Bombs, Bugs, Drugs, and Thugs
Bombs, Bugs, Drugs, and Thugs
Bombs, Bugs, Drugs, and Thugs
Loch K. Johnson
a
New York University Press
New York and London
NEW YORK UNIVERSITY PRESS New York and London First published in paperback in 2002. Copyright 2000 by New York University All rights reserved Library of Congress Cataloging-in-Publication Data Johnson, Loch K., 1942 Bombs, bugs, drugs, and thugs : intelligence and Americas quest for security / Loch K. Johnson. p. cm. Includes bibliographical references and index. ISBN 0-8147-4252-1 (cloth : alk. paper) ISBN 0-8147-4253-X (pbk. : alk. paper) 1. Intelligence serviceUnited States. I. Title. JK468.I6 J634 2000 327.1273dc21 00-055027 New York University Press books are printed on acid-free paper, and their binding materials are chosen for strength and durability. Manufactured in the United States of America 10 9 8 7 6 5 4 3 2 1
To Harry Howe Ransom mentor and dear friend and to Kristin daughter and young scholar extraordinaire
The important thing about foreign policy is this: There are a lot of important objectives: democracy is one of these, security is another, prosperity is another one, environment is another one. So you have to see how you give emphasis to these objectives at any moment in time. Henry A. Kissinger, interviewed by Suchichai Yoon, Nation, Bangkok newspaper, March 8, 1999, A5.
CONTENTS
A New Preface by the Author xi Preface xix List of Figures xxiiii List of Abbreviations xxv Introduction 1
PA R T I :
2. Stocks and (James) Bonds: Spies in the Global Marketplace 3. The Greening of Intelligence 50
72
5. The DCI and the Eight-Hundred-Pound Gorilla 6. Spending for Spies 122 150
Appendix: Americas Intelligence Leadership, 19412000 Notes 225 Bibliography 265 Index 287 About the Author 298
| ix |
The tragic terrorist attacks of September 11, 2001, directed against the World Trade Center in New York City and the Pentagon in Washington, D.C., caught us by surprise. It was the worst intelligence failure in the history of the United States. We must now try to understand why we were caught flatfooted and move quickly to strengthen our intelligence capabilitiesthe nations first line of defense. This book, published several months before the attack, addressed the danger of terrorists and other perils facing the United States. In light of the events of September 11 and continuing terrorist threats, the need to strengthen this nations intelligence shield has become all the more compelling. Intelligence, the means by which we acquire and assess information apt to protect this nation from harm, is a process that has several phases, from planning, collection, and processing to analysis and dissemination. If the United States is to be successful in thwarting future terrorist operations against these shores, we will have to undertake extensive reforms to correct the weaknesses in each of these steps. The planning phase involves deciding which nations and groups abroad and at home warrant intelligence surveillance. At the beginning of every administration, White House officials work with the Director of Central Intelligence (the DCI, who heads Americas thirteen secret agencies) to prepare a threat assessmenta priority listing of the most dangerous perils faced by the United States. These officials then determine how much money from the annual intelligence budget (reportedly about $30 billion prior to the September attacks) will be spent tracking the activities of each target. This planning stage is critical; unless a target is taken seriously in the initial setting of priorities in Washington, D.C., it is unlikely to receive much attention by those with responsibilities for collecting information in the field. During the cold war, the United States concentrated mainly on gathering intelligence about the Soviet Union and other Communist
| xi |
powers, neglecting lesser targets like Afghanistan and the rest of South Asia (where we found ourselves surprised by the hostility toward the United States displayed by the Taliban regime in Afghanistan, as well as the Indian nuclear test in 1998). Terrorism has risen steadily on the list of intelligence priorities since the end of the cold war, but until September 11 it remained just one of several demands on the resources of the U.S. intelligence agencies, including North Korea, Iraq, Iran, China, and Russia (whose massive nuclear arsenal has kept the attention of Washington officials). Now terrorism holds a position of preeminence on Americas threat list, resulting in a greater focus of our worldwide intelligence resources on Osama bin Laden and his al-Qaida network. The collection phase became skewed as well during the cold war, in a manner that has further harmed Americas counterterrorist preparedness. Understandably awed by the technological capabilities of satellites and reconnaissance airplanes (U-2s, SR-21s, unmanned aerial vehicles or UAVs), officials poured most of the intelligence budget into surveillance machines capable of photographing Soviet tanks and missile silos and eavesdropping on telephone conversations in Communist capitals. Human spy networks became the neglected stepchild of intelligence. Machines certainly have their place in Americas spy defenses and they are currently playing an important role in Afghanistan, as satellites hover over its mountains taking photographs and UAVs swoop into its valleys in search of al-Qaida terrorists and their Taliban accomplices. But machines cannot peer inside caves or see through the canvass tents or the roofed mud huts where terrorists gather to plan their lethal operations. A secret agent in the enemys camp is necessary to acquire this kind of informationthe only kind of information likely to give us advance warning of future attacks. Human intelligence (HUMINT) remains the key to protecting the United States against terrorist attacks. HUMINT networks take time to develop, though, and only recently has the DCI launched a major recruitment drive to hire Americans into the CIA with language skills and knowledge about Afghanistan and other parts of the world largely ignored by the United States. Intelligence officers with these skills are needed to recruit local agents overseas who do the actual snooping for the CIA.
| xii |
The September attacks will accelerate these efforts, although finding American citizens who speak pasto, Arab, and farsi and want to work for the intelligence agenciesoperating overseas in less than luxurious (and sometimes dangerous) conditions at a modest government salarymay prove difficult. When the director of the National Security Agency (NSA, which collects electronic information around the world) was asked recently what his major problems were, he replied, I have three: processing, processing, and processing. In this third phase, information is converted from raw intelligencethat is, in its original language (perhaps farsi), in the form of a secret code, or in the obscure details of satellite photographsinto plain English. The chief difficulty is the sheer volume of information that pours into the secret agencies, especially from machines around the globe. A former intelligence manager recalls that he often felt like a fire hose was being held to his mouth. Hundreds of photographs from satellites stream back to the United States each day, along with thousands of untranslated telephone intercepts. The task of sorting through this flood tide to determine what is important and what is routine has sometimes failed to produce key information in a timely manner. The CIA could use some help from the computer whizzes in Seattle and the Silicon Valley on how to manage information flows more expeditiously. Once information is processed, it must be studied for insights into the intentions of our adversaries. This fourth step is called analysis and lies at the heart of the intelligence process. If the CIA is unable to provide reliable insights into what all the information means, all the preceding stages are for nought. Its one thing to discover that a group of terrorists have convened in Kuala Lumpur, but what policymakers really want to know is why the meeting took place. What are the specific implications for Americas security? Good analysis depends upon assembling the best brains possible to evaluate global events and conditions, drawing upon a blend of public knowledge and secrets purloined from adversaries. Our chief problem once again is recruiting into the intelligence service well-educated Americans who have deep knowledge about the politics, economics, culture, and military affairs of places like Afghanistan and Sudan.
| xiii |
The CIA and the other secret agencies have been scrambling to redirect their resources from the Communist world to the forgotten world, butlike the establishment of new HUMINT spy ringshiring and training outstanding analysts takes time. Finally, intelligence must be disseminated to those who make decisions on behalf of the United States. This may seem simple enough, but it is a phase rife with opportunities for error. The information must have five essential characteristics for it to be useful: relevance, timeliness, accuracy, breadth, and purity. Relevance is essential. If intelligence fails to help put out the fires that have flared up in the policymakers inbox, it will be ignored. Incisive reports on political elections in Poland have their place, but what the White House wants above all is knowledge about the progress of the ongoing political and military campaigns in Afghanistan. Often intelligence is out of sync with the main issues before policymakers, because analysts become too wedded to their own research interests (the state of the Mongolian Peoples Army, for example) at the expense of other topics currently more pressing to decision-makers. The White House declaration of war against al-Qaida, the Taliban, and global terrorism will help focus the work of the intelligence agenciesor their top managers will be out of a job. Timeliness is equally vital. The worst acronym an analyst can see scrawled across his intelligence report is OBEovertaken by events. Reports on the whereabouts of terrorists are especially perishable, as we discovered in 1999 when the United States fired cruise missiles at Bin Ladens encampment in the Zhawar Kili region of Afghanistans Paktia Province, only to learn that he had departed hours earlier. Similarly, the accuracy of information is critical. One of this nations worst intelligence embarrassments came in 1999 when the CIA misidentified the Chinese Embassy in Belgrade as a weapons depot, leading to a NATO bombing of the building and the death of Chinese diplomats. Intelligence must be comprehensive as well, drawn from all thirteen intelligence agencies and coordinated into a meaningful wholewhat intelligence officers refer to as all-source intelligence. Here one runs into the vexing problem of fragmentation within the so-called intelligence community (a misnomer if there ever was one). These agencies often act more like separate medieval fiefdoms than a cluster of organi| xiv |
zations all trying to provide the president with the best possible information from around the world. One of the most important needed reforms of intelligence is to elevate the statute and authority of the DCI so that he (or she) can truly harness all of the secret agencies. As things stand now, the DCI has neither budgetary nor appointment powers over the NSA and other agencies. As a result, the all-source goal dreamed of by President Harry S Truman when he created a Central Intelligence Agency remains unfulfilled. Intelligence must also be free of political spin. An analyst is expected to assess the facts in a dispassionate manner. Usually intelligence officers maintain this ethos, but occasionally they succumb to White House pressure for intelligence to pleasedata that support the presidents political agenda rather than reflect the often unpleasant reality that an administrations policy has failed. Much can go wrong with intelligenceand has. If it is to function properly in the new war against terrorism, the planning phase must identify the correct targets and direct adequate resources against them; collection must be riveted on tracking the terrorists and must employ the right mix of machines and human spies (especially the latter). Processing must move faster and with greater skill in discriminating the wheat from the chaff. Analysts must possess a deeper understanding of foreign countries that harbor terrorist cells, as well as a better comprehension of what makes the terrorists tick. And, at the end of the pipeline, intelligence officers must redouble their efforts to provide policymakers with information that is pertinent, on time, reliable, all-source, and unbiased. Policymakers must also have the courage to hear the truth rather than brush it aside, as President Lyndon B. Johnson did with intelligence reports that brought him bad news about the war in Vietnam. Thats a tall order, in light of Americas extensive global interests and responsibilities. Places like Rwanda and Somalia can seem all-important one day and not the next. New flavors of the month pop up and demand attention. At least with terrorism, though, Americans have become painfully aware that this threat has reached a more virulent form and is going to take a long, patient effort to subdue. This is not a flavor of the month, but rather a new global war against a particularly insidious ghost-like enemy who operates in secret and must be hunted down with a stronger reliance on Americas secret agencies
| xv |
than any other war has required. Just as the Pentagon has geared up to fight this war using a range of weapons, troops, and tactics, so must the intelligence agencies move to improve their capabilities for more focused planning, collection, processing, analysis, and dissemination of information on the terrorist target. Americans must brace themselves for further mistakes, though, since this nation will never have perfect information about the activities of every adversary and thug around the world. We have learned how cunning enemies can be and the many hiding places they enjoy. Still, the United States has the worlds largest and most effective intelligence agencies in history. They have painstakingly tracked down and captured Carlos the Jackal in Sudan, the ringleader of the World Trade Center bombing in 1993, the two Libyan intelligence officers convicted in the bombing of Pan Am flight 103, the leaders of the Shining Path in Peru, and the Pakistani (Mir Aimal Kansi) who murdered two CIA officers near the agencys headquarters in 1993. In due time, they will find those who masterminded the horrible murders in September of 2001. We have much work to do, though, to improve our intelligence agencies. If one good thing can come out of this national tragedy, it may be our awakening to the necessity for intelligence reform. We are still operating under the antiquated National Security Act of 1947. Fresh initiatives are necessary to combat the stealthy enemies we face in the postCommunist world. The place to begin is with consolidation of the intelligence agencies under the control of a stronger DCI, held accountable to congressional oversight committees. A DCI with the proper authority can in turn support the new Office of Homeland Defense with the kind of relevant, timely, accurate, all-source, unbiased intelligence on terrorists that we so badly needed before the attacks against New York City and Washington, D.C. We must also elevate the importance of analysis in the intelligence agencies. This can be done by hiring more analysts, especially individuals with knowledge, language skills, and experience of the world that lies beyond Russia and Europe. Analysts must be paid more, and given increased opportunities to travel and live abroad, rather than being tethered to their PCs at headquarters. Further, analysts must be encouraged to mingle more extensively with scholars in universities and think tanks, submitting their papers (sans
| xvi |
classified material) to academic journals referred by outside peers. They should also attend more open academic conferences on world affairs and invite more outside scholars to participate in the CIAs internal discussions about international issues. Outsiders should be invited more frequently to join in the writing of reports for top decision-makers, or to provide critiques of CIA reports albeit with the caveat that ideologues with policy axes to grind should be avoided. Future presidents would be well, in addition, to appoint a leading analyst as CIA director. This would send a signal that analysis lies at the very heart of good decision-making for Americas foreign policy. What better time than now for correcting the information inadequacies that allowed the devastating attacks against the American homeland? Large bureaucracies are unlikely to reform themselves, however. White House leadership will be necessary. Will President George W. Bush take the time and display the determination to bring about the necessary changes? The events of September 11 give him no other choice.
| xvii |
PREFACE
As with my earlier research on intelligence over the past twenty-five years, this book has benefited enormously from the help of others. The footnotes and bibliography in this volume attest to the valuable literature produced by those writing on intelligence: works by former government officials, media correspondents covering this elusive beat, and a growing number of academic scholars. I thank them one and all. I am pleased to pay special tribute to a number of individuals who assisted me more directly with this volume. Mark S. R. Heathcote offered thoughtful insights into the question of economic security (the subject of chapter 2, based on a lecture I presented at St. Antonys College, Oxford University, in 1999). Scott A. Hershovitz, my former undergraduate honors student and currently a Rhodes scholar at Balliol College, Oxford University, tackled some of the research problems in chapter 3 (environmental intelligence). Diane C. Sawyer, a former CIA officer and now a private-sector manager, brought a valuable perspective to chapter 4 (health intelligence) and conducted some of the research. Kevin J. Scheid, a budget expert, led me through the maze of national security procedures followed by the Office of Management and Budget and worked closely with me in drafting an earlier version of chapter 6 (intelligence funding). Thomas P. Lauth, a friend and colleague at the University of Georgia and a public finance expert, also read an early version of chapter 6 and made useful suggestions, for which I am grateful. Annette Freyburg, my former graduate student and freshly minted Ph.D., researched shoulder-to-shoulder with me on an earlier version of chapter 7 (foreign intelligence liaison) and was especially helpful with the German literature review. Mark M. Lowenthal and H. Bradford Westerfield, whose writing in this field has been exemplary, generously read the entire manuscript and offered enormously valuable guidance. My understanding of contemporary intelligence issues has benefited, too, from an opportunity to serve as special assistant to Les Aspin, chair
| xix |
Preface
of the Commission on the Roles and Missions of the U.S. Intelligence Community (the Aspin-Brown commission, Washington, D.C., 1995 96). During and since the commissions proceedings, I have been able to discuss a range of intelligence topics with its members and staff, as well as with several of the witnesses who testified before the panel; their insights are greatly appreciated. In addition, I served as an assistant to Senator Frank Church (D, Idaho) on the U.S. Senate Select Committee on Intelligence (197576); as the issues director in Churchs presidential campaign (1976); as the staff director of the Subcommittee on Oversight, U.S. House Permanent Select Committee on Intelligence (1977 79); and as a foreign policy consultant to the White House during the Carter administration. My knowledge of intelligence issues has benefited as well from informal discussions with scholars and a variety of government officials, both here and abroad. I thank the following good people (who, along with the others I have mentioned in this acknowledgment, are in no way responsible for any errors of fact or interpretation that may appear in these pages): Christopher Andrew, John B. Bellinger III, Richard A. Best, Cliff Blaskowsky, Ann Z. Caracristi, David Charters, James R. Clapper Jr., Charles G. Cogan, Richard N. Cooper, Jack Davis, Linda England, Linda C. Flohr, Ambassador Wyche Fowler Jr., Richard H. Giza, Allan E. Goodman, Representative Porter Goss (R, Florida), David D. Gries, Sir David Hannay, Glenn P. Hastedt, Michael Herman, Sarah B. Holmes, Douglas M. Horner, Arthur S. Hulnick, William Hyland, Rhodri Jeffreys-Jones, James H. Johnston, Frederick M. Kaiser, Wolfgang Krieger, William T. Kvetkas Jr., Edward Levine, John Macartney, Ernest R. May, Brendan G. Malley, Phyllis Provost McNeil, John Millis, John H. Moseman, Joseph S. Nye Jr., Hayden B. Peake, Charles Peters, Walter Pforzheimer, John Prados, Harry Howe Ransom, Jeffrey T. Richelson, L. Britt Snider, Robert D. Steele, William P. Sullivan, Stafford T. Thomas, Gregory F. Treverton, Michael Turner, Richard R. Valcourt, Wesley K. Wark, David Wise, and Paul D. Wolfowitz. Several intelligence officers also spent time explaining their work to me, and I thank them profusely while maintaining my assurance of their anonymity. At least I can publicly acknowledge the insightful guidance (through conversations, interviews, and correspondence) of all the directors of Central Intelligence (DCIs) since and including Richard
| xx |
Preface
Helms, as well as the admirable patience of the CIA public affairs officer David French. I am grateful to two of my student research assistants, Amy Elizabeth Early and William Gillespie, for their careful library and Internet searching, and to the University of Georgia for its ongoing support, especially the travel assistance from the Office of the Vice President for Research and a pleasant working environment provided by the political science department. Bertis and Catherine Downes offered me an opportunity to write in the tranquillity of their sylvan retreat, Wood House, nestled in the mountains of North Carolina. I thank them for these quiet times and for their friendship. I would also like to thank the following journals and institutions for allowing me to draw on earlier research for this book: Espace Europe, Freedom Review, Intelligence and National Security, International Journal of Intelligence and Counterintelligence, the German Historical Institute, Journal of Conflict, Public Budget & Finance, Research Institute for European Studies, St. Antonys College at Oxford University, and St. Ermins Press. Finally, I wish to express my appreciation to Niko Pfund, the inspiring editor in chief of New York University Press for his encouragement, which sustained me during the inevitable frustrations of research and writing; to Despina Papazoglou Gimbel of the press for her guidance; and to my wife, Leena, for bringing sunshine and flowers into each day.
| xxi |
FIGURES
2. The Office of the Director of Central Intelligence and the CIA 99 3. The Dominance of Military Agencies over Total Intelligence Funding 124 4. Percentage Increase in Intelligence versus Defense Spending since 1980 127 5. The Relationship between Acceptable Risk and the Need for Intelligence Resources 136
| xxiii |
A B B R E V I AT I O N S
ADCI/A: assistant director of Central Intelligence/Administration ADCI/A&P: assistant director of Central Intelligence/Analysis and Production ADCI/C: assistant director of Central Intelligence/Collection AFIO: Association of Former Intelligence Officers AFMIC: Armed Forces Medical Intelligence Corps ANSIR: Awareness of National Security Issues and Response (FBI) ARIO: Association of Retired Intelligence Officers BfV: German equivalent of the FBI BND: Bundesnachrichtendienst (German intelligence service) BNL: Bana nazionale del lavoro BW: biological weapons CA: covert action CAS: Covert Action Staff CBW: chemical-biological warfare CDC: Centers for Disease Control CDU: Christian Democratic Party (Germany) CE: counterespionage CFR: Council on Foreign Relations CHAOS: cryptonym for a CIA domestic spying operation CI: counterintelligence CIA: Central Intelligence Agency CIC: Counterintelligence Center (DCI) CIRA: Central Intelligence Retirees Association CMS: Community Management Staff COINTELPRO: FBI Counterintelligence Program COS: chief of station (CIA) COSPO: Community Open Source Program Office CNC: Crime and Narcotics Center (DCI) CTC: Counterterrorist Center (DCI)
| xxv |
List of Abbreviations
CW: chemical weapons DCIA: director of the Central Intelligence Agency DCI: director of Central Intelligence DDA: deputy director for administration (CIA) DDCI/CM: deputy director for Central Intelligence/Community Management DDCIA: deputy director of the Central Intelligence Agency DDI: deputy director for intelligence (CIA) DDO: deputy director for operations (CIA) DDS&T: deputy director for science and technology (CIA) DEA: Drug Enforcement Administration DEC: DCIs Environmental Center DECA: Developing Espionage and Counterintelligence Awareness (FBI) DIA: Defense Intelligence Agency DA: Directorate of Administration (CIA) DI: Directorate of Intelligence (CIA) DNI: director of National Intelligence DO: Directorate of Operations (CIA) DS&T: Directorate of Science and Technology (CIA) DGSE: French Intelligence Service ECP: Economic Counterintelligence Program (FBI) EOP: Executive Office of the President EOS: Earth Observing System (NASA) EPA: Environmental Protection Agency ETF: Environmental Task Force (MEDEA) EWG: Environmental Working Group FAS: Federation of American Scientists FBIS: Foreign Broadcast Information Service FIAS: Foreign Intelligence Surveillance Act FOIA: Freedom of Information Act FPD: Free Democratic Party (Germany) GAO: General Accounting Office (Congress) GATT: General Agreement on Trade and Tariffs GDIN: Global Disaster Information Network GDP: Gross Domestic Product GRU: Soviet military intelligence GSG: German counterterrorism service
| xxvi |
List of Abbreviations
HPSCI: House Permanent Select Committee on Intelligence HUMINT: human intelligence (espionage) IC: Intelligence Community ICBM: intercontinental ballistic missile ICS: Intelligence Community Staff IDP: imagery-derived products IG: inspector general IMINT: imagery (photographic) intelligence INF: intermediate-range nuclear forces INR: Bureau of Intelligence and Research (Department of State) IOB: Intelligence Oversight Board ISCAP: Interagency Security Classification Appeals Panel ISI: Inter-Services Intelligence (Pakistani intelligence agency) I&W: indicators and warning JCS: Joint Chiefs of Staff Jstars: Joint Surveillance Target Attack Radar Systems KGB: Soviet foreign intelligence and secret police KLA: Kosovo Liberation Army MASINT: measurement and signatures intelligence MEDEA: Greek mythological nickname for the Environmental Task Force (CIA) Mossad: Israeli intelligence service MRBM: medium-range ballistic missiles MRC: major regional conflict NAC: National Assessment Center (proposed) NASA: National Aeronautic and Space Administration NAFTA: North American Free Trade Agreement NBC: nuclear, biological, and chemical (weaponry) NEOB: New Executive Office Building NFIP: National Foreign Intelligence Program NGO: Non-Governmental Organization NIC: National Intelligence Council NIE: National Intelligence Estimate NIMA: National Imagery and Mapping Agency NIO: National Intelligence Officer NISD: National Intelligence Security Directive NOAA: National Oceanic and Atmospheric Agency
| xxvii |
List of Abbreviations
NOC: nonofficial cover NPC: Nonproliferation Center (DCI) NPIC: National Photographic Interpretation Center NRO: National Reconnaissance Office NSA: National Security Agency NSC: National Security Council NSCID: National Security Council Intelligence Directive NSDM: National Security Decision Memorandum NSTC: National Science and Technology Council NTM: National Technical Means (mechanical spy platforms) OMB: Office of Management and Budget ONI: Office of Naval Intelligence OPA: Office of Public Affairs (CIA) OPEC: Organization of Petroleum Exporting Countries OSINT: open-source intelligence OSIS: Open-Source Information System OTI: Office of Transnational Issues (CIA) PDB: Presidents Daily Brief PFIAB: Presidents Foreign Intelligence Advisory Board PLO: Palestine Liberation Organization PM: paramilitary PRC: Peoples Republic of China ROSE: Rich Open Source Environment (CIA computer system) SAS: British intelligence service SDO: support to diplomatic operations SHAMROCK: cryptonym for NSA domestic spying operation SIGINT: signals intelligence SISDE: Italian intelligence service SMO: support to military operations SPD: Social Democratic Party (Germany) SSCI: Senate Select Committee on Intelligence Stasi: East German intelligence service TECHINT: technical intelligence UNSCOM: United Nations Special Commission USAMRIID: U.S. Army Medical Research Institute for Infectious Diseases USAMRMC: U.S. Army Medical Research and Material Command
| xxviii |
List of Abbreviations
USC: United States Code USTR: United States trade representative VA: Veterans Administration VX: a deadly nerve agent used in chemical weapons WHO: World Health Organization (UN) WMD: weapons of mass destruction
| xxix |
INTRODUCTION
Certainly nothing is more rational and logical than the idea that national security policies be based upon the fullest and most accurate information available; but the cold war spawned an intelligence Frankenstein monster that now needs to be dissected, remodeled, rationalized and made fully accountable to responsible representatives of the people. Harry Howe Ransom, Reections on Forty Years of Spy-Watching, 1994
Introduction
Introduction
Figure 1. The U.S. Intelligence Community
In addition, NIMA, the newest intelligence agency, prepares world maps used by everyone from crisis managers in the White House Situation Room to fighter pilots and foot soldiers in combat (and also for targeting coordinates built into the electronic brains of cruise missiles and other smart weapons). Just how important accurate mapping
| 3 |
Introduction
can be was underscored in 1999 during the war precipitated in the Balkans by a Serbian takeover of Kosovo. Out-of-date mapping data on Belgrade went from the hands of intelligence analysts into the cockpit of a NATO B-2 bomber pilot headed for the Yugoslav city. Under the impression that an improperly identified building was an arms depot, the pilot dropped part of his payload on what proved to be the Chinese embassy. Four cabinet departments have nondefense intelligence agencies: the Energy Department, with one intelligence unit that tracks the worldwide ow of nuclear materials and another brand-new agency created to improve security at the nations weapons laboratories; the State Department, whose Bureau of Intelligence and Research (INR) serves the secretary of state and the diplomatic corps and draws heavily on the highly touted political reporting of foreign service ofcers; the Treasury Department, which supervises intelligence units within the Secret Service and the Internal Revenue Service (IRS); and the Justice Department, home of the counterintelligence corps of the Federal Bureau of Investigation (FBI) and the intelligence division of the Drug Enforcement Administration (DEA). Finally, the CIA is an institutionally independent entity, situated in neither the organizational framework of the Pentagon nor that of any of the other cabinet departments (although it does collect and analyze strategic military information from abroad, in addition to its responsibility for a wide range of nonmilitary subjects). The CIA enjoys a special stature in the intelligence community by virtue of its early creation in 1947, predating most of the other agencies. More important, the main ofce of the leader of the entire intelligence communitythe director of Central Intelligence (DCI)is located on the seventh oor of the CIAs headquarters building in Langley, a neighborhood in the Virginia suburb of McLean, near Washington, D.C. Surrounded by an electric barbwire fence and patrolled by stern-faced guards in dark blue fatigues with black pistols at their hips and German shepherds at their heels, the CIA is a 219-acre leafy, campuslike compound on the west bank of the Potomac River. The DCI also has an ofce in the Old Executive Ofce Building adjacent to the White House but spends little time there outside of attending the occasional meetings of the presidents Foreign Intelligence Advisory Board.
| 4 |
Introduction
Introduction
can intercept revealing conversations held by those who intend harm to the United States. But even when they save lives (the main purpose of intelligence), these achievements usually go unheralded, since the secret agencies try to conceal successful methods that they might use again against future threats. Nonetheless, some victories have made their way into the public record, including the rounding up of more than fty international terrorists in the past ve years; effective support for U.S. military operations in the Persian Gulf, Bosnia, and Kosovo; the destruction of Colombias Cali drug cartel; the disruption of terrorist Osama bin Ladens activities; and an important role in the effort to prevent the outbreak of war between Turkey and Greece.4 Certainly Americas intelligence agencies have also made their share of mistakes. Their close watching of Soviet military activities, however, may well have helped (along with the nuclear deterrent) to prevent the cold war from mushrooming into a thermonuclear war-the most important contribution of these agencies since their establishment. So, as with all human ventures, the intelligence ledger has its pluses and minuses. To reduce the debts in the twenty-rst century will not be easy, as Americas current advantage in imagery is rapidly diminishing. In 1999 the civilian sector launched a surveillance satellite that is almost as good as the NROs best space platforms and whose photographs are for sale to anyone with cash or a credit card. During the Persian Gulf War, the United States enjoyed a nearly perfect view (transparency) of the Iraqi battleeld, allowing American commanders to pinpoint targets and call in smart weapons that demolished enemy positions with much greater success than in previous wars. In contrast, the Iraqi military remained in a fog about the American side of the battleeld. Within a few years, however, Iraq and other rogue nations will have access to their own satellitesor commercially available substitutes (the Rent-a-Satellite option)to acquire battleeld transparency for themselves. Americas SIGINT capacities are declining as well, approaching what one authority has referred to as a crisis situation.5 The NSAs listening satellites capture microwave telephone transmissions from the air. But the world is rapidly switching to underground (and undersea) ber-optic modes of communications, which are much harder for this agencys technicians to tap and so are leaving the NSA with an increasingly irrelevant constellation of SIGINT satellites. Furthermore, the NSA has tra| 6 |
Introduction
ditionally depended on its considerable skills at decoding foreign diplomatic communications to gain access to secret information. But nations and terrorist groups are growing more and more clever at encrypting their messages using complicated mathematical, computer-based technologies that can stymie even the most experienced NSA cryptologists. Moreover, under pressure from the prot-oriented U.S. software industry and the Department of Commerce, the Clinton administration decided in 1999 to allow the export of advanced American software that encrypts electronic communications, making it even harder for the NSA and the FBI to break into the communications of foreign entities that might intend harm to the United States. There is an additional shortfall on the human side of the intelligence community. Currently, the agencies do not have enough spy handlers (case ofcers) abroad to recruit foreign agents (assets), especially in places where the United States has never had much of a presence (such as in China and various Arab nations). As a result, the human intelligence owing back to the CIA is insufcient as well. Even if this HUMINT problem could be solved, the community would still have another, equally serious human deciency: brain power. The secret agencies lack enough talented information interpreters (analysts) to make sense of all the data that stream into their ofces each day. On the eve of the Persian Gulf War, for instance, the DIA had only two analysts assigned to study the intelligence on Iraq.6 Imagery analysis has also suffered from inadequate attention. An intelligence supervisor on Capitol Hill reported that less than half of the pictures taken by our satellites ever get looked at by human eyes or, for that matter, by any sort of mechanized device or computerized device detecting change.7 The United States does not have enough imagery analysts, many of whom chose to retire rather than be uprooted from the CIA and sent to the new NIMA. Across the board of the various ints (intelligences), Americas analytic depth is uncomfortably shallow. The rst generation of U.S. intelligence ofcers hired in the 1950s began retiring in the past few years and has yet to be replaced with an adequate number of fresh recruits. The intelligence community is thus undertaking its largest recruitment effort since the early days of the cold war. But even after the newcomers are trained and sent overseas, it takes yearsdecades usuallyfor them to mature into effective ofcers with a productive network of assets in
| 7 |
Introduction
foreign capitals. We need to recruit talent, grow it, and nurture it, emphasized a ranking CIA ofcial, and this means paying and promoting area experts in a way that is competitive with the private sector.8 Lacking, too, are adequate connections between the various collectors and analysts inside the intelligence community at home, on the one hand, and U.S. military and civilian personnel overseas, on the other hand. Also missing is an effective pooling of the ndings and insights produced by all the agencies in the intelligence community (a desirable all-source intelligence capability). We need a smoother electronic communication of intelligence everywhere, stressed a recent director of State Department intelligence.9 In a nutshell, the secret agencies must recapitalize or become obsolete. They need better technology, more ofcers in the streets of foreign capitals, additional analysts at home (though with more frequent travel abroad than is presently the case for these desk-bound thinkers),10 and a greater integration of all phases of intelligence, from the gathering and analysis of information to its timely dissemination. These goals can be achieved while at the same time (with a thoughtful shifting of priorities) reducing the overall size and expense of the intelligence community. The preferred model is a smaller, more efcient intelligence servicenot as limited as Britains secret service, since the United States has broader global responsibilities than Great Britain does, but similar in its leanness and agility. Any ornery mule can kick down a barn; building one is harder. Similarly, the various shortcomings that plague the intelligence agencies are relatively easy to outline, whereas coming up with workable solutions is a more difcult assignment. Nonetheless, this book hopes to contribute toward that end. The starting point is a look at the array of threats that confront the United States in this new and uncertain world, for which intelligence is expected to provide the rst line of defense.
| 8 |
PA R T I
ONE
omnipresent Communist threat would produce a dramatically different approach to international affairs in Washington, D.C., as betting the radical change in global politics. Within the secret connes of the National Security Council (NSC), the Pentagon, and the intelligence community, planners drew up fresh lists of enemiesreal and potentialnow arrayed against the United States. The White House and Congress created a special panel of inquiry, The Roles and Capabilities of the United States Intelligence Community (the Aspin-Brown commission), viewed widely as an opportunity to revamp the nations secret agencies for a different kind of threat environment. Public ofcials and media pundits claimed that economics would now replace the nations more traditional concerns about military security. The intelligence community adapted fairly quickly to the changed environment, contrary to the expectation that the secret agencies (in the caricature of bureaucracies) would prove sluggish and resistant to change. By 1994, the CIA had extensively reoriented its global operations, dedicating only about 15 percent of its assets to Russian intelligence collection and analysis. Gates, the rst postcold war DCI (199193), referred to this new orientation as a massive reallocation of resources.3 The former Soviet empire, once hidden behind an iron curtain, was now on view to outsiders. Russia alone had hundreds of neophyte independent newspapers, magazines, and other media outlets, as well as a handful of competitive political parties. Secrets were fewer, so the need for espionage by the CIA was less. This impressive reshufing of duties notwithstanding, Americas foreign policy goals remained relatively static in the post-Communist world. To be sure, the list of adversaries had changed, with rogue nations like North Korea and Iraq moving to the forefront to take the place of the Soviet Union. Attention to economic globalism fell short, however, of what the hoopla over the creation of a new National Economic Council seemed to foreshadow early in the Clinton administration. Moreover, the Aspin-Brown commission was able to make only modest adjustments to, rather than a sweeping reform of, the fty-year-old CIA and the rest of the intelligence community. In the highest councils of government, military security continued to hold sway over other agenda items, and the military intelligence agencies still received the lions share (85 percent) of the annual budget for espionage.
| 12 |
Nations become not what they may wish to be but what they must be. Accordingly, in light of the enduring military threats in the world after the cold war, the United States was forced to set aside thoughts of a peace dividend, particularly since the country had been thrust into a new leadership position. Less by aspiration than by fait accompli, the United States had become the worlds foremost power. Reinforced by the dynamics of the military-industrial complex (alive and well even without the Soviet threat), Washington ofcials maintained U.S. defense and intelligence budgets at near cold war levelsindeed, using the excuse of the Kosovo crisis in 1999, GOP legislators sought and obtained large spending increases for national security. If America now was the worlds leading power, it also had to have a credible military capability to intervene when necessaryor so the nations leaders seemed to think. The intelligence community would have to monitor potential military threats around the globe, from tracking the proliferation of major weapons systems and anticipating chemical and biological terrorist attacks against the United States to gathering information vital to American military operations whenever they might take place. Political Security As Clausewitz pointed out, war is the pursuit of politics by other means. The United States must understand the political machinations of other nations as well as the location and capabilities of their war machines. The twenty-rst century has not changed the concentration by Americas intelligence agencies on both military and political concerns, what is often referred to as strategic interests in contrast to economic and humanitarian considerations.7 Does North Korea intend to start a war against South Korea or Japan? Do the leaders of China have imperialist intentions in Asia, perhaps beginning with an invasion of Taiwan? Has Iraq resumed its quest for nuclear weapons? How friendly will the new president of Russia be toward the United States? Economic Security Because of the United States abiding interest in the military and political dimensions of international affairs, its goal of economic prosperity has
| 14 |
usually been relegated to second position in the list of Americas leading foreign policy (and, therefore, intelligence) objectives.8 At the beginning of the Clinton years, however, it seemed as though issues of international economics were about to displace Americas long-standing central interest in military and political security. With the cold war now in the hands of the historians, the new administration decided that it could afford to concentrate more on domestic policy considerations. The Clinton administration has given priority to commercial diplomacy, making the promotion of American exports a primary foreign policy objective, observed a foreign policy expert in 1997.9 Or as President Clintons U.S. trade representative put it in the early months of the administration, The days when we could afford to subordinate our economic interests to foreign policy or defense concerns are long past.10 The presidents rst DCI, R. James Woolsey, reinforced these sentiments. The days are gone, he said, when international economics could be labeled low politics to separate it from the higher, loftier plane of political-military issues.11 President Clintons undersecretary of state for political affairs further stressed that our economic interests are paramount,12 and the director of the FBI, Louis Freeh, added, Weve entered a phase and a century where our economic independence and security and strength [are] really identical to our national security.13 Throughout his presidential honeymoon, Bill Clinton appeared determined to focus on rebuilding the American economy. His administration believed, according to a trade expert, that international issues (other than commercial ones) could be for the most part marginalized.14 Then the pressure of security problems began to crowd in on the presidents economic aspirations: Iraq, Somalia, Burundi, Rwanda, North Korea, Bosnia, the terrorist Osama bin Laden (hiding in Afghanistan under the protection of the Taliban regime), mainland Chinas threats against Taiwan, Israeli-Palestinian are-ups, tensions between India and Pakistan, and the war in Kosovo that threatened to embarrasssome said unravelNATO, Americas second oldest defense alliance (signed in 1949, two years after the Rio Treaty provided for regional security in the Western Hemisphere). International economics no longer enjoyed the front seat in the bus. Most of the threats to global stabilityand ultimately to the security and integrity of American civilizationhave had less to do with the
| 15 |
intricacies of geoeconomics, wrote a foreign policy specialist, than with a primal fact of international politics, namely, states and peoples intimidating one another by force of arms.15 While some authorities continued to argue that American foreign policy had become largely a battle over international economic supremacy,16 by 1996 the Clinton administration knew better. It was up to its ears in problems that chiey involved the Pentagon and the Department of State, not the Departments of Commerce and Treasury or the U.S. trade representative. This is not to say, of course, that trade no longer matters. It has always mattered, from the days of Thomas Jeffersons naval duels with the Barbary pirates in the Mediterranean (an early use of military force to protect economic interests) to contemporary diplomatic struggles with Japan and China over worrisome trade imbalances. Today, as a New York Times foreign affairs columnist writes, Economic crises can spread rapidly from one continent to another.17 Although America cannot afford to ignore the ramications of an increasingly global economy, the Clinton administrations initial euphoria for things commercial gave way to a greater concern for military and political affairs.18 Intelligence has mirrored these policy interests, focusing more on economic intelligence from 1993 to 1997, after which intelligence support for military operations gained ascendancy when the Iraqis again got out of control and President Slobodan Milosevic started his policy of ethnic cleansing in Bosnia and Kosovo. The Security of a Quality Life with Human Dignity The United States foreign policy goals extend beyond the military, political, and economic. Though generally less well supported by the American people,19 a cluster of lifestyle issues that threaten humanity attract the sympathies of many citizens, issues such as adequate health care, quality housing and education, clean air and water, protected woods and streams, defense against drug dealers and other international criminals, and freedom from the biggest killer of all, infectious diseases.20 Many Americans care, too, about global injustice, particularly the violation of human rights in other lands. A major impetus for U.S. military involvement in Africa and the Balkans since the end of the cold war was a heartfelt concern for the suffering of the people in those regions,
| 16 |
whether they were victims of hunger or armed conict. Americans also hope to see the benets of democracy spread worldwide, a dominant theme in the Clinton administration, with its goal of democratic enlargement taking the place of Communist containment as the centerpiece of American foreign policy. Expressions of cold war nostalgia are commonplace among intelligence ofcers and other members of the national security establishment in the United States. During the cold war, life was simpler for intelligence agencies, reminisced a senior intelligence ofcer. There was a reasonably clear consensus about who the bad guys were, about what countries were legitimate targets for intelligence collection. Today, the situation is much more complicated.21 This complication arises from the host of claimants for the intelligence dollar that was once dedicated almost exclusively to anti-Communist activities. With Communism now largely in ruins, policy ofcials have turned to other threats facing the nation. While most of these perils are military, political, or economic (like the wars in the Persian Gulf and Kosovo, the byzantine political maneuvering in Moscow, and the recent Asian nancial crisis), some are more novel and have stimulated debate over the so-called New Intelligence Agenda, characterized by a greater awareness of how intelligence might be used to improve the quality of life for Americans and to make the world more humane. In 1994, the director of the DCIs National Intelligence Council (NIC) created a new position: a national intelligence officer, or NIO, for global affairs. This analysts portfolio gave special attention to soft power, the directors label for issues of human rights, international ethics, and other cultural and ideological influences related to the quality of life and human dignity around the world, as distinguished from the hard power of traditional military, political, and economic might.22 This large basket of responsibilities contains everything from global ecology issues and the danger of infectious diseases to world hunger and violations of basic human rights. While the NIC global affairs position is new, the concern for such matters is not. In preparing his speech to announce the Marshall Plan in 1947, General George C. Marshall crossed out a reference in an early draft to the Communist threat. Instead, the enemies of humanity that he chose to emphasize were hunger, poverty, desperation and chaos.23 The NIO for global
| 17 |
affairs is expected to monitor such conditions and to report on their likely consequences for American and allied interests abroad. The growing importance of soft power is unmistakable. As a leading newspaper reported with respect to the war in Kosovo, the United States has raised human rights to a military priority and a pre-eminent Western value.24 To what extent the intelligence community should reorient its resources toward issues of soft power is a matter of considerable debate in Washington, with interest in soft power on the ascendance. During the recent Balkan wars, for instance, government ofcials here and abroad displayed a strong interest in the capacity of U.S. spy satellites to look for evidence of genocide. From hundreds of miles deep in space, these satellites high-powered cameras were able to discern evidence that mass graves may have been freshly dug in the villages of Pusto Selo and Izbica in Kosovo during 1999.25 This imagery then allowed UN investigators on the ground to search for further evidence of atrocities that might be used in trials against the murderers. During the war in Kosovo, U.S. satellite cameras lmed the countryside several times a day, recording the pathways of enemy troops and tanks, locating burning villages, and searching for signs of civilian carnage. Low-ying pilotless aircraft augmented the satellite data by crisscrossing the province each day with cameras fastened to their bellies. The surveillance operations of two piloted radar planes, called Jstars (Joint Surveillance Target Attack Radar Systems), further contributed to the goal of battleeld transparency.26 When the war ended, Apache helicopters (never used in actual combat in Kosovo) ew intelligence reconnaissance missions over the region, aiming the cameras in their cockpits at any individuals on the ground suspected of foul playSerbs and their opponents and the Kosovo Liberation Army (K.L.A.), alike. After the cameras recorded the criminal activity, the Apaches swooped in to make an arrest.27 Valuable, too, both during and after the war, were HUMINT reports on the activities of Serbian military and police forces. More broadly, HUMINT has grown into an important component of the U.S. efforts to judge the state of human liberty around the world, as summarized in the State Departments annual appraisal of human rights in every foreign nation. Intelligence, often sneered at as an unsavory business, has be| 18 |
come a knight errant in the cause of human rights, uncovering foul deeds and helping apprehend the bad guys. The objectives of Americas external relations are, above all, the physical protection of the United States and its allies (a shield relying on knowledge about foreign powers military strength and political schemes), followed by a concern for economic prosperity. Also on the agendathough often an interest more rhetorical than realis the wellbeing of people in other nations and their freedom from coercion. This is the moral impulse in Americas external relations that has long buttressed foreign aid programs, cultural exchanges, support for struggling democracies, the Peace Corps, and, more recently, selected military interventions abroad (notably Kosovo in 1999). Using this rich intelligence agenda in the post-Communist era, this and the next chapter offer illustrations of the role played by intelligence in support of Americas traditional military, political, and economic objectives, beginning with a look at intelligence efforts to prevent the spread of weapons of mass destruction. The following chapters examine two key dimensions of the New Intelligence Agenda, environmental and health security. The purpose is not to offer a definitive survey of the current intelligence agenda; after all, one could write a separate book on military intelligence activities alone, or political intelligence, or economic intelligence. Rather, the purpose is to provide a glimpse into some of the threats to this nation that warrant monitoring by the secret agencies.
Russia has sharply declined, high-quality espionage against this part of the world continues, including the use of the NROs most expensive satellite platforms. The purpose is to alert the United States if Moscow makes any untoward changes in its relations with the West, particularly with respect to military posture. Even though Russia is now more open, it still hides information about its military capabilities and intentions, just as it did during the cold war. So does the United States. Moreover, Russias pro-American sentiments in the aftermath of the cold war have been ckle at best. In 1999, NATOs bombing of Serbia produced mass protests against the United States, leading a New York Times correspondent in Moscow to report that Russia . . . seems at times almost gleefully anti-American and, yearning for empire, is considering new unions with Belarus and Yugoslavia itself.29 All nations and other entities (such as terrorist organizations) that have the ability to inict grievous harm on the United States stand high on its list of intelligence targets. The Clinton administration (as did each of its predecessors during the cold war) carried out a global threat assessment exercise soon after entering ofce. The purpose was to sort out from the nations of the world those that were both well armed and hostile (or ambivalent) toward America. The White House expected the intelligence agencies to watch these top-level threats with special scrutiny, especially to nd out as much as possible about their military and political capabilities and intentions. This objective can be difcult. Nations are becoming ever more sophisticated at hiding their weaponry. North Korea has cavernous underground bunkers at Kumshang-ni and elsewhere, large enough to house a plutonium production facility and possibly a reprocessing plant as well.30 Inside these hideouts, technicians can construct nuclear bombs, free from the probing cameras of U.S. surveillance satellites. Likewise, ofcials in India knew when the NROs satellites would be passing over their territory and, in synchrony, camouaged their nuclear-testing preparations.31 At least, though, TECHINT (supplemented by HUMINT) has been able to monitor most signicant nuclear weapons developments. The U.S. intelligence community had a good track record of knowing where Soviet missiles and tanks were during the cold war, especially after the Cuban missile crisis when U.S. surveillance satellites be| 20 |
came more sophisticated and plentiful. Much harder to fathom have been the political intentions of leaders in Moscow, Baghdad, Belgrade, and Pyongyang, for in these places one needs a HUMINT asset with access to the inner sanctums where decisions are made. The Importance of Nonproliferation High on the list of military-political intelligence objectives is a problem that cuts across national boundaries: the proliferation of nuclear, biological, and chemical (NBC) weapons, as well as the development of radiological agents for military purposes. Nations acquire advanced weapons for a number of reasons, sometimes as a means for discouraging an adversary from trying to topple nation-state dominoes that might eventually fall toward their own shores (a fear of the United States with respect to Soviet military operations in the developing world). Or because they seek status (Great Britain) or are curious about the ability to master the technical problems (a potential fascination for Sweden and Switzerland). Some countries consider themselves in a state of siege and view weapons of mass destruction as the ultimate deterrent (North Korea, Israel). Others appear driven by a lust for power and hegemony (Iraq, Iran) or a sense of fatalism (the Japanese terrorist group Aum Shinrikyo). Disturbing reports at the end of the cold war suggested that a surge in the spread of NBC weapons was rampant, including nuclear programs in Iraq and North Korea; aggressive efforts by Iran to purchase ssionable materials; the sale of advanced conventional weaponry by North Korea and other nations to Iran, Algeria, Pakistan, Syria, and Libya; the suspected sale of missiles by China to Pakistan; the near outbreak of a nuclear war between Pakistan and India; and the fear of international crime rings attempting to steal and sell weapons.32 According to public opinion polls, the American people view the spread of dangerous weapons as the single most important threat facing the United States in the aftermath of the cold war.33 Of special concern to weapons experts is the threat of biological warfare (BW). Biological weaponsemploying such agents and toxins as anthrax bacteria, botulinum toxin, smallpox virus, tularemia, cholera, and plague bacillusare cheaper to produce than nuclear weapons are (costing millions rather than billions of dollars). Moreover, they are easier to
| 21 |
conceal and can cause a larger number of casualties (although the dissemination is vulnerable to winds and other weather conditions). For delivery, one could even use a crude system of aerosol sprayers attached to an aircraft, a boat, a truck, or simply a portable device strapped to a terrorists back. By weight, BW materials are hundreds of thousands of times more potent than the most toxic chemical warfare (CW) agents (such as the sarin gas used, fairly ineffectively, in the Tokyo subway system in 1995 by the Aum Shinrikyo terrorist organization). However, if the terrorist does know how to disseminate the agent or toxin efciently, BW provides ground coverage that is far more expansive than any otherincluding nuclearweapons. Existing BW agents can also be modified by genetic engineering, making the materials even more pathogenic or infectious. Even benign microorganisms can be converted into pathogenic or toxin-producing BW agents by inserting into these organisms genetic material from harmful species. With recombinant DNA technology, for example, notes an unclassified government report, it is possible to produce new organisms, exploit variations on organisms, or induce organisms to respond in new ways, such as producing synthetic bioregulators or chemical toxins.34 The Arms Control Legacy Americas intelligence agencies became deeply engaged in monitoring foreign weaponry during the cold war. As a result of advances in satellite technology, the United States (and, on its side, the Soviet Union) was able to count precisely the number of missile silos constructed by its adversary, and it could estimate with a high level of confidence each missiles accuracy and throw weight. By way of surveillance from space and other TECHINT methods, both nations were able to verify each others compliance with arms control accords within tolerable parameters of error. Even though they made mistakes from time to time, U.S. intelligence ofcers in the CIAs National Photographic Interpretation Center (NPIC) and the DCIs Arms Control Intelligence Staff contributed signicantly to world peace through their painstaking analysis of technical and human intelligence on the adherence of nations (especially the
| 22 |
USSR) to arms accords. Modern espionage made the world much more transparent, which permitted a greater sense of security within the ideological camps of both the East and the West during the cold war, thereby helping minimize the risk of a global conagration. A More Complicated World The job of monitoring weapons production and deployment in the Soviet Union was a daunting challenge, but U.S. intelligence responsibilities are now in some ways more daunting still. As DCI Woolsey once observed, although the Soviet dragon has been slain, we live now in a jungle lled with a bewildering variety of poisonous snakes.35 Even as the intelligence agencies have become more skillful at collecting and analyzing data on weapons proliferation, they are not infallible. In the waning months of the twentieth century, their failures included North Koreas unexpected test of a long-range missile; the lack of verication of a suspected weapons plant in Sudan bombed by American cruise missiles; the failure to know the precise whereabouts of the Osama bin Laden, leader of the Al-Qaida terrorist faction, during a military strike against his base camp in Afghanistan (he was more than a hundred miles away when the missiles struck the Zhawar Kili region of Afghanistans Paktia Province);36 and surprise Indian and Pakistani nuclear tests.37 These intelligence shortcomingsthough offset by a much longer list of successes, many of which remain classiedserve as a reminder of the uncertainties that human beings (whether intelligence ofcers, policymakers, stockbrokers, or academics) face when trying to predict what is about to happen in the world. The case of India is a good example. The intelligence community expected the Indians to accelerate their nuclear program; after all, that is what the top-level Indian politicians were saying publicly that they were going to do. The surprise was how quickly the program escalated. The Indians had also become more clever at deception. The cables normally moved into place for a nuclear test were nowhere to be seen in U.S. satellite photographs of the test sites, because the Indians had devised less visible ignition techniques. Moreover, during the cold war South Asia received limited attention from U.S. intelligence agencies, compared with their concentration on the Soviet Union and its surrogates; therefore,
| 23 |
building up a HUMINT espionage infrastructure in this region after the cold war took considerable effort and still was far from nished at the time of the Indian-Pakistani tests. The Sudanese case is instructive, too. In 1998, the CIAs biosensor devices sniffed out the chemical weapons precursor Empta (required for the production of the deadly nerve agent VX) in a pharmaceutical factory near Khartoum. The intelligence community had also collected SIGINT and HUMINT information linking the factory in the past with the terrorist bin Laden. Putting two and two together, analysts estimated with a high degree of condence that the factory was indeed producing chemical weapons, even if the Sudanese strenuously claimed that the only chemicals produced by the plant were aspirin and other common medicines.38 Such detective work is difcult and imprecise, and the turning of a few values can mean the difference between a pharmaceutical company and a chemical or biological plant, lamented the CIAs leading proliferation specialist.39 As an indication of the growing complexity faced by the intelligence community with respect to proliferation, its experts note the existence of at least sixteen countries with active chemical weapons programs and a dozen or so pursuing offensive biological weapons programs.40 Furthermore, fteen developing nations are likely to produce their own ballistic missiles during the rst year of the new century.41 The intelligence community has responded to these events with some new ideas, including intensied intelligence targeting, the creation of a new organization focused on proliferation, improved methods of tradecraft, and a redirection of counterintelligence and covert action capabilities toward proliferation targets. Indias nuclear test has also led to a number of postmortemswatching the football game lms, in the words of the director of the DCI Nonproliferation Centerin search of ways to avoid comparable mistakes in the future.
and Weapons Research, took them off of Soviet weapons programs and put them onto proliferation.42 Under Gates and his successor, James Woolsey, renegade states like Iraq, Iran, Libya, and especially North Korea became the proliferation targets of highest priority. Additional targets have included companies engaged in commercial transactions that aid and abet the spread of weapons of mass destruction, such as the German corporations that assisted the Iraqi weapons buildup and the construction of the large chemical-weapons plant at Rabta in Libya.43 Other intelligence concerns are the whereabouts of former Soviet nuclear scientists (the Russian brain drain danger),44 the buyers of uranium ore, the dealings of international mobsters involved in weapons theft, the activities of shipping companies that might be transporting weapons parts or fissionable materials, and the governments of major powers known to sell missiles and related matriel. In this last category, the most immediate concern is the movement of matriel and expertise from the former Soviet Union, especially Russias cooperation in the development of Irans weapons and missile programs. Worrisome, too, is Chinas sale of missiles to Pakistan and Iran. A senior intelligence ofcer reported that Russian entities have helped the Iranian missile effort in areas ranging from training, to testing, to components, and North Koreas sales of [missiles and related technology] over the years have dramatically heightened the missile capabilities of countries such as Iran and Pakistan.45 Also high on the nonproliferation agenda is the future of Indias and Pakistans nuclear programs (and their implications for other potential proliferators like Iran); the status of weapons development in Iraq now that the United Nations Special Commission (UNSCOM) inspection team has been thrown out of the country; and North Koreas weapons program, especially its ongoing development of powerful, multistaged missiles (the Taepo Dong series) that could strike the United States with nuclear warheads. The intelligence community has dedicated substantial resources to penetrating foreign biological and chemical weapons programs, especially with an eye toward blocking the use of weapons of mass destruction by terrorists. Scores of analysts have been assigned to the routine but important jobs of strengthening existing arms control and export control regimes. More
| 25 |
resources have been directed to aggressive operations against proliferators, such as the substantial use of covert action for disruptive purposes.46 Finally, a new buzzword among intelligence officers is consequence management, preparing to help Americans cope with an NBC weapons attack, should one take place. The Nonproliferation Center When he was the DCI, Robert M. Gates tried to coordinate the governments intelligence-related activities with respect to proliferation. In September 1991, he established the Nonproliferation Center (NPC) and gave it added authority in April 1992. The NPC grew out of a realization among policymakers in the wake of the Persian Gulf War that they needed better information about potential proliferation culprits like Iraqs Saddam Hussein, whose weapons programs had proved far more advanced than the CIA had estimated. The NPC, like other newly created centers designed to concentrate communitywide intelligence resources on selected problems (counterterrorism among them), is made up of an interdisciplinary corps of ofcers from the various secret agencies. Housed at the CIA headquarters in Langley, the NPC has been dominated from the beginning by CIA personnel. Nearly all the Agencys analysts covering biological and chemical weapons, missile and nuclear technology, and proliferation supplier networks have been reassigned to the Center. Its professed early goal was to recruit at least 40 percent of its more than two hundred members from non-CIA agencies within the community by the year 2000, but the CIA staff has thus far remained at 80 percent. Participation [of the full community] is broad but not deep, concedes the NPC director, though he is quick to emphasize that the FBI, the NSA, the DIA, the military intelligence units, the Customs Service, and the Department of Commerce all have representatives in the Center.47 To offset the possible dominance of CIA analysts, the director has insisted that the Centers staffers rotate for part of their careers (for one to two years) into some other entity, such as the Ofce of Naval Intelligence or the CIAs Operations Directorate. The director also serves on several interagency nonproliferation committees (such as the intelligence communitys Nonproliferation Committee and the Intelligence Subgroup of
| 26 |
the Weapons of Mass Destruction Preparedness Working Group), which he believes provide him with extensive communitywide views on the subject. The director also establishes from time to time tiger teams made up of personnel from several different centers and agencies to focus on specic short-term problems, such as how to stop bin Ladens terrorist activities. Virtual teams are becoming increasingly popular, too, in which analysts throughout the community work with one another on proliferation issues, linked together by their computer workstations as they follow key developments as a group (say, the money ow of suspected weapons proliferators). Both of these efforts are innovative attempts to overcome the communitys centrifugal forces, although a recent commission concluded nonetheless that Americas research on the status of foreign chemical-biological weapons programs remained fragmented among the CIA, the Army and [Energy Department] laboratories.48 The NPC director also has sought outside expertise, recently hiring a leading private-sector virologist to serve as the DCIs science adviser on weapons proliferation. The scientist schedules conferences with academic and think-tank experts and brings in private-sector consultants and contractors to discuss the technical ramications of ballistic-missile technology. The NPC, the White House, and the NSC communicate daily through short classied reports and answers to specic queries on proliferation activities. The Center also incorporates its principal ndings into the Presidents Daily Brief (PDB), the highest-level intelligence document sent each morning to the president and a dozen other top policy ofcials. Tradecraft The prerequisite for curbing weapons proliferation is information about when the proliferation is likely to occur, where it will take place, and its probable forms. This requires close surveillance of several important sites where proliferation decisions are made. Besides the inner councils of those foreign governments suspected of violations, other intelligence targets are the ofces of matriel suppliers and their intermediaries, front companies, the international scientic community, worldwide banking networks and other nancial institutions, customs houses, and weapons laboratories overseas.
| 27 |
If the president of the United States decides to destroy another countrys facilities used for weapons production (as George Bush did in Iraq during the Persian Gulf War), intelligence agencies must be prepared to provide the U.S. military with detailed maps of the suspected locations. As demonstrated by the mistaken bombing of the Chinese embassy in Belgrade, even obtaining reliable maps may be difcult, especially when a nation (like North Korea) is less open to on-the-ground HUMINT verication opportunities than Yugoslavia was. Counterintelligence The arcane discipline of counterintelligence (CI) contributes to the nonproliferation effort, too, and the NPC closely coordinates its activities with the Counterintelligence Center (also located at the CIA). The purpose of counterintelligence is to thwart the operations of hostile intelligence services, including their efforts to undermine U.S. nonproliferation objectives. During the cold war, inating rubber submarines was a crude method that the Soviets used to try to fool U.S. satellites into overcounting them as warships. The Kremlin then offered to destroy these subs in exchange for the destruction of real American counterparts, a zany deception operation detected by U.S. satellite cameras and the experienced eyes of counterdeception imagery experts at NPIC and on the CIAs Counterintelligence Staff. Similarly, figuring out how Saddam Hussein and other outlaws may try to conceal weapons lies within the domain of counterintelligence, and this information was secretly shared with UNSCOM weapons inspectors during the Clinton years to help them locate Iraqi weapons caches. Other responsibilities of counterintelligence specialists are interrogating defectors about weapons programs in their native countries and helping Americas weapons industries protect their technologies against theft by foreign intelligence services and rival businesses. In 1999, the spy scandal at the Los Alamos labs, investigated by the Cox committee on Capitol Hill, revealed that counterintelligence had been negligent at the nations weapons laboratories, which U.S. officials have vowed to correct,49 just as similar vows were made to strengthen it at the Central Intelligence Agency following the Aldrich H. Ames spy scandal in 1994.
| 28 |
Covert Action The most extreme method used to stop the spread of weapons is direct military strikes against foreign weapons laboratories, nuclear reactors, or weapons caches, as in the case of Israels bombing an Iraqi nuclear facility at Osirak in 1981. Escalation to full-blown war, though, is a last resort. Instead, policymakers usually prefer the quiet option, a euphemism for covert action, or the secret interference in the affairs of other nations. Here the purpose is to undermine a nations proliferation activities through clandestine operations, without using overt force. Covert actions of this kind might be propaganda placed in foreign media that disclose a nations involvement in improper weapons activities or articles designed to persuade a nation not to make a proliferation decision (for example, a newspaper article encouraging Taiwan to concentrate on satellite technology rather than rocketry). The CIA might also try to plant a virus in the computers of hostile weapons laboratories or see that faulty equipment is provided to foreign manufacturers involved in proliferation. More risky would be a paramilitary operation designed to set back or eliminate a renegade nations weapons production programs, perhaps by blowing up an underground weapons lab. Under the Iraq Liberation Act of 1998, Congress granted $97 million for lethal and nonlethal aid to seven dissident groups dedicated to overthrowing Saddam and destroying his weapons programs through covert actions.50
encouraging. The inspections in Iraq were the most extensive ever carried out against a sovereign nation. Even so, in a territory as large as California, the inspectors felt sure they had missed many tons of Iraqi chemical-weapons matriel and other suspected caches.51 The intelligence communitys essential proliferation task, according to the NPC director, is not so much curbing the flow of all armaments around the world but, rather, helping delay the spread of weapons of mass destruction until nations come to their senses.52 The hope is to reform the attitudes of foreign leaders who might be thinking about adopting an NBC weapons program. Long-term obstruction works, declared a seasoned British diplomat.53 Would-be proliferators must be convinced that weapons of mass destruction are unnecessary for either security or status, as Brazil and South Africa finally concluded. In the meantime, Americas diplomats, military leaders, and politicians continue to seek guidance from the intelligence agencies on how to counter the spread of NBC weapons into irresponsible hands. From time to time, when outlaw nations threaten the international community, the secret agencies may be called on to take more aggressive covert action. In some circumstances, a clandestine approach is preferable to direct hostility and the inevitable casualties of noncombatants. Another avenue holds promise for fighting the spread of weapons without resorting to extreme measures: intelligence liaison, that is, a greater emphasis on sharing information about proliferation activities among national intelligence services and international organizations (discussed in chapter 7). Presidents Bush and Clinton have already taken some steps in this direction. Both authorized the DCIs Iraqi Task Force (part of the Nonproliferation Center) to share intelligenceparticularly satellite photographywith UN arms inspectors to an unprecedented degree.54 In 1993, President Clinton extended Americas intelligence sharing (on a limited basis and over the objections of CIA counterintelligence personnel worried about security breaches) to a number of nations working together to monitor and control global arms trafficking.55 This could lead to the eventual development of an effective UN intelligence arm for tracking proliferation activities, relying on member
| 30 |
states for satellites and other surveillance equipment and also analytic expertise. A greater emphasis on liaisonthe intelligence services of peaceful nations working together against the worlds renegadesmay prove to be the most valuable of all the nonproliferation programs conducted by the United States.
| 31 |
TWO
War and commerce are but two different means of arriving at the same aim, which is to possess what is desired. Benjamin Constant, quoted in Hirschman, National Power and the Structure of Foreign Trade, 1945
In Defense of Prosperity
An understanding of foreign military threats and the politics that fuel them has been and will continue to be the rst responsibility of the U.S. intelligence community. These, after all, including the still-present specter of nuclear annihilation, are matters of life and death. Nevertheless, matters of economic security, too, have always been high on the national security agenda. An intelligence expert explained why economic intelligence is important to a nation: In its most basic form, intelligence of this nature is designed simply to assist government leaders to better manage the economy.1 As the interest in economic intelligence surged to the forefront for a brief time during the rst term of the Clinton administration, the government devoted at times (as on the eve of important international economic conferences) roughly 40 percent of the intelligence communitys resources to matters of international economics.2 Even during the cold war when Moscows political and military maneuvers attracted most of the communitys attention, the secret agencies still allocated an enormous amount of funding and human talent to monitoring the Soviet economic system, the largest single project in social science research
| 32 |
ever undertaken.3 The CIA managed to track closely the demise of the Soviet economy during its nal stages between 1984 and 1991, despite failing (like everyone else) to anticipate its complete collapse.4 Economic security, then, is by no means a new entry on the New Intelligence Agenda, but specic economic issues of interest to policymakers (and, as a result, to the managers of the intelligence community) have uctuated over time. Wheat production in the USSR and oil pricing by the Organization of Petroleum Exporting Countries (OPEC) were signicant intelligence priorities in the 1970s, for example, while the effectiveness of trade sanctions against Iraq and the ow of petroleum into Serbia were preeminent in the 1990s. The generic economic categories considered important by intelligence planners have, however, remained fairly constant. They include information about and insight into global economic trends, international nancial and trade issues, the availability of critical resources, negotiating strategies at international economic conferences, and worldwide technological developments. They do not include industrial espionage. Industrial Espionage The purpose of economic intelligence is to give policymakers in the U.S. government information about the economic decisions and activities of foreign governments, not foreign businesses. This support is based on insights derived from sources both open (legal) and closed (illegal espionage), in a ratio of about 95 to 5 percent, respectively.5 For a variety of reasons, the intelligence community has rejected industrial espionage, that is, providing clandestinely derived intelligence to private American companies. In the rst place, these companies have rarely asked for assistance. The largest corporations already have their own capacity for spying on foreign competitors, often hiring former CIA and FBI ofcials. In addition, the network of agents recruited by U.S. intelligence and in place around the world are burrowed into governments, not companies. (In some nations, though, certain industries such as aerospace and telecommunications are run by the government, and so this becomes a distinction without a difference.) Moreover, if a CIA agent were caught with his hands in the Toyota headquarters safe at midnight, the repercussions on
| 33 |
U.S.-Japanese relations might be so severe as to make the attempt counterproductive in the extreme, especially since Japanese autos are often assembled in America through joint ventures that create jobs at home for U.S. workers. Given the intermingling of American and foreign components in automobiles and other manufactured goods, along with the multinational boards and stockholders of the major corporations, the CIA would run into bafing dissemination problems even if it gathered intelligence against a foreign company. Would the company that the CIA decided to help be sufciently American to receive the top-secret information? The Boeing aircraft company in the state of Washington is a good illustration of the complications inherent in todays global economy. If the CIA provided secret intelligence to Boeing about Airbus (its European competitor), might this not harm another American company, General Electric, which produces jet engines for Airbus? Some U.S. rms make a greater prot in overseas markets than they do in the United States (General Motors, for one) and do not want these markets jeopardized by a spy scandal. Furthermore, given a choice of three or four competing American industries, which would receive the information? Should both labor and management be informed? And if the answer were yes to all of these questions, could the sensitive sources and methods on which the intelligence is based be kept secret? Commerce among nations has become so interwoven and complex that industrial espionage by the U.S. intelligence community would raise many red ags. Employing a different metaphor, a former defense secretary warned that the hazards of industrial espionage by Americas secret agencies would be not just a slippery slope but a ravine.6 As a result of these considerations, the CIA has decided that it will not conduct economic espionage against foreign rms for the benet of U.S. companies, a position rmly endorsed by DCIs Gates and Woolsey while they were in ofce (and since).7 This policy stance also is popular among intelligence ofcers, one of whom has proclaimed (with a modern geoeconomic twist to Nathan Hales famous declaration), You know, Im prepared to give my life for my country, but not for a company.8 This is not to say that everyone endorses a hands-off attitude toward industrial espionage. Former DCI Stanseld Turner (197780) was convinced that the U.S. intelligence communitys rejection of this option
| 34 |
was tantamount to a form of disarmament, and unilateral as well, given the support for this approach by nearly all the other industrial nations.9 In Turners opinion, in light of the growing world trade competition, economic secrets might help the United States as much as military secrets, and so they ought to be pursued in the same fashion with the same amount of determination.10 So far, Turners argument has not been heeded. Sometimes, though, in the course of their normal espionage activities, the intelligence agencies do come across seemingly important economic intelligence about specic foreign companies, and they are allowed some discretion over whether to pass this information along to the Commerce or State Department. Once inside these departments, the intelligence is stripped of telltale signs that might reveal sources and methods and then from time to time is forwarded to U.S. companies in what can only be described as an evolving ad hoc relationship between the government and various U.S. businesses.11 These murky arrangements are poorly conceived, follow no uniform guidelines, and, if they contain classied information, are vulnerable to disclosure, however inadvertent. On the Defensive The intelligence community does help the American business community more systematically and legitimately through counterintelligence. According to DCI Gates in 1992, some twenty nations have engaged in economic espionage against the United States since the end of the cold war.12 Four years later, a Senate document reported that the number of nations that had tried to obtain advanced technologies from American industries through clandestine means had climbed to more than fty.13 Another survey in 1996 claimed that China, Canada, France, India, and Japan have been (in descending order) the most aggressive nations in their conduct of non-defense-related economic espionage against the United States, with Germany, South Korea, Russia, Taiwan, England, Israel, and Mexico close behind.14 In 1999, the Cox committee discovered a remarkable Chinese espionage effort directed against U.S. defense targets as well,15 and another recent study pointed to aggressive economic espionage operations against the United States carried out by France, Israel, and South Korea.16
| 35 |
There are no friends or allies in this international [economic] spy game, cautioned an FBI agent,17 a point of view reinforced by none other than a former director of the French intelligence service, Pierre Marion. It would not be normal that we do spy on the [United] States in political matters, he conded on the NBC TV show Expos in 1991. We are really allied, but in the economic competition, in the technological competition, we are competitors; we are not allied.18 Through such training programs as Developing Espionage and Counterespionage Awareness (DECA) and the Economic Counterintelligence Program (ECP), the FBI advises U.S. companies on protecting themselves against espionage, whether by a foreign company or a foreign intelligence service.19 A more recent bureau program, Awareness of National Security Issues and Response (ANSIR), educates and warns American rms about foreign intelligence activities that might be directed against them. During scal years 1993 and 1994 alone, the FBI reported brieng almost twenty thousand companies about safeguarding proprietary information. The bureau has conducted comparable seminars for universities, laboratories, and local governments,20 although as the Chinese spy scandal of 1999 indicates, the lessons apparently failed to protect the nations nuclear secrets at the Los Alamos labs. As an additional deterrent to industrial spying, the Economic Espionage Act of 1996 made it a federal crime to steal trade secrets.21 The State and Defense Departments occasionally block some of the Commerce Departments commercial sales programs, to prevent sensitive scientic information from falling into the hands of potentially hostile nations. Such action illustrates how Americas export-control laws may be used to curb or at least slow the spread of military technologies around the world. A recent instance is the prohibition against selling a Hughes Space and Communications satellite to China to establish a mobile telephone network that would cover much of Asia. Ofcials at the State and Defense Departments feared that the technology to place the satellite in orbit might also improve the accuracy of Chinas long-range missiles.22 This is but one of many battles that have taken place between the Department of Commerce, with its domestic orientation and interest in advancing U.S. business deals, and the more traditional departments like State, Defense, and Treasury, with their greater focus on security issues.
| 36 |
criminal activities and that has more than two hundred members as well as a hierarchical structure becomes a target for the CNCthat is, if the director thinks the center has a chance of successfully opposing the group. Prominent targets include organizations inside Russia (some of which operate in the Western Hemisphere), Nigeria (active in eighty nations), and various Asian countries. The three main areas of concern for the Crime and Narcotics Center are business fraud (corrupt business practices, counterfeiting, and nancial fraud, for example), threats to Americans (from drug dealers, terrorists, international child pornographers, and other criminals), and issues of global stability (such as arms trafcking).30 The overlap between the missions of the CNC and other DCI centersespecially Counterterrorism and Nonproliferation-is obvious, and they readily share information and personnel. Cooperation with the FBI on crime matters is also better than Ive seen it in thirty years, claimed the CNC director, adding: It has to be, since the intelligence community now has more problems in the world to deal with.31 Valuable, too, is intelligence on economic conditions in closed and unfriendly societies like North Korea and Iraq, for again such information is often difcult to acquire through means other than espionage. Knowledge of a nations economic health can reveal much about its prospects for stability as well as its military capabilities, making it doubly important for foreign policy ofcials to acquire. Many U.S. government agencies often have information that is as good, if not better, than the intelligence communitys. First-rate economists at the Departments of Treasury, Commerce, and State may know more about particular questions of international finance than any CIA analysts do. Yet often the intelligence community can provide a perspective that other agencies and departments may have overlooked, especially nuggets of secret information derived from, say, a telephone tap or an asset deep within the trade ministry of a foreign economic rival. Moreover, sometimes the more open U.S. government departments (especially the State Department) are simply too busy and understaffed to prepare detailed economic reports for U.S. ofcials. Even the basic task of collecting open information on economic topics overseas has been eroded by substantial cutbacks in State Department personnel
| 38 |
posted in U.S. embassies around the world. In response to these staff cuts, ofcials have turned increasingly to the intelligence community to take up the slack on a wide range of foreign policy issues. According to one experienced government ofcial, Intelligence analystsessentially DI [the CIAs Directorate of Intelligence] analystsdo 90 percent of the analysis of the USG [U.S. government] on foreign affairs.32 George Tenet, the current DCI, argued further that the policy departments already have a heavy load without taking on the added task of gathering and disseminating information. If the CIA did not pull [information] together, sort it out, and present it, who would? he asked. Some argue that individual agencies, such as State and Defense, should do it; but, in my view, this would place an unfair burden on them. Our democratic system obliges these agencies to formulate policies on behalf of the president and to defend them in public and before the Congress. That is a heavy responsibility.33 Nor do the various policy departments have a good track record for cooperating and sharing information among themselves or with the intelligence agencies. Many policymaking entities jealously guard their analytical functions, accurately noted an observer of international economic policy as practiced in Washington, and [they] see intelligence service analysis as an unwanted and not very useful intrusion into their territory.34 Such obstacles to the contrary notwithstanding, the CIA has taken a leadership rolejust as it did with arms control issues during the cold warin providing useful economic information to policymakers. The Agency has stepped forward because it has the headquarters staff and the worldwide espionage network needed to carry out these tasks. Moreover, the CIA boasts elaborate around-the-clock publishing facilities that help analysts prepare eye-catching, four-color graphics of economic statistics printed on glossy paper and attractively bound. The CIA has become skillful, too, in writing reports that are easily understood by busy policymakers with limited training in econometrics. Besides these advantages of institutional resources is the secret information the CIA can incorporate into its open-source reporting. An additional ourish is the SECRET or TOP SECRET classication the Agency stamps on its reports, which fairly shouts Read Me First! to harried ofcials. Finally, the Agency has developed over the years a quick
| 39 |
distribution system for inserting its reports into the in-boxes of the governments highest echelons in Washington. Even though the secret agencies are not necessarily smarter on international economic questions than the rest of the government, they are outstanding at processing and disseminating information. The capacity to handle both open and clandestine sources of information for now remains uniquely within the intelligence community, observed an expert, rendering it the sole choice for all-source intelligence.35 The policy departments wisely understand another advantage of letting the CIA and its sister agencies ll their information gaps: analytic support from the intelligence community is available to them at zero marginal cost. As a result of these capabilities, the intelligence community frequently takes the initiative in preparing the economic portfolios sought by policy ofcials. As the DCIs chief economic analyst stated in 1995:
The intelligence community is not a source of mainline economic analysis. Our strengthand our principal missionlies in winkling out the key bits of nonpublic information and then blending this nonpublic information with, typically, a much larger volume of openly available material to build a picture of foreign government plans and intentions that is comprehensive (the phrase we often use is all-source) and, equally important, tailored to the specic immediate needs of U.S. policymakers.36
The resourceful policy ofcial also pays attention to the economists in the Departments of State, Commerce, and Treasury, along with those in the Federal Reserve Board, the Ofce of the U.S. Trade Representative (USTR), and various international organizations. In addition, the prudent decision maker draws on information gleaned from leading newspapers and periodicals, trusted business lobbyists, and opinion on Capitol Hill. Level Playing Fields Also high on the list of economic intelligence priorities, and a newer role, is monitoring unfair trade practices by foreign governments, a responsibility that DCI Woolsey reportedly approached with particular gusto.37 The goal here is to ensure fair access for American businesses
| 40 |
in the global marketplace or, in the popular Washington clich, to seek a level playing eld, such as when American companies are bidding for contracts against foreign competitors (insofar as American and foreign can be ascertained in this age of multinational corporations). The CIAs worldwide network of agents watches for signs that a foreign government might be rigging bids on a contract, giving preferential access to information, taking bribes from foreign rms, receiving kickbacks, or otherwise engaging in inappropriate business practices that would place the United States at a disadvantage. We collect intelligence on those efforts to bribe foreign companies and foreign governments into, for example, awarding an airport contract to a European firm rather than an American firm, Woolsey explained. The State Department then warns the offending government that it is about to jeopardize its relations with the United States. Frequently, but not always, the contract is rebid and the American firm gets a share of it.38 The Aspin-Brown commission reported that diplomatic interventions of this kind netted billions of dollars in foreign contracts for U.S. firms between 1993 and 1996 alone that otherwise would have been lost.39 Dossiers for Diplomats The intelligence community also gathers information that might be helpful to U.S. negotiators at international trade conferences, what a former intelligence ofcial has referred to as tactical tidbits.40 While en route to a conference on (say) the North American Free Trade Agreement (NAFTA), American diplomats may benet from studying intelligence insights into which coalitions are likely to form around what issues and how various nations are apt to vote. As one intelligence ofcer put it, We cant go into this kind of thing [trade negotiations] disarmed.41 In 1993, American intelligence assets in the European Union are said to have provided information that aided U.S. diplomats in preparing for the Uruguay round on international trade negotiations.42 In 1995, the intelligence community reportedly gained access to revealing data on Japanese negotiating positions regarding automobile trade with the United States.43 During the nal negotiations with the Japanese in
| 41 |
Geneva, a team of intelligence ofcers continually briefed the U.S. trade representative and his aides on the latest HUMINT and SIGINT ndings on the Japanese negotiating positions, along with assessments on just how far the Japanese side could be pressed.44 Popular among U.S. negotiators are personality proles prepared by the CIA on the people they will be facing across the bargaining table. This information is organized into a baseball card format for easy reading and carrying, and sometimes is interspersed with juicy tidbits about the foreign diplomats private lives. Telephone intercepts of conversations held by foreign negotiators on the eve of an economic conference (courtesy of the NSA) are often helpful. Wise recipients of this information understand, however, that signals intelligence can be a risky source of knowledge, as it is subject to deliberate deception, or the individuals being recorded may be poorly informed. According to a reliable newspaper report, the U.S. negotiators have occasionally found valuable the daily int tidbits (such as SIGINT telephone taps) but have been less impressed by the intelligence analysts broader assessments.45 The economic agenda for diplomats and spies expands from time to time. In 1999, for instance, President Clinton encouraged the International Labor Organization to adopt a treaty that would prohibit the most abusive forms of child labor practices, including the exploitation of children in prostitution and pornography. In support of the proposed treaty, the president issued an executive order that mandated the preparation of a list of countries and companies that might be engaged in forced child labor.46 The collection of these data will no doubt require clandestine, not just open, inquiry, and the intelligence community will be handed yet another assignment related to international economic policy. Monitoring Sanctions Just as the United States has increasingly turned to the use of economic sanctions in recent years as punishment against nations opposing its global interests, the intelligence community has been asked to gauge their effectiveness. This involves tracking the activities of individual foreign trading companies, including their ties to international banks and their use of various communications channels (telephone, fax, e-mail). In
| 42 |
addition, the CIA is expected to watch the ow of oil, international transportation, and arms into and out of offending nations. For these purposes, the CIA houses interagency teams that keep an eye on sanctions, following shipping and other modes of trade involving Iraq, Pakistan, Iran, China, and Serbia. The information analyzed by these teams is then forwarded to the Treasury Department, whose Ofce of Foreign Assets Control is in charge of enforcing trade sanctions. Should the president order the U.S. Navy to check on suspicious ships at sea bound for (say) Iraq, the CIA is able to conduct a quick computer run on each ship to see whether its owners have previously attempted to violate an international blockade. America for Sale The international community keeps track of foreign attempts to invest in the United States or to purchase American real estate and other assets. This responsibility, known in the government as foreign acquisitions review, requires the community to provide information about such activities to the Committee on Foreign Investment in the United States, an interagency panel in which the Commerce Department is a major player. Protection against Predators In the CIAs rich database on international economic activities are detailed proles of companies that have been engaged in unsavory business activities, such as violating sanctions, laundering money, spreading weapons and ssionable materials, or selling to known terrorist organizations. These are the bad actors of the global marketplace. The Federal Reserve Board, the Treasury Department, and the Commerce Department also have extensive corporate memories in this regard, but the intelligence agencies are often able to contribute useful information to the governments storehouse of knowledge on disreputable foreign companies. The intelligence community funnels these data to the Department of Commerce and the Department of Treasurys Ofce of Foreign Assets Control, and they alert American banks and rms to stay away from those companies.
| 43 |
Drug Busting In the shadowy domain of underground economics, the intelligence community has been drawn into the war against international organized crime, especially drug trafcking (highlighted by a recent DCI as the main money-making venture of international criminals).47 Americas secret agencies have taken on this counternarcotics mission only reluctantly, sensing that law enforcement ofcials in the FBI and the Drug Enforcement Administration (DEA) are more experienced and better armed to deal with the low-lifeand dangerousthugs who peddle cocaine and heroin in the back streets of urban and even rural America. The DCI Crime and Narcotics Center is the repository for information collected by the intelligence community on drug dealers prots so-called narcodollarsand money-laundering operations. Suspected ties between drug cartels and international banks are monitored for tipoffs on illegal drug deals, and the CNC alerts FBI and DEA ofcers if the opportunity for an arrest seems ripe. While this concept of intelligence support to law enforcement agencies may sound good in theory, in reality the narcotics cartels are winning the drug war hands down, even though a few of the major cartels (including the notorious Cali drug lords) have been brought down by the U.S. government. Indeed, of the total amount of illegal substances bound for the United States, only about 30 percent is apprehended. Although this is an improvement over the 10 percent interdiction rate of a decade ago, this statistic is still discouraging, since the remaining 70 percent more than meets the U.S. demand for illegal drugs.48 Some ve hundred to six hundred tons of cocaine are produced each year in Peru, Bolivia, and Colombia, of which three hundred tons are shipped to the United States and the rest chiey to Europe.49 In the last year of the twentieth century, production in Peru and Bolivia dropped markedly, but that of Colombia more than made up for the slack. Almost two-thirds of the cocaine bound for the United States comes through Mexico and about one-third through the Caribbean, with Haiti the fastest-growing transit point (currently at some four tons a month).50 Some three hundred tons of heroin are rened from opium each year, mainly in Burma and Afghanistan (where production is spiraling upward); ten tons are shipped to the United States, with much of the rest
| 44 |
going to Russia and eastern Europe.51 This losing effort has led critics to conclude that success lies not in intercepting drugs, which is akin to nding a needle in a haystack, given the thousands of ships, airplanes, and motorized vehicles that enter the United States each year. Rather, success lies in discouraging the desire of American consumers to purchase harmful drugs in the rst place.52 Clearly, the United States must more aggressively educate Americans about the physiological dangers of illegal narcotics, especially Americas main drug users: white, affluent males in their late twenties and early thirties.53 The current funding of about $18 billion per year has proved inadequate to defeat what President George Bush often referred to during his first year in office as Americas public enemy number 1. Important to a more extensive education campaign would be publicity debunking various drug misconceptions, including the widespread belief that inhaling heroin (as opposed to injecting it with a needle) avoids addiction.54 Necessary, too, are more effective treatment programs for current addicts.55 The constructive role that intelligence agencies (or, for that matter, the FBI and the DEA) can play in counternarcotics is relatively limited compared with the results that could be derived from allocating additional resources to improve antidrug education and health care, that is, shifting attention away from the supply side to the demand side.
A Period of Transition
As these examples illustrate, Americas secret agencies expend considerable resources on international economic matters. Yet, according to a senior intelligence ofcial, just how important this assignment really is was still not resolved as the twentieth century came to an end: We are still in a transition period.56 The Asian nancial crisis in the last years of the century revived interest in collecting international economic intelligence. Questions linger, however, about whether the secret agencies really can add much beyond the information and assessments already provided by the Departments of Treasury and Commerce as well as other government agencies, not to mention the well-regarded reporting on economic issues by the New York Times, the Wall Street Journal, and The Economist.
| 45 |
In support of the CIAs economic role, its ofcers are quick to emphasize that the needs of Washington ofcials are often quite different from those of Wall Street investment analysts. Besides, they maintain, the CIA has become adept at making things easier to understand for distracted Washington ofcials.57 The Agency focuses on economic problems at the top of the policymakers tray for Action This Day, delivering information and insight that are timely, lucid, and attractively presented, a composite of open and secret sources of information directly relevant to the ofcials immediate concerns. That, at any rate, is the goal but, as discussed in chapter 8, is not necessarily what really happens in the hurly-burly daily life of Washington, D.C. The CIA has recently tried to concentrate on carrying out three activities especially well with respect to economic intelligence.58 First, it attempts to serve the needs of the National Economic Council (NEC), created during the rst year (1993) of the Clinton administration as an economic companion to the National Security Council. Bo Cutter, the NECs deputy director, developed the council into an important focal point for economic intelligence, treating the CIA as an extension of his own staff and giving strong credibility to the Agencys value added in this domain. The NEC has been particularly interested in trying to understand the politics of shifting coalitions at international trade conferences, and according to Cutter, the CIA has been helpful.59 Most important, though, has been the daily tactical information the Agency has provided about economic events around the world, everything from world crop production to maps tracing international oil shipments.60 Second, the CIA has tried to rise above its past focus on the economies of individual countries. Shaken by the Asian nancial crisis of 199798, Bo Cutter and other consumers of economic intelligence in the executive branch have sought a broader assessment of the world economy, an integrated transnational analysis in the current Washington jargon. Knowing what is going on inside a particular country is no longer enough; more important is an understanding of the economic global interactions among nations and the unexpected dynamics they may create. Recently, the National Intelligence Council conducted a one-day game simulation involving intelligence ofcers and policymakers (chiey deputy assistant secretaries). Participants considered the
| 46 |
experience useful for the sense it gave them of the dynamics of contemporary geoeconomics.61 Third, intelligence analysts in the community, from the most senior NIO down to the newest employee, are attempting to write more detailed economic assessments. These days, economic intelligence reports are lled with possible scenarios, laying out a panoply of likely directions the international economy might take and assigning probabilities to each pathway. The intention is to remind policymakers that intelligence analystsmere mortals like the rest of usnever know for sure what is going to happen; rather, they are able only to draw on their experience and expertise to suggest the odds of certain events unfolding. Unlike during the cold war era, policymakers are now presented with fewer black-and-white intelligence assessments. Shades of gray are the order of the day. Although this approach is often frustrating for the nations leaders, who seek sure guidance and denitive answers, it is also less misleading, conveying to those who must make decisions just the best-guess hunches for various options.
formation and insight derived from clandestine operations. This service has been a generally appreciated time-saver for busy policymakers.64 The trick is to ensure that the assessments of analysts in both the open and the secret agencies are brought to the attention of key decision makers in a timely, synergistic manner. Here, unfortunately, one runs into the problem of institutional fragmentation that has long plagued the U.S. intelligence community. During Americas clumsy response to the Mexico nancial crisis of 199596, a noted historian and intelligence scholar observed that neither the Treasury nor the Federal Reserve had a comfortable relationship with the intelligence community.65 Unfortunately, this institutional estrangement still prevails (the subject of chapter 5). Even though military and political security concerns most of the time crowd out other interests at the top of Americas foreign policy agenda and even though a vast amount of valuable data on international commercial matters can be found in the public domain, the intelligence community will remain a player of consequence in the U.S. governments deliberations over global economic policy. The secret agencies are well staffed for, and experienced in, providing timely information to policymakers on events and conditions related to military, political, and economic affairs (which is not to say the agencies are always correct in their assessments). The intelligence community will continue to shoulder the counterintelligence assignment of helping U.S. rms protect themselves against economic espionage by other nations and foreign companies. Finally, the White House will occasionally order the CIA to employ disruptive economic covert actions (special activities) to counter Americas adversaries. During the 1980s, this disruption took the form of mining harbors and blowing up power lines in Nicaragua (considered a Marxist adversary by the Reagan administration) to cause commercial havoc. For as long as nations seek trade advantages in the global marketplace and an understanding of the economic underpinning of hostile military forces, economic intelligence will remain an important assignment for Americas secret agencies.
tention to other threats that jeopardize U.S. security interests. Strategic security concerns such as weapons proliferation and the danger of ethnic confrontations (which could to a wider war and draw in the major powers) have always been paramount, closely followed by geoeconomic considerations, particularly in the new era of tightly interwoven patterns of international trade. Less pressing are foreign policy issues related to human dignity and the quality of life for people around the world. Yet these considerations are gaining greater attention as the twenty-rst century begins. The intelligence community has been expected to provide insights into a much wider range of threats than it did during the cold war, including environmental and health security, the subjects of the next two chapters.
| 49 |
THREE
Of late I have been tempted to look into the problems furnished by Nature rather than those more supercial ones for which our articial state of society is responsible. Sherlock Holmes, in Arthur Conan Doyle, The Final Problem
Environmental Security
The expression environmental security refers to the potential effects of global environmental scarcity and degradation on the wellbeing of a nation or group.1 Even though Americas intelligence community devoted only limited resources to this question during the cold war, environmental topics were not completely ignored. The CIA studied (and carried out, though without much success) ways to disrupt weather conditions in North Vietnam during the Vietnam War, for example, and even researched the potential environmental consequences of a large asteroids striking the earth. (The conclusion: it could happen, but the chances are so remote that we humans ought to spend our time and resources on more immediate perils.)2 Since the end of the cold war, however, policymakers have asked the intelligence agencies to address a much wider range of environmental issues. Some intelligence ofcers remain skeptical about the new emphasis on nature watching, dismissing the notion as a rather squishy mission and evoking the risible image of Agency assets creeping around the mountains of Patagonia counting the number of blind rabbits, victims of retina damage from the ozone hole over Argentina.3 For some observers, though, the governments growing environmental agenda is heartening,
| 50 |
however belated. The cold war is now over, declare a pair of researchers, and the green war is about to begin.4
The Greening of Intelligence One states behavior can radically change the amount of resources available to other statesdrift net sheries of one country may devastate a shing ground used by alland in the realm of management of the atmosphere there is no problem that does not cross national frontiers: acid rain, greenhouse gases, and ozone depletion are salient at this writing.5
An important example of the transboundary character of environmental threats can be found in the Middle East, where the 12 million people of Israel, Jordan, and Palestine receive as little rainfall as does Phoenix, Arizona, thereby creating a situation that, according to an international group of scientists, will cause signicant water stress in the near future.6 Another illustration comes from Scandinavia where even though Norwegians themselves produce virtually no dangerous amounts of sulfur dioxide and nitrogen oxide, they have one of the worst acid-rain conditions in the world, thanks to industrial pollution drifting northward from Great Britain, Germany, and a few other neighbors.7 Another example is the island nation of Haiti in the Caribbean, whose local ecology has been ravaged by government corruption and poor resource management.8 The soil in Haiti has become so badly eroded that almost no crops can grow, and in 1994 this condition resulted in the mass exodus of a hungry population, headed for the United States in a otilla of small boats. The ensuing crisis caused by the outburst of refugees toward Florida led the Clinton administration to prepare for a military invasion of Haiti to stem the tide and restore order. This intervention was barely averted through the skillful diplomacy of three private American citizensformer President Jimmy Carter, former Senator Sam Nunn, and retired General Colin Powellbrought in by the administration for a last-ditch try at resolving the crisis peacefully. Another site of disputes related to environmental conditions is the Tigris-Euphrates Valley, whose rivers nourish the Fertile Crescent in the Middle East. Dams in the eastern (Kurdish) parts of Turkey punctuate these rivers, thereby making Syria and Iraq vulnerable to Turkish inuence. In this region of the world, water is power.9 Other areas of environmentally related conict are Indochina, Nigeria, and the Great Lakes region in Central Africa. To facilitate negotiations designed to keep the peace in these strained regions, Americas intelligence agencies give the White House and the Department of State assessments of local
| 52 |
demographic conditions that affect U.S. security interestsAmerican diplomats have learned that what may appear to be a traditional military, political, or economic source of unrest can often have deeper environmental roots. Local Environmental Emergencies Environmental calamities may strike more conned localities, such as an earthquake or severe ooding. In such a situation, the intelligence community is sometimes able to help the Federal Emergency Management Agency (FEMA) and other domestic agencies respond to such crises with information gathered by its airborne collection platforms. With the encouragement of Vice President Al Gore, the government established its Global Disaster Information Network (GDIN), operated by the U.S. Geological Survey and furnished with data from open agencies like the Environmental Protection Agency (EPA), as well as the secret agencies. For example, in 1989, intelligence managers redirected the spy satellites cameras to help determine the extent of earthquake damage in California. The secret agencies also answer requests for assistance in rescue operations, as in 1997 when U-2 spy planes aided the search for an air force ghter plane that had crashed in Colorado.
focal point for the greening of U.S. intelligence. Lawrence Gerswin, at the time the NIO for global affairs and currently the NIO for science and technology, was the crusading spirit behind the establishment of this, the smallest and most tightly focused of the DCI centers. The DEC lacks the generous resources lavished on some of the other centers (especially the one dealing with counterterrorism). In fact, it has just one analyst concentrating on Chinese environmental issues and only one with expertise on the Russian environment. All together, the DEC has just two dozen analysts, half from the CIA and the others on loan from such places as the EPA, the National Imagery and Mapping Agency (NIMA), and the National Oceanic and Atmospheric Agency (NOAA). Despite its limited resources, the center has prepared several high-quality reports in its short lifetime and is beginning to attract favorable, if sometimes begrudging, attention from the intelligence community. As with every signicant topic of national security concern, the government also has a high-level interagency environmental working group, which meets once a month and is chaired by an NSC senior staff member. Other participants engaged in environmental intelligence work are the intelligence units of the four armed services: the army, navy, air force, and marines, which monitor global environmental developments that could affect American military operations. The National Security Agencys SIGINT collectors have certain words in their computer watch lists (such as pollution) that are used to sort through the deluge of electronic data captured by NSAs worldwide listening posts, ltering out information that the Environmental Center might nd useful.10 If the environmental information gathered by these military agencies is deemed important by intelligence managers (say, information related to the dumping of radioactive materials in the Arctic Circle region by Russian military personnel), they pass it along to civilian and military analysts in the CIA and the Defense Intelligence Agency (DIA) for closer study and evaluation. As with economic intelligence, the greatest value added by SIGINT in the environmental domain has been to inform U.S. diplomats regularly about the likely negotiating positions of other countries at international conferences. Traditional HUMINT reporting may be relevant to environmental concerns. By having agents visit (or even work inside) aging nuclear reactors in the former Soviet republics, the CIA or military intelligence
| 54 |
units might be better able to judge the risk of additional nuclear-plant meltdowns, like the 1986 Chernobyl reactor accident in then-Soviet Ukraine. Other local assets can complement satellite surveillance with close-up reports about the extent of ooding in Bangladesh or drought conditions in Africa. The National Photographic Interpretation Center (NPIC), now part of the newly established NIMA, is responsible for interpreting satellite photographs of such environmental matters as earthquakes, res, oods, hurricanes, volcanoes, and oil spills; but it is the ground truth of local agents that lls out the picture, especially with respect to how well the indigenous government is coping with the crisis.
find intelligence data on global ecological conditions useful for their scholarly research.
that has been condoned by Russian authorities (the focus of a recent national intelligence estimate, or NIE, prepared by the NIO for science and technology). Russia is not the worlds only environmental culprit. Environmental researchers report on the unloading of waste products by a variety of rogue ship captains sailing the seas in search of unsuspecting ports in the South, abandoning leaking drums of toxic waste at dockside in developing countries, or dumping it under cover of night.11 These and other environmental crimes are of concern to the United States, and policymakers rely on the secret agencies to uncover such behavior. Environmental data are valuable, too, for efforts by the United States to help clean up the now abandoned foreign military bases and oil depots in the former Warsaw Pact countries. The nuclear reactor accident at Chernobyl reminded Americans how small todays world has become. Indeed, an environmental disaster or crime in a country that seems far away can quickly reach the United States. As an example, within two weeks of the Chernobyl accident, research scientists at the University of California in Irvine discovered oating in the air above their seaside campus ssion products released from the nuclear facility.12 The CIAs efforts to track the dumping of radioactive materials by the Soviet Union in the Arctic Ocean is an illustration of the Agencys involvement in collection operations related to environmental security. Relying on the technical collection capabilities of its Directorate of Science and Technology, the CIA has kept Washington ofcials up-to-date on the frequency of this dumping and its likely effects. Several topics have been taken up by the DCI Environmental Center, the Office of Transnational Issues, and the NIC, displaying the wide breadth of the intelligence communitys involvement in environmental studies since the end of the cold war. Almost all the research has focused on ecological degradation at the global level.13 Global battlefield conditions have attracted research funding inside the community, especially the ecological effects of Iraqs sabotage of Kuwaiti oil fields and the ensuing oil slick during the Persian Gulf war. More generally, the community has explored a wide range of questions about pollution, including the feasibility of monitoring complex chlorofluorocarbons, or CFC emissions (which many scientists believe are depleting the earths protective ozone layer that blocks out harmful solar
| 57 |
ultraviolet radiation). As suggested earlier, the dumping of hazardous materials into oceans, lakes, and rivers around the globe, along with the effects of nuclear weapons testing on atmospheric pollution (even modern underground tests, mandated by the 1963 Nuclear Test Ban Treaty, leak radioactive substances into the air) and the status of nuclear power reactors in various countries, are ongoing concerns. The extent to which global resources have been depleted has drawn the attention of scientists in the secret agencies: such matters as tropical deforestation research in support of U.S. efforts to secure an international treaty on forest protection, climate change in support of international agreements on reducing greenhouse gas emissions, global water supplies, the environmental effects of narcotics cultivation, global food shortages, the environmental implications of mass refugee movements in Kosovo and elsewhere, and the environmental implications of world population growth. In addition, the government has turned to the intelligence community for research on natural calamities, including studies of the effects of earthquakes and ooding around the globe. Scientists in the intelligence community also study future environmental challenges, such as the likely cost of coping with environmental stresses and what technological advances the United States can anticipate to combat global environmental problems. Some analysts examine the environmental issues faced by individual countries, and others explore the prospects for the electoral success of green parties in foreign countries. The DCI Environmental Center is especially enthusiastic about the statistical modeling of environmental futures. It tells us where to focus, explained a DS&T scientist afliated with the center.14 Besides detailed case studies of environmental disputes that have led to inter- or intrastate conict, the DEC is improving its measures for I&W (indications and warning) with respect to the environment, alarm systems to alert U.S. policymakers that an impending ecological event could affect Americas security interests. Support for Americas Diplomatic Initiatives The second and third major environmental objectives are closely related to each other and entail supporting diplomats involved in international agreements (treaties, statutory agreements, or executive agreements) on
| 58 |
matters affecting the global commons. This support ranges from marshaling data to buttress the American position during the early stage of bargaining over the content of pacts through monitoring compliance by the signatory nations on specic agreement provisions. Support for agreement making has become a steadily expanding responsibility for the secret agencies as the United States enters into more and more environmental accords with other nations.15 Analysts in the DCI Environmental Center (DEC) and the Ofce of Transnational Issues (OTI) examine the likely negotiating tactics of other nations at multinational conferences on the environment. Then they provide probability forecasts of where the participants are apt to lean during the working sessions and on nal votes. The DEC uses both qualitative modeling and more quantitative gaming methods to simulate international conferences. A recent game focused on the issue of climate change. The players were able to test negotiating positions and oat trial balloons that might be used in real conferences. Analysts in the OTI also supply empirical data on existing environmental conditions in whatever part of the planet may be of concern to the international conferees, so that U.S. negotiators are not forced to rely on the environmental-impact statistics pushed by those countries that seem more interested in protecting their own economic interests than in seeking a fair international accord that will help all nations. The following, in chronological order, is a selection of conferences for which intelligence analysts provided support to U.S. negotiators. They represent, however, only a small sample of the nine hundred international agreements on ecological problems that have been a part of the recent U.S. agenda for environmental diplomacy.16 International Tropical Timber Organization (1983) Montreal Protocol on Substances That Deplete the Ozone Layer (a landmark negotiation) (1987) Basel Convention on the Control of Transboundary Movements of Hazardous Wastes (1989) London Conference on CFCs (1990) Framework Convention on Climate Changes (1992) UN Conference on Environment and Development, UNCED (the Earth Summit in Rio de Janeiro, 1992)
| 59 |
UN Convention on Biological Diversity (1992) UN Commission on Sustainable Development (1993) Summit of the Americas (1994) Intergovernmental Panel on Global Forests (1995) UN Convention on Combating Desertication (1996) Kyoto Conference on Greenhouse Emissions (1997)
The intelligence support was notably useful, according to a senior EPA ofcial who participated in many of these conferences, in calculating how far to push U.S. environmental objectives.17 Added a manager of the National Intelligence Council, It was very helpful for U.S. negotiators to know, based on information provided by intelligence analysts, that illegal shipments of hazardous wastes were being made from certain countries who wereat the very same timeengaged with [the United States] in negotiating the Basel Convention on the Export of Hazardous Wastes.18 The intelligence community was able, too, to uncover instances in which CFCs, the focus of the Montreal Protocol, had been improperly shipped abroad by nations participating in the conferenceadditional information helpful for U.S. diplomats to have at hand. The demands on the intelligence agencies to support environmental diplomacy is unlikely to diminish. Other negotiating challenges that loom on the horizon are establishing agreements to control international commerce in toxic chemicals; grappling with land-based sources of marine pollution; improving international forestry agreements; and dealing with a broad range of environmental, health, and ethical issues related to genetically engineered organisms. Preparing solidly researched and clearly written international agreements is only part of the challenge for the United States; equally important are assurances that they will be implemented according to the letter and spirit of the negotiations that produced them. This means keeping a close eye on the diligence with which signatories honor the principles of their agreements and each of the specic provisions. The MEDEA Program Among the Directorate of Science and Technologys most valuable assets is its extensive ecological database, gathered over the years by spy satel| 60 |
lites and other collection platforms. Coincidental to their traditional (mainly military) intelligence duties, these platforms images have mapped the development of the earths surface. As one CIA ofcer put it, We have photographed the evolution of the planet,19 or at least some parts of the earth since the late 1950s. While still a member of the U.S. Senate, Al Gore (D, Tennessee) became a leading advocate for releasing portions of these archives to the American scientic community. He further proposed that a cross section of this nations scientists be given the opportunity to recommend the kinds of environmental data that the intelligence agencies should gather from various regions of the world, beyond the well-photographed topography of the Soviet republics. In response to Gores urging, in 1992 DCI Robert M. Gates and the DS&T management team invited seventy prominent American scientists to visit the CIA. The scientists represented ten different disciplinesincluding geologists, ecologists, and hydrologists20and the program was initially called the Environmental Task Force (ETF), but within a year it acquired a more informal moniker that stuck: MEDEA (pronounced ma-day-a). The word is not an acronym but, rather, a reference to the sorceress of Colchis in Greek mythology, who helped Jason of the Argonauts steal the Golden Fleece. With their permission, the CIA ordered background investigations of the scientists (if they did not already have the necessary clearances, as many did), along with the Agencys standard polygraph tests. The concept behind the project was to have these experts, some of the best scientic minds in the country, evaluate the CIAs potential for collecting environmental intelligence that would be useful to Americas scientic community. The MEDEA scientists were, in essence, a kind of search party assembled to pore over some thirty years of data collected by satellites (mostly imagery, plus some SIGINT) to assess their value for private-sector ecological inquiry. In return, the scientists made available their expertise to help the DS&T interpret environmental conditions that might threaten U.S. security interests, and they helped design new environmental sensors. According to interviews with DS&T personnel and public comments from outside participants, the imagery shared with the MEDEA scientists has proved valuable for civilian environmental research.21
| 61 |
Among the topics in which the CIA and the scientists have had a mutual interest are predictions of natural disasters, with experiments under way on improving the accuracy of forecasts of volcanic eruptions and early warnings of forest fires.22 They also are measuring global warming and tropospheric water content and looking for buried oil trenches, water run-off contamination, other waste site examinations, oil spills and seeps in the oceans, and biomass burning (a significant source of greenhouse gases). Included in the secret agencies environmental research are studies of cloud-size variability, which affects infrared radiation ows in the atmosphere; observations of snowfall, glaciers, and permafrost, important to understanding the growth of vegetation and related animal habitats, as well as global climate warming; and measurements of sea-ice thickness, useful for calculating the exchange of heat between the ocean and the atmosphere and a signicant factor in modeling global climate change (not to mention the obvious interest in this subject by military planners responsible for strategic submarine operations). Other studies have examined geological erosion, mapped wetlands, and tracked industrial air pollution, population growth, urbanization, and industrialization. Intelligence sensors have been used for oceanographic research and ne measurements of trends in vegetation, desertication, and deforestation. The deforestation studies illustrate how the intelligence community can enhance the research of nongovernmental scientists. Satellites and other national technical means of intelligence collection allow a more detailed mapping of small deforested areas than is currently feasible with civilian sensors. Moreover, the MEDEA program permits the examination of a larger number of land-cover categories than currently available through civilian remote-sensing data sets. Finally, intelligence sensors more accurately estimate changes in existing carbon stocks in tropical forest regions.23 In general, the intelligence communitys surveillance equipment offers greater topographical detail in its earth photography (reduced mixed pixel ambiguities for improved interpretation in DS&T lingo).24 Intelligence satellites can spot a small forest re more quickly than civilian satellites can, for instance, although the civilian sector is rapidly improving its camera resolution and is likely soon to match the governments surveillance capabilities. Currently, the NRO satellite resolutions
| 62 |
are measured in inches, whereas the best commercial satellite (the Ikonos, launched in September 1999 by the U.S. rm Space Imaging) has greater than a one-meter resolution.25 Just a few years ago, only the government could capture even one-meter-resolution imagery with its satellite cameras. This photographic clarity allows analysts to count the number of people swimming in a backyard pool, but so far, only the NROs satellites can identify each of the swimmersor, more to the point for intelligence purposes, distinguish a tank from a jeep. One of the MEDEA projects on the drawing board is to set up two hundred global ducials, or earth zones, which the intelligence communitys satellites will watch for signs of ecological change. Another possible topic of interest to the civilian scientists is the status of corral reefs throughout the world, a topic also amenable to analysis based on satellite photography. Cooperation between the CIA and the outside scientic world has not always gone smoothly. They disagreed over what the scientistsunaccustomed to having their work censored by a government review boardwould be allowed to publish based on these classied archival data. In addition, several of the scientists refused to take a polygraph and insisted that this requirement be waived. And the CIA has frequently complained that the relationship is, to quote a top DS&T manager, mostly a one-way streettoward the scientists.26 The CIA concedes, nonetheless, that the scientists have provided valuable insights into such questions as how much arable land exists in China and how well the Chinese will be able to feed their large population over the next few decades. As another example, in 1998, the MEDEA scientists studied the condition of the Russian boreal forest, the coniferous woodlands just south of the Arctic tundra zone, as these woods are important reservoirs for more than one-fifth of the worlds carbon found in terrestrial biomes. The scientists sharply disagreed with the Russian scientists projections of this forests capacity to absorb atmospheric carbon and chided them for underestimating the fire, insect, and logging disturbances likely to affect the trees carbon-removal potential. The American scientists then called for more data on the forest to be collected by both government and private-sector satellites, coupled with on-the-ground field investigations by civilian researchers.27
| 63 |
The scientists in the MEDEA program have also been interested in reviewing intelligence imagery archives on the worlds rain forests. As the Harvard University ecologist Edward O. Wilson pointed out, the rain forests are home for some two-thirds of the earths life species.28 At the beginning of the twentieth century, the tropical forests that had been in existence for the last twenty centuries remained intact; but in just the last one hundred years, half of them have vanished, and they continue to disappear at the rate of one hundred acres per minute. If this trend continues, all the rain forests will be lost within the next century. Scientists have made clear one of the potential effects of this catastrophe: The home of nearly half our plants known species will be destroyed, including those that may hold the secrets to curing cancer, AIDS, heart disease, and other diseases.29 As a consequence of MEDEAs enthusiastic evaluation of the potential for important scientic research resulting from access to the intelligence communitys imagery, President Clinton signed executive order no. 12591 in 1995, releasing to the public photographs from the Corona, Lanyard, and Argon generation of intelligence satellites. This amounts to a staggering 860,000 images from 1960 to 1972. Under the auspices of DS&T, the MEDEA scientists have met periodically with Russian scientists to exchange views and unclassied data on the subject of remote sensing for the purpose of better environmental monitoring. Under urging from Gore and the DS&T, the National Reconnaissance Ofce has been willing to tweak its satellites from time to time (as DS&T ofcials put it) to meet specic environmental tasking requests from other parts of the government, including the National Aeronautics and Space Administration (NASA) and NOAA. The nongovernmental MEDEA scientists also are sometimes permitted to use these platforms. At the present time, only 1 percent of the intelligence communitys total satellite collection capacity has been released for environmental research, precisely the level at which the NRO and other elements of the intelligence community (including the DS&T and the CIA) intend to keep the support for environmental science. According to intelligence ofcials, spy satellites are not well equipped technically for environmental research. The band length of the imagery used by the NROs satellites is designed to spot the location of weapons and troop movements on the surface of the earth, not to penetrate the planets crust for precise
| 64 |
ecological measurements. Although the intelligence community can be of some help to ecologists (the spy satellites are good at taking photographs of ora above ground), roughly 85 percent of the information of interest to outside scientists regarding environmental matters cannot be addressed by the communitys collection platforms as they are presently congured. So the nations collection capabilities for environmental intelligence can only modestly supplement the research being conducted in other, more open government agencies (like EPA and NASA) and in the private scientic laboratories of industry, academia, and the think tanks. Despite these limitations, the intelligence community anticipates contributing to environmental research in a number of ways. The MEDEA program will continue to be developed, including the nurturing of U.S.Russian scientic cooperation on environmental problems. In addition, Americas intelligence community will continue to assist civil government agencies with their environmental studies, toward which the higher-resolution imagery of its spy satellites can provide important ground-truth referents (at any rate, until commercially available satellites equal the intelligence communitys machines in their degree of imagery resolution). Were trying to make these [satellite surveillance] systems more available to a wider set of U.S. government entities, the NRO director stated, especially imagery for use by FEMA in disaster relief.30 Moreover, the intelligence community intends to make its classied ecological databanks more user friendly to a wider array of government agencies interested in environmental issues. Finally, intelligence managers are studying ways to make additional archival data on the environment available to the general public. One outgrowth of the MEDEA experience was the formation in 1995 of the U.S.-Russian Environmental Working Group (EWG), the brainchild of Vice President Gore and former Russian Prime Minister Victor S. Chernomyrdin. Drawing on the MEDEA experience, the EWG envisions a bilateral relationship between the two nations that is devoted to encouraging cooperation among scientists and intelligence agencies on a host of environmental questions, an unanticipated form of intelligence liaison between the former adversaries. Russian and American environmental specialists and intelligence ofcers have already exchanged unclassied information on such matters as environmental cleanup efforts,
| 65 |
accurately calculating the extent of forest defoliation, evaluating oil and gas exploration risks, and accurately assessing earthquake damage. This cooperative research also draws on selected classied data collected by both nations intelligence agencies. Emergency Aid to FEMA Sometimes the intelligence community receives requests from the Federal Emergency Management Agency (FEMA) to direct its spy satellites toward U.S. territory in times of domestic environmental upheavals, say, an earthquake in California, a hurricane in South Carolina, or volcanic activity in Washington State. This form of tasking requires high-level authority, given the sensitivity of directing intelligence satellites against U.S. domestic targets.31 Thus far, such authority has been quickly granted in times of emergency. But such requests for emergency assistance are complicated by the need to protect from disclosure the sensitive sources and methods used by the NRO and other agencies to gather intelligence, such as specific camera-lens capabilities that could prove useful to Americas foreign adversaries seeking to develop countermethods to escape the eyes of Americas cameras in space. To solve this problem, intelligence photo-interpreters work with artists to redraw the precise images acquired by the satellites (imagery derived products or IDP, in the inescapable Washington acronym) into cruder, but still valuable, maplike depictions. This conversion process protects the secret details of satellite camera capabilities but still manages to convey the essential information necessary to aid FEMA in its rescue operations. An example of cooperation between FEMA and the intelligence community occurred during the 1994 earthquake in Northridge, California. Intelligence on postquake conditions began within ve hours of the event, and analysts in the National Photographic Interpretation Center (NPIC, at the time still a part of the CIA) gave FEMA ofcials preliminary damage assessments on the same day. This form of assistance has also been supplied to other nations that have suffered a major natural disaster. In 1994, for instance, NPICs analysis of the Vozey oil eld spill near Komi, Russia, disclosed numerous, long-term leaks throughout the pipeline system, though it found no evidence of a single catastrophic
| 66 |
spillimportant information for Russias emergency workers and a source of their enduring goodwill toward the United States.
expressed a desire to continue to have access to information of this kind gathered by the secret agencies.35 The NIC, the DCI Environmental Center, and the OTI have had little luck making known to policymakers the benefits of their environmental research. Interviews with staff personnel at the EPA and the NSC revealed that policymakers still do not know what environmental services are available through the intelligence community. For instance, a senior EPA official found useful the communitys raw intelligence on and analysis of suspected Russian radioactive dumping in the Arctic, of industrial plants illegally producing CFCs in different parts of the world, and of evidence of pollution in sundry global watersheds. Yet he was surprised to learn that the secret agencies also give senior policymakers throughout the government (on request) daily briefings on international topics of interest to them, including information on fast-breaking environmental news around the world. This official also did not know that some policymakers have intelligence forward observers in their own buildings, that is, liaison officials from the secret agencies who convey classified information and requests for further analysis back and forth between the policymakers and intelligence analysts. Furthermore, he was surprised to learn that policymakers may regularly request from the intelligence community written materials on specific topics of interest to them, so-called niche intelligence. This official expressed an interest in having all these services to support his global environmental responsibilities.36 Similarly, a senior NSC official in charge of environmental affairs had had little contact with either the NIC or the individual intelligence agencies and was unaware of the environmental services available from the community.37 Blame for this failure of communication between the producers and the consumers of intelligence lies on both sides. Policymakers could be more assertive in seeking assistance from the intelligence community; but clearly the community could advertise its products better. As one high-level EPA ofcial complained, The intelligence community must become more user friendly.38 As for the MEDEA program, the CIAs Directorate of Science and Technology is making some modest and useful contributions to ecology by providing archived imagery to outside scientists for analysis. The DS&T contributes by occasionally collecting material requested by other
| 68 |
government agencies and private researchers, if it can be done without signicantly diminishing the traditional missions of the NROs platforms. Although processing the environmental data does cost money, it is a small amount so far and will be further reduced through cost-sharing arrangements with consumers. Ofcials in the DS&T are skeptical about expanding the intelligence communitys environmental responsibilities, however, because their spy satellites are not generally well suited for most forms of ecological research. Thus, these ofcials anticipate at best a complementary, not a central, role in the collection and analysis of ecological data. The secret agencies can, however, continue to assist FEMA and other governments in times of earthquakes and other national disasters. The National Aeronautic and Space Administration is in the process of developing the Earth Observing System (EOS), a planned otilla of twenty-six satellites to measure the earths climatic system in greater detail than ever before. The intelligence community is also contributing its expertise to this project. Unlike the incidental involvement of Americas secret agencies in ecological research, the EOS was specically designed to address the most important environmental questions facing the world today.39 The managers and scientists in the secret agencies view their role as complementary at the margins to NASAs more extensive focus on the earth as an ecological system. The intelligence communitys main contribution thus will be the occasional redirection of spy satellites and aircraft to scrutinize environmental phenomenon of interest. But at least into the foreseeable future, intelligence managers intend to keep the resource commitment for such assignments at no more than 1 percent of the communitys total collection capacity.
small, in large part because spy satellites have only limited value for ecological research. NASAs Earth Observation System shows more potential in this regard, as the DS&T management readily acknowledges. Hence, dramatically greater funding to collect environmental intelligence is not warranted, although the MEDEA program and related activities do deserve continued and even somewhat greater funding. The CIAs Directorate of Intelligence should be encouraged to create a larger group of analysts to support international negotiations on ecological issues and to monitor the compliance of signatories to environmental treaties and other international agreements. Moreover, the DI should maintain its presently small group of analysts who study global environmental issues. Yet because the government already has a large number of environmental researchers working on these issues, analysts at the NIC, the DEC, and the OTI should concentrate on the comparative advantage they can bring to the table as a result of their access to clandestine information, which can ll in the gaps in open-source information on environmental topics. This is where the Directorate of Operations (DO) could be more involved. Its case officers usually regard environmental issues as beneath their station. Im concerned about questions of military and political instability, declared one. If the DEC wants to know if the Dnieper River is polluted, they can go find out for themselves.40 This case officer has a point. After all, a U.S. embassy scientific officer would be better trained for this mission. Nevertheless, occasionally the DO may be in a position to sniff out useful environmental information that no one else has detected. In sum, the DCIs Environmental Center has failed to clarify adequately the importance of its interests to DO operatives in the field. It is not enough to express concern about tree cutting in Gambia. Quite rightly, DO officers (and intelligence budget-planners on Capitol Hill) need to understand exactly what military, political, or economic threat the tree cutting might pose. What is the strategic intelligence concern for the United States? Until this is adequately explained, the DEC is likely to see further resistence to the environmental mission. The intelligence community should continue to cooperate with FEMA, providing rapid imagery of key locations in times of natural disasters in the United States and, when feasible, abroad. The secret agen| 70 |
cies should also consider sharing its archival materials on the worlds environment with international organizations. This sharing would have to be carried out within the constraints of protecting sources and methods, but as the cooperation among the NRO, CIA, and FEMA has demonstrated, it is possible to offer useful information gleaned from advanced satellite imagery without revealing technical secrets. The intelligence community should also consider accepting specic environmental assignments from international organizations, either at cost or perhaps in partial compensation for dues that the United States has been reluctant to pay to the United Nations. This cooperation would be particularly admirable in times of global natural disasters, when reconnaissance satellites might be able to provide valuable information to save lives or when outlaw nations are suspected of violating environmental international agreements (say, by dumping hazardous materials in the oceans) and richly deserve to have their misbehavior publicly documented and widely disseminated. Last, the intelligence community should continue to improve its program of outreach to consumers, both inside and outside the government, who are interested in environmental security and ecological research. So far, the secret agencies have not been able to explain adequately the value of their environmental products. How does deforestation in Brazil relate to climate change and quality of life in the United States? What risks to Americans are presented by Russian radioactive dumping in the Arctic? Or to our allies the Norwegians, who are much closer to the dumping sites? Because these questions have never been answered satisfactorily to policymakers (and to the public), they know little about the value of the intelligence communitys environmental data collection. The secret agencies have resources that can contribute to the understanding and management of environmental-security concerns without sacricing their preeminent role of protecting the United States against hostile military and terrorist threats. Americas intelligence agencies should not, however, waste their time trying to serve as additional EPAs or NASAs but, rather, should concentrate on gathering and interpreting environmental data that other agencies or the public cannot acquire, information derived from clandestine sources and cutting-edge satellite technology.
| 71 |
FOUR
The traditional idea of intelligence is the spy who provides the enemys war plans. Actually, intelligence is concerned not only with war plans, but with all the external concerns of our government. declassied CIA mimeograph statement to the Church committee, 1974
Although often referred to as the New Intelligence Agenda, the topics examined by the commission were in fact not new at all to the intelligence agencies. As noted in chapter 2, economic intelligence has been a subject of interest to policymakers and intelligence ofcers throughout the nations history, and during the cold war, Americas secret agencies closely monitored a number of environmental concerns, including the dramatic drying up of the Aral Sea between Kazakhstan and Kyrgyzstan.
| 72 |
Still, nontraditional intelligence topics have largely been allowed to simmer on the intelligence communitys back burner. Its managers continually dipped into this small budget for funds to cover the more immediate responsibility of containing the global communist threat. But when the Soviet empire fell apart, resources once intended for the USSR became increasingly available for the New Intelligence Agenda. The back burner, though, is precisely where many critics inside and outside the secret agencies would like to keep these nontraditional consumers of the limited resources available for intelligence. From their point of view, military threatsthe whereabouts of Russian missiles and warheads, the likelihood of renewed Indian and Pakistani nuclear testing, the extent of Iraqi and North Korean nuclear weapons production, the ongoing sale of Chinese missiles to Pakistan and other nations, a renewal of paramilitary operations by the Serbs or the Kosovo Liberation Army in the Balkans, and potential terrorist attacks against U.S. personnel at home or abroadmust remain the primary concern of ofcials responsible for protecting the American people and their global interests. In reaction to the runaway defense spending of both superpowers during the cold war, U.S. government ofcials tried to rebalance the federal budget and draw down the national debt. This popular political movement toward reducing government expenditures has worked against expanding intelligence requirements without strong support and whose direct relationship to national security and foreign policy may not be as readily apparent as warheads and missiles in the hands of rogue nations. Intelligence managers are dismayed, too, at the rising number of unfunded mandates emanating from Congress and the White House. In contrast are those who maintain that Americans can no longer afford to dene this nations security in narrow, traditional terms. If the ozone layer disintegrates, if the rain forests vanish, if the Ebola virus spreads across continents, or, for that matter, if a large asteroid strikes the planet, the American people may be just as endangered, or dead, as they would have been under a massive Soviet nuclear attack during the cold war. Thus, to dene the nations security strictly in terms of foreign military dangers is delusive. An obsession with the USSR once distracted America from these other dangers, but now the old-fashioned views of threat assessment must be redened in the climate of uncertainty characterizing the post-Communist world.2 As one specialist remarked with
| 73 |
respect to global public health, Infectious diseases are potentially the largest threat to human security lurking in the post-cold war world.3 As for balancing the budget (continues the argument in favor of shifting resources toward the New Agenda threats like environmental and health security), the fresh set of targets can be covered in part by reorienting those technical systemssatellites, for instanceonce directed toward the Soviet Union. Experts maintain that the United States invested too much money in gold-plated collection platforms in the rst place, equipped as they are with every conceivable bell and whistle. An ofcial at the National Security Agency, for instance, accused the National Reconnaissance Ofce of building Cadillacs instead of smaller satellites that could just as well meet Americas security needs.4 Improved intelligence gathering with respect to the New Agenda items could actually save the United States money, according to some reports. The presidents Ofce of Science and Technology Policy calculated that the lack of early warning about a resurgence of drug-resistant tuberculosis (TB) undoubtedly contributed to the more than $700 million in direct costs for TB treatment incurred [by the United States] in 1991 alone. The ofce added that surveillance of this form of tuberculosis was not reinstated until 1993, by which time multi-drug-resistant TB had become a public health crisis and millions of Federal dollars had been allocated.5 Support for attention to nontraditional intelligence topics comes from the highest levels of government. In The National Security Science and Technology Strategy, a report issued in 1996 under the guidance of the National Science and Technology Council (NSTC, a cabinet-level panel), President Clinton stated that no country is isolated from the consequences of newly emerging diseases, environmental degradation, or other global threatseven if the roots of these problems lie in distant parts of the world.6 As an example, he offered the tragedy of AIDS.
auspices of the State Department, the CIA led this research in cooperation with a number of other government entities (including the Departments of Energy and Defense).7 The initial focus was on Africa, where the AIDS epidemic originated, and researchers sorted the infected groups according to such standard demographic variables as age, gender, and rural-urban residence. The model was subsequently expanded to include Latin America and Asia and also took into account infection by the AIDS virus (HIV) through intravenous drug use, homosexual transmission, and blood transfusion. The worldwide rise of disease continues, despite hopes to the contrary in this age of advanced medical knowledge.8 Yellow fever haunts Benin, viral meningitis has surfaced in Romania, polio in Albania, bubonic and pneumonic plague in India, and cholera in the Philippines. Tuberculosis has undergone a global renascence, too, and in a recent epidemic in Madagascar, a strain of plague proved resistant to standard treatments with ampicillin and tetracycline, raising fears that this strain could render plague untreatable.9 As reported by the World Health Organization (WHO, an arm of the United Nations), malaria, plague, diphtheria, cholera, yellow fever, and dengue have reemerged around the globe.10 Each year, there are 300 million to 500 million new cases of malaria, with a child dying of the disease every twelve seconds.11 In 1999 a new and highly infectious tropical virus, never seen before by scientists, killed dozens of people in Malaysia.12 At least thirty-three new disease-causing organisms have been identied since 1976, including HIV, hepatitis C, the Ebola virus, sabia, and rotavirus, along with previously unseen strains of bacteria resistant to antibiotics.13 These diseases have no country borders. In this era of modern transportation, more than 200 million people arrive in the United States each year from foreign locations, by land, sea, and air.14 This high volume of human trafc links the worlds cities in a close-knit matrix of vulnerability. . . . Diseases that once took months to cross the Atlantic with Columbus or the Pilgrim Fathers could now circumnavigate the globe in a single day.15 With this vulnerability in mind, the White House issued a stern warning:
Diseases affecting humans, plants, and animals are spreading rapidly as a result of trade and travel and, especially when combined with malnutrition, | 75 |
Spies versus Germs threaten public health and productivity on a broad scale. The rapidly growing human population, widespread pollution, and the deterioration of other environmental factors that contribute to the maintenance of good health, as well as the lack of dependable supplies of clean drinking water for fully a fth of the worlds people, contribute to the acceleration and spread of such diseases.16
Concern over world health risks must not diminish Americas vigilance against potential military threats from abroad, always the rst priority on the intelligence agenda, whether traditional or new. As outlined in chapter 1, the world remains an angry place where weapons of mass destruction are abundant and the specter of swift and devastating carnage still stalks the planetas does the prospect of terrorist attacks using chemical or biological agents. Yet the less prominent topics mandated for investigation by the Aspin-Brown commission, including economic and environmental security, are not inconsequential and warrant close scrutiny by policymakers and the public they serve if U.S. ofcials are to make thoughtful judgments about competing intelligence resource priorities. Among these topics is perhaps the least understood of all: global public health intelligence, the subject of this chapter.
a 151-page report and offered virtually no evidence to support its endorsement.17 Health Intelligence Scenarios Yet as one begins to probe beneath the surface of the limited information available on this subject, it becomes apparent that public health intelligence warrants more serious attention than it has received. Imagine the following scenarios: AIDS is spreading rapidly throughout the population of a developing nation with mineral resources important to Americas industrial base. Indeed, in the previous year, about one-third of the children in the nations capital city were born HIV positive. The National Security Council is concerned about the stability of the currently pro-U.S. regime, since some members of its government appear to have symptoms of AIDS. The presidents national security adviser wants to know to what extent the governments higher echelons have been infected by AIDS and the likely effect this will have on the regimes stability. The CDC does not collect information about foreign leaders, and even if it did, many countries hide the truth about the prevalence of AIDS within their own bordersand certainly within their own ruling councils. In addition, the CDC and its staff would not be qualied to write an accompanying analysis of the military, political, and economic implications of the AIDSinduced instability. The secretary of state is worried about the widespread unrest in another developing country that seems to be a result of extensive poverty and disease. Particularly disquieting is the near endemic nature of debilitating intestinal afictions in its northern territories. The secretary wants an analysis of what might be causing the illnesses. Although this information may be available somewhere in the les of the United Nations, she wants it right away and with an analysis that will explain the implications for American foreign policy toward the country. The secretary is especially anxious about the potential of
| 77 |
infected refugee populations moving across national borders into neighboring states, further spreading the disease throughout the region. American troops are ordered by the president to join a UN peacemaking mission in the heart of Central Africa. Among the eld commanders responsibilities is ensuring the safety of the troops against local contagious diseases, and so he wants upto-date information on what health conditions to expect. Some of these data are available in the open domain, but part of the military action is apt to take place in a remote jungle where few Western medical experts have traveled. The commander needs to know what inoculations and other precautions are necessary to keep his troops free of disease, and he needs to know immediately. His civilian counterparts who will be dealing with humanitarian aid have the same concerns, as their workers must also be protected from indigenous health risks. The president has just read a technothriller about a member of a Middle East terrorist faction who leases a Twin Otter airplane from a small airport in the Virginia countryside, heads for Washington, D.C., and drops a ne rain of anthrax spores out the window from a suitcase while ying at low altitude along the Smithsonian Mall in the nations capital. In the novel, the attack proves fatal within forty-eight hours to almost everyone inside the Washington Beltway. The president wants to know how farfetched this plot is, along with a full report on anthrax and other biological materials that could kill Americans targeted by a terrorist attack. He also wants to know what can be done to guard against such contingencies, as well as the history of international agreements controlling biological substances. He charges the Department of Defense and the Federal Emergency Management Agency to determine whether the U.S. government is working to develop easily available antidotes in case of a terrorist strike using disease-inducing substances. These agencies in turn request from the intelligence community a full report on the threat of biological terrorism.18 The secretary of state is expected to attend a worldwide conference addressing the health dangers to citizens and military
| 78 |
combatants when environments are destroyed as a by-product of warfare. Of interest to the conferees is likely to be the health effects of toxic gases released in the aftermath of damage inicted on the environment during warfare, as occurred during the Persian Gulf conict in 1991. She requests an immediate intelligence report on the subject.19 The secretary of defense wants to know if his counterpart in a certain Asian nation is mentally unstable, as rumored, or if in fact the man is someone with whom the secretary can work. He wants, in other words, a psychological prole of the foreign minister of defense, prepared before the secretarys meeting with him scheduled in a fortnight. For this mental health information, the secretary of defense has no place to go except to Americas secret agencies.20 A White House science adviser informs the president that North Korea is probably developing biological weapons, most likely using smallpox, a disease thought to have been responsible for the deaths of at least 300 million people in the twentieth century alone and more people through the ages than any other infectious disease (including the Black Death of the Middle Ages).21 The adviser suggests that the leaders of North Korea, known to have resorted in the past to risky acts of brinkmanship in their dealings with other nations, may have in mind loading a missile with hundreds of small bomblets lled with smallpox virus and ring the projectile at the United States. At least some of the bomblets would likely slip through any missile-defense program the United States might develop in the near future, and the disease would be disseminated over a wide area. After considering this nightmare, the president orders the DCI Nonproliferation Center to prepare a report on the credibility of the advisers prediction.22 One does not have to be a Chicken Little to have some concern about scenarios like these (though some are less likely and immediate than others). After all, when an outbreak of the Ebola virus in Zaire killed 240 people in 1985, American ofcials were properly alarmed at the potential of the disease for wider dissemination and, in 1989, even feared that
| 79 |
Ebola might gain a foothold in the United States as a result of diseased monkeys housed in a medical facility at Reston, Virginia.23 And in 1997, an outbreak of bird u in Hong Kong stirred anxieties over its possible global reach.24 Researchers have pointed to the relationship between a nations health and its political stability. With respect to the AIDS pandemic, for instance, Garrett found that as early as 1988, economists envisioned the creation of a global underclass and an economic disaster in Africa because of the direct costs of AIDS care, HIV-testing costs, a years supply of condoms, AZT (azidothymine) and other drugs for opportunistic infections (where such pharmaceuticals were at all available); and loss of net industrial and agricultural productivity due to deceased work force.25 A chemical or biological weapons attack against the United States by a rogue nation or a terrorist group is also increasingly possible. Drawing on a U.S. government study, two correspondents reported that three nationsIraq, North Korea, and Russiaare almost certainly hiding unauthorized caches of the smallpox virus, and another fourteen are suspected of having or trying to acquire germ weapons.26 Former Soviet scientist Kanatjan Kalibekov, now using the Americanized name Ken Alibek, defected from the Russian military in 1992 and brought with him to America reports that Moscow had made tons of smallpox virus during the cold war. According to Alibek, the USSR had also designed special warheads to deliver the lethal scourge to the United States in long-range missiles, should a shooting war break out between the superpowers.27 The chairman of the National Intelligence Council agrees that the peril of chemical and biological terrorist operations against the United States is rising, and former DCI James Woolsey views biological terrorism as the single most dangerous threat to our national security in the foreseeable future.28 President Clinton recently conrmed that it was highly likely that a terrorist group would try a chemical or biological attack against this nation within the next few years.29 Experts consider smallpox the greatest biological threat facing the United States, since 42 percent of the American public have never been vaccinated against the disease. Next in the hierarchy of dangers is an anthrax attack, which at least has the virtue of not being contagious30 (a
| 80 |
fact of small comfort to those in the attack area). Some specialists look upon germs like smallpox as even far more deadly than a nuclear weapon . . . because most people are no longer vaccinated and hence have lost their immunity to the virus.31 Bioweapons present an acute problem for intelligence detection, since the manufacture of such armaments is easily disguised as peaceful research.32 As the director of the DCI Nonproliferation Center explained, The overlap between BW [biological weapons] agents and vaccines, and between nerve agents and pesticides is considerable; the technologies used to prolong our lives and improve our standard of living can quite easily be used to cause mass casualties.33 Policymakers understand that relying on media reports alone for information on global disease conditions is insufcient. Foreign governments sometimes try to conceal health dangers from media correspondents, as witnessed recently in the cover-up by Chinese military leaders and Communist Party ofcials of an AIDS-contaminated blood product (serum albumin) produced by a military-run factory in China.34 The purpose of clandestine intelligence collection by secret agencies is to help ferret out the facts behind such subterfuge.
global health conditions with facts and insights from espionage channels, something no one else is in a position to do. Separating the wheat from the chaff in the open information can be an enormously valuable (but often difcult) task in itself, conrming from the reports of intelligence assets on location whether the public record is reliable. Is a particular city in the Balkans actually under siege, as reported (let us say) by a European correspondent? What is an accurate population estimate for the city, taking into account the waves of refugees pouring in, so that the amount of humanitarian aid airlifted into the city will fulll its needs without oversupplying it and creating a black market? The number of refugees descending on a city may be particularly important to know, since the movement of great masses of people is often associated with outbreaks of dangerous epidemics. What is the quality of the citys drinking water? Are newspaper reports accurate about an outbreak of cholera in the main hospital? How much and what kinds of medicines are available in the hospital and in smaller clinics throughout the city? On the list of health topics analyzed by the U.S. intelligence community in the past are studies on the access of people in developing countries to safe drinking water and adequate sanitation. The underlying assumption is that a populace whose physical and mental wellbeing is under stress is vulnerable to radical political movements and other manifestations of social and political unrest that can shake the stability of its government and possibly affect Americas interests. Another topic of growing concern is the spread of HIV in foreign countries, which is so extensive already that it may well have already begun to undermine the stability of some regimes. In Janeiro, Zaire, for instance, 23 percent of the babies born in 1990 reportedly were HIV positive.36 In Zimbabwe, some segments of society are recording 25 percent HIV infection rates and still higher rates of TB (which is currently the leading infectious cause of death worldwide, killing 3 million people each year).37 American intelligence units have also gathered information from around the world on medical concerns related to peacekeeping and humanitarian operations and have shared these data with UN and NATO ofcials. Of recent special concern to intelligence analysts are the incidence and effects of HIV and AIDS on UN and NATO military forces
| 82 |
with whom the United States has worked shoulder-to-shoulder in combat zones. Similarly, analysts have studied the possible hazards to American soldiers from having to handle HIV-infected prisoners of war or to American civilians involved in the humanitarian aspects of peacekeeping missions in regions where AIDS is prevalent.38 The secret agencies also keep tabs on environmental health dangers. The accident that occurred in 1986 at the Chernobyl nuclear plant, located in the Soviet Ukraine, is an example. In the region near the stricken plant, cancer cases have doubled and calves have been born without heads and limbs. Radioactive particles from the Chernobyl meltdown have been tracked as far away as Scandinavia and, as noted in the preceding chapter, even in more distant California. One ranking UN ofcial estimated that up to 40 potential Chernobyls are waiting to happen in the former Soviet Union and Central Europe.39 What if there was another Chernobyl? What would be the health implications for U.S. personnel and citizens traveling or living in Europe and for Americas allies in that part of the world? And as the 1999 nuclear accident in Japan proves, these dangers are hardly limited to the poorly maintained nuclear reactors of the former Soviet republics. A related concern is the use of chemical and biological agents against American troops on foreign battleelds. While beyond the scope of this analysis, the federal government is well aware of the serious risks faced by U.S. troops abroad as a result of chemical and biological warfare. Reversing earlier opposition, the nations military chiefs have endorsed a plan to vaccinate all U.S. forces against anthrax in what would be the Pentagons rst regular inoculation program against a germ warfare agent, reported the Washington Post in 1996.
The about-face . . . reflects heightened Pentagon concern about the prospect of biological attack. Iraq, Russia and as many as ten other countries are said by U.S. officials to have at least the capability to load spores of anthrax into weapons, although no country is known is have released the bacteria on a battlefield.40
While a wealth of information on global health threats can be found in the public library and on the Internet, someone has to nd it in obscure documents, databases, and archives (sometimes in difcult foreign languages), and collate it into a readableideally, an eye-catching
| 83 |
format that will attract and hold the attention of busy policymakers. Just as important, someone must ensure that the information on global health addresses the immediate demands of the most prominent ofcials in Washington. The UN does not do this for Washington ofcialdom. Neither does the CDC or the Carter Center, the governments VA hospitals, the Library of Congress, the Brookings Institution, RAND, the Heritage Foundation, the Cato Institute, the Aspen Institute, or the American Enterprise Institute. So when the information is needed, the intelligence community is expected to have it, and it must be accurate, timely, and focused on the latest health danger or crisis.
cholera.42 Often, though, media correspondents are not in the right place at the right time, or they may fail to report fully (if at all) the health side of a story and its implications for U.S. security interests. Then the secret agencies intelligence collection and analysis become especially valuable. The U.S. Army Medical Research Institute for Infectious Diseases (USAMRIID), the Armed Forces Medical Intelligence Center (AFMIC), and the United States Army Medical Research and Material Command (USAMRMC) also monitor global health conditions that may affect peacekeeping, humanitarian, and rescue missions, as well as other American military operations abroad (either alone or in coalition with UN or NATO forces).43 Their primary responsibilities are to identify health threats to American soldiers abroad, although sometimes their expertise is sought as well to counter disease threats inside the United States.44 Their funding is modest and the degree to which they are integrated into the communitywide intelligence process is inadequate, particularly in regard to the collection and the subsequent sharing of information for the production of all-source reports. While efforts have been made to elevate the intelligence communitys attention to issues of health security, sometimes the left hand has been unaware of what the right hand is doing a persistent problem facing the vast and loosely connected bureaucracies spread out around Washington (a theme that runs through this book and elsewhere).45
able to level the cities of the United States with nuclear missiles. Moreover, a resumption of ghting in the Balkans or some other foreign locale would again require extensive tactical intelligence for U.S. forces. Around the world, terrorists attack civilian as well as military targets. Political unrest in Mexico can result in additional waves of immigrants eeing across the Rio Grande. International economic conditions in Thailand can directly affect the living standards of Americans. For the time being, these perils are of more immediate concern to the U.S. government than tuberculosis or malaria. Still, health risks to American soldiers serving overseas can hardly be dismissed out of hand, nor would prudent policymakers ignore the other global health concerns discussed in this chapter, even if the limitations of available resources prohibited a full coverage of every possible risk to Americans well-being. The need to keep public health intelligence in proper perspective, neither ignoring its obvious importance nor becoming hysterical about the dangers of global disease, leads to this central conclusion: in an era in which citizens are appropriately skeptical of government spending, it is nonetheless important to preserve the current levels of funding for public health intelligence (as the Aspin-Brown commission concluded, however elliptically). Taking Global Disease Surveillance Seriously Moreover, and on this point the Aspin-Brown commission was silent, without appreciable cost, some steps can be taken to provide better information about global health risks to policymakers. This will require the cooperation of groups unaccustomed to working togetheror even being in the same room. First, the CIA and its companion agencies must take the health portfolio more seriously. Global health reports to policymakers based on open sources of information are currently inadequate. As one physician emphasized, Never before has the world more desperately needed a system of early warning stations [on global disease] distributed about the most likely sources of emergence that would alert us to the first sign of danger, adding that WHOs surveillance capabilities are now fragmented and sadly neglected and other disease watchdogs (like the Rockefeller Foundation) have also cut back their monitoring capacities. The end result is that the world is
| 86 |
less prepared in terms of [global health] surveillance than it was even in the sixties and seventies.47 As a means for improving the quality of information on global health issues disseminated to policymakers, the CIAs Directorate of Operations should report more regularly and systematically from the eld on country and regional health conditions that might not be picked up by CDC and WHO monitors (some of the possibilities were mentioned in the scenarios discussed earlier in this chapter). Such information is presently neglected in the cable trafc sent back to CIA headquarters by DO case ofcers.48 In addition, case ofcers should pay closer attention to the spread of infectious diseases among specic foreign military, political, and economic elites. The Operations Directorate cannot cover the international health beat alone, however. Since the FBI is to increase its presence overseas to ght international crime,49 it should be called upon as well to tap bureau assets for information regarding global health concerns, including information on the physical and mental status of foreign elites. This would represent an expansion of the FBIs traditional investigative mandate, yet only in the narrow sense of passing along intelligence on foreign health matters to the CIA as it is picked up by bureau assets abroad in the course of their anticrime activities. Is this likely to happen? Not without the insistence of both the DCI and the FBI director. Although these activities should be only a secondary interest of the collectors, such information could well be important to the national interest and so should be given more attention. Improving Health Surveillance Methods The proper threshold for triggering collection on health matters whether global, regional, national, group, or individual in focusshould be rened. The system now is too haphazard. Intelligence managers have yet to work out explicit and systematic triggering criteria that would indicate when a health issue had reached the level of national security signicance, say, by virtue of disease lethality, proximity to U.S. interests, or communicability. As with every intelligence topic, analysts and managers throughout the intelligence community must redouble their efforts to learn what types of global health issues most concern policymakers.
| 87 |
Clandestine reporting and open-source material on world health conditions are currently not well integrated. Since a considerable amount of health data surfaces in the public domain, the intelligence analysts first step must be to satisfy the policymakers request for information quickly by way of rapid open-source data searches. Then clandestine findings can be added to the materials found through open-source searching. In the case of certain public health threats, WHO and the CDC already serve as centers for indications and warning (I&W), that is, a quick alert to threatening health conditions. The intelligence community must monitor more closely the published reports of WHO, the CDC, and other health entities with a global focus, turning to its own clandestine collection capabilities only for those topics insufciently reported by the public agencies (such as the health of specic foreign leaders, the presence of disease in potential battleelds, or the threat of bioterrorism).50 In addition, those ofcials in the intelligence community who are responsible for tracking open-source information should search more carefully the databanks and eyewitness accounts of individuals who work on health-related missions abroad for nongovernmental organizations (NGOs) and private volunteer organizations. Just as for a missile attack, the rapid dissemination of accurate information about global health threatsa kind of viral telemetryis essential. The communitys relationship to private groups must be handled carefully. As one FAS scientist stressed, We are in communication with DoD [Department of Defense] ofcials and are, of course, aware of the value of disease surveillance data to the intelligence community. We and theyrecognize that any overt involvement by DoD or intelligence [in the data-collection activities of civilian groups] would kill [our] effort to monitor effectively.51 The intelligence communitys databank on global health topics is decient. The CIAs sophisticated in-house computer system charged with scanning the open literature (known as ROSE, for Rich Open Source Environment) does not have among its machine-readable subscription lists many of the key specialized publications from private and international governmental organizations dealing with health and medical subjects. For very little money, the ROSE system could be enriched with
| 88 |
open-source global disease data useful for both early warning and a more complete understanding of international health threats. Sharpening the Focus on Chemical-Biological Dangers The secret agencies need to shift some resources from intelligence collection regarding conventional military targets to the more probable danger facing the United States of a terrorist attack employing chemical or biological weapons. Given the current resource bias favoring technical intelligence over human intelligence, too few assets are currently exploring the chemical-biological warfare capabilities and intentions of foreign nations and factions (and, in the case of FBI intelligence, for comparable threats at home).52 More research on antidotes and their quick dissemination in times of emergency is necessary, with private industry, the Department of Defense, and the secret agencies working in tandem (as they have done so well over the years in the development of satellites and reconnaissance airplanes). Our ultimate goal, stated a recent White House report, is to foster the creation of a worldwide disease surveillance and response network.53 This laudable objective warrants resources to match the rhetoric. Organizing for Health Security The collection tasking and analytic integration of health intelligence cry out for better coordination. Several federal agencies have given some attention to public health intelligence, but it has not been well coordinated. The FBI, FEMA, and the U.S. Public Health Service, for example, have put together a crisis-management plan to cope with a chemical or biological terrorist attack, but there has been relatively little emphasis on devising practical measures for protecting public health in the event of such an attack.54 The current fragmentation of efforts could be mitigated by the creation of a task force on global disease surveillance and analysis, under the auspices of the DCI. The task force would be expected to convene at least twice a year to review current world health issues and to determine how well the intelligence community and relevant open agencies have
| 89 |
cooperated in the collection, data analysis, and dissemination of global health data and assessments. Members of the task force should include The NIO for global issues (who would chair the panel and report directly to the DCI). A representative from the CIAs Directorate of Operations with knowledge of clandestine collection methods related to public health intelligence. A global health analyst from the CIAs Directorate of Intelligence. Representatives from the National Security Agency and the Defense Intelligence Agency. A representative from the State Department. A representative from the FBI. A representative from the U.S. Customs Service. Representatives from the Armed Forces Medical Intelligence Center, the U.S. Army Medical Institute for Infectious Diseases, and the U.S. Army Medical Research and Material Command. A representative from FEMA. A representative from the U.S. Public Health Service. A physician/researcher from the CDC. An academic medical expert with extensive international experience. The NSC staff aide responsible for global health issues. The task force would also need to establish a close working relationship with WHO and appropriate NGOs. One of the task forces key issues to consider would be who needs to know what and when about potential disease threats, especially when the territory of the United States itself is threatened. The intelligence agencies must do a better job of informing policymakers about health dangers that have been uncovered by agents in the eld, and they must keep them better informed as well about new analytic reports prepared by the community on global health issues. At present, often the wrong or unneeded information is gathered because of inadequate communications between the consumers of intelligence and its producers. One part of the govern| 90 |
ment is frequently unaware of what another, related part is doing on health security, even at high echelons. One recent senior NSC staffer had never met the key national intelligence ofcer dealing with global health issues, even though both individuals had been in their respective positions for almost a year. Furthermore, while the United States already has procedures in place to deal with health threats when the warning comes from public sources, less adequately planned is the manner in which clandestinely derived disease warnings should be disseminated to the civilian population in times of an emergency involving a health danger (such as a terrorist attack employing biological substances).
| 91 |
PA R T I I
Strategic Intelligence
Fissures in the First Line of Defense
FIVE
The jack of hearts has a major liability: he has only one eye. Americas directors of Central Intelligence have longed for perfect vision with respect to the foreign threats discussed in the rst part of this book, yet they too have suffered from partial blindness. This malady is inescapable in one sense, because no onenot even vast and expensive espionage organizationscan know all there is to know about world events, especially when adversaries are determined to hide their activities. This vision impairment can, however, be corrected to some extent, for in part it reects both bureaucratic rivalries and an imbalance of missions among the nations intelligence agencies. The inability of DCIs to give presidents a consistently integrated perspective on global affairs creates a major disconnection between the challenges presented earlier in this volume and the capacity of the intelligence agencies always to respond effectively.
A Season of Change
The mid-1990s were meant to be a period of change for Americas intelligence organizations. An array of reform-minded commissions and study groups, inside and outside the government, scrutinized the state of U.S. intelligence, found it wanting, and offered a variety of correctives.1 But on even the most fundamental points of how the secret agencies should be organized and what their missions should entail, the various panels of inquiry often disagreed with one another.
| 95 |
This lack of consensus came as no surprise to those who had tracked the intelligence communitys troubled history during the cold war. A series of controversial missteps, including the domestic spy scandals uncovered in 197475, had raised questions about the state of American intelligence. Worrisome, too, was the CIAs use of extreme covert actions, even the recruitment of Maa hit men to assassinate Cubas Fidel Castro (revealed in 1975). Then in the 1980s came the excesses of the Iran-contra affair and the failure to anticipate the sudden collapse of the Soviet empire. In the inquiries that followed, some critics called for sweeping reforms, even the abolition of the CIA, but others seemed content to leave the secret agencies to their own devices.2 Further evidence that a movement for intelligence reform would not be easy could be found in the testimony and management decisions of recent DCIs. Some directors readily expressed their dismay that the intelligence community was so resistant to supervision by the directors ofce. Admiral Stanseld Turner, DCI from 1977 to 1981, claimed that running the CIA was like operating a power plant from a control room with a wall containing many impressive levers that, on the other side of the wall, had been disconnected.3 Turners response was to accelerate the downsizing of the CIAs subdivision most resistant to higher management: the Directorate of Operations (DO), home of the Agencys spy handlers. This reduction in personnel had begun four years earlier by order of DCI James R. Schlesinger (1973), who for his efforts came to be known inside headquarters as the most unpopular director in CIAs history.4 Similarly, Admiral Turners tenure is viewed by insiders as a dark chapter in the Agencys history. First an academic (Schlesinger) and then not long after a navy man (Turner)both intelligence outsiders, or irregulars, not bound to a specic career service5had dared to interfere with the Agencys sacrosanct internal structure. One of Turners successors recalls how the CIA had intentionally obstructed the admirals efforts to gain control of the permanent intelligence bureaucracy. I had learned a valuable lesson working for him, writes Robert M. Gates, a career CIA ofcer. I now knew that I never wanted to be DCIanyone who wanted the job clearly didnt understand it.6 Although Gates eventually did become director (199193) despite these misgivings, his memoirs recall his frustrations as the nations spymaster. Even with this career regular at the helm, the intelli| 96 |
gence bureaucracyagain, most notably the Operations Directorate resisted change mandated from the management suites on the seventh oor at Langley Headquarters. Had Gates come up through the ranks in the Operations Directorate, rather than the Intelligence Directorate, he no doubt would have been more palatable to DO personnel. Downsizing the CIA and the other secret agencies has not been the only reform pursued by DCIs. On the contrary, for the directors during the 1980s, the answer to a more effective intelligence community was an expansion of its programs. The new growth took place within each of the intelligence agencies, with little attention to how their work might be most effectively integrated. The result of this approach was the creation of large, fragmented systems, which are ideal climates for the pursuit of parochial interests by individual program directors. As one authority of bureaucracies has noted, This involves seeking higher salaries, better perquisites, greater reputations, and more power; dispensing more patronage; increasing programmatic outputs; and it adds up to immense pressures to expand organizations and increase budgets.7 The various agency directors throughout the intelligence community have acted accordingly, and their combined budgets ballooned from $20 billion annually at the end of the Carter administration to $30 billion annually during the Reagan and Bush administrations.8
the community. A starting place is to examine the CIAs own considerable internal disaggregation. CIA Structural Divisions The CIA has within its walls ve major organizational divisions: the Directorate of Intelligence (DI), the Directorate of Operations (DO), the Directorate of Administration (DA), the Directorate of Science and Technology (DS&T), and the Ofce of the Director of Central Intelligence, each with an elaborate set of subsidiaries (see gure 2). More signicant still in trying to understand the difculties of governing just this agency alone (the other dozen aside) is its multitude of cultural keeps. These informal cultural ssures add to the formal divisions in producing, for intelligence directors and policymakers alike, a dismaying institutional fragmentation. Cultural Divides The CIAs internal cultures reflect the divergent training and outlook of each of the directorates intelligence officers. The members of each directorate usually share basic values and practices that distinguish them from those that staff the rest of the Agency. Among the cultural groupings are scholarly analysts with expertise in foreign political, military and economic systems, located in the Directorate of Intelligence; scientists, in the Directorate of Science and Technology; case officers, propagandists, paramilitary officers, and counterintelligence specialists, in the Directorate of Operations; administrators and security officers, in the Directorate of Administration; and managers, attorneys, inspectors, arms control specialists, and legislative liaison personnel, in the Office of the DCI. The Analysts The analysts are the CIAs scholars, usually Ph.D.s and area specialists. During the CIAs early days, the stereotypical analyst was an Ivy League professor replete with elbow-patched tweed jacket complemented by the mandatory button-down collar and regimental striped tie, but today
| 98 |
they are generally less tweedy and come from colleges outside the Ivy League. Nonetheless many are educated in the nations top private schools, and most have an academic air about them. Their job is to sift through secret information procured abroad, blend it with information in the public domain (open source), and prepare short, up-to-date
| 99 |
reports (current intelligence) or longer estimates (research intelligence) on world conditions for consideration by the president and other policy ofcials. Analysts are meant to beand usually are thoughtful, unbiased, and empirical, with a sharp eye for nuance and the academicians training to consider every perspective. The milieu of the analyst is the library, increasingly the virtual one inside a word processor, aided by the ongoing development of ties with colleagues through a secure computer network across the intelligence community (called Intelink). The ethosin theory at least and usually in practiceis objectivity, and the goal is to provide decision makers with accurate, timely, and relevant information and insight, free of policy spin or bureaucratic parochialism.
The Case Ofcer
Although in the same building as the Directorate of Intelligence, the Directorate of Operations is another world, largely sealed off from the rest of the CIA. (In an attempt to overcome this separation, a recent experiment in co-location has seated a small percentage of DO and DI personnel together, although some DO ofcers have already skittered away from the project, as if on the rim of a vortex.) Some of its personnel, known as case or operations ofcers, live abroad and are responsible for recruiting and handling native agents or assets who, if they are both prick eared and well positioned, can collect useful information in their respective countries, from sources both open (Iraqi newspapers) and closed (military documents in a safe at the intelligence headquarters of the Iraqi government). The successful case ofcer, typically a gregarious sort, completes a tour of duty overseas having recruited a stable of new agents. Indeed, the criterion of success for CIA case ofcers was once the number of assets that he or she had recruited.10 Recruitment is still very important, but promotion boards now take other skills into account as well. Whereas analysts are trained to value all-source intelligencedata drawn from all of Americas spy machines and espionage assets (blended with open sources)case ofcers are acionados of old-fashioned human spying or, in their terminology, HUMINT. This, in their opinion, is ground truth; their assets, with whom they frequently develop close personal relations, are (ideally) in the enemys secret councils or at least have access to some| 100 |
one who is. The case ofcer spends most of his or her career abroad and believes that this experience provides a better sense of the target country than that held by the narrowly specialized Ph.D. analystRodins The Thinker stuck behind a desk at Langley and venturing overseas only occasionally. These differing perspectives can lead to disagreements and sometimes even hostility between the two cultures. Until a truce (partnership) was signed in 1995, DI personnel could not even enter the DOs suite of ofces at headquarters, barred by special combination locks that kept out all but the elite cadre of the real intelligence ofcers, those who learned the lessons of espionage during their overseas assignments. According to a former senior CIA ofcial, as recently as the Reagan administration DO ofcers refused even to tell the DCIs intelligence community staff what was going on overseas.11
Covert Action Specialists
Within the Directorate of Operations is the Covert Action Staff (CAS), always the most controversial of the Agencys subsidiariesand the most cosseted. This unit plans and manages operations designed to inuence (and sometimes to overthrow) foreign governments through the use of propaganda, political and economic manipulation, and paramilitary (PM) or warlike activities. One wing of the CAS suite of ofces resembles those of a metropolitan newspaper, with journalists writing articles for placement in foreign media. Another buzzes with political campaign activities, as specialists produce everything from bumper stickers and brochures to political pins and leaets meant to benet pro-U.S. candidates in foreign elections. In still other ofces, economic experts concoct schemes to disrupt an adversarys monetary system or to mine harbors as a means for disrupting the enemys maritime commerce. Although the art form has declined since the end of the cold war, most of the clandestine operations during the struggle against Communism took the form of propaganda, particularly the use of articles placed in foreign newspapers and magazines to discredit the leaders of the USSR One of the CAS ofces has the Latin phrase Actiones Praecipuae above the entrance, indicating the site of the Special Activities Division, home of the paramilitary cadremacho war ghters sporting blue-tinted
| 101 |
aviation glasses and rolled shirt sleeves and displaying a certain swagger that comes from having faced danger abroad. These intelligence ofcers relish the peril of unmarked air ights behind enemy lines and the command of speedboats in hostile waters. Given the choice, they would prefer (at least in the lingering and overdrawn Rambo cartoon image from the cold war days, which CAS ofcers are not above nurturing) to scale enemy walls in the dead of night, knife between the teeth, rather than fret over analytic nuances in a report destined for the president. During the cold war, CAS officers frequented the worlds hot spots, blowing up bridges in Vietnam and Laos and concocting assassination plots against pro-Soviet leaders in the developing world (terminate with extreme prejudice, the order would read). Their involvement in these primordial pursuits earned them the monikers knuckle-draggers and snake eaters, evoking the image of men crawling on their bellies through foreign jungles. (Some journalists labeled them The Gang That Couldnt Shoot Straight, since none of the assassination plots succeeded.) The analysts are a bunch of academics, summed up a former DCI, while the DO types would be entirely comfortable in the Marine Corps.12
The Counterintelligence Corps
Farther down the hall in the DO are the CIAs counterintelligence specialists, another breed unto themselves. Counterintelligence (CI) is the art of thwarting hostile intelligence operations directed against the United States. In these suites, paranoia is paramount: a distrust of everyone, for perhaps even ones best friend might be a Russian or Chinese mole. Some CI ofcers possess the countenance of Talmudic scholars poring over faded intelligence archives in search of clues to which foreign intelligence ofcer may be susceptible to recruitment (the best way of discovering what operations the enemy is running against the United States is to penetrate its foreign intelligence service with a mole of ones own). Other CI ofcers are cut from quite different cloth: muscular security guards who check safes to ensure they are properly locked at the close of business and monitor the internal CIA computer databanks to guard against personnel surng outside the narrow province of ones need-toknow. They also keep an eye on CIA ofcers overseas, say, during happy hour at local watering holes, in order to warn them away from socializ| 102 |
ing with individuals who may be hostile intelligence ofcers or their cut-outs (intermediaries). When James Angleton ran the CIA Counterintelligence Staff within the DO (195474), it resembled Arthur Conan Doyles Lost World: remote, unchartered, mysterious. Angleton personally carried out aggressive penetration operations against foreign targets, often without the knowledge of the U.S. ambassador, the DCI, or even his most immediate supervisor, the deputy director for operations (DDO). His charge was to catch foreign spies, especially those run by the Soviet intelligence services; how he did it was up to himor so he decided.13
The Techies
In another domain all their own are the scientists of the S&T Directorate, the technological wizardstechies or techno-weeniesmade famous for moviegoers by Major Boothroyd (aka Q) in the James Bond lms. In the early days, they helped the air force build airplane and satellite surveillance platforms (most famously, the U-2), now a task shared by the National Reconnaissance Ofce and the air force. The scientists in DS&T design and manufacture state-of-the-art espionage devices, from tools for picking locks and burglary (black-bag or second-story job) to clandestine communications facilities and disguises that can utterly transform an agents physiognomy. In the most notorious intervals of their history, DS&T scientists have crafted exotic killing instruments for assassination plots (including a highly efcient poison dart gun or nondiscernible microbioinoculator), conducted LSD experiments on unwitting personnel (among them one of their own scientists, who subsequently committed suicide), and provided wig disguises for Watergate conspirators (though without knowing their criminal political intentions). Just as every university campus is culturally divided between hard scientists and other faculty members, so is there some distance between the CIAs scientists and the rest of the organization. The CIAs techies are essentially a lab-based support service, often driven by a stronger interest in pure research than in the traditional concerns of spy agencies.
The Admin
The Directorate of Administration keeps the Agencys oors mopped and its cafeterias well stocked with food and drink. Yet it, too, has its
| 103 |
pockets of insularity, especially the dreaded admin inspectors and the Ofce of Personnel Security. These intelligence ofcers are the cause of periodic dyspepsia inside the CIA, because of their marmoreal demeanor and ofcious enforcement of security regulations: everything from correctly wearing ones identication badge to never leaving a classied document out of its safe at night. The admin also descend from time to time on the CIAs embassy-based ofces abroad (stations), conducting detailed audits and white-glove inspections. The DA also administers the Agencys lie-detector or polygraph tests to prospective employees and, at least every ve years (a rule honored more in the breach than in the commission), to career intelligence ofcers as a check on their loyalty. Taking a lie detector test is always stressful and can also be a demeaning experience. In some instances, the polygraph unfairly casts doubt on the test takers integrity, without conrming evidence. The machine is far from infallible. It failed to uncover Aldrich H. Ames, Wu-Tai Chin, and other traitors inside the intelligence community. Now and then, though, the lie detector has proved to be a useful security device for uncovering foreign espionage agents (CIA traitor Harold Nicholson became a suspect after failing a routine polygraph test in 1995), as well as for catching thieves and even, on one occasion, a murderer who confessed to killing his wife. But whatever the polygraphs merits or demerits,14 it nonetheless contributes to the cultural tensions between an element within the DA and the rest of the Agency, as does a concern (however unfounded) among some CIA ofcers that nancial and medical information acquired by security personnel might be misused to harm an individuals career.
The Seventh Floor
The CIAs intelligence managers, the DCI and his immediate entourage of deputy and executive directors and their retinue of aides, reside on the seventh oor. At this level, personnel are forced into a less parochial perspective, as their job descriptions require them to plan for the entire community, however resistant the individual agencies may be to central guidance. Depending on the particular objectives of individual DCIs (some are more community oriented than others), this management group does try to improve cooperation in intelligence collection and analysis. The
| 104 |
goal is to overcome turf battles between the agencies, focusing instead on producing the best possible analysis for the decision makers. To this end, the DCI tries to behave as a genuine director of central intelligence, not just the director of the Central Intelligence Agency. If most of the other units inside the CIAs building are centrifugal or fragmenting in their organizational effect, the DCI and his staff represent a degree of centripetal or centralizing inuence both within the CIA and throughout the wider community. The extent of this centralization has been modest over the years, however. Even those employees on the seventh oor meant to assist the DCI in communitywide activities can yield to narrower interests. The DCIs legal counselors, legislative liaison team, arms control experts, and the inspector general, for instance, are chiey concerned with (respectively) legalisms, the congressional perspective, arms-accord monitoring, and accountability. These professional interests may or may not help the DCIs quest for greater community integrationif, in fact, that is even the directors goal. As a result of this internal fragmentation throughout the CIA, from the labyrinth of basement corridors to the seventh oor, DCIs have found their hands full with the task of leading the CIAlet alone all the other agencies in the community. The DCIs First Job: Running the CIA No DCI has successfully negotiated the straits between the Scylla of the CIA and the Charybdis of the intelligence community. Managing the Agency is obviously a less daunting challenge for a DCI than guiding the entire community (which is essentially a dozen other CIAsindeed, some many times larger), yet none has managed to grasp even the CIAs reins tightly in hand. Admiral Turner described the leadership dilemma as he saw it during the Carter years:
These differing outlooks [of the CIAs internal directorates] give rise to a lot of pushing and pulling on what position the Agency as a whole should take on specific questions. In any other organization such disputes would be brought to the person at the top, who would have to adjudicate them. Not so at the CIA. There, the branch heads go a very long way to compromise with each other rather than let an issue reach the DCI for resolution. The last thing [the directorates] want is for the | 105 |
The DCI and the Eight-Hundred-Pound Gorilla DCI to become a strong central authority. In adjudicating between them he might favor one or the other, and the others would lose some of their traditional freedom.15
The admiral attributed the independence of the CIAs operating directorates to a combination of three inuences: their initial separateness at the beginning of the Agencys history in 1947, each with distinctive and (in his view) haphazard evolutionary arcs; the philosophy of a need-to-know compartmentalization (or what the CIA refers to as compartmentation) of activities that, for security reasons, fractures the sharing of information along directorate and even ofce lines; and their differing responsibilities (collection, analysis, and technical support). In what manner does the CIAs professional intelligence bureaucracy want the DCI to govern? In Turners opinion, by leaving the CIA alone and concentrating on outside political battles with the White House, the Congress, and the publica blend of public relations and Washington inghting to protect Agency budgets and programs. Admiral Turner was not willing to tolerate this degree of internal autonomy, believing that in order to combat foreign threats more effectively, information had to be shared more equitably, both inside the CIA and across the community. Moreover, excessive internal discretion in the past had led, he was convinced, to the intelligence abuses documented by White House and congressional investigators in 1975. Yet try as he might, Turner conceded that he had little success in overcoming the centrifugal forces at Langley, and his experience in attempting to discipline improper behavior by two renegade CIA officers in the Operations Directorate illustrates the point. Rather than support his efforts, the Agency closed ranks against him, sharply resisting intrusion by this outside military man and his uniformed aides (quickly dubbed the Navy mafia by inside regulars). As Turner recalled, Not one CIA professional concurred with my instant reaction to fire the two men.16 President Bill Clintons rst DCI, R. James Woolsey (another irregular), had a similar experience in 1994. When cracking down on the lax security that allowed DO ofcer Ames to sell secrets to the Kremlin, he found to his amazement and chagrin that the Directorates own leaders had chosen to confer medals on the very individuals he was attempting
| 106 |
to punish, clearly a signal from the DO regulars to back off their turf. Apparently intimidated, Woolsey ignored the recommendations of the CIAs inspector general (Frederick P. Hitz) in favor of dismissals and other tough sanctions, deciding instead merely to reprimand eleven senior DO managers. When Woolseys successor, John Deutch (also an irregular, a former MIT chemistry professor and provost), sought to discipline DO ofcers for improper activities in Guatemala, he became the rst director ever booed by senior intelligence ofcers assembled in the Bubble, the Agencys main auditorium.17 The DCIs Second Challenge: Running the Community Admiral Turner also did not have much success in leading the wider community, but none of the other DCIs that followed him has done much better. Turners immediate successor, the controversial outsider William J. Casey (198187), devoted little attention to issues of community integration (although he did take an active interest in national intelligence estimates, detailed reports based on communitywide sources). Indeed, he bypassed altogether the Agencys normal procedures and the community during the centerpiece operation of his tenure, the Iran-contra affair. Another outsider, former FBI director William H. Webster (1987 91), followed by insider Gates, both achieved some success in integrating the intelligence community based on the creation of interagency intelligence fusion centers and task forces. Although the next DCI, Woolsey (199395), built some bridges between the CIA and the Pentagon (where he had once served), his role as a community leader was modest as well. Subsequently, DCI Deutch (199596), who had also served in the Defense Department, further tightened the ties between the Agency and the Pentagon and strengthened the feeble Community Management Staff in his search for better interagency coordination. In addition, both Woolsey and Deutch enriched the DCIs top board of analysts, the National Intelligence Council, by drawing in more communitywide personnel, and responding to Washingtons budget-cutting pressures, they experimented with pooling a communitywide legislative liaison staff. But all these efforts represented only piecemeal attempts to integrate the
| 107 |
secret agencies, despite Deutchs euphoric hope to orchestrate the symphony of the communitys component parts.18
Fusion Centers
The basic themes of American governmental institutions are distrust and disaggregation, notes a political scientist.19 Nothing so exemplies this phenomenon as the intelligence community. In response to the centrifugal tendencies both within the CIA andmore pronounced still throughout the community, recent DCIs have experimented with fusion centers that concentrate on specic intelligence problems. These fusion centers include the Center for CIA Security, the Center for Support Coordination, the DCI Center for Security Evaluation, the DCI Nonproliferation Center (NPC), the DCI Counterterrorist Center (CTC), the Counterintelligence Center, the National HUMINT Requirements Tasking Center, the DCI Crime and Narcotics Center (CNC), and the DCI Environmental Center (DEC). These centers offer planning, research, analysis, technical support, and operations all in one place (one-stop shopping, ofcials in the centers boast), bringing together community experts to focus on specic threats to the United States. They encourage the sharing of information across agencies, in contrast to the more traditional emphasis on separate agency hierarchies, competition, and the hoarding of knowledge. Seated in the same suite of ofces within easy conversational reach are CIA, Federal Bureau of Investigation (FBI), and other intelligence ofcers with common specialties (such as counterterrorism). Currently, each center is housed in, and dominated by, the CIA, yet the number of communitywide experts participating in several of the centers is steadily increasing, and the organizations are becoming more truly all-source integrators of information, analysis, and operations.
Task Forces
In another effort to overcome internal CIA and communitywide fragmentation, recent intelligence directors have experimented with using special task forces to deal with specic problems. Some dozen in number, they have addressed such matters as covert action, information management, and future planning. Director Woolsey put together one of the most successful task forces to monitor intelligence needs for UN and
| 108 |
NATO forces in Bosnia. Field commanders and Washington policymakers alike commended this communitywide team for its exemplary allsource ethos and reporting of timely, useful information from the Balkans. A comparable team also performed with merit during the war in Kosovo in 1999. Centers and task forces notwithstanding, disaggregation remains the order of the day for the intelligence community. The community resembles nothing so much as a byzantine mosaicor, in the apt description of one observer, a Hobbesian state of nature.20 This fragmentation poses a staggering leadership challenge for any DCI who hopes to piece together, on behalf of the president, all-source intelligence products from all parts of the community. Little wonder that a deputy DCI once threw up his hands in despair and declared the community nothing more than a tribal federation.21 The movement toward centrism has gained some momentum, albeit at a glacial pace, and this description remains close to the mark.
history. The DCI, in contrast, is not a member of the cabinet. President Reagan did make William Casey a member, but since then no other DCI has served in this capacity. The DCI may be the formal head of the intelligence community, but in terms of genuine clout in the high circles of government, he has minimal leverage over people like the secretary of defense. Moreover, the defense secretary is only one of several powerful gures in the government who preside over intelligence agencies within their own departments. The secretary of state can have considerable bureaucratic inuence in the White House and on Capitol Hill and is quite capable of deecting unwanted DCI control over the State Departments Bureau of Intelligence Research (INR). The director of the FBI, too, is not exactly a lightweight in Washington circles. This point is obvious with respect to the legendary J. Edgar Hoover, director of the bureau between 1924 and 1972, who refused even to talk to DCI Richard Helms (196673) during a CIA-FBI squabble over counterintelligence jurisdictions. More recent FBI directors and certainly the current incumbent, Louis J. Freehalso have had minds of their own, close ties to the Hill, and a manifest capacity to thwart DCI interference in bureau affairs. Despite the DCIs initial opposition, Freeh successfully expanded the presence of the FBI overseas to ght international crime, a move viewed with alarm by some senior ofcials in the CIA as an exercise in global empire building by the bureau at the expense of Agency billets in U.S. embassies abroad. Moreover, lamented a recently retired CIA ofcial, The FBI is absorbing all of the Agencys counterintelligence responsibilities.23 The less well known program managers who head up the other intelligence agencies (such as the director of the NSA) are also expert at shielding their operations from the DCI and at building alliances in the White House and in Congress. Furthermore, whereas the CIA is an independent, nonpolicy agency that serves the president directly (through the DCI), all the other intelligence agencies report to their policy department secretaries (whether civilian or military) as well as to the DCI. Not surprisingly, the directors of these agencies are quick to run to their departmental secretaries for protection should a DCI become too aggressive in trying to shape their programs and budgets.
| 110 |
The DCI cannot depend on the presidents national security adviser as a reliable ally in the White House. The reason is that the security advisers views may contradict the information brought to the Oval Office by the intelligence director, and the security adviser has the considerable advantage of a suite in the West Wing and frequent access to the president. The position of DCI, then, is not at all what it appears to be on the standard organizational diagrams: a colossus standing astride the secret agencies and driving them forward in his chosen direction, as if they were so many horses in a wagon train. Rather, the director is primarily the titular head of the community and must depend heavily on personal bargaining skills, support in Congress, friendship ties with key departmental secretaries and program managers, andvital to successthe presidents backing. In this sense, the Ofce of the DCI is reminiscent of the view of the presidency as a position of persuasion, not command,24 although the DCI lacks the resources of funding, staff, and authority enjoyed by the president and other senior gures in the national security apparatus. The DCI does have a few face cards in the game of political persuasion that characterizes American government. Depending on the chemistry between the two, the director sometimes has a close relationship with the president. William J. Casey was a long-time friend and condant of President Reagan, and Robert Gates also beneted from strong ties to President Bush. In addition, the DCI has ready access to the CIAs storehouse of information gathered overseas by agents recruited by the Operations Directorate, as well as to the reports prepared by the thousands of analysts in the Intelligence Directorate (who, free of afliation with a cabinet department, enjoy a reputation for policy neutrality). The secretaries of state and defense have their wellsprings of information, too, of course, from open sources as well as from their own departmental intelligence services, but sometimes the CIA can provide the DCI with unique data and assessments, especially on global political and economic matters. In the truism, information is power and the DCI can use Agency information to gain standing in the government, particularly if the president values intelligence and regularly seeks briefings from the DCI.
| 111 |
Military versus Civilian Intelligence The dilemma faced by the DCI in governing the intelligence community can be seen in the current tug of war over support to military operations (SMO in the inevitable Pentagon acronym). As Operation Desert Shield gathered momentum in 1990, Congress heatedly debated for four days the wisdom of intervention to halt Iraqi aggression against its neighbor, Kuwait. Senator Sam Nunn (D, Georgia) agonized over the risk of high U.S. casualties that might result from the military action. Backed by former chairman of the Joint Chiefs of Staff Admiral William J. Crowe Jr., Nunn argued forcefully in favor of economic sanctions to punish Iraq rather than the use of an American invasion force in the heart of the Middle East. Nunn lost the debate, but as it turned out, the ensuing fatalities on the U.S. side numbered fewer than two hundred. One of the main reasons for this outcome was the transparency of the battleeld for American war ghters, a result of saturating the region with intelligence surveillance platforms. The possibility in the future of ever greater battleeld transparency, allowing for still fewer body bags, has understandably whetted appetites in the Pentagon for acquiring additional intelligence resources to support the war ghters. As a consequence, SMO has become a popular bureaucratic battle cry inside the Pentagon among those who prepare the secretary of defense for annual intelligence budget negotiations with the DCI. Naturally, DCIs also favor the reduction of U.S. casualties as far as possible during warfare; however, they have the added responsibility of reporting to the president and other policy ofcials on intelligence related to foreign political, economic, and societalnot just military matters. Given the Pentagons control already over 85 percent of the intelligence dollar, further erosion in the direction of the SMO mission would drastically reduce the budget for intelligence on these other global threats. As the staff director of the House Intelligence Committee has put it, There is a need to rebuild a strategic, or what we sometimes call the national, capability to end what has been an absolute and total xation on near-term, tactical [military] intelligence.25 Sometimes the bargaining over resources between the intelligence chief and the secretary of defense has been cordial. Indeed, Woolseys
| 112 |
and Deutchs ties to the defense secretary were too cozy in the opinion of some CIA ofcers, who feared that both men were selling out to the Pentagons dreams of perfect battleeld transparency. Often, though, the relationship has been distant, like, in the words of a former CIA ofcer, ships passing in the night.26 In the Carter administration, Secretary of Defense Harold Brown and DCI Turner rarely saw eye to eye. In those infrequent cases when disagreements between the secretary of defense and the DCI are pushed into the Oval Ofce for arbitration, presidents have been disinclined to oppose the military. And even if the secretary of defense were to lose in the White House, the Pentagons powerful allies on the Armed Services Committees in Congress are likely to enter the ring on the militarys side. The Ofce of the DCI is thus an incongruous leadership post, with major responsibilities for guiding national intelligence but without concomitant authority, jostled on all sides by muscular rivals and torn by deep historical and cultural divisions even within the directors own immediate home agency, the CIA. As one intelligence specialist put it, For all the talk about community, the reality is different.27 Indeed, it is unlikely that even James Madison (the father of institutional disaggregation in Americas government) could have imagined the hyperpluralism that characterizes the intelligence community today. Agency autonomy is the guiding norm even within the subdivisions of the secret organizations. The end result of this institutional fragmentation has been a steady drift away from the centrism that Harry S Truman endorsed with his creation of a more central intelligence. Some recent steps have been taken to reverse the powerful centrifugal forces emanating from the separate departments and agencies that deal with intelligence, but they have met erce resistance, especially from the guardians of military intelligence in the Pentagon. Even the DCI is nervous about seeking more authority. Every time you try to give me new authority, George Tenet has remarked, you get me in a ght with a building much bigger than mine [that is, the Pentagon].28
the DCI be given more authority.29 When Congress addressed these and related reform proposals in the Intelligence Authorization Act of FY 1997, it gave the director some extra governing leverage, including a special Committee on Foreign Intelligence (CFI) lodged in the NSC.30 The new CFI is chaired by the presidents national security adviser, and its members include the DCI, the secretary of defense, and the secretary of state. Although the intention of this reform was to provide more focus to intelligence issues at a high level, it achieved little more than to create still another layer in the NSCs increasingly encumbered bureaucracy. The Aspin-Brown commission (and subsequently Congress) embraced the creation of even another new NSC committee, this one entitled the Committee on Transnational Threats. Again chaired by the national security adviser, its membership included the DCI, the secretary of defense, the secretary of state, and the attorney generalin short, the CFI plus one. The catchall phrase transnational threats is meant to include global crime, narcotics ows, and weapons proliferation, as if the NSC had somehow overlooked these menaces in the past. Finally, Congress created in this same statute one deputy director and three assistant directors to support the DCI. The deputy director for Central Intelligence (DDCI, already in existence) is supposed to help manage the CIA. The new deputy director of Central Intelligence for community management (DDCI/CM) is meant to help manage the wider community. The assistant directors of Central Intelligence (ADCIs) are positions designed to aid the DCI and the DDCI/CM in the communitywide coordination of three core activities: administration (ADCI/A), intelligence collection (ADCI/C), and analysis and production (ADCI/A&P). With respect to the spending powers, Congress recoiled from the notion of a stronger DCI. According to the language of the 1997 Intelligence Authorization Act, the director would be allowed only to facilitate the development of annual budget for intelligence (as he already does, insofar as the secretary of defense lets him). The DCIs most notable success in the 1997 legislation, however modest, came in the realm of selected appointment powers. That is, the secretary of defense must seek the concurrence of the DCI before appointing the program directors for the NSA, the NRO, and the National Imagery and Mapping Agency (NIMA). If the DCI did not
| 114 |
concur, the secretary of defense could then take the case to the president or select another nominee. For other key appointments, including the heads of the Defense Intelligence Agency (DIA), States INR, and the FBI, the intelligence director would only have to be consulted by the secretary of defense, the secretary of state, and the attorney general, respectively; no concurrence would be necessaryanother victory for institutional autonomy.
who seek greater centrism, namely, a more prominent role for the DCI in interagency coordination, which would also tilt the community away from the Department of Defense and toward a richer reporting of civilian intelligence:
We dont really have a Director of Central Intelligence. There is no such thing. The DCI at CIA controls only a very small portion of the assets of the Intelligence Community, and there are so many entities you dont have any Director. There is not a Director of Intelligence in the American system, and I think we have to create one.34
The current chairman of the House Intelligence Committee agrees. The DCI needs greater capability, since he is the chief intelligence architect, argues Porter Goss (R, Florida). We have a management problem designed for failure, and its amazing it works as well as it does. We need more comprehensive management.35 The chief source of the problem, in his view, is lodging the intelligence budget in the Department of Defense. The staff director for the House Permanent Select Committee on Intelligence articulated the case for a strengthened DCI:
There is still no management of the intelligence community. The intelligence agencies are each managed, but there is no one in a position to make the tradeoffs within the intelligence community that will make a coherent, efcient organization that will function as a whole. So, we end up doing it on Capitol Hill. And Ive got to tell you, if you are depending on Capitol Hill to do something as important as this, youre in trouble.36
A rst step in remaking the DCI would be to give the ofce added stature, not in an unrealistic attempt to match that of the secretary of defense, but at least to raise the prole of the intelligence director in the national security establishment. To this end, amending the National Security Act of 1947 to make the DCI a full statutory member of the NSC (along with the president, vice president, secretary of state, and secretary of defense), and not merely an adviser to the panel, is likely to be more important than the superuous NSC committees created by the Intelligence Authorization Act of 1997 (which place the DCI in a subordinate role to the national security adviser). Such a law would have to state clearly, however, that the DCI would serve on the NSC strictly in a nonpolicy capacity, only to provide information and analysis and not policy
| 116 |
pronouncements that would contradict his role as a neutral presenter of facts and insights. In addition, the DCIs approval of the appointment of all intelligence program directors would make the various agency chiefs more responsive to the individual supposedly in charge of the entire community. The DCIs role in preparing the annual intelligence budget could be strengthened as well, again not to have the intelligence director replace the secretary of defense, but to remind the Pentagon and others that the nations civilian intelligence needs are important, too. Except in times of war, 25 percent of the annual intelligence budget should be turned over to the DCI for civilian intelligence purposes, such as the collection of information on global political and economic matters. In regard to consolidating the community, some important measures have been adopted since the end of the cold war, such as the development of centers and task forces. Useful too is a new joint system set up by the CIA and the Pentagon to keep track of clandestine operations involving agents abroad, what the DCIs assistant director for administration calls an excellent first step and a concept we need now to extend . . . throughout the community.37 The melding of dispersed space reconnaissance activities under NIMAs direction is another example of consolidation. Some CIA officers worry, though, that this new organization was simply a ploy by the Defense Department to take away photo-reconnaissance and imagery interpretation from the Agency. The nations National Photographic Interpretation Center (NPIC) was indeed once sheltered in the CIAs DS&T Directorate, and its shift into the NIMA was, in this sense, a militarization of this important function. Still, logic was on the side of fusing communitywide imagery and mapping components for the common task of researching global geographic details and taking note of any changes that might have strategic signicance for the United States (just as signals intelligence is concentrated in another disciplinary stovepipe, the NSA). The DCI has full access to the imagery analyses prepared by photo interpreters in the new NIMA. Nonetheless, the most important power over imagery is the ability to direct satellite and airplane cameras toward the targets of ones choice in the rst place (a decision called tasking). This is another place where the DCI and the secretary of defense have often bumped
| 117 |
heads, since NIMA is basically a combat support agency and belongs to the Department of Defense.38 An expansion of the program to rotate ofcers through different agencies as part of their career progression and a greater emphasis on common security badges, training, and the sharing of facilities would lead to better interagency cooperation.39 Pooling recruitment data would be sensible, too. Seymour Hersh reported that U.S. Naval Intelligence recruited Jonathan Pollard, who eventually became an American spy for Israeli intelligence, without knowing that he had already unked the CIAs recruitment tests on security grounds.40 The CIAs recent efforts at co-location for DO and DI ofcers in order to increase the interaction between intelligence collectors and analysts could also be replicated among the specialties inside other agencies. The desired outcome is to build bridges that will enable people in different cultures to collaborate on assignments that cut across agency boundaries. The organizational objective of most intelligence reformers is to build a community that is lean, exible, and synergistic, with each agency integrated with the others and all led by a DCI with more effective management control. It is driven by a centrist vision. Reformers propose not a simple-minded model of centrism, however, headed by a potentially dangerous intelligence czar but, rather, a more uid model that draws together different strands of the community for different tasks. This model envisions concentrating communitywide resources into the Counterterrorist Center to deal with that specic threat, or into an allsource task force for, say, an intense focus on ethnic strife in central Africa, or into a collection discipline (such as HUMINT) to blend the results of that approach to information gathering. The model envisions a DCI with the authority to redirect community resources wherever they are necessary in future contingenciesin some instances, a rapid shifting (surging) of capabilities from one nation or region to another. For such enduring interests as terrorism or international narcotics ows, the DCI would order a more permanent concentration of resources into new fusion centers. Increasingly, centrism would become more a matter of setting up secure electronic networks for communications among intelligence specialists throughout the community than establishing physical sites at Langley or elsewhere. These virtual fusion centers, according to a senior intelligence ofcer, have made
| 118 |
cross-cultural linkages [within the community] easier.41 Temporary teams of visiting experts could be brought in to assist the intelligence community (for example, the nations leading academic experts on Sudan should a crisis occur there). According to this perspective, the DCI would have a continuum of coordinating strategiesa protean centrismto focus the communitys efforts on the limited number of targets where the secret agencies could contribute to the already available public knowledge on foreign events and conditions.
worldwide information in a timely, holistic fashion, with a good balance between civilian and military reporting. In unity lies strategic direction and clarity, remarks an expert on Americas executive branch of government. While on the one hand commending the National Security Council for exhibiting this attribute, he praises on the other hand the value of diversity displayed by the Department of State, noting that diversity encourages sensitivity to implementation and to nuance.42 Likewise for intelligence, greater centrism would permit the White House (through the DCI) to derive better insights from the enormous inow of global information gathered separately by the various intelligence agencies. But if the United States were to concentrate all of its intelligence resources into a single intelligence department or perhaps a committee of the NSC, the result would be an erosion of diversity, agility, and the responsiveness that allows each intelligence element in the existing cabinet departments to respond to the needs of their individual secretaries, especially the tactical intelligence requirements of the secretary of defense. Furthermore, excessive centrism would discourage competition among the secret agencies, which currently offer to the president (although not always) a range of views rather than a single, homogenized common denominator. In addition, as an intelligence expert observed, Competition is essential for innovation.43 Diversity of structure and a division of power in the intelligence community can lead to a healthy debate over the meaning of world events, a competitive analysis that is a valuable (if more complicated) precondition to thoughtful presidential decisions. Just as the homogeneity of excessive centrism would be a mistake for the intelligence community, so would a system that was too diverse and unwieldy and no longer served the presidents needs for reliable, timely, and cohesive informationTrumans lament. Over the years, the agencies of the intelligence community have largely eschewed unity in favor of functional diversity, protected as they are by their department secretaries against centrism in the form of a strong DCI. The recent growth of interagency task forces and centers suggests some movement toward greater centrism. Whether this trend will continue depends ultimately on the leadership of future presidents. If, like Truman, they believe that greater intelligence unity is necessary, the cen| 120 |
trist trend will continue. The adversarial, individualistic culture of the intelligence community may begin to approach the greater analytical integration exhibited in the British system. Even then, however, the secretary of defense will likely ght for the autonomy of military intelligence, the secretary of state for intelligence (support to diplomatic operations or SDO), the FBI director for the bureaus perceived prerogatives in the war against international criminals, and on down the line. Given what is likely, on the one hand, to be the policymakers growing interest in quick, integrated information from the intelligence community on civilian and military developments around the world and, on the other hand, the enduring desire for autonomy among the intelligence agencies, we can anticipate the struggles between the values of unity and diversity to continue in the national security establishment. In light of the relatively rapid turnover of presidents and the more permanent nature of the intelligence bureaucracy, it would probably take an intelligence failure of Pearl Harbor proportions to shock the American people and their chief executive into demanding the greater efciencies of centrism. However imperfectly the intelligence community is now organized, presidents and other top ofcials continue to rely on the secret agencies and spend a kings ransom each year for the information, insight, and other services they provide. These costs of intelligence are explored next.
| 121 |
SIX
Perhaps no topic is more central to an understanding of politics than budgeting, for in the annual allocation of funds is the ultimate outcome of the struggle over nite resources among government agenciesthe who gets, what, when, and how of a famous denition of politics reduced to cold, hard numbers.1 This chapter looks into the funding of Americas intelligence agencies in an effort to shed light on the politics of spending for spies since the end of the cold war. The study of U.S. intelligence spending confronts some unique research barriers, foremost the secrecy in which budgeting for the hidden side of government is shrouded. The public record yields a fair amount of reliable information on this subject, however, and coupled with interviews with intelligence ofcials, it is possible to piece together an accurate portrayal of budgets and politics even in this shadow land. Regardless of the methodological difculties, this topic warrants more attention than it has been given in the past. After all, the intelligence agencies attract a large slice of the annual tax revenues in the United States, by all accounts more than $26 billion to $30 billion in recent years, a sizable sum compared with what other nations spend on intelligence (though equivalent to only about 12 percent of the total U.S. defense budget).2 These monies are sometimes used for highly controversial purposes, including the overthrow of foreign governments (a form of covert action), highly intrusive collection operations like the economic espionage conducted in Paris by the CIA in 1995 that resulted in an embarrassing
| 122 |
diplomatic ap between France and the United States, and the U.S. espionage caper against Germany in 1997 that went awry.3
Note: Military intelligence agencies include the National Security Agency, the National Reconnaissance Ofce, the Defense Intelligence Agency, and the tactical intelligence activities of the military services. Other civilian intelligence activities include the FBIs foreign counterintelligence activities, the State Departments Bureau of Intelligence and Research, the Intelligence Community Management Account, and small ofces in the Energy and Treasury Departments.
other agency heads. The staff that is available to himabout seventy professionals making up his Community Management Staff (CMS)are for the most part on temporary assignment from the agencies they are expected to oversee. Clearly, when the parent agency pays the salary of a staff person, approves his or her promotion, and determines where the staffers next assignment will be, the chance that this person will carry out a careful, objective examination of the home agencys budgets and performance is dubious. While not the intent of this staff arrangement at least from the DCIs point of viewit has usually been the practice in most years since the creation of the DCIs ofce in 1947. Finally, and perhaps the most telling indication of the DCIs tenuous central control over the intelligence community, he lacks a common database to tell him what he is paying for in each of the agencies. The director runs the largest enterprise in the history of the world for the col| 124 |
lection and analysis of global information, yet he does so partly blindly, another aspect of the one-eyed jack phenomenon discussed in the preceding chapter. When previous directors have attempted to create a communitywide database, their requests to the agencies have largely been ignored. It is little wonder that DCI R. James Woolsey (199194) appeared ill informed on C-SPAN in 1994 when explaining the details of the NROs exorbitant $300 million headquarters building in the Virginia countryside. The funding for the building had been tucked away under the innocuous category Mission Support, essentially lost in the NROs topsecret budget document.5 Act 1: Early Budget Estimates The bureaucratic process of deciding how much to spend on spying and for what end is an obscure, secretive ritual. The opening act of the intelligence budget review, as bewildering to most Americans as Japanese kabuki theater, begins in the spring of each year when the governments secret agencies estimate the amount of funding they will need for the coming year. In a rather unscientic manner, each agencys ofces, divisions, and directorates use their previous years budget to determine how much more money they will need to cover ination, payroll increases, rises in operational expenses, and new or expanded missions. The managers of each agency and their respective budget shops also weigh operational risks against potential payoffs in new intelligence, estimate the costs of addressing new intelligence targets, plan infrastructure improvements, and review stafng levels. In each agency, this process is usually dominated by the directorate that is responsible for the line function. At the CIA, for example, the Directorate of Operations (which, recall, collects intelligence abroad by means of HUMINT assets) is at the top of the budget review. During the 1980s, when intelligence funding increased much faster than even Defense Department spending (see gure 4),6 this initial phase of internal agency review emphasized how best to spend new money rather than whether or not the way an agency spent the previous years funds was having the desired payoff. The intelligence agencies institutionalized this practice by assuming that 75 to 85 percent of their
| 125 |
budget constituted the base program that would be required to keep the agency running at current levels of activity. The remaining 25 to 15 percent consisted of new spending and drew the attention of those overseeing the budget. As a result, what the agencies presented to the DCI at the end of each summer was a detailed description of how they would spend additional funding, but with little to no analysis of what they were doing with the bulk of their funds. The DCI had limited insight into each agencys base activities, since he had neither an adequate independent staff to check each agencys estimates nor a comprehensive budget database that covered the entire intelligence community. Not surprisingly, what was new spending one year soon became part of the review-free base program in subsequent years. Thus the bulk of intelligence funding receives little scrutiny, as the agency heads, the DCI, and others in oversight positions focus on marginal issues loosely referred to in the community as shortfalls or funding gaps. As increases in the communitys budget began to taper off (temporarily) after 1989 with the end of the cold war, the intelligence agencies had fewer opportunities to propose new activities. This led the DCI, the White House, and Congress to look more closely at the activities being funded in the previously review-free base. The communitys individual bureaucracies have fought the exposure of the agencies base budgets, resulting in a great deal of frustration for the DCI, the OMB, and the two congressional oversight committees (the Senate Select Committee on Intelligence and the House Permanent Select Committee on Intelligence). The practice of focusing on the margin is common in the federal budget process, certainly for defense budgeting, and has been immortalized in the phrase marginal incrementalism, the widely accepted description of how budgets are drawn up at the federal level in the United States.7 What the intelligence community calls its base program is what civilian agencies refer to as their current services budget. In each case, the bureaucracys intent is to focus the attention of those in oversight positions on new spending rather than on the full program. This approach is not necessarily a ruse, for most of what is in the base (or is funded through current services) will be required if an agency is to continue functioning, including payments for salaries, building construction, electricity, water, computers, and telephones. None| 126 |
Note: Constant 1996 dollars used to plot change. The gure compares total intelligence (national, defensewide, tactical) spending with DoDs military spending, less intelligence. Source: Report of the Commission on the Roles and Capabilities of the United States Intelligence Community (Aspin-Brown commission), Preparing for the 21st Century: An Appraisal of U.S. Intelligence (Washington, D.C.: U.S. Government Printing Ofce, March 1, 1996), 131.
theless, if an activity in the base is no longer required to achieve the agencys mission, the funds are usually diverted to other activities, such as the construction of new facilities or allowances for more liberal travel. An additional problemand one starkly apparent in the intelligence communityis that programs that were a high priority one year continue long after they have diminished in importance. For instance, intelligence programs once targeted on the former Soviet Union are now justied (or marketed) for countering drug trafcking or weapons proliferation. Hence, the radar operator who once looked for Bear bombers coming over the North Pole is now searching for propeller-driven Cessnas carrying drugs from Colombia, a case of cold war elephant guns being used for hunting ducks. Act 2: DCI and OMB Budget Reviews The second act of this drama begins in the fall, typically September, when the DCI and the OMB are given the budgets prepared by the individual agencies. At the same time, the directors staff and the OMB staff weigh
| 127 |
the competing requests of the various agencies and formulate a consolidated intelligence program for the government. The DCIs lack of a truly independent budget staff to examine and challenge the requests developed by the agencies have left him seriously disadvantaged. Rarely, if ever, has the analysis performed by an intelligence agency or the DCIs personnel on the CMS identied possible savings. In contrast, the OMB staff assigned to review the intelligence budget, though composed of only ve people, is at least independent and can often point out to the DCI and OMB management where savings might be realized. Although these suggestions are sometimes adopted, the process remains dominated by the Pentagon. Act 3: Integration with the Defense Budget By mid-December, the nal act of the intelligence budget cycle is performed when the DCI discusses projected funding levels with the secretary of defense, the most crucial of all the dialogues in this elaborate sequence. Before this, two parallel and concurrent budget processes were conducted simultaneously (the cross walking referred to earlier), in which the DCIs Community Management Staff and the Department of Defenses intelligence budget ofcials compare notes and numbers at all levels as they move toward the summit meeting with the DCI and the secretary of defense. At the end of this sequence, the secretary of defense has discussed the status of the Department of Defenses budget with persons in the Executive Office of the President, including the director of OMB, White House officials, and (if the secretary wishes) the president himself. Thus, the secretary of defense has an understanding of the current politics that drives budgets beneath the surface and so knows whether the Department of Defense faces budget reductions, increases, or a continuation of the status quo. If budget reductions are on the horizon, the DCI and the secretary of defense negotiate where they can cut the funding, if at all, for the intelligence community. These discussions usually take place over lunch at the end of a National Security Council (NSC) meeting, in the secretary of defenses office at the Pentagon or simply over a secure telephone. In these negotiations, the DCI knows who is in charge. His budget
| 128 |
goals hover around $28 billion, a fraction of the Department of Defenses budget. The secretary of defense is the eight-hundred-pound gorilla, and the DCI is the organ-grinders monkey, tin cup in hand. Not even the largest intelligence agenciesthe NSA, the NRO, and the DIAneed the DCIs representation, even though they are ofcially part of the intelligence community. Rather, these military intelligence agencies are part of the Pentagon, and so they benet from a strong protector and advocate in their other and more senior boss, the secretary of defense. This is not to say that the secretary of defense simply rubberstamps these agencies initial intelligence budget proposals; on the contrary, the secretary can wield his own budget scalpel. It is to say, though, that the military intelligence agencies are inclined to be more attentive to the spending priorities of their boss in the Pentagon than those of their boss at Langley.
retain the secret classication for the aggregate budget continue to insist); rather, it would simply allow the public to know at least broadly what they are spending on intelligence and force the intelligence community to justify this expense.8 Sensitive clandestine operations, the names of spies, and the capabilities of space reconnaissance satellites should remain classied, of course, so as not to jeopardize foreign agents who act on behalf of the United States or to undermine delicate technological advantages. Nonetheless, the intelligence establishment (just like other government agencies) should have to be questioned and challenged by taxpayers through their representatives in Congress. These agencies should be evaluated each year on the merits of their overall spending plans, in the same way that stockholders periodically hold the feet of private corporate bureaucracies to the re. This logicand, perhaps more important, rising political pressure (including a lawsuit led by the Federation of American Scientists)nally led the DCI to release the aggregate spending gure for its 1998 budget: $26.6 billion.9 The following year, however, the director balked at releasing the comparable gure, arguing that intelligence spending had increased signicantly in the interim and disclosing the new budget gure might tip off Americas enemies to U.S. intelligence plans and operations. Because the 1998 appropriation represented approximately a $3.1 billion increaseor less than a 0.4 percent changeover the 1997 appropriation, the DCI stated, I concluded that release of the 1998 appropriation could not reasonably be expected to cause damage to the national security, and so I released the 1998 appropriation.10 The larger gure the next yeara bump in the snake, according to the director caused him to reconsider disclosing the next annual budget number. Although his decision was supported by a U.S. district judge who heard a complaint led by the Federation of American Scientists (disclosure would provide, according to the judge, too much trend information and too great a basis for comparison and analysis for our adversaries),11 it remained hard for outside observers to imagine how the release of a single aggregate gure each year would reveal much to Americas adversaries about specic intelligence activities. What it would provide is some sense of accountability. The DCIs real fear seemed to be that the release of this gure would somehow lead to the medias de| 130 |
mand for disclosing more detailed budget gures, as if ofcials in the intelligence community were likely to forget how to say no to reporters on the specics of intelligence operations. Myth 2: The Spy Budget Receives Careful Oversight The reality, it bears repeating, is that the DCI does not have a sufcient independent staff to review, challenge, and question the budgets submitted by the various intelligence agencies. Recall that members of the CMS staff are primarily detailees from various parts of the community on temporary assignment. Often they are most interested in defending their own home agencys turf and are not always the best people for the DCI to consult for an objective perspective on budgeting. And the White House/OMB staff of ve assigned to examine the intelligence budget is obviously stretched thin. By contrast, the OMB has thirty-one examiners who review the same amount of money in the Departments of State, Treasury, Interior, and Commerce. The General Accounting Ofce (GAO), whose staff of 3,700 seek to improve government by exposing poor management and wasteful spending, has been shut out by the DCI and the secretary of defense from almost all access to the CIA, the NSA, the NIMA, and the NRO. Furthermore, the Department of Defenses inspector general concentrates on relatively minor issuesbuilding leases, parking allocation, and personnel processes, for instancewithout questioning such matters as the mishandling of NRO funds. The House Permanent Select Committee on Intelligence (HPSCI) and the Senate Select Committee on Intelligence (SSCI) do engage in some meaningful oversight with respect to intelligence funding.12 Yet each of these two committees uses only a few staffers for this task (in some years the gure has been four or ve, in other years around a dozen). Moreover, these overseers are sometimes denied access to the basic information necessary to analyze the budget. That the review of intelligence programs by Congress is uneven is illustrated by an exception to the rule: the relatively effective legislative monitoring of the CIAs Reserve for Contingencies. This special fund for the rapid nancing of unanticipated expenditures, including covert actions, is fenced off from the CIAs regular budget. In times of emergency, this reserve gives the
| 131 |
president some exibility to spend money without going through the formal appropriations process. The only requirement is that the president notify the congressional oversight committees. The reserve fund is closely watched by the legislative committees, and the money can be released only with the OMBs approval, another important check on possible misuse of these funds. As a result, even though the Reserve for Contingencies is held to exceptional accountability, it contains only a relatively small amount of money. The huge sums of money spent on the NRO headquarters buildings and on satellite programs is, in contrast, subject to more limited accountability. The procedures for the Contingencies Reserve to the contrary notwithstanding, oversight of the intelligence communitys budget is woefully inadequate, even if it is better monitored now than before 1976 (before the congressional oversight panels were created). Myth 3: The Intelligence Agencies Form a Community As argued in the previous chapter, only a Yugoslavian denition of community could apply to the U.S. intelligence community. These agencies have very little in common, primarily because they perform such different functions. Moreover, they evolved in an era when interagencyor even intra-agencysharing of information, talent, or know-how would disregard the cold war mentality of sealing off (compartmenting) all these resources from one another in order to improve security. A further complication was that the NSA employee who enjoyed solving an encryption puzzle was sometimes at odds with the CIA employee who relished a late-night rendezvous with an agent in a foreign capital, another manifestation of the cultural divides described in chapter 5. The DCI lacks the authority to mitigate these inherent differences of temperament and tradecraft (the bag of espionage tricks used by the various secret agencies). He does not have the sole right to appoint the heads of the dozen agencies outside the CIA, all of which are part of the National Foreign Intelligence Program (NFIP) and therefore theoretically within the directors ambit of authority. So while the DCI is supposedly in charge of formulating and defending these agencies budgets, the funds for intelligence are ultimately appropriated to their parent departments, Defense, State, Energy, or Justice. And while the DCI of| 132 |
cially has the authority to transfer funds from one agency to another, in reality the various agency managers throughout the community have successfully blocked any attempts to exercise this authority without their prior approval. Even though executive order 12333, signed by President Ronald Reagan in 1981, formally acknowledges the existence of an intelligence community, the assemblage is still only a loose confederation of agencies. Each takes advantage of having two masters, the DCI and a department secretary, and often plays one off against the other to advantage. Most departments in the federal government are a collection of disparate agencies. Within the Commerce Department, for example, are the Patent Ofce, the National Oceanographic and Atmospheric Administration, and the Bureau of the Census, among others. Yet unlike the DCI, their departmental secretaries have clear authority over the heads of these agencies. Furthermore, each secretary has an independent staff to manage his or her department and its budgets. But to manage the intelligence community, the DCI has little more than the Community Management Staff, with its mixed loyalties and limited authority. For some policiesparticularly counterterrorism, counterproliferation, counterintelligence, and counternarcoticsthe fusion centers located inside the CIA represent an attempt to help increase interagency comity. The results have been uneven, however, and most of the other agencies complain that the CIA has too much control over these centers. Myth 4: Intelligence Is a Force Multiplier Some ofcials have argued that in the postcold war era, a dollar spent on intelligence saves many dollars in defense. This concept of intelligence as a so-called force multiplier is derived from the notion that in a more transparent world, the United States can focus its smart weapons more efciently against predetermined targets. Fewer weapons will be necessary because their value will be multiplied by their greater intelligenceguided accuracy. When intelligence funds are dedicated to purely clandestine collection operations, they can indeed yield information of special value.13 Today, however, most of each intelligence dollar goes to support a massive bureaucracy rather than eld operations. The more efcient tooth-to-tail
| 133 |
ratio exhibited by the secret agencies in the early stages of the cold war has been lost. Today, the agencies employee tens of thousands of people, with thousands of additional personnel under government contract. The number of civilian personnel at the CIA, the NSA, and the DIA is 33 percent higher now than in 1980, despite the end of the cold war, reductions through attrition, and voluntary buyouts mandated by Congress.14 The intelligence communitys physical facilities around Washington and worldwide account for more than 15 million square feet of ofce spacedwarng even that legendary behemoth, the Pentagon. Little of this investment, however, actually results in new information about Americas foreign adversaries, the main reason for having an intelligence community in the rst place. The computers, the communications facilities, heating and cooling equipment, support staffs, cars, trucks, airplanes, satellites, and related costs all add up to one of the largest bureaucracies ever. In order to believe that a dollar spent on intelligence really saves dollars in defense, we would have to forget that the care and feeding of these agencies siphons away most of the hoped-for prot of valuable information on foreign events and military targets.
Intelligence funding, like Americas budget making generally, tends to remain static. From year to year, if the budget changes at all, it is not in any sweeping fashion but at the margins. For intelligence funding, the exception to this rule during the cold war occurred in the Reagan administration. Under President Reagan, the intelligence budget rose by $10 billion (a 50 percent increase), driven by the strong anti-Soviet ideology of the president and his advisers. But what happened when the
| 134 |
cold war ended? Did this startling change in world affairs lead to major redirections for U.S. intelligence spending? With Americas nemesis in tatters and an exponential growth in the U.S. national debt wreaking havoc on the U.S. economy, did the budget makers toss marginal incrementalism to the winds and cut back sharply on spending for all government agencies, including intelligence? When the USSR dissolved, the funding for intelligence might have been expected to be cut, since the international threat environment began to appear more benign. The reasonable hypothesis would be that if a nation faces a well-armed and belligerent adversary, it will be more inclined to increase funding for intelligence as a rst line of defense against attack.15 Conversely, with the disappearance of such an adversary, intelligence funding might be expected to decline. After all, if an adversary has the capacity to strike the United States with a devastating military blow from which (at the extreme) this nation might be unable to recoversay, a massive Soviet rst strike during the cold warpolicymakers might be inclined to spend large amounts of public funds to increase the warning time for an impending attack. The objective would be no surprises like Pearl Harbor (or worse). Put another way, a nation that nds itself vulnerable to a nuclear decapitation16 or some other form of lethal assault from abroad will probably prefer low risk-taking behavior, manifested by an increase in capabilities for information gathering, especially a search for early-warning indicators of an imminent attack. Intelligence serves as useful insurance, and this low-risk behavior requires a larger intelligence budget, as depicted in gure 5. Since the prospect of annihilation seemed much greater for this nation at crisis points during the cold war (the Cuban missile crisis, for instance) than it does now, the United States might be expected to have spent larger sums of money on intelligence during the cold war than since the fall of the Soviet Union.
The Question of Threat Uncertainty
Another line of reasoning is compelling as well. At the end of the cold war, the United States faced an uncertain world. Almost overnight, its leaders shifted from having to cope with an often tense standoff between the two superpowers to a situation of relative global dominance enjoyed by the United States. Before the euphoria of dominance could
| 135 |
for Intelligence
be savored, however, the emergence of smalleralbeit highly aggressivestate and nonstate actors on the world scene challenged what the first postcold war U.S. president, George Bush, hoped would be a new world order. In this new, uncharted international environment, a variety of seemingly less perilous dangers began to add up to an overall threat that (at least to some observers) seemed as unsettling as the former superpower rivalry. Iraq, Iran, North Korea, Serbia, and other rogue or outlaw statesa few with accelerated programs of weapons of mass destructionfocused the attention of U.S. national security ofcials and required their shifting intelligence resources toward targets once considered to have a much lower priority. The situation was the same for televised humanitarian crises, like those in Somalia, Rwanda, Bosnia, Kosovo, and East Timor. During the cold war, such threats seemed to pale in comparison to the USSRs capacity to reduce American civilization to rubble in half an hour. Intelligence spending was thus concentrated against the Soviet target, with a timely warning of attack foremost in mind.
| 136 |
An observer of American society notes, though, that the collapse of the Communist threat has, paradoxically, made it harder, not easier, for the United States to draw the line [on national-security interests].17 While threats to this nation may have become less lethal than the prospect of Soviet rockets, they continue to exist and are more globally dispersed. Or, at any rate, policymakers are prepared now to focus more on pockets of international strife once largely overlooked during the cold war. Consequently, from this point of view, the United States should in fact spend more money on intelligence in the post-Communist era if its leaders are to prepare themselves properly for these diffuse new dangers. Remember DCI Woolseys admonition that the several poisonous snakes of the new international setting might well turn out to be as dangerous as the old Soviet dragon.18 Indeed, it is arguable that the continuation of the cold war would have prevented the emergence of a number of these hot spots in the developing world that have come to weigh so heavily in U.S. military and intelligence planning. If so, the end of the U.S.-Soviet rivalry may have actually led to a greater sense of insecurity and an increased need for global intelligence.
The Inuence of the Military Establishment
A third argument also grows from the change in international affairs since the Soviet demise. During the cold war, armed conict between the United States and the Soviet Union could well have escalated into World War III, which quite likely would be an Armageddon. Facing this extreme danger, both sides usually acted prudently. The Cuban missile crisis was the most conspicuous exception, a highly dangerous and sobering event that caused both sides to draw back from the nuclear abyss with a heightened desire to avoid risks. With the dissolution of the USSR, though, the United States has found it more feasible to venture forthfrequently with armed combat unitsin the defense of perceived security interests. American intervention in the Persian Gulf would have been considered highly risky, and probably would never have been undertaken, had the USSR not been so preoccupied at the time with its own severe economic problems and internal political upheaval. In 1991, as the Soviet Union fell apart, the United States carried out a massive counterattack against Iraq with only
| 137 |
minimal debate in Washington. Subsequently, the Bush administration dispatched American troops to Somalia, and the Clinton administration followed suit in Haiti, Rwanda, and Bosnia, and U.S. aircraft relentlessly attacked Serbian targets during the Kosovo War of 1999. These last two interventions would have been especially perilous and unlikely during the cold war. Thus, with the United States greater global dominance in this new world has come its more frequent use of military force abroad. This in turn has brought demands from the Pentagon for more extensive intelligence regarding areas unfamiliar to U.S. military leaders. It understandably seeks up-to-date street maps of Mogadishu, Tuzla, Pristina, and Rwanda, not the topography of the Fulda Gap in Germany. In the Pentagon, a new military doctrine has evolved since the end of the cold war that corresponds to the more fragmented world we now face, with its tendency toward brushfire wars and ethnic bloodletting. This doctrine is known as the two-war strategy. According to this viewclearly the prevailing paradigm in the Department of Defense, even if repudiated by critics like former member of the Joint Chiefs of Staff, General Merrill McPeak, 19the United States must be prepared to wage two major regional conflicts simultaneously, say, one war on the Korean peninsula and another in the Middle East or the Balkans. Regardless of how valid or realistic this doctrine may be, it obviously has a clear implication for intelligence spending. Whereas technical and human-agent collection was once focused on the gathering of information about the Soviet Union, todays military wants high-quality, instantaneous information from around the globe, an expensive proposition. The declaration Support to Military Operations! (SMOs in Pentagonese), examined in the preceding chapter, has become a budgetary battle cry in the halls of Department of Defense for those who negotiate intelligence budgets. The spending emphasis should be on tactical battleeld support, runs the argument of military leaders, and not so much on the production of national intelligence for the presidents enlightenment with respect to global political and economic affairs. The SMO emphasis is on winning wars with minimal U.S. casualties, which translates into increased spending for intelligence to illuminate battleelds around the world.
| 138 |
At the national levelthat is, in Washington, where the nations global security decisions are madethree additional inuences impinge on intelligence-spending decisions in the postcold war era. The rst has to do with the state of the U.S. domestic economy. The argument is that a nation facing economic distress at home is apt to turn to belt-tightening corrections, even to the detriment of existing legitimate programs; therefore, after the cold war, serious budget decits in the United States would have been likely to push national leaders toward budget-balancing measures, including a reduction in spending on intelligence. In the wake of the cold war, the United States felt the pangs of domestic economic problems. Experts warned of dire consequences unless the federal budget were restored to some semblance of balance following the runaway spending spree of the Reagan years. Budget-slashing lawmakers gained national prominence; the GOP swept the House and the Senate in 1994 on platforms to ax government expenditures and enact a constitutional amendment to balance the budget; and citizens groups like the Concord Coalition opened chapters across the country in support of measures to reduce the decit.
The GOPs ProDefense Spending Agenda
Two additional arguments point to inuences working against a budgetreform agenda. The rst stems, ironically, from the success of cost-cutting Republicans in gaining control of the House and the Senate in 1994. Their budget-balancing campaign rhetoric did indeed take the form of legislative proposals designed to dismantle portions of the government, most notably the welfare system. However, many Republicansa party with a long tradition of supporting military programs drew the line at defense and intelligence cuts. Slice spending on welfare and health care, yes, but not the B-2 bomber, the Seawolf attack submarine, or the Comanche helicopterall better suited, perhaps, to ght the old Soviet military, but important jobs programs for constituents back home nonetheless.20 Similarly, the Republican Party has had a stronger pro-intelligence orientation than the Democratic Party in roll-call voting and legislative hearings during and since the end of the cold war.21 Thus,
| 139 |
one might surmise that GOP dominance in Congress would lead to legislative initiatives in support of robust intelligence funding.
The Intelligence Iron Triangle
Any discussion of spending at the federal level must also consider the question of lobbying inuence. In intelligence policy, the concept of iron triangles and issue networks is alive and well, just as in the rest of the government. According to the venerable theory of iron triangles (and the more nuanced and realistic issues-network derivative), interest groups, agencies in the executive branch, and congressional committees form an alliance around policy domains for their mutual benet. In the last few years, the private sector has lobbied much more aggressively for contracts to build costly intelligence hardware, chiey reconnaissance satellites and low-ying drone aircraft. Industry receives government funding; intelligence bureaucrats benet from new programs; and legislators win the votes of constituents employed by the industries and the intelligence agencies.22 Reinforcing this triangulation is the widely noted propensity for bureaucracies to perpetuate themselves. When the cold war ended, the CIA and its companion agencies were likely to seek other intelligence missions to replace their concentration on the Soviet Union. Consequently, one might reasonably anticipate the growth of policy alliances among industry, executive agencies, and legislative committees dealing with intelligence policy to result in added pressures to increase intelligence spending. The Individual Level of Analysis
The Inuence of Leadership
At the individual level of analysis, researchers probe the likely views and behavior of key decision makers. For the topic of intelligence (as for most policy domains), these individuals include at a minimum a core group of elected ofcials: the president, the Speaker of the House, the Senate Majority Leader, and the chairs of the intelligence committees on Capitol Hill. Added to this list is a group of foreign policy elites appointed by the president: the secretaries of state and defense, the chairman of the Joint Chiefs of Staff, the DCI, and the presidents national security adviser. Among the central questions we would want answered about these pol| 140 |
icymakers are, To what extent are they isolationists or internationalists? Of the same or different political parties? Risk takers or risk avoiders? Budget balancers or spenders? Impressed by intelligence or skeptical about its usefulness? It is difcult to generalize about individuals as diverse as Speakers J. Dennis Hastert (R, Illinois) and, preceding him, Newt Gingrich (R, Georgia); Majority Leader Trent Lott (R, Mississippi), and, preceding him, Bob Dole, (R, Kansas); and President Bill Clinton. Nevertheless, based on their public pronouncements on the subject, it is safe to say that none has sought a reduction in spending on intelligence, despite the end of the cold war. Moreover, some of themmost vocally, Speaker Gingrich and HPSCI chairman Goss (as well as his predecessor, Larry Combest, R, Texas)have been enthusiastic about an increase in intelligence funding. We have hollowed out our intelligence capability dangerously, Goss argued. This is what motivates me every day.23 Their public comments indicate an acceptance of the force-multiplier perspective, in which intelligence can be counted on to offset the cutbacks in military spending sought by some budget balancers in Congress. When an American pilot accidentally bombed the Chinese embassy in Belgrade during the Kosovo war, Representative Goss concluded that the error was a reaping of the harvest of the underinvestment in our intelligence capabilities.24 As if an accurate map of Belgrade were that expensive or hard to ndit costs 28 Yugoslav dinars ($2.80) at a local kiosk in the city! Gosss counterpart in the Senate, Richard Shelby (R, Alabama), agreed with him. Weve been doing defense, which intelligence is part and parcel of, on the cheap for about thirteen straight years, he opined, and now youre seeing the fruits of it.25 The lawmakers vowed to seek a 9 percent spending increase for intelligence in the FY 2000 budget. In the waning days of his speakership in 1998, Newt Gingrich telephoned DCI George Tenet and said, How would you spend an extra billion dollars if I could arrange that? Like any good bureaucratic chief, the director had no trouble coming up with a quick wish list, and the Speaker-by now the CIAs favorite Corinthian on Capitol Hillfolded the added funding into the defense budget for use by the DCI.26 Gingrich was also reportedly behind successful efforts in 1998 to increase covert action funding for Iraqi dissidents by $97 million, despite the view
| 141 |
of Marine General Anthony C. Zinni, commander of U.S. forces in the Middle East, that this approach was ineffective and unrealistic.27 An examination of leadership views on intelligence might lead us to suppose that the current constellation of national security ofcials, like their predecessors during the cold war, generally agree on the need for preservingeven raisingthe level of intelligence funding. Indeed, it seems likely that those Washington policymakers responsible for foreign policy usually are inclined to protect the funding for those agencies that give the United States an early warning of threats from abroad. According to this perspective, given the prominence of these ofcials in policymaking and budgeting, spending on intelligence would be unlikely to decrease even with the disappearance of Americas archenemy, the USSR
ished did make the world seem somewhat less threatening to most policy ofcials, despite DCI Woolseys warning about poisonous snakes loose on the globe. Had the Soviet Union remained an adversary, a decline in intelligence spending (however temporary) would have been unlikely. Thus the magnitude of the foreign threat is a compelling consideration for policymakers who address spending decisions. With the dramatic change in international politics brought about by the dissolution of the Soviet empire, the intelligence budgetand the larger defense budgetmay well have yielded a peace dividend had not policymakers been concerned about the imponderables of the new world and its rogue states. The sudden prominence of Iraq, Somalia, Rwanda, Haiti, Bosnia, and Serbia, and other avors of the month that demanded U.S. military attention gave pause to policymakers who had hoped for a new world order in which America could trim back its global defenses and focus more on domestic needs. When you get away from L.A. and New York, the rest of the country loves us, declares a senior CIA ofcial. They want us to catch the bad guys, and they dont care about budgets.30 In this sense, Woolsey was correct in the early months of this new era: even though the Soviet dragon had died, the world remained in ux and required ongoing intelligence gathering to guard against untoward surprises from abroad. In advancing this argument to the OMB and congressional budgeteers, Woolsey and his successor John Deutch were successful in resisting more accelerated and deeper spending cuts urged by those in Washington worried about the domestic economy and budget imbalances. Woolsey and Deutch found strong allies in the Pentagon (from which both had come before serving as DCI) who were adamantly in favor of increased support for military operationsthe SMO mantra. Not only was the world an uncertain place, but the United States military would be called on to ght in remote locales about which policymakers and Pentagon brass had little knowledge. A peace dividend derived from a reduced intelligence budget would have to wait; money would be needed to improve the ow of war-ghting intelligence to U.S. commanders in once-ignored locations like Bosnia and Kosovo. Each of these arguments relating to the international setting provides an explanatory insight. The end of the cold war might have led
| 143 |
to intelligence spending cuts had not new problems immediately arisen in places like Somalia, Iraq, and Kosovo. The quest for SMO has been a prime driver toward maintaining cold war levels of intelligence spending. In budget-drafting councils, the need for improved intelligence to help protect U.S. troops in harms way overseas has been a persuasive argument blocking deeper cuts in postcold war intelligence budgets. Furthermore, the United States was at the end of a generation of IMINT and SIGINT satellites that needed to be updated and replaced, an expensive undertaking. Similarly, at the national and individual levels of analysis, each of the arguments outlined earlier contributes to an overall understanding of the budget outcome for intelligence. The political ethos in the United States favoring a balanced budgetdramatically displayed in the rhetoric of the 1992 and 1994 federal electionsdid encourage a reduction in government spending across the board, including that for defense and (briey) for intelligence. Once more, however, this trend was offset by countervailing domestic inuences, chiey a Congress dominated by pro-defense Republicans, an iron triangle that supported a perpetuation of the intelligence establishment at cold war levels, and individual leaders responsible for the nations securityparticularly Speaker Gingrich and Representative Gosswho expressed little to no inclination toward cutbacks in intelligence (or most defense) spending.31 In the wake of the cold war, domestic pressures for budget balancing pushed the government toward trimming intelligence funding, but other inuences at home ensured that the trimming stayed just that, rather than turn into more substantial reductions. Among these national and individual inuences, one in particular exercised special sway over a few key legislators: the component of the iron triangle related to jobs for constituents. Selected members of Congress with large intelligence agencies in their states or districts, or with industrial plants manufacturing satellites and other spy hardware, were inclined to trim intelligence budgets only slightly if at all. Senator John Warner (R, Virginia) is a good example. In 1994, he spearheaded the creation of a special panel of inquiry on intelligence (which eventually became the Aspin-Brown commission) for one main reason: to head off the movement after the cold war in Washington favoring a cutback in the spy budget and perhaps even the abolition of the
| 144 |
CIA. Most of the people who work for the CIA (and many of the other intelligence agencies) liveand votein Virginia. After a year of study, the Aspin-Brown commission had found no reason to reduce the intelligence budget (even though its vice chairman, Warren Rudman, served as a member and cofounder of the Concord Coalition, whose raison dtre is a reduction in national spending and the accumulated debt). Senator Warner looked upon the commission as a way to cool down overheated rhetoric in favor of dismantling the CIA and other elements of the intelligence community. Another inuential commission member was Representative Norman D. Dicks (D) of the Seattle area, home of Boeing, which has a substantial interest in manufacturing expensive intelligence equipment (especially satellites). He also did not favor cutting the intelligence budget.
In addition, the new DCI, George Tenet, vowed to restore the CIA to its cold war strength and to mount increasingly complex and expensive operations.33 His goals included building up the CIAs clandestine espionage service, opening more overseas Agency stations, undertaking more covert actions, hiring more in-house experts, buying faster and more sophisticated computers, and bringing in a new generation of recruits. However promising it may have seemed for reformers in 198991 to achieve a substantial peace dividend and balance the budget in light of the less dangerous international environment the United States faced, their hopes were soon dashed by the exigencies of unforeseen peacekeeping missions abroad, politics-as-usual at home, and a sea change in intelligence community personnel (as senior ofcers reached retirement age) that warranted a large number of new hires. Of course, savings from reductions in the intelligence communitys $30 billion budget would have contributed only modestly toward the goal of reaching a balanced budget, but nonetheless the secret agencies could have made a contribution along with all the other departments and agencies in the government, and without cutting into muscle. The uncertainties of a fragmented world and its host of ethnic wars, however, persuaded Washington ofcials to support intelligence operations at almost full cold war levels. The United States had to know more about regions of the globe that had been relatively ignored during the cold war, but that now posed threats to U.S. interests abroad. So the argument went. At the same time, it seemed possible to cut back on bigticket military weapons systems in this time of brushre warfare. Thus, intelligence budgets remained relatively at and defense budgets declined until both started moving back up in 1998. This concern about an uncertain and still hostile international setting was reinforced by the desire of a few important legislators to protect the interests of their constituents by maintaining the intelligence bureaucracies in their districts. Has the intelligence community struck the correct spending posture since the end of the cold war? Generally, yes, although some important adjustments could be made and substantial savings accrued. Excessive support for winning wars by focusing the intelligence communitys attention on support for military operations detracts from attention to avoiding wars in the rst place by providing broader intelligence support to the president and the diplomatic corps.
| 146 |
Moreover, beyond maintaining a better balance between war-ghting and war-avoiding capabilities, the budget process could be improved. Spending would become a much more rational enterprise if the DCI had greater control over the formulation of the entire intelligence budget. As things stand now, the centripetal forces in the community place critical budget decisions into the hands of the various program managers such as the directors of the NSA and the DIA. With a stronger community staff for budget drafting, the DCI would have a better chance at drawing the budget strings together. Under DCIs Deutch and Tenet, the Community Management Staff has strengthened its role in the funding process by hiring a few independently minded budget specialists to help the director sift through the various initiatives pursued by agencies throughout the intelligence community; but more needs to be done to broaden this base for independent budget analysis carried out on behalf of the DCI. To give the DCI greater authority in negotiations with the secretary of defense, it should be made clear that the director will have all intelligence funding appropriated to him, not to the heads of the individual agencies within the community. The DCI should have the responsibility for dispersing these funds and should be held accountable for how they are spent. The director of Central Intelligence will never have more authority than the secretary of defense, nor should he (or, one day, she). Nevertheless, in the negotiations between the two over the annual intelligence budget, a strengthened community staff under the DCIs direction along with a stronger legal and congressional affairs staff to present the DCIs budget on the Hillwould permit the director to enter into negotiations with the secretary of defense carrying more than a tin cup. He or she could come armed with a well-considered set of numbers that made sense for the entire communityan integrated intelligence budget in place of the current patchwork quilt. This would also give the DCI a chance to make trade-offs within the intelligence community where necessary, say, reducing spending on airplane reconnaissance in favor of increased HUMINT and the hiring of more and better qualied analysts. (At the present time, only about 1 percent of the total intelligence budget is spent on analysis.) 34 Americas intelligence should be more like the British model, an
| 147 |
experienced intelligence ofcer contends, smaller, more efcient, a few goodvery goodspies, a small budget, and some military gear.35 Many of the so-called New Intelligence Agenda targets in the post-Communist world (examined in part I of this volume) require classic espionage with human agents, not airplanes and satellitesneither of which can inltrate terrorist cells or narcotics cartels or divine evil intent among foreign leaders. Human agents are relatively cost effective, too (even though many of their reports prove to be inaccurate)-and they do not have microchips that fail, as happened with a group of U.S. image-collecting satellites over most of the New Years holiday weekend in 1999 and with the NSAs data-processing computers in January 2000. The salaries for spies are tiny compared with the costs of building enormous and heavy spy satellites and then launching them into space. During the cold war, the spending ratio between technically based intelligence collection (TECHINT) and HUMINT was approximately seven-to-one, roughly what it remains today.36 So classic espionage is not only the best, and sometimes the only, way to acquire certain kinds of information valuable to Americas security interestssuch as the trade-negotiating strategies of foreign economic rivals (often best detected through a combination of HUMINT and SIGINT). Reductions in spending on technical intelligence in favor of human spies has the added virtue of reducing a bloated intelligence budget.37 Such trade-offs must be pursued cautiously, though, because satellites and other hardware have demonstrated their enormous value in monitoring Russian missiles and other threats (real and potential). They cannot be indiscriminately eliminated, even in the unlikely event that their political constituencies were no longer there to defend them. Finally, much can be done to save money in the intelligence domain. As the Aspin-Brown commission pointed out, even as the CIA seeks an upgraded HUMINT capability, some of the intelligence agencies should undergo additional personnel reductions, especially from the NSA, where staff salaries are choking off funds that are badly needed for research and development (at one time this agencys strong suit).38 The intelligence agencies could also further consolidate many of their operations, from counterintelligence to legislative liaison. The large number of collection systemsthe reconnaissance airplanes, satellites, and other mechanical platforms that account for the
| 148 |
overwhelming proportion of the intelligence budgetcould have much smaller budgets than the Aspin-Brown commission recommended. Too much redundancy is built into these systems, with satellites, airplanes, and unmanned aerial vehicles (UAVs) often staring down at the same location.39 Moreover, many of the satellites are Cadillac de Ville models, with all the latest accessories. They could be replaced with less expensive, smaller satellites (Chevies). The smaller the satellite, the less expense involved in positioning them in space (since launch costs are linear with weight).40 Happily, the new NRO director seems willing to replace some of Americas Battleship Galacticas with smaller satellites having more specic missions.41 Consolidating and streamlining the large intelligence agencies and moving away from emphasizing expensive technical collection toward cheaperand, for some tasks, more effectivehuman assets could reduce intelligence spending by 20 percent over the next five years (based on staff estimates of the recent Aspin-Brown commission on Intelligence).42 If the often-reported aggregate annual spending figure of $26 billion to $30 billion for intelligence remains accurate, that would mean a savings of some $26 billion to $30 billion over five years, all without damage to the national security or any significant diminution in mission coverage. In this manner, the New Intelligence Agenda can be addressed while at the same time the DCI acquires a more efficient intelligence community and helps cut back the size of the federal government and Washington spending. These savings could be used to reduce the national debt, support social security, provide a tax cut, or whatever other measure leaders in the executive and legislative branches deem appropriate. Naturally, cuts in the intelligence budget are not in themselves going to eliminate the national debt, save social security, or lead to much of a tax cut, but the secret agencies can nonetheless contribute to such worthy goals and grow more agile at the same time. This is an objective that should unite budget balancers and all but the most diehard Pentagon planners, with their quixotic and costly visions of transparent battleelds in every corner of the globe.
| 149 |
SEVEN
Nations exist in a world of threats and opportunities. If their leaders are responsible, they seek knowledgeideally, foreknowledgeabout these conditions. The more accurate their understanding of global affairs is, the more likely they will be able to protect and advance their national interests. The goal of global awareness can be achieved only through the painstaking collection and assessment of information (from both open and concealed sources) about key events, circumstances, and personalities around the world. This gathering and analysis of information is the essence of intelligence. This chapter focuses on the ways in which the United States has sought intelligence relations with other nations (usually close allies)and with international organizations to help collect and analyze information about common adversaries and problems. To illustrate, this chapter uses the experience of American-German intelligence ties during the second half of the cold war, a relationship largely overlooked in the literature on this subject.1 Liaison relationships can vary from quite close (Americas ties with Great Britain, New Zealand, Canada, and Australia) to rather weak (American and Russian cooperation on environmental intelligence).
| 150 |
Germany falls toward the close end of the spectrum, though short of the long-standing bonds between American and British intelligence. The U.S.-U.K. model, perhaps the most exhaustively researched foreign intelligence relationship, is a special case with an extensive, intertwined history between two enduring democracies that share a common language and culture. The U.S.-German case is closer to the norm, however, and therefore more instructive, marked as it has been by less wholehearted cooperation on both sides. From time to time, Germany and the United States have joined in intelligence operations against the Soviet Union, the one foe that could bring about the sudden demise of their societies under a storm of nuclear missiles.2 This chapter explores the main issues involved in the efforts of officials in Bonn and Washington to work together against this common target and other threats through the sharing of espionage responsibilities.
remains in its infancy, with a modern organization dating back only to the creation of the CIA in 1947. Technical intelligence requires sophisticated skills, including scientists with advanced research knowledge, elaborate management teams to build and deploy the spy machines, and highly trained operators. Geography is important, too. The United States remained largely uninvolved with the rest of the world until the twentieth century. Even then, the Atlantic and Pacic Oceans kept Americans relatively isolated from most of the world. Only in the second decade of the twentieth century were American soldiers nally drawn into the vortex of war in Europe, followed twenty years later by another war in Europe and the Pacic and, later, two more in Asia (Korea and Indochina). Whatever advantages this remoteness may have offered the United States (and they were considerable), it failed to motivate an interest in creating an international spy network, as developed by other leading powers that often had contiguousor at least nearbyenemies. Then came the Japanese attack on the U.S. Pacic eet at Pearl Harbor, Hawaii, in 1941, a startling wake-up call. In this, the hard way, the United States learned the importance of developing a worldwide intelligence capability in an age of increasing vulnerability. No nation, not even those with a long history of intelligence activity, has all the requisite resourcesmoney, experience, scientic skills, a dispersed array of mechanical eyes and earsfor perfect or even near-perfect global coverage. As a consequence, every nation has some interest in working with allies to share the burden of intelligence costs and thereby compensate for gaps in its own spy network. Indeed, intelligence burden sharing is the phrase often used in the United States to describe cooperation with foreign intelligence services. More formally, these ties are referred to as intelligence liaisons.
Intelligence Liaisons
Americas intelligence activities include the cultivation of an immense network of multiple liaison relationships, notes an intelligence expert, that includes the sharing of information and insights on global affairs and cooperation in training and support, access to facilities, and even collaborative operations.4 The most common and important
| 152 |
form of cooperation is information sharing. Throughout the cold war, the United States and West Germany, for example, had much to offer each other. The Americans had the advantage of technical intelligence. From its constellation of space satellites that engaged in both photography (imagery intelligence or IMINT) and electronic listening (signals intelligence or SIGINT), the United States knew the location of Soviet armies, tanks, warships, and missiles, as well as their state of readinessthe most important military data one would want as a member of the Western alliance. West Germany had no spy satellites of its own, but it did have rst-rate human intelligence.5 The West German foreign intelligence service, the Bundesnachrichtendienst (BND), had a stable of agents in East Germany and elsewhere throughout the Soviet sphere of inuence who served as a sometimes helpful complement to the efforts of the CIA, which also had a network of spies but often with less language prociency and European cultural understanding. The West Germans also had the advantage of geography. The Federal Republic of Germany provided an ideal base for U.S. intelligence operations directed against the Soviets. West Germanys eastern border was the longest contiguous boundary between the Western alliance and the Warsaw Pact and thus was a splendid launching pad for Americas U-2 and other aerial reconnaissance flights over Eastern Europe and the USSR, as well as for the eastward infiltration of spy teams and propaganda materials. Moreover, both Berlin and Bonn were important centers of diplomatic activity and thus were infested with spies pursuing diplomats in hopes of acquiring useful information. What better place for the CIA (with the help of the BND) to recruit disaffected and avaricious officials from the Soviet Union and its allies posted in West Germany? The West Germans and the Americans had other reasons to cooperate on intelligence operations. West Germany had some aerial reconnaissance capabilities and was willing to share the information it obtained. The BND gathered additional information through the use of wiretaps and other ground-based, technical means, The West Germans also helped break foreign diplomatic and spy codes, a science heavily dependent on advanced mathematical and computer skills in which Germans have traditionally excelled.
| 153 |
As a source of espionage informationon Soviet weapons systems located in East Germany, for instanceand as a base for operations, West Germany thus contributed crucial resources to Western intelligence. On a strategic level, however, the Federal Republic could not offer much that the CIA did not already know from Americas more powerful surveillance platforms in space; but on such matters as the details of Soviet conventional weaponry throughout Eastern Europe, BND agents were able to contribute to the Agencys intelligence estimates. Bonn had every reason to seek cooperation with the West, even despite the forced partnership that followed Germanys defeat in World War II. For one thing, the CIA had a few well-positioned agents in the Soviet bloc whose information was of continuing interest to Bonn. Moreover, the United States had vital satellite data to share, in particular, strategic warning intelligence if a tank blitzkrieg or missile attack from the east was imminent. Washington ofcials were also in a good position to help West German leaders achieve their broader political and economic objectives. The political quid from Washington for the intelligence quo from Bonn would further legitimize the rise of West German political and economic power in the European community. Intelligence cooperation, then, was yet another means that Bonn used to ingratiate itself with the United States (and other Western powers with whom it formed comparable liaison relationships), in return for its growing integration into the Western alliance. Intelligence goodwill would beget political goodwill, or so Bonn hoped. The United States also stood to benet from winning the allegiance of West Germany to the West in the tug-of-war with Moscow over world alignments. In this sense, intelligence was essentially an instrument for expanding U.S. power and inuence abroad, what some might view as American imperialism. Or this use of liaison could be seen more benignly as simply a smart way to compensate for the United States own intelligence weaknesses and to save money (economy through synergism) while at the same time forging bonds of political friendship within the pro-democracy Atlantic alliance. The sharing of information and a base of operations were only two of many opportunities for U.S.-West German intelligence cooperation. Counterintelligence, thwarting hostile operations carried out against the West by the secret services of the Communist nations, also was impor| 154 |
tant. At the end of World War II, Western intelligence agencies aggressively sought to acquire the espionage records of the Third Reicha huge repository of information about possible agent recruitments in Eastern Europe and the Soviet Union. Even former Nazi intelligence ofcers with records of despicable war crimes were quietly spirited out of postwar Germany and absorbed into the ranks of the CIA and other Allied intelligence agencies to tap into expertise and contacts that would be useful from a counterintelligence perspective in the new cold war against Communism.6 The most valued CIA counterintelligence technique is penetrating the enemys secret service by planting a mole at the center of his operations, someone who can warn of clandestine schemes directed against the United States (the gift that keeps on giving, joke CI specialists). Because the Third Reich had just fought the USSR, former Nazi intelligence ofcers arrested by Allied powers in the western sectors of Germany after the war held obvious potential for assisting Western penetration operations against the East. Naturally, these ofcers toutednot to say exaggeratedtheir own value to avoid the gallows or long imprisonment. Even in the latter stages of the cold war, this old knowledge (and some new ndings) of BND intelligence ofcers and their agents about Eastern Europe and the USSR occasionally proved useful to the CIA (which, after the war, handpicked and groomed BND ofcials and otherwise shaped the organization in its own image).7 Covert action was yet another intelligence discipline in which the CIA and the BND cooperated. Covert action is the secret attempt to influence the affairs of other countries through the use of propaganda and political, economic, and, at the extreme, paramilitary activities. The classic illustration of CIA-BND solidarity in this domain during the cold war was the use of covert propaganda espousing pro-West and anti-Communist views. The two intelligence agencies joined in fashioning propaganda themes and, of greatest value, in devising methods to infiltrate the propaganda into the Soviet camp (including such means as smugglers, balloons lofted over the Iron Curtain, and, most effectively, radio transmissions). Radio Free Europe and Radio Liberty (Radio Liberation, in the 1950s) were two important channels of propaganda. Beginning in 1949, the CIA operated both radio transmitters out of Munich throughout the
| 155 |
cold war with assistance from the BND (whose headquarters is located in a shabby, eerie building seemingly untouched since its days as a Nazi interrogation facility on a military base in Pullach, a Munich suburb).8 During the rst few years of transmission, the American and West German governments frequently clashed over issues of policy and communications, but these tensions gradually relaxed as relations between Bonn and Washington settled into a routine. When the CIA connection to the radio stations was exposed in 1971, Congress began funding the broadcasts openly and created a small agency called the Board for International Broadcasting to supervise the propaganda transmissions.9 A nalbut unspokenreason for intelligence liaison is that it may enable a country to spy on its own partner. CIA liaison ofcers might be able to learn about West Germanys foreign policy and intelligence objectives, another source of information on the direction of German and European affairs that the CIA could put into its reports for Washington policymakers. The same, of course, was true for BND liaison ofcers who visited the CIA (and other U.S. intelligence agencies) and no doubt kept their eyes and ears open for extracurricular information.
liaison team itself. This is a highly risky venture, though, and is rarely undertaken because of the potential for destroying ongoing intelligence cooperation and even higher government-to-government relations. Ambivalence characterizes liaison partnerships for yet another reason: concern that the allied intelligence service may have been penetrated by a common adversary. During the 1960s, the CIAs chief of counterintelligence, James Angleton, wined and dined the visiting British liaison ofcer, the suave and witty Harold Kim Philby, for months in Georgetowns nest restaurants, sharing with him closely held CIA views on how best to battle the KGB and the GRUonly to discover at the time of Philbys defection to Moscow in 1963 that his clubby British counterintelligence companion had been in the service of the KGB since his student days at Cambridge University.12 This taught Angleton a memorable lesson and henceforth made him doubly suspicioussome would say paranoidof virtually everyone. The Israeli recruitment of a U.S. Navy civilian intelligence analyst, Jonathan Jay Pollard (arrested by the FBI in 1985 and sentenced to life in prison two years later), taught the lesson anew in the 1980s. Pollard claimed he was simply passing on information that had been unfairly denied by Washington to a trusted American ally. Beyond their disgust at Pollards treachery, intelligence ofcials in the United States feared that Israels intelligence service (Mossad) may have been penetrated by the KGB, and as a result, Pollards acquisitions for Israelthousands of topsecret U.S. intelligence documents for which he was secretly paidcould have beneted the Soviet Union as well. Or perhaps ordinary Israeli ofcials and Mossad ofcers might simply trade away Americas secrets in their own negotiations with Moscow and the KGB. In a effort to promote peace between Palestinians and Jews in the Middle East, President Clinton considered the Israeli prime ministers request in 1998 that Pollard be pardoned as part of the negotiation package. The president reportedly weighed this appeal seriously, but his DCI, George Tenet, threatened to resign if he approved the pardon. Evidently Tenet, having never served as a career intelligence ofcer himself, thought he would lose credibility throughout the intelligence community if Pollard were freed from prison. Pollards release might also have undermined the DCIs efforts to boost the morale of CIA employees in the wake of a more disastrous spy scandal, the discovery in 1994 of
| 157 |
Agency ofcer Aldrich Amess treason on behalf of the Soviet Union. The president accordingly backed away from the controversy.13 Like every other nation, West Germany was vulnerable to penetration during the cold war by foreign agents, Communist or otherwise. Some moles were indeed discovered, and although some traitors have been found, others may still be in place unrevealed.14 One U.S. intelligence ofcer asserts that the BND has had a history of penetration, and the truth is we have never really taken them too seriously as an intelligence organization.15 It is a refrain that one hears privately expressed by U.S. intelligence ofcers with respect to most of Americas allies (except for the British). In 1998, the chief of German counterintelligence, Volker Foertsch (alias Fleming), came under suspicion as a long-time Moscow mole in the heart of German intelligence operations. According to a newspaper report, C.I.A. ofcials have been left to wonder if German intelligence, which was often compromised by Communist agents during the cold war, is again being inltrated by Moscow.16 German authorities investigated Foertsch, exonerated him, and returned the counterintelligence chief to his sensitive position. His backers believe that he had been the victim of a Russian disinformation operation designed to harass German intelligence. Still, U.S. intelligence ofcials remain uneasy over the possibility of Russian agents in the BND, even if access to the dossiers of the old East German intelligence service (Staatssicherheitsdienst, or Stasi) has at least allowed the CIA and the BND to root out the former Communist moles in Germany.17 Thus mindful of the ever possible presence of a mole inside the partners intelligence service, a liaison team never reveals its most sensitive secrets to another country, even a close ally. If the CIA had shared its intelligence fully during the cold war, a penetration of the BND run by Moscow would have been tantamount to a penetration of the CIA. Moreover, Americas intelligence agencies have suffered Soviet penetrations of their own, thereby reminding the BND of the risks to its agents of cooperating with the United States. In a word, every liaison relationship is marked by suspicion.18 The details of tradecraftthe methods of espionagealso induce liaison ambivalence. While understanding and enjoying the benefits of sharing, both sides are careful to protect both their own intelligence
| 158 |
sources (the names and locations of agents) and methods (the specifics of their most advanced espionage techniques). This is particularly true with respect to Americas desire to maintain an edge in satellite and other technical surveillance. Rarely does the United States disclose its very best (that is, highest-resolution) satellite imagery, even to close allies, for fear of revealing to other intelligence servicespenetrated as they may be by an enemy agentjust how capable its spy cameras are. If this technical information were made known to the enemy, it could devise more effective methods for evading the cameras eye. Even liaison disclosures of tradecraft on miniature surveillance devices could aid the enemy or put the liaison partner on alert for methods that Americas intelligence agencies might want to use against it one day, should the friendship disintegrate.
By 1969, East-West relations had changed signicantly. Under the leadership of Chancellor Willy Brandt (196974) and a coalition government composed of the Social Democratic Party and the Free Democratic Party, West Germany reached tentatively toward the East in search of improved relations through a policy known as Ostpolitik (eastern politics). This policy both reected and encouraged further efforts in the West to relax tensions with the Soviet Union. Known as dtente, this approach resulted from the growing sense that the Soviet threat had diminished signicantly since both the days of Joseph Stalin and even the East-West confrontations of the 1960s (epitomized by the Berlin and Cuban missile crises). Both the United States and Europe began to worry more about political and economic disparities instead of remaining xated on the Kremlins military machinations.20 In addition, West Germany was beginning to become more assertive in economic and political affairs, buoyed by a strong GDP and a new self-condence gained from its role in helping make dtente a reality.21 The preoccupation of the United States with the Vietnam War gave further credence to Bonns belief that Europe would have to look out more for itself as American forces became bogged down in the jungles of Southeast Asia. A former U.S. ambassador to West Germany recalled: The drift of Brandts thinking [on Ostpolitik] was not unwelcome in Lyndon Johnsons Washington, but as the president became progressively more obsessed by Vietnam, he could not provide the kind of sustained pressure required to get things moving.22 The Soviet invasion of Prague in 1968 further checked President Johnsons hopes to pursue dtente with Moscow. The 1970s and 1980s were a critical period during which West German political leaders and other members of the Western alliance questioned the basic U.S. cold war principles of containment and strategic deterrence.23 Even though Brandts personal relationship with President Richard M. Nixon was cordial,24 during the 1970s it became clear that American and West-European interests were no longer as congruent as they appeared to be in the immediate postwar period. . . . In addition to differing interpretations of the meaning and results of dtente, a series of U.S.-German disagreements over economic and monetary matters occurred in the 1970s.25 During Helmut Schmidts chancellorship (197482), U.S.-German
| 160 |
relations were further strained because of personal differences between him and President Jimmy Carter. Schmidt, having respected both presidents Nixon and Gerald R. Ford as level-headed statesmen and able diplomats, complained about Carters (and later Ronald Reagans) naive and moralistic approach to questions of international security.26 Distrusting his own intelligence officers, whom he repeatedly accused of collecting nothing but irrelevant or outdated information, Schmidt was reportedly even less willing to base his political decisions on information provided by American intelligence sources.27 In addition, Schmidt held that West Germany should be a critical partner to the United States, addressing not only common interests but also disagreements and differences.28 When Germany elected a Christian Democratic Union (CDU) majority to the Bundestag in 1982, the Reagan administration expected a relaxation of U.S.-German tensions and an increased willingness to cooperate. Yet American hopes were not fully realized under the resulting administration of the conservative Chancellor Helmut Kohl (198298), and the continuing growth of German political self-condence prevented a return to the postWorld War II levels of German submission to U.S. leadership in intelligence and other affairs. Nevertheless, the stability and pro-West outlook of the Kohl government helped the longterm efforts at cooperation between the two nations, as did Kohls political ideology, which aligned well with the Reagancontinuing into the Bush and even, to some extent, the Clintonadministrations.29 The ups-and-downs of foreign policy priorities on both sides of the Atlantic had only minimal effects on CIA-BND liaison ties. Despite experimentation with Ostpolitik and dtente, West Germany remained rmly rooted in the Western alliance and closely attuned to leadership from Washington on most security policies, though not so much on political and economic initiatives. Even with the Soviet threat in decline (at least until rejuvenated by President Reagan with his evil empire rhetoric aimed at the Kremlin during his administrations middle years), Bonn and Washington found other common threats that encouraged an ongoing liaison relationship.30 Chief among these threats was the specter of terrorism, which had risen in West Germany during the 1960s in the form of the Baader-Meinhof gang and other violence-prone rebellions against the established
| 161 |
order. This was a target the CIA and the BND could readily agree on as a danger to both nations, and the two intelligence services sharing of information accelerated, especially after 1985 when global terrorism became more widespread.31 Beyond intelligence sharing, West Germanys counterterrorism units also gained a reputation for considerable skill and courage. Indeed, the CIA and other NATO intelligence services turned to them frequently for short-notice paramilitary operations against skyjackers and other terrorists.32 Terrorism continues to be a problem that prompts intelligence services to cooperate. A senior CIA counterterrorist ofcial concluded that the greatest chance for thwarting terrorism lay in the long-term disruption of the activities of terrorist organizations, adding
Im talking here not about foiling specic plots, but rather about impeding the day-to-day work of terrorist groupsthe recruitment, the cellbuilding, the moving of men, money and matriel, and the mere maintaining of a presence in a foreign countryall of the things that a group needs to be able to conduct terrorist operations in a given area. For us, this task involves regular cooperation with many foreign policy, intelligence, and security services around the world.33
Additional threats encouraged liaison during the Kohl years. In rough descending order of cooperation among intelligence services, after terrorism came the danger of narcotics trafcking in West Germany and the United States. Much of this illegal drug trade originated in Latin America, and therefore the United States had useful information to share with the BND about Colombian and other drug cartels. In return, the BND had data to share regarding U.S.-bound heroin stemming from poppy elds in Turkey and elsewhere in the Middle East. During and after the cold war, Bonn and Washington have had a further common interest in halting the proliferation of weapons of mass destruction. Information collected by the CIA and the NSA enabled U.S. government ofcials to alert German authorities to illegal private exports from Germany, such as equipment for poison gas plants shipped to Iraq and Libya in the late 1980s.34 Since German law prohibits the BND from collecting information that might incriminate German citizens, help from foreign intelligence services (including the CIA) wasand remainsinvaluable to
| 162 |
German law enforcement in its efforts to track down the sources of illegal exports.35 The CIA and the BND continued their efforts to monitor military events in the Soviet Union, and near the end of the cold war, the activities of unpredictable rogue states have concerned both nations, particularly Iraqs aggressiveness and the destabilizing ethnic wars in the Balkans at the end of the century. Even after the collapse of the Warsaw Pact in 198991 and the subsequent reunication of the two German states, the CIA and the BND have continued to cooperate, sustained by the threats of terrorism, narcotics, weapons proliferation, and rogue states. Events and personalities in Moscow have remained a common concern as well, especially the future of democracy there, where Washingtonand, even more, Bonn has invested large sums of money to support a more open and free Russian society. Above all, German intelligence ofcials have been interested in joint BND-CIA counterterrorist activities.36 The U.S. intelligence community has also concentrated on improving its relations with foreign intelligence liaison services in the domain of counterintelligence, as indicated by the creation of the DCI Counterterrorist Center (CTC) at the CIA. Before CTC was formed, remembers a senior ofcial in the center, when a liaison ofcer came to town, he had to knock at about ten doors. Now he can come to one single pegpoint. This has smoothed our relations and led to a greater exchange of information and a greater level of success in terms of tracking the terrorist target. The ofcial emphasized, though, that of course, nobody ever tells the complete truth.37 Thus, despite the diminishing ability of the cold war in its latter stages to bind together West Germany and the United States, the Soviet threat remained potent enough to encourage ongoing CIA-BND liaison ties. The Euromissile crisis of the Carter and Reagan administrationswhen the Soviet Union placed SS-20 missiles in Eastern Europe as a counter to the U.S. Pershing IIs in Western Europeproduced a fourth-quarter irritation between the West Germans and the Americans during the cold war, relieved by ratication of the Intermediate-Range Nuclear Forces (INF) Treaty in 1988. Finally, bureaucratic inertia no doubt has helped preserve the liaison ties, as [intelligence] interdependencies become habitual and systemic, for good and for ill.38
| 163 |
He concluded that there was nothing new in this role for the CIA,47 and he revealed that the CIA has been asked in the past to support other Middle East agreements, to monitor U.S.-Soviet arms control pacts, and to intercede to ease tension between India and Pakistan. As a global
| 165 |
agency with security contacts in all corners of the world, the CIA (Tenet implicitly argued) is sometimes well positioned to provide a helping hand in peace negotiations. The CIA is not making policy, the DCI emphasized, but helping to carry it out. This is consistent with the agencys history of ghting terrorism and helping friends and allies in the region live together peacefully and safely.48 Other administration officials joined in the effort to defuse the controversy over whether the CIAs role in the Middle East had ventured too far in the direction of involvement in questions of policy. The Agencys role was to try to deal with these issues without being personally involved, Secretary of State Madeleine K. Albright said.49 National security adviser Samuel R. Berger reassured the public that the CIA would just help to facilitate cooperation, not enforce the provisions of the peace accord.50 Specifically, the CIA would sit on a security committee (with Israeli and Palestinian intelligence leaders) in the role of judge, reviewing Israeli charges against suspected terrorists involved in attacks against Israelis, some of whom were thought to be members of the Palestine police. The Agency would study the cases and determine which Palestinians should be jailed and tried, though in Palestinian courts. A former chair of the Senate Select Committee on Intelligence, David Boren, found it entirely appropriate to use our intelligence assets to promote stability and peace in the world.51 Former DCI R. James Woolsey fretted, however, over the possibility that some policymakers might inappropriately draw the Agency away from its primary responsibility of collecting intelligence and providing unbiased assessments.52 A prominent American intelligence scholar expressed deep reservations. The problem is that the agency can become committed to policy, thereby compromising its ability to objectively report on the facts of the situation and the viability of the policy, reasoned Harry Howe Ransom. United States intelligence history includes numerous examplesincluding the Bay of Pigs and the fall of the Shah of Iranof major intelligence failures that resulted from its commitment to carrying out a wrongheaded policy.53 Others worried that the heightened visibility of CIA operatives could compromise the Agencys sources and methods, not to mention placing its ofcers in a risky political cross re between Israeli and Palestinian of| 166 |
cials. Enmeshing the CIA in this is a serious, serious mistake, grumbled a former Pentagon ofcial from the Reagan administration. The CIA is essentially getting involved as an umpire. If anything goes wrong in the Middle East, guess who gets blamed?54 The agency will have to guard against taking sides, warned the New York Times, or becoming involved in punitive actions that make the United States a protagonist rather than a mediator in the conict. But if it can maintain its strict policy neutrality, it can make an important contribution.55 On balance, the CIA would have been better off leaving diplomacy to the diplomats and concerning itself with its traditional duty of gathering intelligence and providing independent assessments about world affairs.
means that the information can go to 185 nations, including a number of Americas adversaries. As a result, the information is unlikely to stay secret. With this in mind, the intelligence community gives to the UN what one of its representatives calls vanilla information: somewhat bland, highly sanitized documents which, after various interagency predissemination reviews, are usually less than timely in their arrival to consumers at the United Nations. Nevertheless, the information is still considered useful by UN ofcials, for often it is the only reliable source of analysis on some global issues.58 If asked, the United States sometimes supplies information on specic topics of interest to the United Nations at a somewhat higher level of classication than normal, although still carefully vetted to remove clues to sources and methods before being passed along. One example is an analysis of military, political, and economic developments in a war-torn developing nation. As a rule, the United States does not provide classied documents to the UN, with the occasional exception of tactical battleeld information for the UNs blue helmet troops in times of crisis. Another kind of information sharing (the term the UN prefers to intelligence) and one that avoids giving sensitive documents to the United Nations is the timely oral brieng. When the intelligence community determines that the blue helmets are in jeopardy, a member of the U.S. mission to the United Nations presents, with clearance from the Department of State, valuable battleeld information orally to the appropriate UN ofcials, possibly saving lives and without leaving any documents behind. Sharing intelligence with international organizations is a complex procedure that depends on the kind of organization (its size and whether its members are U.S. allies, for example) and Americas experience with that organization. Whoever the recipient is, the United States shares information following precise procedures. Usually the intelligence is given in a highly diluted fashion; when more sensitive information is disseminated, it is to only a small group of consumers. There have been mishaps. In Somalia, UN ofcials ineptly handled U.S. intelligence documents and, worse still, left some behind during their withdrawal in 1994.59 Subsequent inquiries into this case revealed that the documents were less sensitive than initially feared; nevertheless, and as a result of this experience, UN administrators have tightened their security procedures.
| 168 |
Whenever the United States shares information with the United Nations, its purpose is to advance Americas national security interests, not to create goodwill toward Washington. Information that uncovers transgressions by Saddam Hussein, protects peacekeepers in Bosnia, provides a realistic picture of events in Rwanda, or conrms acts of atrocity by Serbian or Albanian soldiers benets the United States as well as the United Nations. In general, Americas best interests are served when the United Nations has accurate information about world affairs. In many cases, however, UN ofcials are already well informed. As a result of their diplomatic contacts, world travel, and familiarity with the standard sources of public information, most ofcials do not need secret information (except for tactical military intelligence when blue helmets are under re). These ofcials like, nonetheless, to receive from reliable member states more studies produced by their individual intelligence agencies on the issue of human rights, as well as on such broad topics as world population growth and global food supply. The extent of U.S. liaisons with international organizations raises the question of whether Washingtons secret agencies undermine their credibility by making them appear as lackeys of American foreign policy. This possibility was brought to the publics attention in 1999 when news reports revealed that the CIA and the NSA had assisted the UN Special Commission (known as UNSCOM) in eavesdropping operations against some of Iraqs most sensitive communications. In this case, the United States had decided to go far beyond its normally low-level intelligence activities with respect to the United Nations. The UN commissioned UNSCOM, a team of arms inspectors, to monitor Iraqi compliance with a 1991 cease-re agreement requiring it to dismantle its program for strategic weapons. The team was nothing less than what one reporter called an international intelligence service for the new world order . . . the rst of its kind, adding that more than 7,000 weapons inspectors from around the world served UNSCOM over seven years, spying on Iraq, surveying its military and industrial plants, trying to do what smart bombs could not: destroy nuclear, biological, chemical and missile programs hidden by Saddam Hussein.60 For instance, Germany provided helicopters to UNSCOM with special radar to penetrate Iraqi sand dunes in search of buried weapons; Britain contributed sensitive scanners to intercept Iraqi military communications;
| 169 |
and the United States lent U-2 spy planes and even navy divers to probe Iraqi lakes and rivers for submerged weapons.61 According to another reporter, The spirit of postCold War cooperation promised a miracle: UNSCOM, operating on behalf of the U.N. Security Council, would utilize the secret intelligence agencies of its members states, Communist and non-Communist alike, to investigate the Iraqi arsenal.62 Information acquired by the NSA, which has the capacity to unscramble encrypted telephone conversations between Saddam and his aides, could help the UN search for weapons of mass destruction inside Iraq. At the same time, UNSCOM could be used by the U.S. intelligence community for its own purposes, namely, ridding the world of Saddam Hussein. Under the cover of UNSCOM, the NSA apparently had even wired a UN microwave transmission system (without the knowledge of UN ofcials), which allowed the eavesdropping agency to monitor a wide range of secret Iraqi military communications.63 The UN cannot be party to an operation to overthrow one of its member states, complained a condant to UN Secretary-General Ko Annan, when the United States intelligence ties to UNSCOM became a matter of public knowledge. In the most fundamental way, that is whats wrong with the UNSCOM operation.64 Had the UNSCOM weapons inspectors restricted their activities solely to its nonproliferation agenda, which had widespread support in the world, they could have preserved the high esteem in which most member states held them. Instead, news leaks and speculation from one of the inspectors (Scott Ritter, a former U.S. Marine intelligence ofcer) raised suspicions that UNSCOM had gone beyond just trying to nd Saddams weapons. According to these reports, the CIA had used UNSCOM in 1996 as an umbrella for its own intelligence collection operations as well as for covert actions designed to topple Saddam Hussein.65 The Clinton administration conceded that the CIA had been assisting UNSCOM through intelligence, logistical support, expertise, and personnel but denied using the team to plot a coup against the Iraqi leader.66 Wherever the truth lay, UNSCOM was fatally wounded by these charges, and the independence of the United Nations was severely compromised, in perception if not in reality. In order to advance its plans to destroy Saddam Hussein, the UN liaison operations of the U.S. intelligence community (presumably acting under White House orders) had instead destroyed an
| 170 |
international effort to halt the proliferation of dangerous strategic weapons. To avoid the problem of national bias that comes with relying on individual nations intelligence services for its information, the UN must create its own intelligence capabilitiesprofessional intelligence ofcers committed to making the UN work (with all the necessary safeguards against misusing shared information). The UN is already taking some steps in this direction. It has set up a situation center, which is creating a computer infrastructure for collecting, storing, and retrieving opensource information on world affairs. Its resources, though, are modest. The United Nations has also recently gained the authority to construct a satellite surveillance system that would allow its International Drug Control Program to monitor the cultivation of illegal drug crops in the major source countries. By this means, the UN can establish an internationally accepted benchmark for verifying countries promises to reduce their production of drugs. For the rst time the international community will have a very reliable instrument to measure the extent of illegal crops, according to the programs executive director.67 The European Space Agency is contributing the necessary satellites and technical expertise to support the operation. These experiments in international intelligence remain alive despite the UNSCOM setback. Nonetheless, it has been difcult to overcome the old view of the UN as either a target or a cover for intelligence operations, rather than a customer for information and analysis provided by the secret agencies of member nations for the benet of the whole world. This change in attitude is ill thought out and haphazard, in the words of a former British ambassador to the United Nations.68 The relationship between international organizations and intelligence raises a paradox: how can these organizations be effective if they are so poorly informed about the outlaw nations they are expected to tame? The UN is supposed to resolve conicts, keep the peace, enforce economic sanctions, control the spread of large-scale weapons, combat organized crime, ght drug trafcking, and bring to justice war criminals and human rights violators. All of these tasks require intelligence, yet the UN has little at its disposal. International organizations cannot afford to develop their own full-service intelligence agencies. Besides, member nations are unlikely to tolerate the risk that the UN might end up peering
| 171 |
into their own backyards. Member states could provide more intelligence assistance themselves, but they fear leaks of sensitive sources and methods. Moreover, the UN must worry about biased intelligence from member states. Despite these dilemmas, both nations and NGOs could give to the UN and other international organizations extra or secondhand satellites and other surveillance equipment for monitoring global environmental conditions, refugee ows, arms trade, and suspicious military mobilizations. Satellites can even track mosquito populations around the globe, by focusing on vegetation patterns and breeding grounds that attract the disease-bearing insects.69 The UN could establish an assessment board made up of retired senior intelligence analysts from member states: men and women with extensive analytic experience who could evaluate the quality and objectivity of member-state intelligence reports solicited by the UN secretary-general. As a specialist on the United Nations observes, The UN must be given the means, including information-gathering and analysis, to make manifest its goal, as stated in the opening words of the UN Charter, of saving succeeding generations from the scourge of war.70 So far members of the UN have fallen far short of satisfactory intelligence cooperation, although some individual nations (like Great Britain) have been responsive to requests from UN ofcials for intelligence assistance. Increased intelligence burden sharing within the framework of the United Nations would enable a global dissemination of information to all member nations, carefully reviewed by an assessment board to lter out national biases. This would be a valuable contribution toward the search for solutions to the challenges that confront all the worlds people.
| 172 |
PA R T I I I
EIGHT
American intelligence after the cold war has been a balance of old approaches that still seem useful (such as the satellite surveillance of distant battleelds), along with new approaches necessitated by changing conditions (covert actions that attack international terrorists computer networks and bank holdings).
and stringent security clearances. New is the current emphasis on safeguards against information operations (once known as information warfare) or cyberterrorism, especially the protection of government computers against foreign access (or American teenagers, for that matter). Currently, one of the intelligence communitys main recruitment efforts at home is hiring computer specialists who can use their knowledge to help the secret agencies protect their databases, although the best computer experts are difcult to entice, since the private sector is able to pay so much more for their services. Appeals to patriotism and the lure of working for interesting clandestine agencies are the best hopes. Beginning with the Ames spy scandal, in which Aldrich Ames of the CIAs Operations Directorate was uncovered in 1994 as a long-time Soviet mole, Congress has appropriated additional funds for counterintelligence. Internal security has been tightened at Langley since this embarrassment, which tipped off the Kremlin to more than two hundred CIA spy operations in the former Soviet republics and led to the execution of at least nine key Agency assets. Ironically, U.S. ofcials have paid more attention to counterintelligence since the end of the cold war than they did during some of the most confrontational years with the Soviets under Presidents Carter, Ford, Reagan, and Bush. Guided by James J. Angleton, the CIAs chief of counterintelligence (a man of enormous skill and resolve, however paranoid he may have been), CI enjoyed its highest prole from 1953 to 1974, until a seam of discord split open between William Colby and Angleton over how to handle the Agencys relations with Israeli intelligence and Colby red Angleton. With Angletons departure, responsibilities for counterintelligence were dispersed throughout the CIA and given a lower prole by intelligence managers. A series of foreign spy revelations in 1985 (most notably the Walker familys espionage against U.S. naval intelligence) renewed the attention of intelligence managers in CI, and the Ames spy scandal a decade later provided an additional jolt. The Los Alamos spy case in 1999 set off the most recent counterintelligence alarm in the Energy Department and the nations science laboratories. Based on these experiences, the current DCI is strengthening counterintelligence throughout the community, as well as in the labs and another vulnerable site, the security connections between the secret agencies and the private
| 176 |
industries contracted to build surveillance platforms and other intelligence hardware. Counterintelligence covers a number of subspecialties beyond catching foreign spies trying to steal Americas secrets. Beneath its umbrella resides counterterrorism. The Counterterrorist Center (CTC), the oldest center (founded in 1986 by DCI William J. Casey), has received the most funding since the end of the cold war and is now also the largest, even bloated, according to a former CIA ofcer.1 Some insiders view the CTC as the most integrated from a personnel perspective (others point to the Crime and Narcotics Center). Most of the CTCs experts are on loan from CIAs Operations Directorate, which has commandand-control authority over the center, even though the CIAs three other directorates also participate in its activities.2 Despite the strong CIA stafng component, the center has twenty-four ofcers (known as detailees) from a dozen other agencies, including the FBI and the Department of State (the two most important links), the Department of Defense, the Secret Service, the Department of Energy, the Bureau of Alcohol, Tobacco and Firearms, the Naval Investigative Service, the Federal Aviation Agency (another vital participant in this mission), the NSA, and the Immigration and Naturalization Service. A State Department ofcial heads the Interagency Intelligence Committee on Terrorism for purposes of government-wide coordination. By all accounts, the CTC demonstrates that a high level of cooperation can be achieved through the community-wide sharing of personnel, information, and insights:
The whole concept behind the CTC was to bring elements from all four [CIA] Directorates together and put them under one single chain-of-command, so that wed have all the necessary resources together to tackle the problem. In addition, we brought in these detailees from outside, so that wed have a very close relationship with the intelligence community. These people can pick up a secure [telephone] line and cut through the bureaucratic thickets that we normally face.3
Especially innovative and productive has been the centers placement of CIA analysts and clandestine DO ofcers in the same location, working side by side for the rst time ever in the Agencys history (and encouraging further experiments in co-location elsewhere at Langley,
| 177 |
though with uneven results). Turf battles still are fought in the CIA and throughout the community; but according to CTC participants, having in place a center for counterterrorism means that the battles are now less brutal and more easily stopped than used to be the case. In addition, the center has excelled in providing intelligence for tracking and capturing fugitive terrorists. Some fty have been apprehended in the past ve yearsalthough Fugitive No. 1, Osama bin Laden, continues to elude the intelligence dragnet.4 He is thought to be hiding somewhere in Afghanistan under the protection of the Taliban regime, a fundamentalist government that controls about 85 percent of the nation. But even when U.S. intelligence knows precisely where he is, getting to him is another matter. The bombing of the World Trade Center in New York City (1993) what one terrorism authority refers to as the rst battle of the twentyrst century5and a federal building in Oklahoma City (1995), as well as the U.S. embassies in Kenya and Tanzania (1998), has encouraged Congress to allocate more money to those agencies combating terrorism, including the CTC (even though it does not deal with U.S. domestic terrorism). Congress has yet to appropriate the funds requested by the State Department to enhance security at (harden) its embassies, in yet another instance of a long-standing tendency among legislators to support the supposedly hard-nosed warriors of the secret agencies over the pinstriped negotiators in the diplomatic corps. The CTC and its counterpart units in allied nations appear to have made some progress in the war against terrorists, as the number of terrorist incidents against the United States and worldwide has decreased in the last few years.6 When terrorism does strike, though, America is a favorite target. This nation suffered more than 35 percent of the total number of international terrorist attacks in 1998, up from 30 percent in 1997 and 25 percent in 1996.7 Worrisome, too, is the fact that the terrorists weapons have become increasingly more lethal. Moreover, as government experts have stated, the objective of terrorists allied with bin Laden is not to inuence, but to kill, and in large numbershence their declared interest in acquiring chemical and even nuclear weapons.8 Some forms of terrorism are nearly impossible to stop, especially a suicide attack carried out by one person or a group, as happened to Egyptian President Anwar Sadat in 1979, the U.S. Marine base in Lebanon in
| 178 |
1982, and the Israel embassy in Buenos Aires in 1992. Among the most troubling scenarios pondered by intelligence ofcials is the launching of a nuclear-tipped ballistic or cruise missile against an American target from an offshore surface vessel, disguised perhaps as a freighter.9 No matter how well protected you are, or how well trained a presidents security detail, acknowledged a CTC expert, if youve got someone in a truckor whateverloaded to the gills with bombs (and probably loaded to the gills with hashish, too), the chances of him getting through are pretty strong.10 To combat terrorism, the CTC works closely with the Nonproliferation Center (NPC), since both have a mandate to curb the use of dangerous weapons against mass populations. Both centers have concluded that a terrorist organization is more likely to use biological or chemical weapons than a nuclear weapon against the United States. They can really only get a nuclear weapon from a state sponsor, points out a CTC ofcial, and state sponsors would be reluctant to give that sort of weapon to a terrorist group, because the retaliation against the state by the United States would be like a sledgehammer.11 The NPC concentrates on the supply side of the weapons problem, trying to stem their ow at the origins of production and distribution, whereas the CTC focuses on the demand side, preventing terrorist groups from acquiring the weapons in the rst place. If these efforts fail, the CTC cooperates closely with the FBI to catch the perpetrators following the terrorist attack. The most important defense against terrorism is information about its likely occurrence, so that law enforcement ofcials can intercede before the attack takes place. To this end, the perfection of HUMINT and other collection methods stands at the top of the CTCs priorities, especially the inltration of terrorist organizations or the wooing of a defector from the enemy camp. These are difcult tasks, since modern terrorist organizations are sophisticated and acutely aware of the CTCs intentions. Even when the CTC is successful, its achievements usually remain hidden (at the centers own insistence), for fear that valuable tradecraft will become known to future terrorists. Based on the CTCs HUMINT and TECHINT intelligence sources, the United States retaliated in 1998 against suspected terrorist facilities and encampments in Sudan and Afghanistan. In Sudan, the target was the Al Shifa Pharmaceuticals plant in Khartoum, suspected by CTC
| 179 |
ofcials of producing chemical weapons; in Afghanistan, it was a cluster of tent encampments outside the town of Khost in Paktia Province, where terrorists, including Osama bin Laden, had gathered for meetings. As mentioned earlier in this book, the Sudanese air attack became controversial when the government of Sudan claimed the factory was making only aspirin and other harmless medicines, not, as claimed by the CTC, a precursor chemical (known as Empta) necessary for producing the deadly nerve agent VX. As for the bombing near Khost, it was subsequently learned that the terrorist gathering had disbanded only two hours before the U.S. Tomahawk missiles struck. Bin Laden and his associates were lucky. Yet once more in the eyes of the media, the CIA had suffered another humiliating failure. In self-defense, CTC ofcials point out that no one has a crystal ball, not even the media. No human being is able to predict with condence when a tent encampment of terrorists in a remote Afghan desert might decide to steal away in the night. The CTC concedes that most of the time the United States will not have the luxury of a clear, advance warning about an impeding terrorist attack. As a result, it has been given presidential authority to resort to more disruptive and preemptive counterterrorist activities, namely, covert action. Covert Action Just as during the cold war, covert action (CA) is still an important tool for the intelligence community or, more accurately, for the CIA and its Operations Directorate and some of the DCI centers, which are responsible for conducting aggressive secret operations against foreign nations and groups that intend to harm the United States. The main difference in the use of CA now and during the cold war is that today it is focused more on the so-called transnational issues (proliferation, narcotics, international crime) and less on specic regimes.12 Collection and analysis are an important foundation for effective covert action against terrorists, since before the CTC can take direct action, it must rst know through what channels weapons are owing to terrorists, where the terrorists are located, and how they intend to carry out their activities. Based on this information and in cooperation with the Pentagon and paramilitary elements within the CIA (the Special Op| 180 |
erations Group of the Operations Directorate), the CTCs job is to make life difcult for terrorists in most every way possible, from intercepting their weapons and sowing doubt, confusion, and dissention within their ranks to fouling their computers and tying up their nancial resources. In this new age, the CIA continues to use old forms of covert action against hostile foreign nations, too, including propaganda, political and economic disruption, and even secret warfare. The most recent examples of the last are the funding of Iraqi opposition groups in 1998/99 (largely routed by Saddam Husseins armies but still supported by U.S. ofcials, especially in Congress) and support for the anti-Serbian Kosovo Liberation Army in Kosovo and other anti-Milosevic factions within Serbia (with results so far not much better than in Iraq).13 The newest forms of CA carried out by the CIA are designed to complement the counterintelligence corps in blocking information operations directed against the United States. These covert actions seek especially to disrupt the communications of adversariesfrom terrorists to rogue nationsby degrading their telecommunications and computer facilities.14 Another tactic is to manipulate international financial transactions through computer hacking, say, emptying out bin Ladens accounts in the Dubai Islamic Bank in Dubai of the United Arab Emirates and in the National Commercial Bank in Saudi Arabia, as well as other locations around the world where he reportedly has hidden his copious assets.15 Whatever form the covert action may take, it remains subject to a series of extensive internal clearances before being implemented, a review process put into effect in 1974 with the Hughes-Ryan amendment to the National Security Act of 1947 and refined over the intervening years through more amendments. In-house CIA panels initially scrub each covert action proposal, both before and after an NSC interagency group looks at it. Then the proposal must pass muster in the DCIs office, the NSC Deputies Committee, and the NSC itself. Within the NSC, the proposal must obtain the presidents written authority in a document called a finding, the chief executives finding that the proposal merits adoption. Finally, the covert action must be reported to the two congressional oversight committees in which legislators may occasionally object to the proposed operation and ask that it be modified or shelved altogether (although Congress has no formal
| 181 |
authority to stop a covert action, in extreme casesas with Nicaragua in the 1980sit can vote down the money to support it). The Assassination Option From time to time, the argument is raised that out of a misplaced sense of morality, the U.S. government has tied its hands in dealing with terrorists and violent dictators by removing a useful instrument of foreign policy: the assassination plot, an extreme form of paramilitary covert action. It is true that for a brief time during the cold war (the late Eisenhower and early Kennedy administrations), the United States did engage in assassination attempts.16 The best-known plots were aimed at Fidel Castro of Cuba and Patrice Lumumba of the Congo. Neither plot succeeded (Lumumba died at the hands of African rivals not connected to the CIA), nor has any other known CIA assassination attempt against a foreign leader. Despite this record of failure, some advocate a revival of this approach to resolving Americas foreign policy headaches.17 After all, diplomacy is slow and often ineffectual, and air strikes or sending in the marines are noisy, bloody alternatives that might trigger a major war. In between lies the prospect of neatly removing someone like Iraqs Saddam Hussein or Serbias Slobodan Milosevic with a silent dart gun or a vial of poison. No endless diplomatic haggling, no great expense (cruise missiles cost $1 million each if surface-launched, $2 million if by air), no still greater tribute in blood and treasure that would accompany a major invasion. Just a single bullet in the head of an annoying dictator or a few drops of Blackleaf-40 in his morning orange juice. Is the assassination option a valid answer to this nations international woes? With a couple of important exceptions, the answer should be a resounding no. The case against assassination has strong legal, practical, and moral dimensions. President Gerald R. Ford signed an executive order in 1976 prohibiting assassination plots, a policy that has never been rescinded by his successors. The language of the order, signed again by President Ronald Reagan in 1981, reads, No person, employed by or acting on behalf of the United States Government, shall engage in, or conspire to engage in assassination.18 True, President Reagan had Muammar Gadhas house bombed as
| 182 |
part of an air raid against Libya, and George Bush ordered the bombing of Baghdad (including Saddams palaces) during the Persian Gulf War and would not have been unhappy if the Iraqi president had been one of the victims; indeed, the Bush White House lit a candle every night hoping Saddam Hussein would be killed in a bunker during the Baghdad bombing.19 Nevertheless, these were acts of overt warfare. In contrast, successive presidents have felt an obligation to honor the executive order with respect to the CIAs more clandestine operations. The Bush administration even prevented the CIA from supporting a Panamanian group intent on overthrowing President Manuel Noriega in 1989, for fear that the coup might lead to his murder.20 Indeed, President Ford did not arrive at the assassination prohibition lightly, declaring unequivocally that he was opposed to political assassination. Should a president decide to waive the executive order and adopt the assassination option, a still more daunting consideration has to do with the practicalities. The United States has never been adept at assassinating foreign leaders. Castro lives on after many attempts against his life concocted during the Kennedy administration. Even locating targets like warlord Mohamed Farah Aidid of Somalia or Saddam Hussein proved impossible during the 1990s. Dictators are paranoid, well guarded, and elusive; they live in closed societies where it is easy for them to hide. The consequences of a murder plot raise another practical consideration. Would the elimination of Castro have led to freedom in Cuba, or merely the rise to power of his like-minded brother, Raul? How many more Saddam Husseins wait in line to replace the current Iraqi dictator? How many individuals must be assassinated before a regime changes its colors? Should it be U.S. policy to assassinate a long queue of potential tyrants, just to be on the safe side? The venal leader plus all his close relatives, too? And at what point do foreign leaders decide that if the United States is going to target them, perhaps they ought to retaliate against Americas presidentwho lives in an open society and is easily targeted? Finally, to what extent is murder compatible with American values? Does the United States seek a world in which countries kill one anothers heads of state? For America, the worlds leading democracy, the role of global godfather is contradictory and inappropriate. Means matter, not just ends.21
| 183 |
Now the exceptions. First, if the president is engaged in a war authorized by Congress (not simply by NATO or even the UN), the enemys leaders are just as subject to combat operations as is the lowliest soldier in a trench. Formal warfare overrides the executive order against assassination. Second, if Americas president has reliable intelligence that a dictator or a terrorist is on the verge of using lethal force against the United States or its vital interests (not merely manufacturing weapons, as every nation does), it would be absurd to stand by and do nothing. The CIA has established an informal agreement with its congressional oversight committees (SSCI and HPSCI) that if a terrorist were known to be driving a truck loaded with explosives toward a U.S. building, the CIA would be expected to shoot the driver if there were no other way of preventing the bombing.22 This is a far cry from a preemptive plot to kill a dictator. Short of these exceptions, though, the United States is well advised to keep President Fords executive order intact and, however tempting at times, to resist the odious role of International Godfather.
Intelligence Collection
Most of the intelligence budget is spent on collection hardware, especially satellites, eavesdropping antennae, and a variety of reconnaissance aircraft (piloted and pilotless). But in recent years, intelligence ofcials have become more aware of the limits of these surveillance platforms. Satellites and aircraft cannot see through roofs or into underground caverns.23 Moreover, the construction and positioning of large satellites more than $1 billion for the launch aloneis a great drain on the intelligence budget. In light of these shortcomings, intelligence managers have begun the long, slow task of building up Americas HUMINT capabilities, doubly important since the intelligence community is presently witnessing the mass retirement of a generation of case ofcers responsible for recruiting and managing spies during the cold war. Training the new recruits and sending them overseas to nd new foreign assets will take time, and so in the rst years of the twenty-rst century the United States HUMINT intelligence abroad will be less effective until the new case ofcers begin to establish their own spy networks. The targets of HUMINT operations have changed, too. While
| 184 |
Russian politicians, diplomats, generals, and spies will continue to be the preferred targets (and the careers of those CIA case officers who successfully turn anyone from this group will benefit), high-ranking officials inside rogue nations are valuable as well. North Korea is a prime example. The recruitment of a leading official from this isolated nation is probably the most difficult assignment in the world today. It is almost impossible to recruit anyone inside North Korea because American travel there is so restricted. The only real chance is to approach and try to pitch (recruit with promises of money or perhaps resettlement in the West) a North Korean diplomat when he attends meetings abroad. Even this scenario is unlikely, since North Korean officials and their security guards travel in clusters, a precaution intended to ward off approaches from foreign intelligence officers. Foreign scientists are valuable targets for recruitment, too; China is not the only nation approaching experts in other countries in hopes of gaining access to weapons secrets and other technological advances. A key theme of this book is that the United States has been too fascinated with gold-plated technical intelligence at the expense of human collection. Without losing this nations comparative advantage in TECHINT, the intelligence community is capable of developing a world-class HUMINT service if it is supported by the president and Congress. To do so will require a more extensive recruitment and training of case officers familiar with the language and culture of targets not of great interest to the United States during the cold war (for example, Serbia). The goal should be smaller spy satellites and better foreign agents. The intelligence community must recognize that much of what policymakers need to know can be found in the open literature. Even in the days of DCI Allen Dulles (195362), about 80 percent of the information in classied intelligence reports was based on open information. The DCI did not sit down and identify exactly what an information item was and then compute the percentage of those items (weighted according to importance) that came from each source. Rather, this presumably was a guesstimate based on a rough comparison of what Dulles saw in the newspapers and what he learned from his network of spies and spy machines. Today the gure is thought to be more like 90 percent and growing as the secret agencies become more procient at picking
| 185 |
through the worlds open sources and then stirring into the reports for policymakers their own secret ndings.24 The use of these percentages, however imprecise, is more than a just a rhetorical device; they are the pretty good hunches of those who read a lot of intelligence reports and much of the open literature.
Analysis
In the lexicon of U.S. intelligence professionals, analysis refers to the interpretation by experts of unevaluated (raw) information collected by the CIA and the other agencies in the intelligence community. The information may come from open sources, such as Iraqi television broadcasts, or from covert sources, say, SIGINT collected from Serbia by way of a reconnaissance satellite. The analysts responsibility is to assemble all these data, from a variety of sources, both open and clandestine, a process known as all-source analytic fusion. Even though a large percentage of this information may be in the public domain, these sources can be difcult for most people to reach, such as the hundreds of magazines and newspapers now published in Russia or obscure scientic papers presented at distant international conferences (a form of gray literature). Logically, we would think that the intelligence analysts would begin with open sources of information and then turn to covert sources to look for the missing parts of the puzzle he or she has been assigned to solve. In practice, they often do just the opposite. Analysts frequently say they are too busy reading secret information from foreign agents to spend much time on open sources. The covert or secret information (intelligence, in the narrow sense of that term) is derived from across the ints: signals intelligence, imagery intelligence, measurement-and-signatures intelligence (MASINT, technically derived data other than imagery and SIGINT, including such telltale signs as energy emitted from a nuclear warhead), and espionage or human intelligence. After it is captured by a global web of mechanical platforms and human assets, this information moves into the hands of analytic experts in the intelligence community (the producers of intelligence reports) and then on to the ofcials whom the entire complex sequence is meant to serve: the president and other leading policymakers (the consumers).
| 186 |
At its best, intelligence analysis can offer policymakers just the right data and assessments they need to make wise decisions, presented with accuracy, timeliness, and clarity. When the United States entered into war against Iraq in the Persian Gulf in 1991, President George Bush and his military commanders had a better understanding of the battleeld situation than any other leaders have in the history of armed conict, in large part a result of the multiple U.S. intelligence platforms above and around the war zone. At its worst, intelligence analysis can be wrong, late, or muddled and sometimes all three at once. Just before war broke out between North and South Korea in 1950, a national intelligence estimate (NIE, the most elaborate of the intelligence-reporting formats) forecast peace on the peninsula. In 1956, analysts failed to anticipate the Soviet invasion of Hungary and again, in 1968, the Soviet invasion of Czechoslovakia. A former national security adviser in the Nixon administration recalls that the Presidents Daily Brief arrived early one morning in 1973 announcing that the Egyptians would not attack Israel, even though at that very moment the attack was under way!25 The Perils of Analysis The information gathered by Americas secret agencies travels a perilous course from its acquisition by sensors and assets in the eld (collection) through its evaluation by experts (analysis) and nallyoften the most difcult stage of the journeyto its delivery at the ofces of policymakers in Washington and U.S. military commanders overseas (dissemination). In this so-called intelligence cycle, many things can go wrong.
Determining Policy Needs
At the very beginning, the policymaker may not know exactly what kinds of information and analysis he or she requires, and so the intelligence agencies are left to guess what collection targets might be most helpful. Or the policymaker may be too busy to determine what information he or she needs, or sometimes the policymaker does not know whom in the intelligence community to contact. The result is a cueless collector and clueless policymaker.
| 187 |
Assume that the policymaker enjoys a close working relationship with the intelligence community and requests specic information from abroad. Even then, another formidable obstacle quickly arises: the secret agencies must be able to gain access to the information. Sometimes this is simple. Whether the beaches along Kuwaits coast are rm enough to support amphibious landing craft, and the circle of likely heirs to the Russian presidency in its next cycle of change (if not the exact individual, any more than one can predict with full assurance House or even presidential elections in the United States), can be readily determined. But consider these questions: Does North Korea have nuclear weapons? Is Russia violating the Chemical-Biological Warfare Convention of 1992? Has Pakistan purchased M-11 missiles from China? Such information is closely guarded and harder to acquire. Intelligence ofcers distinguish between secrets and mysteries. Secrets are information that a foreign nation is trying to keep concealed, for instance, the blueprint for Russian stealth technology or Iraqi order-ofbattle data, but with skill and luck, the United States may nd them. A mystery is something that may defy the most cunning espionage and the most advanced technical surveillance; even the target country itself may be unable to answer the question. How long will Castro last as Cubas leader? Or during the cold war, would the Iranian army support the shah in 1979 or tilt toward the Islamic revolution? Would the Soviets decide to invade Czechoslovakia in 1968 or just rattle their sabers? The answers to questions like these are not to be found in documents but, rather, are imponderables about which one can only speculate (unless there is an agent deep within the enemy camp). Even using open sources, acquiring just the right information can be daunting, given todays deluge of television reports, newspapers, magazines, books, Internet data, and gray literature from around the world. Modern intelligence agencies must be as procient in open-information management and retrieval as they are in classic espionage and spying with satellites and other machines. Time is a constraint. In 1991, the United States had the advantage of anticipating war in the Persian Gulf. The president ordered troops and supplies sent to the region. The DCI, in cooperation with the Pentagon,
| 188 |
encircled the expected battleground with an armada of listening and watching posts. But moving satellites into the correct geosynchronous position takes time, as does surging other assets, including spies on the ground. During the early stages of the war planning, Americas secret agencies disagreed over the Iraqi order-of-battle numbers, and for several weeks, collectors and analysts pored over their data to determine which agency had the more reliable gures. Seldom, however, does a nation have this luxury of time to prepare the battleeld.
Processing
Deciphering the information that has been collected takes time, as adversaries often encode their communications. Moreover, some countries (including Russia) use such complicated mathematical codes that the messages are essentially undecipherable. Even communications in exotic foreign languages require skill and patience to unravel. The keys to good analysis, then, are not just sharpening the skills of the analysts themselves, nor can analysts sit and wait for the information to land on their desks. From the beginning, they must help policymakers understand how the secret agencies can help them and work with the collectors to determine the best targets and modus operandi. The new partnership between co-located case ofcers from the CIAs Operations Directorate and analysts from the Intelligence Directorate is one of several reforms adopted since the end of the cold war to make HUMINT targeting more effective.26
Searching for Insights
Next is the actual analysis of the information, efforts to interpret the espionage ndings in light of open-source knowledge and to give policymakers valuable insights into world affairswhat the British call assessment. Sometimes the open sources will be sufcient to answer the policymakers question. On other topics, though, covert information may be needed. Imagery (IMINT) can be a good source of data on the location of foreign troops; SIGINT and HUMINT on the plans of adversaries; MASINT (measurement and signature intelligence) on the specications of the enemys weapons. Ideally, the skillful analyst is able to weave together each of these sources, revealing the hidden gure in the carpet. More likely, the analyst confronts the existential dilemma of
| 189 |
ambiguity and uncertainty in human affairs. As skillful a weaver of allsource evidence as he or she may be, some of the necessary strands of information will probably be missing. The carpet, richly textured in some places, may be frayed or even have gaping holes in others. Even when the analyst has all the facts, they rarely speak for themselves, so their meaning must be extracted from among a number of often conicting (noisy) possibilities. Was the Soviet Backre bomber a tactical or a strategic weapons system? During the cold war, analysts had an enormous amount of data on the capabilities of the Backre, but they disagreed about how the Soviet military might use the aircraft. Probably the airplane was meant for tactical purposes. But if the Kremlin ordered pilots to y a one-way, kamikaze mission to the United States, the Backre did have just enough fuel capacity to serve this mission (however unlikely). That is, the answer rested on the intentions of Kremlin leaders, a dimension of their behavior much harder to fathom than the straightforward counting of their weapons through IMINT photography. Irrefutable evidence is a luxury seldom provided to the analyst; more common is a shadowy landscape studded like a surrealist painting with question marks and darkened doorways.
Better Information, Better Analysis
In the 1950sthe dark ages of intelligence, in the phrase of a CIA historian27the secret agencies had no overhead reconnaissance capabilities and knew little about weapons production and other important events behind the Iron Curtain. Finally, critical technological breakthroughs in surveillance capabilitiesrst the U-2 spy plane and then the CORONA satellites and the SR-71 surveillance aircraft (1963) provided analysts with the hard data they needed to prepare reliable reports on Soviet military developments, supplemented by an occasional and valuable HUMINT asset (Oleg Penkovsky being the most famous). Besides these remarkable IMINT breakthroughs, the intelligence community made major advances in SIGINT and MASINT capabilities.28 From 1950 to 1970, Americas intelligence analysts went from a state of near blindness with respect to the USSR to something approaching 20/20 vision on at least selected aspects of Soviet society, especially weapons capabilities and numbers. During the next two decades, the progress continued. Imagery cameras gained sharper resolution and ex| 190 |
ibility, incorporating color lm and stereoscopic lenses and radar and infrared capabilities; SIGINT ears grew ever larger, more sensitive, and ubiquitous; MASINT sensors were rened; and Americas stable of HUMINT assets expanded (although most proved ineffectual). The Kremlins military intentions, political machinations, and economic strategies remained murkier than its weaponry, although even these mysteries became less opaque as analysts gained experience. Many of this nations intelligence accomplishments must remain classied to protect methods that may be useful again. One success story disclosed by the Aspin-Brown commission in 1996 was the discovery that North Korea was planning to construct a nuclear weapons capability. U.S. intelligence also tracked the clandestine efforts of several countries to acquire weapons of mass destruction and delivery systems. In some cases, this information provided the basis for diplomatic actions by the United States and the United Nations to counter this proliferation. American intelligence also has helped other countries identify and arrest several notorious terrorists, including Carlos the Jackal in Sudan, the alleged ringleader of the World Trade Center bombing in the Philippines, the head of the Shining Path terrorist group in Peru, and those involved in the bombing of Pan Am 103.29 Intelligence analysts have alerted this nations leaders to a vast number of events abroad of importance to the interests of the United States. Armed with these early warnings, policymakers have been able to make decisions with the greater degree of condence that comes with knowing all the facts of a situation. From time to time these decisions have been awed, of course, like the human beings who made them. But often the errors have occurred not so much from failures of intelligence collection or analysis as from the policymakers unwillingness to accept the facts and judgments of the intelligence experts. It is during the nal stage of the intelligence cycle, known as dissemination, that the analyst faces his or her greatest obstacle. Dissemination and the Paradox of Rejection American intelligence holds a central paradox: the nation spends some $26 billion to $30 billion a year to gather and analyze information deemed useful to policymakers, only to nd that often it is never used.
| 191 |
How can policymakers spend so much money to acquire all this information and then ignore it? The reasons vary and begin at the starting point of the intelligence cycle, when policymakers have the chance to tell the DCI and other intelligence managers exactly what kinds of information they need. If they do not and the secret agencies are forced to guess what the policymakers want, the information that they receive may not be what they expected. Sometimes policymakers simply refuse to hear the truththe wellknown problem of speaking truth to power.30 President Lyndon B. Johnson rejected the CIAs reports on Vietnam when they failed to match his hopes for a quick victory. More recently, a well-regarded former director of the DCI Nonproliferation Center, Gordon Oehler, claimed that the Clinton administration disliked inconvenient intelligence on nuclear weapons, choosing to disregard facts that failed to t a pre-conceived view of what the world ought to look like.31
The Limits of Time and Understanding
The importance of a close relationship between intelligence producers and consumers seems so patently obvious that one must wonder why the policymakers are AWOL at the crucial starting point. Time constraints and a lack of awareness are central explanations. Many in high ofce nd themselves too harried to block out time for meetings with intelligence ofcials. Others lack an understanding about how the secret agencies can help them with their specic information needs. Moreover, sometimes policymakers convince themselves that they can nd all the intelligence they need in the nations major newspapers, along with their own informal contacts in Washington and abroad.
Ideology
Ideology frequently is the reason for disregarding intelligence. The Aspin-Brown commission heard this comment from a former NIO, echoed by many other intelligence ofcers: Intelligence is of use to decision makers primarily when it accords with their own views.32 Accordingly, analytic reports from the intelligence agencies that question the policymakers basic convictions or previous public pronouncements may be dismissed out of hand. This form of self-delusion has been widely reported by historians. During World War II, Joseph Stalin embraced
| 192 |
Nazi Germany in a nonaggression pact and subsequently rejected the counsel of his advisers who warned that Russia was about to be attacked by its erstwhile ally. During the Vietnam War, President Johnson escalated his rhetoric in favor of defending South Vietnam and thereafter dismissed all judgments of the CIA that the United States was engaged in an unwinnable war of attrition. More recently, CIA ofcers charged Vice President Al Gore with casting aside in 1995 conclusive intelligence on the personal corruption of his counterpart and professional friend in Russia, Prime Minister Viktor S. Chernomyrdin. According to several intelligence ofcials, the vice president reportedly sent the analysis back to Langley with a barnyard epithet scrawled across its cover.33 Policymakers are like surgeons, a member of the Aspin-Brown commission pointed out. They dont last long if they ignore what they see when they cut an issue open.34
Relevance
Sometimes policymakers discount intelligence information because they have been disappointed in it in the past, or perhaps the analyst delivered a report too late for it to matter any longer. Relevance is the word one hears most often in speaking with policymakers about their intelligence needs. We publish too much intelligence of questionable relevance to policymakers, longtime CIA analyst Robert Gates admitted during his DCI conrmation hearings. It thus is essential that the secret agencies provide useful informationwhat the professionals call value added beyond what the policymaker can nd in the daily media and weekly news periodicals. The evidence is strong that the secret agencies have passed this test on numerous occasions, particularly on technical matters (such as Soviet weapons development), transnational issues (terrorism and arms trade), and a range of diplomatic initiatives.35 Public sources are often better, though, on political reporting. Moreover, newspapers and magazines have the advantage of a more readable style and better atmospherics (more vivid details of some events).
Format
The form of intelligence reporting is important. If the intelligence product is not two pages or less, an assistant secretary of defense told the Aspin-Brown commission, it is unlikely to be read. I have only
| 193 |
about ve minutes that I can devote [each day] to reading intelligence.36 He obviously preferred what is known in intelligence circles as current intelligence, brief memoranda on key issues of importance to his daily agenda. But some senior ofcials prefer to read a longer analysis. This is true even of busy cabinet secretaries. Les Aspin and Harold Brown of the Defense Department serve as examples.37 Even though most senior ofcials prefer two-page intelligence reports, their aides may appreciate the more thorough analysis offered in deeper research intelligence. Commented a cabinet aide: No one reads an encyclopedia from A to Z, but it is still helpful to have encyclopedias.38 The secret agencies have therefore crafted a range of written products, from fax and interactive e-mail intelligence over secure lines to in brief spot intelligence reports of paragraph length andthe analysts research showcasethe omnibus NIEs. The challenge is to nd which format works best for each ofcial, which is more difcult than it seems, because the policymaker may not take the time to sample these menu offerings or express a preference to intelligence managers. At times the answer may be none of the above. As one intelligence scholar noted, Some policymakers dont read, some wont read, and some cant read.39 They thus may seek oral briengs rather than written reports. Accordingly, the intelligence community has trained a cadre of oral briefers, from those who travel to the Oval Ofce at the request of the president to those who meet with a cabinet member or an aide the rst thing each morning, sometimes in the limo on the way to work.
Marketing
The intelligence cycle ends with the job of marketing. Ideally, the policymaker retrieves the desired intelligence product from a secure computer terminal linked to the analysts workstation. More commonly, the intelligence agencies use attractive visual presentations of information in hopes of catching the policymakers attention: fascinating IMINT photographs, detailed maps in four colors, catchy sidebars, time lines, succinct proles of foreign personalities, boxed quotations from foreign leaders, and many other techniques normally associated with glossy magazine publishing. The agencies even produce intelligence videotapes and CD-ROMs, for those (like President Reagan) who prefer watching
| 194 |
movies to reading reports. Once again, the idea is to meet the needs of the consumer as far as possible without destroying the credibility of the substance. Improving the Quality of Analysis How can analysis be improved in this new world since the end of the cold war? First, the intelligence cycle must keep the needs of the individual policymakers foremost in mind; that is, intelligence must be consumer driven. Only if the collector and the analyst know exactly what information a decision maker needs will the secret agencies be able to provide assistance that is both timely and relevant. The wise intelligence ofcer is responsive both to what the policymaker thinks he or she needs to know and what the intelligence ofcer believes the policymaker really needs to know. Second, the intelligence community must present evidence to policymakers that is as objective as possible.
opportunity to gather with a group of analysts from time to time. One innovative ofcial in the Bush administration established an ad hoc study group that became known as the East Asian Informals, various collectors, analysts, and policymakers discussing that region of the world. Whatever the desired format for tasking intelligence ofcers or receiving their product, it must be decided by the consumer. And some consumers may want no help at all from the intelligence community. The Dependence of Analysis on Reliable Data The intelligence community must use its expertise to decide which int is most promising for a particular assignment. The starting point should be a greater emphasis on using open sources before turning to clandestine sources of information. At the beginning of the 1990s, intelligence managers set up a Community Open Source Program Ofce (COSPO) inside the CIAs Directorate for Science and Technology. Its purpose was to coordinate the communitys collection, processing, and dissemination of open-source information. In turn, COSPO created the Open Source Information System (OSIS), a computer network that uses the Internet to give analysts and policymakers access to worldwide public information. Nonetheless, the intelligence community has slipped behind the sharply rising curve of modern information management, and one expert on opensource intelligence has concluded that even COSPO is dead in the water, has become a victim of inattention.41 Enriching the computer hardware and software inside the secret agencies is only one way of improving the access of analysts to open materials. In addition, the intelligence community must offer more open conferences on international topics, with both inside and outside experts on world affairs. The National Intelligence Council should have each of its NIEs vetted by an outside panel of scholars known for their expertise and objectivity. Then if the two groups come to different conclusions, the presidential and congressional oversight panels should take a close look at the reasons for the disagreement. One of Americas most important resources is its knowledge base, an asset that needs to be more effectively used in the governments foreign policy deliberations. The intelligence community should draw
| 196 |
up a list of respected experts willing to contribute their education and experience to an interpretation of international events. The idea of an external review for intelligence products raises the broader question of whether intelligence assessments might well be conducted completely outside the intelligence community, perhaps in a National Intelligence Councillike entity affiliated with the National Security Council or perhaps by an independent think tank. At a minimum, the current National Intelligence Council should be located away from the CIA, where it is now. A good location would be near the White House where it once stood (on E Street near the Old Executive Office Building), situated closer to the policymakers it serves and away from possible domination by analysts at the CIA. But not everyone likes the idea of moving the National Intelligence Council out of the CIA.42 Some analysts believe that then it would be too close to the policymakers, and the alternative of lodging the National Intelligence Council in a think tank would take it too far from the often useful clandestine resources of the intelligence community. Others have more practical, and perhaps more compelling (if prosaic), arguments: the CIA has more parking places at Langley, and, besides, purchasing an old building in D.C. would be expensiveand they are riddled with asbestos. So much for lofty rationales for deciding how best to conduct the affairs of state! The idea of placing the NIC downtown (though still within the intelligence communitys organizational framework) continues to have appeal, however, and was endorsed by the Aspin-Brown commission. This would make the NICor, in the commissions Anglophile terminology, a new National Assessment Center (NAC)more independent from the secret agencies and, therefore, possibly more attractive to outstanding academic scholars concerned about the potential stigma associated with working inside the walls of the CIA. A relocated NIC would continue to have constant access to the extensive analytic resources of the CIAs Directorate of Intelligence, by means of secure electronic linkages and frequent conferencing (at the CIA, where there is a place to park). In sum, the most important requirement for effective intelligence in this new world is niche analysis. The analyst must design the intelligence product to suit the informationalthough certainly not the politicalneeds of the consumer.43 Without this quality, personnel in the
| 197 |
secret agencies can retire and spend their time fishing; they are no longer needed. How can this laudable goal be achieved? Understanding what the policymaker wantsthats the key to the intelligence business, a seasoned intelligence manager asserts.44 In turn, that means having an intelligence officer close to the policymaker. The key, advises a former ambassador, still is getting close enough to the individual policymaker to find out what he needs.45 The greatest successes seem to be associated with having an analyst or a liaison officer in the next room, or at least not too far down the corridor, or traveling with the policymaker abroad, sitting in on staff meetings, or providing a daily briefing. If the intelligence product offers a crisp response to the main issues on a policymakers desk at that moment, it will not only be read; it will be devoured.
| 198 |
NINE
watch on one another. In his most famous dictum, Ambition must be made to counteract ambition.1 This concern about the dangers of concentrated power was widespread in the new republic. Jefferson scoffed at the notion that loyal citizens should exhibit an obsequious condence in their leaders; instead, he recommended vigilance over those serving in high ofce. Condence is everywhere the parent of despotism, he warned. In questions of power, then, let no more be heard of condence in man, but bind him down from mischief by the chains of the Constitution.2 The preeminent link in these chains was the Constitutions rst article, which enumerated the powers of Congress and made it clear that legislators would have a major role to play in the exercise of the war, treaty, and spending powers, along with an opportunity to impeach an executive or judicial ofcial who violated the public trust. Contemporary political scientists have refashioned this idea as separated institutions sharing powers as a more accurate portrayal of the day-to-day reality of how the Constitution operates in practice.3 This idea of power sharing was endorsed in modern times by Supreme Court Justice Louis Brandeis, who reminded a new century of Americans that the founders had sought not to promote efciency but to preclude the exercise of arbitrary power. The purpose was not to avoid friction, but, by means of the inevitable friction incident to the distribution of the governmental powers among three departments, to save the people from autocracy.4 The governing arrangements envisioned by the founders have never worked perfectly. Institutional struggles over the war and the treaty powers have been particularly heated. Sometimes the powers of the president have expanded to alarming proportions, as when Abraham Lincoln assumed the status of an autocrat during the early phases of the Civil War, when Andrew Johnson acted capriciously during Reconstruction, when Lyndon B. Johnson escalated the war in Vietnam without a meaningful congressional debate, and when Richard M. Nixon helped cover up a White House espionage operation against the opposition party (the Watergate scandal). On other occasions, the powers of Congress have grown too large, as when Joseph R. McCarthy (R, Wisconsin) grossly misused the Senates investigative powers to harass the Truman and Eisenhower administra| 200 |
tions and scores of private citizens. Sometimes the judiciary has overreached, as in 1936 when Justice George Sutherland issued sweeping dicta in favor of expanded presidential powers in foreign affairs.5 For the most part, though, the government has abided by the founding principle of power sharing, though its precise form has always been dependent on the personalities and conditions of the times. Some personalities have been expansive in the interpretation of their ofces inherent constitutional powers (compare Franklin D. Roosevelt with the more passive William Howard Taft). Some events have compelled a greater concentration of power in the hands of the executive, in times of emergency and for the sake of secrecy and swift action. The Depression, World War II, and the cold war have been the major centralizing forces of the modern era that encouraged an aggrandizement of power by the executive branch. Yet almost always (the Civil War excepted), dialogue and accommodation have mollied disputes among the departments of government. Presidents Andrew Johnson and Bill Clinton barely escaped removal from ofce through the impeachment procedure, and President Richard Nixon resigned rather than face almost certain removal. Usually, though, those in high ofce have been willing to display (however begrudgingly) a spirit of comity on which power sharing depends. Always at the heart of these governing arrangements is the principle of checks against power imbalances, that is, accountability, except for one domain of government that has always stood out as a conspicuous exception to the rule. Throughout most of their history, the nations intelligence agencies have enjoyed immunity from close oversight by outside supervisors.
A former director of Central Intelligence, James R. Schlesinger, remembered a meeting he had in 1973 with John Stennis (D, Mississippi), chair of the subcommittee dealing with intelligence on behalf of the Senate Armed Services Committee. I went up to the Hill and said, Mr. Chairman, I want to tell you about some of our programs. To which the Senator quickly replied: No, no, my boy, dont tell me. Just go ahead and do itbut I dont want to know!8 With little scrutiny, the leaders of the Armed Services Committees in both chambers quietly allocated funds for the secret agencies into the Defense Departments annual appropriations bill. Nor did the Executive Ofce of the President offer reliable accountability for the intelligence establishment. Key members of the National Security Council rarelyin some cases, nevereven laid eyes on the intelligence budget. I never saw a budget of the CIA, although I was a statutory member of the National Security Council, Dean Rusk once said, looking back over his long tenure as secretary of state during the Kennedy and Johnson administrations.
The CIAs budget apparently went to two or three specially cleared people in the Bureau of the Budget, then run briey by the president, turned over to Senator [Richard] Russell [D, Georgia], and that was the end of it. He would lose the CIA budget in the Defense budget and he wouldnt let anybody question it. There were no public hearings on it. So again his judgment, his word on that, was the last word.9
Many of the CIAs activities (including aggressive covert action, collection, and counterintelligence operations) never received a thorough examinationor, in some cases, even approvalby the National Security Council.10 When the council did endorse a covert action proposal, the decision process became slippery, according to Clark Clifford, an adviser to several presidents from Truman onward.
I believe on a number of occasions a plan for covert action has been presented to the NSC and authority is requested for the CIA to proceed from point A to point B. The authority will be given and the action will be launched. When point B is reached, the persons in charge feel it is necessary to go point C, and they assume that the original authorization gives them such a right. From point C, they go to D and possibly E, and even further. This has led to some bizarre results, and when an investigation is | 202 |
Balancing Liberty and Security started the excuse is blandly presented that authority was obtained from the NSC before the project was launched.11
Mindful of the need for closer supervision of the intelligence community, a few members of Congress attempted from time to time to devise new controls (particularly in the wake of intelligence aps such as the Bay of Pigs and the CIAs inltration of the National Student Association). But these initiatives were always defeated, as a majority of legislators remained content to abide by the rule of exception for intelligence activities, persuaded by the argument that the nations secret operations were too delicate for oversight and wary of consenting to operations that might prove embarrassing. Nonetheless, some of the oversight proposals were modest efforts to strengthen the review of intelligence programs, and had they been adopted, they might have helped avoid later scandals. Other proposals were more extreme, including onethe Abourezk amendmentdesigned to abolish all covert actions, regardless of type or circumstance.12 Whatever the merits of the various oversight initiatives, Congress proved unwilling to extend the doctrine of power sharing to the darker recesses of American government. In December 1974, however, this attitude changed abruptly. In a series of articles, reporter Seymour M. Hersh of the New York Times disclosed that the CIA had spied on American citizens during the Vietnam War and had also attempted to topple the constitutionally elected president of Chile (Salvador Allende). Although Congress might have ignored the revelations about covert action in Chile as just another necessary chapter in the cold war against Soviet interference in the developing world, spying on American citizenstheir constituentswas an allegation they found difcult to dismiss. Both the executive and legislative branches immediately launched investigations, in what became known as the Year of Intelligence (or the Intelligence Wars, in the embittered view of some CIA ofcials).13 During these inquiries in 1975, a parade of horrors emerged, everything from murder plots against foreign leaders to widespread espionage operations against American citizens whose only crime had been to protest the war in Vietnam or join the civil rights movement. The Ford administration revived the Presidents Foreign Intelligence Advisory
| 203 |
Board and created the Intelligence Oversight Board, both part of the Executive Ofce of the Presidency and now expected to monitor the secret agencies on behalf of the chief executive. By executive order, President Gerald R. Ford banned assassination plots and tightened CIA and National Security Council approval procedures for the use of covert action. His successor, Jimmy Carter, further codied and strengthened the councils accountability for intelligence activities by means of another executive order and supporting directives. The zeal for reform was most evident on Capitol Hill. Indeed, President Fords initiatives were widely considered more an attempt to preempt congressional action than bold steps to rein in the secret agencies. On the last day of the legislative session in 1974, Congress enacted the rst-ever statute to place controls on the use of covert action. The landmark Hughes-Ryan amendment made two far-reaching changes: rst, before a covert action could be carried out, the president would have to authorize the operation through a special approval called a nding, and second, the nding would have to be reported to the appropriate committees of Congress in a timely fashion, thereby alerting legislative overseers that a covert action had been authorized by the White House.14 With the enactment of this law, a few legislators were allowed into the small group of people told about covert actions, the witting circle, in spytalk. Legislators stopped short of granting themselves authority to approve or disapprove covert actions, but at least they would have an opportunity to know about them and (by implication) to voice their objections or, at the extreme, even shut off funding for a proposal if they strongly opposed it. By the spring of 1976, senators had established a permanent committee on intelligence oversight, named the Senate Select Committee on Intelligence (SSCI, pronounced sissy by everyone except its members and staff, which they would sometimes prove to be) and given a mandate to provide a close accounting of intelligence budgets and day-to-day operations. The next year the House followed suit, establishing the House Permanent Select Committee on Intelligence (HPSCI, pronounced hipsee) with largely comparable duties and expectations. Since then, this congressional experiment in power sharing has evolved in ts and starts. Sometimes legislators have tightened the reins, most notably with passage of the Intelligence Oversight Act of 1980, the
| 204 |
Boland amendments to curtail covert action in Nicaragua during the Reagan administration, the Intelligence Oversight Act of 1991, and, in the same year (both responses to the Iran-contra scandal), the creation of a CIA inspector general conrmed by and accountable to Congress. At other times, legislators have loosened the reins when they proved to be too restrictive, as in 1985 with the repeal of the legislation prohibiting covert action in Angola and the buckling under of legislators to President George Bushs insistence on greater presidential discretion over reporting to the Congress on covert actions. On still other occasions, Congress has helped the intelligence agencies shelter their legitimate activities, as with the passage of an Intelligence Identities Protection Act in 1982 to prohibit the exposure of undercover intelligence ofcials through the publication of their names. While the pulling and tugging continued, one conclusion was without dispute: at last the secret agencies had become a part of Americas system of shared powers.
maintains, rather than hold them to high standards of accountability. In regard to accountability from outside the government, she nds the nations media equally feckless. While much of Olmsteds criticism of legislative oversight is compelling, she too easily discounts the improvements that have come about as a result of the investigations in 1975. She (and Helms) is wrong: it is not the number of laws or their level of detail that matters so much but, rather, the day-to-day monitoring of the secret agencies by legislators and their staff. By this measure, the creation of the two intelligence oversight committees has led to a much closer check on Americas secret government than existed earlier. Moreover, the oversight laws that have been passed should not be so easily discounted, especially their reporting requirements. The Intelligence Oversight Act of 1980 considerably enhanced accountability. It included a provision for advanced notice to Congress of every important covert operation (not just covert actions). Signicant, too, are the Foreign Intelligence Surveillance Act (FISA) of 1978, which brought the judiciary into the ambit of intelligence oversight by requiring a special court review of requests for national security wiretaps; and the Intelligence Oversight Act of 1991, which insists on a prior, written presidential nding for important covert actions, not ex post facto oral approval, as once given by President Reagan.17 These initiatives are not shadows on the wall but, like the new inspector general statute, tough laws that have given genuine meaning to intelligence accountability. This is particularly evident when compared with the statutory void that existed before passage of the Hughes-Ryan Act. The media also deserve more credit than Olmsted gives them. Clearly, a number of American reporters erred in the past when they accepted secret stipends from the CIA for intelligence work, blurring the line between independent journalism and espionage.18 Moreover, reporting on intelligence matters has often been supercial (Olmsteds central point). Yet the reason for the thin coverage warrants some empathy. The secret agencies are enclosed by both real and gurative walls, just as daunting for journalists as for scholars and other outsiders. Expectations that the media will be able to break down these walls with any frequency is unrealistic, nor would most American citizens want the nations secrets so easily breached.
| 206 |
Furthermore, the media have occasionally behaved in a manner that has been not so much deferential as irresponsible. Columnist Jack Anderson had his moments of commendable reporting in the public interest, but his disclosure of Operation Guppy (U.S. wiretapping of Soviet limousines in Moscow) and the Glomar Explorer story (when the CIA attempted to salvage a sunken Soviet submarine) undermined two potentially valuable intelligence-collection operations.19 Several members of the media with access to these stories prudently decided against printing them, on grounds that the best interests of the United States might be harmed. There are timeshowever fewwhen the media should restrain itself in the national interest. In Olmsteds view, the secret agencies clearly emerged the winners of their long battle with the investigators [in 1975], for the inquiries resulted only in restoring the CIAs credibility. Yet consider the whole new set of arrangements for closer intelligence supervision on Capitol Hill, including the establishment of SSCI and HPSCI by lopsided votes (the White House and the intelligence community lobbied vigorously against them). The two committees enjoy line-by-line budget authorization, competent staffs, subpoena powers, and a mandate to prevent further abuses. Consider, too, the exposs of assassination plots, domestic spying, covert action in Chile, and drug experimentation. The intelligence agencies were hardly winners in 1975. True, the CIA was not dismantled, as some feared (including then DCI William Colby). The end result, though, was nonetheless a signicant tightening of legislative supervision over the secret agencies. As for restoring the CIAs credibility (which Olmsted seems to view as a dubious outcome), it was never the intention of the Church committee to undermine the intelligence agencies ability to perform their legitimate work. Rather, Senator Frank Church hoped to improve U.S. intelligence by rooting out its rotten branches. Churchs only major speech during the inquiry praised the CIA for its analytic skills and solid reporting to policymakers over the years.20 His purpose was to extol the virtues of intelligence (he himself had served as an intelligence ofcer during World War II), renewing its legitimacy even as he criticized its excesses. Olmsted ends her study with an important question about the evolution of intelligence oversight in the United States: Have the legislative
| 207 |
committees caved in to the very agencies they were created to supervise? Once more she discerns a pattern of deference toward the secret agencies by their overseers, citing as an illustration a journalists observation that within a decade after 1975, the House Intelligence Committee was staffed largely by former CIA ofcers. From time to time, the two oversight committees have disappointed outside advocates of strong accountability, but at other times they have also demonstrated rm resolve, depending on the mix of members and how seriously they have taken their oversight responsibilities. Representative Edward P. Boland (D, Massachusetts) stood up to the covert action chicanery in Nicaragua directed by the National Security Council staff during the Reagan years, as did Iran-contra congressional investigators in 1987. And throughout 199596, both intelligence committees engaged in a wide-ranging, constructive review of intelligence reform proposals. For a brief moment, Olmsted concludes, [congressional investigators] forced the nation to debate the perils of secrecy in a democracy. On the contrary, this has been an energetic and ongoing debate, continuing through the Carter years and heating up during the Reagan and Bush administrations with the Iran-contra affair. It was revived again during the Clinton years with the report of the Aspin-Brown commission in 1996, along with concomitant efforts by Congress and scholars in the private sector to ponder intelligence reform. How much intelligence is enough? What is the proper balance between liberty and security? When should legislators and the media be supportive or openly critical of sensitive intelligence operations? These are questions without denitive answers. Whereas Olmsted is dismayed by the lack of robust intelligence oversight, the second study takes quite the opposite view. Steven F. Knott is aghast that the overabundance of oversight has supposedly stifled Americas secret agencies. He reminds us that Washington, Jefferson, and Lincoln periodically resorted to unsavory covert practices. He derives from this history lesson a dubious conclusion, however, namely, that a reliance on executive discretion over intelligence activities served the nation well in the past and would in the future as well if only the Congress would step out of the way. According to Knott, intelligence operations frequently are delicate and perishable and rely on
| 208 |
secrecy, flexibility, timeliness, and efficiency, all of which are lost when Congress enters the picture. Knott is impressed by precedents set in the nations early history and understandably so, for the founders accomplishments are indeed impressive. His enthusiasm, though, goes too far. During the Watergate scandal, defenders of the Nixon administration insisted that the president had done nothing more than what earlier presidents had done. I do not share this view, properly responded a legislator during the impeachment proceedings against the president, or the view of those who hold that all presidents have lied, have broken the law, have compromised the Constitution. And if George Washington accepted bribes, it would not make bribery a virtue, nor would it be grounds for overlooking such acts by his successors.21 Similarly, the fact that earlier presidents engaged in intelligence operations without serious accountability should not condone the practice today. Knott is a fervent critic of the post-Watergate rebellion against the imperial presidency. He laments the myth of innocence that enveloped Frank Church and his band of reformers in Congress. Instead, he reminds Americans of how their most venerated early leaders were willing to engage in operations that today would send pantywaist legislators running into the press room crying foul. The most important reform that should be made to the current system, Knott writes, would be the elimination of the intelligence committees and the restoration of the system that existed from 1947 to 1974. In place of the congressional oversight committees, he would prefer a system of unfettered executive dominance. President Fords ludicrous executive order prohibiting the assassination of foreign leaders should, for instance, be immediately repealed. What disturbed legislators in 1975 was the extent to which many of the modern intelligence agencies had violated the law and their charters. Most legislators were shocked by the discovery of assassination plots; the creation of more than a million intelligence les on U.S. citizens; illegal mail openings, wiretaps, and cable interceptions; drug experiments against unsuspecting citizens; unlawful sequestering of chemical-biological materials; a White House spy plan against American citizens; an intelligence scheme to blackmail Dr. Martin Luther King Jr. and encourage his suicide; the CIAs inltration of this countrys media, universities, and church groups; the FBIs incitement of violence among African
| 209 |
Americans; covert harassment of Vietnam War dissenters and civil rights activists; and covert actions directed against not just autocracies but duly elected governments in democratic regimes. Throughout most of the republics history, secret operations remained small and peripheral. Now, however, our intelligence establishment has grown beyond the capacity of the president alone to monitor. The Congress must help. In Knotts opinion, however, this legislative supervision (micromanagement, in the preferred slight) has only stymied the secret agencies. Yet most of the intelligence directors since 1975 take a different view. They have welcomed the opportunity to share the burden of their heavy responsibilities with members of Congress. Moreover, no administration has sought to repeal the core set of laws and oversight procedures that currently guide intelligence activities. Legislators understand that this nation must continue to have, when needed, a viable covert action capability and one that can move swiftly. According to Knott, the new oversight has caused the CIA to shy away from this option, but in fact, covert action was most extensively used during the Reagan and Bush years, well after the reforms were in place.22 Knott does Congress a further disservice by blaming it for the unauthorized disclosure of classied information. Studies on the subject of leaks consistently trace most back to the executive branch.23 Knott also maintains that the oversight exercised by Congress from 1947 to 1974 was sufciently vigorous. Every other credible study disagrees.24 He then shifts from the improbable to the impossible: a defense of the relations between DCI William J. Casey of the Reagan administration and Congress. The fact is that Caseys standing on Capitol Hill reached rock bottom. He had nothing but disdain for the legislative branch and even managed to alienate the CIAs archdefenders in Congress (including the SSCI chair, Barry Goldwater, R, Arizona). The choice is not between executive or legislative sovereignty over intelligence. The challenge is to use the best attributes of both branches in the service of the nations security. Members of Congress have a strong sense of what the American people will support, plus a large amount of foreign policy expertise in their own right. Congress provides a second opinion, carefully tendered in the executive (closed) sessions of the oversight committees by a small group of legislators in each chamber. On
| 210 |
sensitive matters that can involve great cost and danger for the United States, a second opinion can be vital. During the Iran-contra investigation, Vice Admiral John M. Poindexter (President Reagans national security adviser) conceded that he had bypassed the intelligence committees in order to avoid outside interference25as if Congress were an outsider. Granted, in the intelligence domain, debate must often take place behind closed doors. The new system of oversight, though, provides an opportunity for at least some degree of independent review by elected representatives of the American people, beyond just the president and vice president. The alternative is covert operations by executive at. The unfortunate consequences of that approach, well documented by investigators in 1975 and again in the wake of the Iran-contra scandal, remain fresh in the memory of the attentive public.
entered into a new era of partnership in the conduct of intelligence activities. As a recent DCI put it, the CIA found itself equidistant between the two branches: responsible and accountable to both, unwilling to act at presidential request without clearance from Congress.26 Between 1986 and 1990, the number of CIA briefings to the congressional oversight committees, individual members, and staffers rose from a few hundred a year to 1,040 in 1986, 1,064 in 1987, 1,044 in 1988, 947 in 1989, 1,012 in 1990, and 1,000 in 1991.27 The number of written reports sent to Congress, most of them classified, has also sharply increased since 1986. In 1991 alone, 7,000 intelligence reports went to Capitol Hill.28 The frequency of contact between the CIA and Congress has accelerated since the cold war. In 1993, 1,512 meetings took place between members of Congress and the CIAs legislative liaison staff, along with 154 one-on-one or small-group meetings between legislators and the DCI; 26 congressional hearings with the DCI as a witness; 128 hearings with other CIA witnesses; 317 other contacts with legislators; and 887 meetings and contacts with legislative staff, a 29 percent increase over 1992. In 1993, the Agency provided 4,976 classied documents to legislators, along with 4,668 unclassied documents and 233 responses to constituency inquiries.29 In 1998, CIA ofcials briefed members or staffers on Capitol Hill on 1,350 occasions (about ve times each working day).30 Another sign of a more serious effort to monitor the CIA and keep American citizens informed of at least some of its activities was the series of hearings in Congress, held from 1991 to 1994, in which witnesses from the intelligence community testified in public, a rarity during the cold war. President Clintons first DCI, R. James Woolsey, appeared in eight open hearings in 1993, whereas in previous years even after the congressional investigations of 1975 and calls for greater opennessDCIs often never appeared in public hearings during an entire session of Congress or, if testifying, never more than once or twice a year. The result is that the Agency now has two masters: the president as well as Congress, and sometimes a third, as the courts increasingly adjudicate intelligence-related litigation and regularly examine requests for electronic-surveillance warrants against national-security targets.
| 212 |
Backsliding The degree of CIA openness should not be overstated, however. That Congress was still kept in the dark on key aspects of intelligence policy was underscored in 1994. Although the HPSCI had been briefed, SSCI members learned only through a chance audit that the National Reconnaissance Office (NRO) had engaged in cost overruns amounting to $159 million for its new headquarters in the Virginia countryside. Subsequent reports in 199596 revealed further that the NRO had accumulated a $4 billion slush fund of appropriations, without keeping Congress informed of its magnitude.31 R. James Woolsey produced a raft of documents purportedly showing that when he had been DCI, Congress had been briefed on the NRO budget nine different times. A CIA/Department of Defense inquiry subsequently indicated, however, that the NRO had presented this matter to legislators in piecemeal fashion that (to quote the report) left unclear the total project cost.32 However inadvertent the inadequacy of briefings may have been, the fact remained that the NRO had failed to keep Congress fully informed of its activities, as the spirit and the letter of the oversight laws intend. The fully informed standard means that intelligence officials must patiently reiterate their testimony to busy committee members and staff again and again, if necessary, with respect to any departure from normal practices (including cost overruns). Overseers have every right to this information.33 It was revealed in 1995 that another secret agency, this time the CIA, had also failed to report to Congress about dubious activities. The issue concerned the Agencys ties to a controversial military colonel in Guatemala, Julio Roberto Alpirez, who had been providing intelligence to the United States from time to time. The media suspected the officer of being involved in the murder of an American citizen in Guatemala and also in the death of a local guerrilla insurgent married to an American woman. Under the oversight rules, the CIA should have reviewed with the congressional oversight panels the propriety of an ongoing relationship with the colonel. Guatemalas most important lesson, concluded the New York Times, is that the C.I.A. cannot be trusted to police itself.34 Another, more recent case of an intelligence official who failed to
| 213 |
understand the concept of accountability is the chief of counterintelligence in the Energy Department. In 1999, he criticized the SSCI and HPSCI chairs for their vigorous inquiry into the spy scandal at the Los Alamos National Laboratory, complaining that he had to testify about this before fourteen different committees for two months.35 The Los Alamos spy incident, however, revealed a serious counterintelligence breach. If legislative overseers wish to hear from the CI chief in charge of the nations labs one or one hundred times, that is an important part of his job. As an experienced former intelligence officer explained, Dealing with the public is as much a function of intelligence these days as the recruiting of agents or the forecasting of future events.36 At least the Energy Departments CI chief avoided the even worse stance adopted by the Iran-contra bureaucrats. They either failed to inform Congress at all, or, the ultimate offense against accountability, they lied to legislators. Other ofcials in the Energy Department, though, did exhibit some of this regrettable behavior, despite the still-fresh memory of Iran-contra. In 1998, the department failed to le an annual report on the status of security at the nations labs, as required by Congress.37 Moreover, two of the departments senior ofcials, including its acting head of intelligence, withheld information on the Los Alamos scandal from the House Armed Services Subcommittee on Military Procurement, even under oath and in executive session.38 For some people, the lessons of Iran-contra seem easily forgotten (if they were ever learned). To my mind, to disclose as little as necessary to Congress, if they can get away with it, is not a bad thing, a former intelligence ofcer reportedly observed in 1991, referring to colleagues caught up in the Iran-contra affair. I have trouble myself blaming any of those guys.39 Similarly, the new NRO director concedes that the old ethic at his organizationwhich he vows he is determined to change was at best a grudging acceptance of congressional accountability. Legislators were considered pimples on the face of progress, he recalls. The attitude was: Were not going to tell you and you cant make us.40 Yet as a former SSCI staff member observed, the only hope for oversight to work depends ultimately on the honesty and completeness in what the members of the intelligence community tell their congressional overseers.41
| 214 |
During the Congresss Los Alamos inquiries in 1999, even DCI George Tenetformerly the SSCI staff director and well versed in the ethos of oversightrefused to provide information about the spy case to his former committee (evidently so ordered by the Department of Justice). The SSCI chairman, Senator Richard Shelby, was correct in asserting his committees right to have access to all information in unredacted form that pertains to our oversight responsibility.42 Without full access to information about all intelligence activities, the oversight committees would be unable to provide the institutional balance envisioned by the nations founders as a safeguard against the abuse of power. The evolution of reliable accountability for intelligence was dealt yet another blow at the beginning of the new century when it came to light in February 2000 that the CIA had never reported to the congressional oversight committees or the Justice Department evidence that implicated former DCI John Deutch in the improper handling of classied materials (while director, he took large amounts home to work on, thereby violating security procedures). There was no excuse for failing to report the impropriety, conceded Deutchs successor, George Tenet. It should have been done promptly, certainly by the spring of 1997.43 The intelligence communitys degree of openness and cooperation with legislative overseers, then, has been uneven since the institution of greater accountability in 1975. How well have other overseers, inside and outside the government, fared in their efforts to keep the secret agencies accountable? Oversight by the White House During the Reagan years, the intelligence community beneted from a close relationship with the White House, mainly because DCI Casey was a personal friend of the president and had served as his national campaign manager. Casey became the rst DCI accorded the largely honoric cabinet rank. Furthermore, Reagan was supportive of Caseys enthusiasm for covertly countering the worldwide inuence of the Soviet Union. But this free rein given to the intelligence community and the NSC staff led to the Iran-contra excesses. When former DCI George Bush became president, the CIA had the luxury of a chief executive who understood and appreciated intelligence as well as anyone who has
| 215 |
served in the nations highest ofce. Accordingly, President Bush was sympathetic to most of the funding requests from the secret agencies, though he did reduce the CIAs involvement in covert actions.44 The Clinton administration has been almost a polar opposite, with its relative inattentiveness to foreign policy (at least in the early years). Then, during the administrations rst signicant foreign policy crisis in Somalia, intelligence decienciesamong them, a failure to understand the intentions, or even the whereabouts, of tribal leader General Mohamed Farah Aideedraised doubts among White House ofcials about the effectiveness of the secret agencies. In 1994, President Clinton turned to a proposal advanced by his former secretary of defense, Les Aspin, Vice President Al Gore, and his national security adviser, Anthony Lake, to establish a presidential reform commission on intelligence, the presidents rst expression of interest in the direction that intelligence should take during his tenure. This was prompted not just by the events in Somalia; the CIAs failure to have forecast the fall of the Soviet Union, also produced widespread criticism in Washington. Some critics further excoriated the intelligence agencies for underestimating the nuclear weapons programs in Iraq and North Korea. Others simply argued that with the end of the cold war, America no longer needed a large intelligence establishment. In addition, its annual budget was an inviting target for budget cutters concerned about the spending decit.45 The nal straw was the discovery in 1994 of a highly placed Russian mole inside the CIA, Aldrich H. Ames. Although President Clinton understood that something had to be done, Senator John Warner (R, Virginia) had in mind something quite different. As chapter 6 discussed, he envisioned a legislative probe whose main objective would be to reassure the American people that the CIA was an effective organization and should be preserved, not abolished or even substantially downsized. The SSCI, of which Warner was a senior member, accepted his view and pushed for a congressional panel of inquiry, rather than what might have been a more probing executive branch inquiry with Aspin at the helm. The eventual compromise between the branches was a law passed in 1994 that created a joint presidential-congressional commission on the roles and capabilities of the U.S. intelligence community. It authorized
| 216 |
the president to select nine members, which he drew from the Presidents Foreign Intelligence Advisory Board (including its chair and subsequently the commissions chair, Les Aspin). Congressional leaders from both parties picked the remaining eight members, Senator Warner among them. The commission began its work in March 1995. When Aspin tragically died three months later, he was replaced by another former secretary of defense, Harold Brown (of the Carter administration). The report issued by the commission in March 1996 largely met Warners objective. Instead of recommending major reforms, the blueribbon panelthe rst signicant ofcial inquiry into intelligence policy in twenty yearsextolled the good work of the secret agencies, kept their budgets intact, offered a few modest suggestions for improvement, and disappeared as a footnote to history. The commissions boldest initiative was its attempt to help President Clintons second intelligence chief, John M. Deutch, expand his powers (see chapter 5). The panel recommended that the DCI have joint approvalalong with the relevant department secretariesover all intelligence agency directors. The commission further advocated greater DCI authority over communitywide budget decisions. The individual intelligence agencies (and especially the military ones) immediately laid siege to these proposals, however, drawing on the assistance of the armed services committees and other powerful allies in the Congress. The reform proposals largely collapsed. Interest Groups In 1975, a senior intelligence ofcer resigned from the CIA to establish the Association of Retired Intelligence Ofcers (ARIO).46 Its purpose was to lobby legislators and the American people on behalf of the secret agencies. Other pressure groups came into existence soon thereafter, some for and some against the intelligence community. For example, as the Pentagons budget began to shrink after the collapse of the Soviet Union, industrial manufacturers cast an eye toward the governments ongoing requirements for espionage hardwareespecially expensive satellitesto supplement dwindling contracts for tanks, ships, and aircrafts. Members of Congress in districts with weapons plantsand jobs
| 217 |
at riskwere solicited by the manufacturers for assistance in procuring intelligence-hardware deals, in the manner they once were used to obtain Department of Defense acquisitions and to forestall base closures. By the cold wars end, interest-group politics had entered the once relatively insulated domain of intelligence policy.47 With respect to the intelligence communitys own lobbying efforts on Capitol Hill, known in Washington euphemistically as legislative liaison, in the wake of the investigations of 1975, intelligence managers began to understand a lesson already well learned by the FBI and the Pentagon, namely, the importance of defending (read selling) ones programs on Capitol Hill and beyond. The Agencys Ofce of Congressional Affairs expanded from two staffers in 1974 to more than a dozen in 1994. The CIAs Ofce of General Counsel soared from two in 1974 to sixty-ve in 1994 (although most of these individuals were employed to administer the new accountability rules, and only a few were given lobbying tasks). Forced somewhat out into the open in 1974 by the New York Times allegations of improprieties, the CIA and the other secret agencies began to devote additional resources to their public defense, in the manner of most other government bureaucracies. Scholarly Inquiries The same forces that led to the creation of an intelligence commission in 1994 stirred various nongovernment groups to study intelligence reform, including panels at Georgetown University, the Council on Foreign Relations (CFR), and the Twentieth Century Fund. Perhaps the most controversial views expressed by the members of these outside panels came from the project director for the CFR report, who tried to turn back the clock on twenty years of bipartisan intelligence reform.48 He recommended the restoration of assassination plots; use of the Peace Corps as a cover for CIA officers abroad (which has never been done); permission for intelligence officers to pretend they are American journalists, academics, or clergy traveling overseas; and more aggressive participation in coups dtat against regimes deemed unfriendly to the United States, all of which had been rejected by every major government panel of inquiry from Church, Pike, and Rockefeller through Aspin-Brown.
| 218 |
With its subpoena powers, budget review, control of the intelligence purse strings, and a capacity to focus public attention by way of open hearings, the Congress remains the strongest potential overseer for intelligence. This potential rests, though, on the question of whether its members have the will to perform these duties, a mixed record so far. For the most part, intelligence accountability has rested on the shoulders of a few dedicated legislators and their staff aides. This limited scrutiny has led to gaps in legislative coverage of intelligence activities and sometimes an insufcient critical mass among legislators to focus the full committees attention on problems that could benet from more serious oversight. In 1996three years before the scandal over the alleged Chinese spying at Los Alamosthe two congressional intelligence committees were told about the possible theft of nuclear secrets from the lab but reportedly did nothing to strengthen counterintelligence at the site or at the other national laboratories.53 Even if the SSCI and HPSCI members spent more time on their oversight duties, they could never hope to monitor, or even understand, all the complexities of U.S. intelligence. Furthermore, the secret agencies will sometimes ignore the oversight guidance provided by Congress, no matter how good the counsel may be. In 1988, for instance, the General Accounting Ofce (GAO, an investigative arm of Congress) found lax counterintelligence procedures at the nations weapons laboratories that allowed foreign visitors too easy access to data on Americas nuclear weapons. The GAO recommended appropriate corrective measures. Nine years later its investigators conducted a follow-up study, only to discover these security problems had grown much worse.54 Though certainly imperfect, accountability from Congress and other legitimate entities (like the Intelligence Oversight Board) remains important, if only for the selective examination of programs it provides; for the questioning of intelligence ofcers on enough things to keep people more honest; for its latent capacity to punish those who do violate their oath of ofce, if only by embarrassing them in the public light of investigative hearings; and for the guidance that overseers can give to bureaucrats about what the public expects from its intelligence agencies. As former DCI Robert Gates has observed, Some awfully crazy schemes might well have been approved had everyone present [in the White House] not known and expected hard questions, debate, and criticism
| 220 |
from the Hill. And when, on a few occasions, Congress was kept in the dark, and such schemes did proceed, it was nearly always to the lasting regret of the Presidents involved.55 The current DCI concurs. I dare say the CIA receives more oversight from the Congress than any other agency in the federal government, George Tenet stated. This is not a complaint. In fact, this oversight is our most vital and direct link to the American peoplea source of strength that separates us from all other countries of the world.56 The success of democracy will continue to depend on these checks, along with an equally indispensable ingredient, the attitudes of people in high ofce. One of the most thoughtful DCIs, the late William Colby, expressed a sense of optimism about the new era of intelligence accountability that came to pass on his watch.
With todays supervision, and with the command structure trying to keep things straight, the people in CIA know what they should do and what they should not doas distinct from the fties, in which there were no particular rules. If CIA people today are told to violate their limits, or if they are tempted to violate those limits, one of the junior ofcers will surely raise that question and tell the command structure, and, if not satised there, he will tell the Congress, and, if not satised there, he will tell the press, and that is the way you control it.57
The Iran-contra scandal erupted not long after these words were recorded, reminding the nation how important a personal commitment to law and integrity is to those who govern. A cause for celebration in Americas experiment with intelligence accountability is the fact that the overwhelming majority of those who serve in the intelligence agencies are men and women of enormous talent and integrity, among the best anywhere in public service or in the private sector. Jeffersons eternal vigilance will remain necessary, though, because inevitably in any organization, a few will lack honor. They will dismiss the rule of law, the philosophy of power sharing, and the principle of accountability. Scholars and practitioners are likely to carry on the debate about the proper degree of supervision over the hidden side of Americas government. Proponents of meaningful accountability will cite Madison, Jefferson, and Brandeis; opponents, Jefferson again (this time his unchecked
| 221 |
use of covert action in simpler days), the Curtiss-Wright case, and the Machiavellian perspectives of Admiral John Poindexters testimony during the Iran-contra hearings. Proponents will warn of Big Brother intrusion at home and against tampering with democratic regimes abroad; opponents will point to the paralysis that accompanies legislative micromanagement, and the foolishness of turning the CIA into a nunnery. The champions of oversight want reliable safeguards to preserve liberty; its critics seek more effective secret operations to shield the United States from enemies at home and abroad. The rub comes from this obvious conclusion: the nation wants and deserves both civil liberties and a shield against foreign dangers. So the search continues to find the right formula for power sharing in this most difficult of government domainsknowing full well that no formula exists, only the hope that in a spirit of comity, the Congress, the executive, and the courts will carry on the quest for a modus vivendi that takes into account liberty and security.
| 222 |
APPENDIX
Appendix
| 224 |
NOTES
Notes to Chapter 1
1. Robert M. Gates, remarks at the Conference on U.S. Intelligence, Langley, VA, June 11, 1984, and, while serving as director of Central Intelligence, remarks to the Economic Club of Detroit, April 13, 1992. | 225 |
Notes to Chapter 1 2. Robert M. Gates, In War, Mistakes Happen, New York Times, May 12, 1999, A27. 3. Loch K. Johnson, Reinventing the CIA: Strategic Intelligence and the End of the Cold War, in Randall B. Ripley and James M. Lindsay, eds., U.S. Foreign Policy after the Cold War (Pittsburgh: University of Pittsburgh Press, 1997), 152. 4. See Abraham H. Maslow, Motivation and Personality (New York: Harper & Row, 1987). 5. Anthony Lake, Managing Complexity in U.S. Foreign Policy (Washington, DC: U.S. Department of State, Bureau of Public Affairs, March 14, 1978), 1. 6. U.S. Department of State, Bureau of Public Affairs, Fundamentals of U.S. Foreign Policy (Washington, DC: U.S. Department of State, Bureau of Public Affairs, March 1988), 1. 7. Joseph S. Nye Jr., Redening National Security, Foreign Affairs 78 (July/August 1999): 35. 8. See Michael Mastanduno, Economics and Security in Statecraft and Scholarship, International Organization 4 (Autumn 1998): 82554. 9. Samuel P. Huntington, The Erosion of American National Interests, Foreign Affairs 76 (September/October 1997): 2849. 10. Mickey Kantor, quoted in Cool Winds from the White House, Economist, March 27, 1993, 58. 11. R. James Woolsey, World Threat Assessment Brief, Statement for the record, Hearings, U.S. Senate Select Committee on Intelligence, 104th Cong., 1st sess., January 10, 1995, 8. 12. Daniel Williams and John M. Goshko, Reduced U.S. World Role Outlined but Soon Altered, Washington Post, May 26, 1993, A1. 13. Louis Freeh, Economic Espionage, testimony, Hearings, U.S. Senate Select Committee on Intelligence, 104th Cong., 2d sess., February 28, 1996. 14. Pietro S. Nivola, American Trade Policy after the Cold War, in Ripley and Lindsay, U.S. Foreign Policy after the Cold War, 249. 15. Ibid., 254. 16. See, for example, Jeffrey E. Garten, A Cold Peace: America, Japan, Germany, and the Struggle for Supremacy (New York: Times Books, 1992); and Edward N. Luttwak, The Endangered American Dream (New York: Simon & Schuster, 1993). 17. Thomas L. Friedman, A Manifesto for the Fast World, New York Times Magazine, March 28, 1999, 43. 18. The usual precedence of military over economic matters can also be seen in Americas reaction to the theft by foreigners of U.S. military and economic se| 226 |
Notes to Chapter 1 crets. Discovery of the former stirs an outrage, as when Jonathan Pollard of the Ofce of Naval Intelligence passed highly classied military documents to Israeli intelligence in the 1980s and when a Chinese American scientist at the Los Alamos labs was thought to have provided the Chinese government with U.S. nuclear-weapons designs in the 1990s. Yet when French intelligence inltrated American aerospace rms, when Israeli intelligence penetrated Recon/Optical (an Illinois company that manufactures satellite cameras), and when South Korean intelligence targeted the acquisition of microwave technology used in the F-16 ghter, the American response was in each case little more than a slap on the wrist. See Duncan L. Clarke and Robert Johnston, Economic Espionage and Interallied Strategic Cooperation, Thunderbird International Business Review 40 (July/August 1998): 41331. The authors point out that nations involved in economic espionage against one another also seek mutual assistance with respect to such transnational threats as terrorism, nuclear proliferation, and organized crime; therefore, they are prepared to accept some level of economic spying directed against them, even by allies, in return for cooperation on these greater dangers of strategic security. 19. See the polling data in John E. Rielly, ed., American Public Opinion and U.S. Foreign Policy 1991 (Chicago: Chicago Council on Foreign Relations, 1991), 15; and John E. Rielly, Americans and the World: A Survey at Centurys End, Foreign Policy 114 (Spring 1999): 101. 20. Mary E. Wilson, Infectious Diseases: An Ecological Perspective, British Medical Journal, December 23, 1995, 168184. 21. C. R. Neu, national intelligence officer for economics, Comments on Economic Intelligence, Institute for International Economics, April 25, 1995, 5. 22. Nye, Redening National Security, 24. Scholars of international relations also use the dichotomy of high and low politics in reference to hard and soft power, respectively. 23. Anthony Lewis, When We Could Believe, New York Times, June 12, 1987, A31. 24. Michael Wines, Two Views of Inhumanity Split the World, Even in Victory, New York Times, June 13, 1999, sec. 4, p. 1. 25. See Craig R. Whitney, Fewer Bombs Fall on a Cloudy Day in Balkan Battle, New York Times, April 12, 1999, A10; David E. Rosenbaum, U.S. Ofcial Calls Tallies of Kosovo Slain Too Low, New York Times, April 19, 1999, A10; and David Stout, U.S. Photos Show Ground Work at Suspected Site of Mass Grave, New York Times, June 10, 1999, A18. 26. On the use of Jstars, see Edmund L. Andrews, Aboard Advanced Radar Flight, U.S. Watches Combat Zone, New York Times, June 14, 1999, A12. | 227 |
Notes to Chapter 1 27. Interview with an Apache pilot in Kosovo, National Public Radio, July 7, 1999. 28. George J. Tenet, quoted by Tim Weiner, U.S. Spy Agencies Find Scant Peril on Horizon, New York Times, January 29, 1998, A3. 29. Michael Wines, Straining to See the Real Russia, New York Times, May 2, 1999, sec. 4, p. 1. 30. George J. Tenet, statement, Hearings, U.S. Senate Armed Services Committee, 106th Cong., 1st sess., February 2, 1999, 2. 31. Indeed, ironically U.S. ofcials explicitly informed the Indian government about the timing of U.S. satellite coverage for South Asia in hopes of impressing on them the futility of trying to conceal test activity. But even without this unintended assistance, the Indians could no doubt have gured out the cycles for themselves. On the ease with which even amateurs can follow the orbits of U.S. spy satellites, see Vernon Loeb, Hobbyists Track Down Spies in Sky, Washington Post, February 20, 1999, A1. 32. Interviews with senior intelligence ofcials in the DCI Nonproliferation Center and the DCI Crime and Narcotics Center, Central Intelligence Agency, Langley, VA, June 14 and 15, 1999. According to the DCIs special assistant for nonproliferation, eight to ten nations are key proliferators, and another sixty to seventy warrant close watch for suspected activities in this area. On the North Korean missile threat, see James Risen, C.I.A. Sees a North Korean Missile Threat, New York Times, February 3, 1999, A6; and on attempts by the Russian maa and former KGB agents to sell guided missiles, plutonium for bombs, Semtex explosives, and other armaments, see Observer, September 11, 1994, 6. For an example of North Korean weapons sales abroad (including the 500-kilometer-range Scud-C missiles to Iran and Syria and the 1,000-kilometer-range Nodong 1 missile to Libya), see U.S., Russian Intelligence Agencies Offer Proliferation Assessments, Arms Control Today 23 (March 1993): 21. 33. Rielly, Americans and the World, 101. 34. The Chemical and Biological Warfare Threat, undated and without attribution (although with all the earmarks of a CIA publication and probably printed in 1995, the year it was distributed to various agencies and congressional committees in Washington, DC). 35. R. James Woolsey, testimony, Hearings, U.S. Senate Select Committee on Intelligence, 103d Cong., 2d sess., March 6, 1993. 36. Mary Anne Weaver, The Real bin Laden, New Yorker, January 24, 2000, 36. Weaver reports that the missiles hit facilities in the area belonging to Inter-Services Intelligence or ISI, the Pakistani intelligence agency, killing ve ofcers and twenty trainees and enraging the Pakistani government. | 228 |
Notes to Chapter 1 37. A still more embarrassing mistake as the twentieth century wound down was not in the proliferation eld but the awed targeting instructions supplied by the U.S. intelligence community that led to the NATO bombing of the Chinese embassy in Belgrade. This appalling error led comedian Jay Leno to suggest a new meaning for the acronym CIA: Cant Identify Anything. The accidental killing of ISI intelligence personnel in Pakistan (see the preceding note) was an equally serious error, though less visible to the general public. 38. The CIA continues to maintain it has solid evidence that Empta was in fact being made and that the plant in question had ties to the terrorist Osama bin Laden. The Agency refuses to provide proof to the public, however, on grounds that its modus operandi would be compromised for future operations (interviews with senior intelligence ofcers, Langley, VA, February 18 and June 15, 1999). Other government ofcials suggested to a reporter, however, that the plant was probably making nothing more dangerous than pharmaceuticals, Daniel Schorr, Washington Notebook, New Leader, May 1731, 1999, 5. 39. John Lauder, director, DCI Nonproliferation Center, comment at Oxford University, Oxford, September 26, 1999. 40. George J. Tenet, remarks at annual dinner, Nashua (NH) Chamber of Commerce, June 28, 1999, 5. 41. This statistic is derived from my interviews with senior intelligence ofcials, Central Intelligence Agency, June 14 and 15, 1999, and comments by the director of the DCI Nonproliferation Center. 42. Interview with Gates, Washington, DC, March 28, 1994. 43. See William E. Burrows and Robert Windrem, Critical Mass: The Dangerous Race for Superweapons in a Fragmentary World (New York: Simon & Schuster, 1994). 44. Judith Miller with William J. Broad, Iranians, Bioweapons in Mind, Lure Needy Ex-Soviet Scientists, New York Times, December 8, 1998, A1. 45. Special assistant to the DCI for nonproliferation, Worldwide WMD Threat, Statement for the Record, Commission to Assess the Organization of the Federal Government to Combat the Proliferation of Weapons of Mass Destruction, April 29, 1999, 2, 3. 46. According to a high-ranking former CIA ofcial, comment at Oxford University, Oxford, September 25, 1999. 47. Special assistant to the DCI for nonproliferation, Statement on the World Wide Biological Warfare Threat, Hearings, U.S. House Permanent Select Committee on Intelligence, 106th Cong., 1st sess., March 3, 1999, 4. 48. The Deutch commission on proliferation, quoted by Walter Pincus, U.S. Preparedness Faulted, Washington Post, July 9, 1999, A2. | 229 |
Notes to Chapter 1 49. David Johnston, Finding Spies Is the Easy Part, New York Times, May 23, 1999, E4. 50. Tim Weiner, Opponents Find That Ousting Hussein Is Easier Said Than Done, New York Times, November 16, 1998, A10; and Jane Perlez, Albright Says Husseins Foes Are Building Unied Front, New York Times, May 25, 1999, A4. 51. Interview with UN ofcials, New York City, May 26, 1999. 52. Interview at Central Intelligence Agency, Langley, VA June 15, 1999. 53. Comment at Oxford University, Oxford, September 25, 1999. 54. Interview with R. James Woolsey, Central Intelligence Agency, Langley, VA September 29, 1993. 55. Interview with the NPC director, Central Intelligence Agency, Langley, VA, July 8, 1993.
Notes to Chapter 2
1. Samuel D. Porteous, Looking out for Economic Interests: An Increased Role for Intelligence, Washington Quarterly 19 (1996): 192. 2. A survey of key policy agencies conducted by the Bush administration, to clarify the governments projected intelligence needs between 1991 and 2005, foreshadowed the rising interest in economic intelligence; National Security Council, National Security Review Directive no. 29 (Washington, DC: National Security Council, November 1991). 3. David M. Kennedy, Sunshine and Shadow: The CIA and the Soviet Economy, Case Program no. C16-91-1096.0, John F. Kennedy School of Government (Cambridge, MA: Harvard University, 1991), 2. 4. Kristen Lundberg, CIA and the Fall of the Soviet Empire: The Politics of Getting It Right, Case Program no. C16-94-1251.0, John F. Kennedy School of Government (Cambridge, MA: Harvard University, 1991). 5. See Commission on the Roles and Capabilities of the U.S. Intelligence Community, Preparing for the 21st Century: An Appraisal of U.S. Intelligence, Report (Washington, DC: U.S. Government Printing Ofce, March 1, 1996), 88 (hereafter cited as the Aspin-Brown commission). Intelligence community information derived from open sources and provided to private rms (usually through intermediaries like the Department of Commerce) is commonly referred to as business intelligence. 6. Harold Brown, comment at a public meeting of the Aspin-Brown commission, Washington, DC, January 19, 1996. 7. Statement provided to me by the DCIs Ofce of Congressional Affairs, Langley, VA, February 7, 1995. Robert M. Gatess and R. James Woolseys reaf| 230 |
Notes to Chapter 2 rmations may be found, respectively, in Gates, remarks to the Economic Club of Detroit, April 13, 1992, 9; Woolsey, The Future of Intelligence on the Global Frontier, address to the Executive Club of Chicago, November 19, 1993; Woolsey, testimony, U.S. Senate Select Committee on Intelligence, February 2, 1993. 8. Quoted by Gates in remark to the Economic Club of Detroit, 6. Hale said to the British, who were about to hang him for espionage in 1776, I only regret that I have but one life to lose for my country. 9. On the involvement of other nations in industrial espionage, see Mike Frost and Michel Gratton, Spyworld: Inside the Canadian and American Establishments (Toronto: Doubleday, 1994), 22427; American Institute for Business Research, Protecting Corporate Americas Secrets in the Global Economy (Washington, DC: American Institute for Business Research, 1992), 41, 45; Craig Whitney, German Finds That Spies Are Still Doing Business, New York Times, September 9, 1993, 1; and Randall M. Fort, Economic Espionage: Problems and Prospects, Consortium for the Study of Intelligence (Washington, DC: Georgetown University, 1993), 3. 10. See Stanseld Turner, Intelligence for a New World Order, Foreign Affairs 70 (Fall 1991): 15152. Then-chairman of the Senate Select Committee on Intelligence, David L. Boren (D, Oklahoma) endorsed this view as well; see his The Intelligence Community: How Crucial? Foreign Affairs 71 (Summer 1992): 58. In the early 1970s, the Presidents Foreign Intelligence Advisory Board (PFIAB) also advocated U.S. industrial espionage. See Maurice C. Ernst, Economic Intelligence in CIA, Studies in Intelligence 28 (Winter 1984): 122, reprinted in H. Bradford Westereld, ed., Inside CIAs Private World (New Haven, CT: Yale University Press, 1995). 11. Interviews with senior ofcials in the Departments of State and Commerce, June 24, 1999; see also John Maggs, From Swords to Plowshares, Journal of Commerce, August 18, 1995, 1. 12. Robert M. Gates, testimony, U.S. House Judiciary Committee, Subcommittee on Economic and Commercial Law, 102d Cong., 2d sess., April 29, 1992. 13. See the statistics in S.1556, 104th Cong., 2d sess., January 2, 1996, reported by Edwin Fraumann (an FBI official), Economic Espionage: Security Missions Redefined, Public Administration Review 57 (July/August 1997): 303. 14. The survey was published by the American Society for Industrial Security in 1996 and reported in John J. Fialka, Stealing the Spark: Why Economic Espionage Works in America, Washington Quarterly 19 (1996): 180. 15. U.S. House Select Committee on U.S. National Security and Military/ Commercial Concerns with the Peoples Republic of China, Report, 106th | 231 |
Notes to Chapter 2 Cong., 1st sess. (Washington, DC: U.S. Government Printing Ofce, May 1999). 16. Duncan L. Clarke and Robert Johnston, Economic Espionage and Interallied Strategic Cooperation, Thunderbird International Business Review 40 (July/August 1998): 415. 17. Fraumann, Economic Espionage: Security Missions Redened, 308. 18. Quoted in Votre Secrets, Monsieur? Security Management, October 1992, and cited by Merrill E. Whitney and James D. Gaisford, Economic Espionage as Strategic Trade Policy, Canadian Journal of Economics 29 (April 1996): 627. 19. Fort, Economic Espionage: Problems and Prospects; Fraumann, Economic Espionage: Security Missions Redened, 308. The Overseas Security Advising Agency at the Department of State also helps U.S. businesses with their security needs abroad. 20. Fraumann, Economic Espionage: Security Missions Redened, 306. 21. 18 U.S.C., secs. 183139. 22. Jeff Gerth and David E. Sanger, Citing Security, U.S. Spurns China on a Satellite Deal, New York Times, February 23, 1999, A1. The Clinton administration subsequently allowed the sale. 23. Gregory F. Treverton, Intelligence since Cold Wars End, in Report of the Twentieth Century Fund Task Force on the Future of U.S. Intelligence, In from the Cold (New York: Twentieth Century Fund Press, 1996), 115. 24. Woolsey, World Threat Assessment Brief, Statement for the record, Hearings, U.S. Senate Select Committee on Intelligence, 104th Cong., 1st sess., January 10, 1995, 9. 25. C. R. Neu, national intelligence ofcer for economics, Comments on Economic Intelligence (Washington, DC: Institute for International Economics, April 25, 1995), 2. 26. On this hostility, see Michael Wines, Straining to See the Real Russia, New York Times, May 2, 1999, 1, sec. 4. 27. Nicholas D. Kristof and Sheryl WuDunn, Of World Markets, None an Island, New York Times, February 17, 1999, A9. 28. The poll was conducted by the Russian newspaper Izvestiya (January 23, 1998) and provided to me during an interview with the director of the DCI Crime and Narcotics Center, Central Intelligence Agency, Langley, VA, June 21, 1999. 29. The struggle of the last half century was to defeat Communism, Representative James A. Leach (R, Iowa) observed in an op-ed piece on international criminal activity emanating from Russia, the challenge in the years ahead will be | 232 |
Notes to Chapter 2 to constrain corruption; The New Russian Menace, New York Times, September 10, 1999, A27. 30. For a catalog of the staggering range of international criminal activity directed toward the United States and its allies, see the White House report entitled International Crime Control Strategy, May 1998. 31. Interview with CNC director, CIA Headquarters, Langley, VA, June 14, 1999. Not everyone is so sanguine about CIA-FBI relations. Its like that book on male-female relations, suggests a former high-level CIA ofcial. One agency is from Venus, the other from Mars. They just dont get along. Comment at Oxford University, September 25, 1999. 32. Ambassador Robert D. Blackwill, former NSC staffer for European and Soviet affairs, interviewed by Jack Davis, A Policymakers Perspective on Intelligence Analysis, Studies in Intelligence (Summer 1994): 3. 33. Remarks at the conference Does America Need the CIA? Gerald R. Ford Library, Ann Arbor, MI, November 19, 1997, 34. 34. Porteous, Looking out for Economic Interests, 199. For ample documentation of this institutional jealousy during recent international nancial crises, see Philip Zelikow, American Intelligence and the World Economy, in In from the Cold, 137262; and Ernest R. May, Intelligence: Backing into the Future, Foreign Affairs 48 (Summer 1994): 6372. 35. Porteous, Looking out for Economic Interests, 199. 36. Neu, 23. 37. According to Neu; see ibid., 3. 38. R. James Woolsey, during a question-and-answer period following his address, The Future Direction of Intelligence (Washington, DC: Center for Strategic and International Studies, July 18, 1994). 39. Aspin-Brown commission, 23. Intelligence ofcials claim to have uncovered bribes affecting $30 billion in foreign contracts between 1992 and 1995. See James Risen, Clinton Reportedly Orders CIA to Focus on Trade Espionage, Los Angeles Times, July 23, 1995, A14. 40. Treverton, Intelligence since Cold Wars End, 115. 41. Quoted by David E. Sanger and Tim Weiner, Emerging Role for the C.I.A.: Economic Spy, New York Times, October 15, 1995, A1. 42. Interview with an ofcial in the Ofce of U.S. Trade Representative, Washington, DC, August 22, 1997. 43. See Maggs, From Swords to Plowshares; Sanger and Weiner, Emerging Role for the C.I.A. 44. Sanger and Weiner, Emerging Role for the C.I.A., A1. On the importance of NSA signals intelligence in reportedly gaining a $6 billion contract from | 233 |
Notes to Chapter 2 Saudi Arabia against European competitors, see Ian Traynor, Bridge of Spies, Guardian, March 26, 1997, 23. 45. Sanger and Weiner, Emerging Role for the C.I.A. 46. Jane Perlez, Clinton Pushes for Treaty to Ban the Worst Child Labor Practices, New York Times, June 17, 1999, A17. 47. Woolsey, World Threat Assessment Brief, 10. 48. Interview with the CNC director, June 14, 1999. 49. Ibid. 50. On Haitis growing prominence in the cocaine trade, see Larry Rohter, Haiti Paralysis Brings a Boom in Drug Trade, New York Times, October 27, 1998, A1. 51. Interview with CNC director, June 14, 1999. 52. Loch K. Johnson, Smart Intelligence, Foreign Policy 89 (Winter 1992/93): 5370. 53. This prole of drug users is based on remarks made by a government drug enforcement expert (at the time, the top aide to drug czar William Bennett), Senior Conference, U.S. Military Academy, June 9, 1990, West Point, NY. More recently, the current director of the Ofce of National Drug Control Policy, General Barry R. McCaffrey, noted that the typical drug user is not poor and unemployed and that in 1997, young adults, men, whites, and those with less than a high school education were more likely to use drugs than other workers. AP report, New York Times, September 9, 1999, 19. 54. Christopher S. Wren, A Purer, More Potent Heroin Lures New Users to a Long, Hard Fall, New York Times, May 9, 1999, 27. 55. David Broder, To Win the War on Drugs, Washington Post, May 2, 1999, B7. 56. Interview, Langley, VA June 2124, 1999. 57. Ibid. 58. Ibid. 59. Interview with Bo Cutter, Washington, DC June 26, 1995. 60. Ibid. 61. Interviews with senior intelligence ofcers, Langley, VA, February 18, 1999. 62. Testimony, Hearings, U.S. Senate Foreign Relations Committee, 103d Cong., 1st sess., November 4, 1993. 63. Quoted by John M. Broder, Presidents Sober Response Assures Public of Counterespionage Measures, New York Times, May 26, 1999, A15. 64. Highly placed policymakers are frequently unaware of the intelligence origins of information they receive in staff briengs and government reports. As a result, they may blithely dismiss the secret agencies as largely unhelpful, whereas | 234 |
Notes to Chapter 3 the deputy assistant secretaries who actually read the intelligence reports often have a more charitable view. 65. May, Intelligence: Backing into the Future, 65.
Notes to Chapter 3
1. See Thomas Homer-Dixon, On the Threshold: Environmental Changes as Acute Causes of Conflict, International Security 16 (Fall 1991): 76116; and his Environmental Scarcities and Conflicts: Evidence from Cases, International Security 19 (Summer 1994): 540; Marc Levy, Is the Environment a National Security Issue, International Security 20 (Fall 1995): 3562; Thomas Homer-Dixon and Marc Levy, Correspondence: Environment and Security, International Security 20 (Winter 1995/96): 18998. See also the excellent study by David D. Dabelko and Geoffrey D. Dabelko, The International Environment and the U.S. Intelligence Community, International Journal of Intelligence and Counterintelligence 6 (Spring 1993): 2142. 2. Interview with DS&T scientist, CIA, Langley, VA, January 24, 1996. 3. Quoted in Loch K. Johnson, Smart Intelligence, Foreign Policy 89 (Winter 1992/93): 59. 4. Matthew Paterson and Michael Grubb, The International Politics of Climate Change, International Affairs 68 (1992): 296. 5. Mostafa K. Tolba with Iwona Rummel-Bulska, Global Environmental Diplomacy: Negotiating Environmental Agreements for the World, 19731992 (Cambridge, MA: MIT Press, 1998), 1314. 6. This quotation is from the report of a research group consisting of members of the U.S National Academy of Sciences and its counterpart institutions from Israel, Jordan, and the Palestinian Authority, cited in William A. Orme Jr., International Study on Water in Mideast Leads to a Warning, New York Times, March 3, 1999, A9. 7. Tolba and Rummel-Bulska, Global Environmental Diplomacy, 15. 8. These observations on Haitis ecological conditions are based on an interview with a former CIA analyst who covered the Caribbean, Washington, DC, June 5, 1997. 9. Stephen Kinzer, Where Kurds Seek a Land, Turks Want the Water, New York Times, February 28, 1999, E3. 10. Interview with NSA ofcial, Washington, DC, September 26, 1996. 11. Tolba and Rummel-Bulska, Global Environmental Diplomacy, 100. 12. Dr. Sherwood Rowland, public lecture, University of Georgia, Athens, March 19, 1999. | 235 |
Notes to Chapter 3 13. This summary draws on interviews with intelligence ofcials, Washington, DC, September 2628, 1996. 14. Interview with senior intelligence analyst, CIA, Langley, VA, February 18, 1999. 15. For details on the key agreements, see Tolba and Rummel-Bulska, Global Environmental Diplomacy; Stephen Hopgood, American Foreign Environmental Policy and the Power of the State (New York: Oxford University Press, 1998); and Jessica T. Matthews, Preserving the Global Environment, in Eugene R. Wittkopf, ed., The Future of American Foreign Policy, 2d ed. (New York: St. Martins Press, 1994), 10816. 16. This list draws on interviews with intelligence ofcials, September 2628, 1996; the 900 gure is from an unclassied intelligence report entitled Global Trends 2010 National Intelligence Council, Langley, VA November 1997. 17. Interview with senior EPA ofcial, Washington, DC, September 27, 1997. 18. Interview, Washington, DC, September 27, 1997. 19. Interview with senior DS&T manager, Langley, VA, February 20, 1999. 20. See William J. Broad, U.S. Will Deploy Its Spy Satellites on Nature Mission, New York Times, November 27, 1995, A1; and Tim Beardsley, Environmental Secrets: MEDEA Brings Intelligence in from the Cold, Scientic American 273 (July 1995): 2830. 21. Interviews with DS&T personnel, September 2628, 1996; and Beardsley, Environmental Secrets. 22. The United States has no national re detection capability, despite spending $600,000 a year to control res on federal lands. 23. These advantages are highlighted in an unclassied document given to me by the Directorate of Science and Technology, entitled ETF Fiscal Year 1993 Experiments Summary (unpaginated and undated but probably 1994). 24. Ibid. 25. Robert Wright, Private Eyes, New York Times Magazine, September 5, 1999, 52, 54. 26. Interview, CIA, Langley, VA, February 18, 1999. 27. National Intelligence Council, The Environmental Outlook in Russia, Intelligence Community Assessment, ICA 98-08 (January 1999): 3335. 28. Edward O. Wilson, The Diversity of Life (New York: Penguin Books, 1994). 29. Tolba and Rummel-Bulska, Global Environmental Diplomacy, 182. 30. Remarks at National Intelligence and Technology Symposium, CIA, Langley, VA, November 6, 1998. 31. See the Rockefeller commissions report (Washington, DC: U.S. Gov| 236 |
Notes to Chapter 3 ernment Printing Ofce, 1975), 23031. This commission noted that intelligence imagery of U.S. locations has been used for such diverse civilian projects as mapping, assessing natural disasters such as hurricane and tornado damage and the Santa Barbara, California, oil spill, conducting route surveys for the Alaska pipeline, conducting national forest inventories, determining the extent of snow cover in the Sierras to facilitate the forecast of runoff and detecting crop blight in the Plains States. The commission found no impropriety in permitting the civilian use of aerial photography systems, though it balked at using intelligence imagery to detect areas of high concentrations of industrial pollutants in the air and water. The concern was that these data might then be used in a criminal action against pollutersa law enforcement activity beyond the intelligence communitys mandate. (Based on this same reasoning, the CIA turned down a request from the Treasury Department to help locate moonshine stills in North Carolina using the infrared photography of spy satellites, another domain of law enforcement.) 32. Interview, Washington, DC, July 14, 1994. 33. Two that have been declassified and placed into the public domain are the National Intelligence Councils Environmental Outlook in Russia, 135; and The Environmental Outlook in Central and Eastern Europe, Intelligence Community Assessment, ICA 96-08D (December 1997): 133. These reports are good illustrations of the intelligence communitys often well-crafted products, whose four-color graphs, sophisticated charts, and maps (even occasional centerfolds featuring, say, a photograph of earthquake damage in an urban locale), along with readable, magazinelike prose, have attracted widespread praise in the upper reaches of the governmenteven if the analysis itself is incorrect from time to time. The reports also provide an unclassified demonstration of the ways in which sophisticated imagery can be helpful in the public domain without jeopardizing sources and methods, through the technique of converting the photographs into simplified but still useful artists depictions of the more detailed photographic data captured by the cameras lens. 34. NIC, Environmental Outlook in Russia, 1. 35. Interviews with policymakers in the EPA, NSC, and State Department, Washington, DC, July and August 1995. 36. Interview, Washington, DC, July 15, 1994. 37. Interview, Washington, DC, July 16, 1994. 38. Interview, Washington, DC, July 15, 1994. 39. See Kim A. McDonald, NASA Satellites May Revolutionize Earth Sciences, Chronicle of Higher Education, July 9, 1999, A20, A22. 40. Interview, Washington, DC, July 15, 1994. | 237 |
Notes to Chapter 4
Notes to Chapter 4
1. Intelligence Authorization Act for Fiscal Year 1995, PL 103-359, sec. 903(b)(2), signed by the president on October 14, 1994. 2. For arguments to this effect, see Laurie Garrett, The Coming Plague: Newly Emerging Diseases in a World out of Balance (New York: Farrar, Straus & Giroux, 1994); Frank Ryan, Virus X: Tracking the New Killer Plagues (Boston: Little, Brown, 1997); Thomas Homer-Dixon, Environmental Scarcity, Mass Violence, and the Limits to Ingenuity, Current History 95 (November 1996): 35965; Thomas Homer-Dixon and Valerie Percival, Environmental Security and Violent Conict (Toronto: University of Toronto Press, 1996); Dennis Pirages, Microsecurity: Disease Organisms and Human Well-Being, Washington Quarterly 18 (Fall 1995): 512; C. F. Ronnfeldt, Three Generations of Environment and Security Research, Journal of Peace Research 34 (November 1997): 47382; and Jessica T. Matthews, Power Shift, Foreign Affairs 76 (January/February 1997): 5066. 3. Pirages, Microsecurity, 11. Another expert reminds us that because diseases have been the biggest killers of people, they have also been decisive shapers of history; Jared Diamond, Guns, Germs, and Steel: The Fate of Human Societies (New York: Norton, 1997): 197. On the military front, Colonel Gerard Schumeyer, director of the Armed Forces Medical Intelligence Center, writes that the medical threat may be the most serious threat to future [U.S. military] operational deployments; Medical Intelligence: Making a Difference, American Intelligence Journal 17 (1996): 11. 4. Quoted by Walter Pincus, Military Espionage Cuts Eyed, Washington Post, March 17, 1995, A6. 5. National Science and Technology Council, Office of Science and Technology Policy, Executive Office of the President, The National Security Science and Technology Strategy (Washington, DC: U.S. Government Printing Office, 1996), 55. 6. Ibid., foreword by President Bill Clinton, unpaginated. 7. Diane C. Snyder, interview with a senior ofcer in the CIAs Directorate of Science and Technology, shared with me, Washington, DC, November 1994. 8. On the threat of global disease, see Garrett, The Coming Plague; Robin Marantz Henig, A Dancing Matrix: Voyages along the Viral Frontier (New York: Knopf, 1993); and Schumeyer, Medical Intelligence, 1115. A useful web site on this subject is Program for Monitoring Emerging Diseases (ProMED), Federation of American Scientists, at http://www.fas.org/pub/genfas/promed. 9. C. A. Hart and S. Kariuki, Antimicrobial Resistance in Developing Countries, British Medical Journal 317 (1998): 647. | 238 |
Notes to Chapter 4 10. For a recent study on one of these dangers, see Susan E. Robertson, Barbara P. Hull, Oyewale Tornori, Okwo Bele, James W. LeDuc, and Karin Esteves, Yellow Fever: A Decade of Reemergence, Journal of the American Medical Association, October 9, 1996, 115762. 11. Sheryl Gay Stolberg, DDT, Target of Global Ban, Finds Defenders in Experts on Malaria, New York Times, August 29, 1999, A1, A6. 12. Associated Press, Fatal Virus in Malaysia Confounds U.S. Scientists, Atlanta Journal and Constitution, April 9, 1999, A4. 13. World Health Organization, Emerging and Other Communicable Diseases (EMC), http://www.who.ch/programmes/emc/news.htm, October 2, 1996; see also Sharon Begley, Commandos of Viral Combat, Newsweek, May 22, 1995, 4854. 14. This estimate is from travel to the United States in 1993, calculated by Work Activity Data System, Plant Protection and Quarantine, APHIS-USDA, Hyattsville, MD, cited in Corrie C. Brown and Barrett D. Slenning, Impact and Risk of Foreign Animal Diseases, Journal of the American Veterinary Medical Association 208 (1996): 1039. 15. Ryan, Virus X, 9, 359. 16. The National Security Science and Technology Strategy, 43. 17. Commission on the Roles and Capabilities of the United States Intelligence Community, Preparing for the 21st Century: An Appraisal of U.S. Intelligence (Washington, DC, U.S. Government Printing Ofce, March 1, 1996), 26. 18. For a nonctional account of this possibility, see Ofce of Technological Assessment, Proliferation of Weapons of Mass Destruction: Assessing the Risks, report OTA-ISC-559 (Washington, DC: U.S. Government Printing Ofce, August 1993), 53. Two authorities recently concluded that the likelihood of terrorists using biological agents as weapons is probably increasing, as biological weapons proliferate and the stability of the cold war balance of power passes; Robert H. Kupperman and David M. Smith, Coping with Biological Terrorism, in Brad Roberts, ed., Biological Weapons: Weapons of the Future? vol. 15 (Washington, DC: Center for Strategic and International Studies, 1993), 45. An analyst in the Canadian Security Intelligence Service concluded similarly that the likelihood of future terrorist use of CB [chemical-biological] agents is both real and growing; Ron Purver, Understanding Past Non-Use of C.B.W. by Terrorists, presentation to the conference on ChemBio Terrorism: Wave of the Future? sponsored by the Chemical and Biological Arms Control Institute, Washington, DC, April 29, 1996. See also Richard Betts, Weapons of Mass Destruction, Foreign Affairs 77 (January/February 1998): 2641, who calls for standby programs for mass vaccinations and emergency treatment with antibiotics to increase the protection or recovery from biological terrorist attacks | 239 |
Notes to Chapter 4 (37); Jonathan B. Tucker, Chemical/ Biological Terrorism: Coping with a New Threat, Politics and the Life Sciences 15 (September 1996): 16785, along with accompanying commentaries by a host of experts; and Glenn E. Schweitzer with Carole C. Dorsch, Super-Terrorism: Assassins, Mobsters, and Weapons of Mass Destruction (New York: Plenum Trade, 1998), chap. 4. On May 22, 1998, President Clinton announced a series of measures to improve U.S. defenses against bioterrorism, including the stockpiling of antibiotics and vaccines; William J. Broad, How Japan Germ Terror Alerted World, New York Times, May 26, 1998, A1. 19. For an example of an intelligence assessment that examines the tie between warfare and a public health issue, see Central Intelligence Agency, CIA Report on Intelligence Related to Gulf War Illnesses (Langley, VA: Central Intelligence Agency, September 24, 1996), 19. 20. On the U.S. intelligence communitys psychological profiling of foreign leaders (a narrow-gauge intelligence focus on the mental health of individuals, in contrast to the broad-gauge global health issues that are the primary concern of this chapter), see Tom Omestad, Psychology and the CIA: Leaders on the Couch, Foreign Policy 95 (Summer 1994): 10522. These individual health profiles are important to U.S. officials as a form of politicalrisk analysis. Periodically the Presidents Daily Brief carries reports on the well-being of prominent foreign leaders, particularly in recent years the chronic poor health of Russian President Boris N. Yeltsin (interview with former Secretary of Defense Les Aspin, Washington, DC, January 27, 1995). On the uncertainties of Yeltsins health and how this matter became an inescapable issue for Washington in the waning years of the twentieth century (he resigned as president on December 31, 1999), see Jane Perlez, Uncertainty Is Persisting Word on U.S.-Moscow Relationship, New York Times, June 20, 1999, A12. During the war in Kosovo (1999), the intelligence community displayed sharp divisions over the likely behavior of Yugoslavian leader Slobodan Milosevic. According to a reliable newspaper report, one classified intelligence assessment predicted that he would remain resolute despite NATO bombing, while another said his confidence would soon break; Elaine Sciolino and Ethan Bronner, How a President, Distracted by Scandal, Entered Balkan War, New York Times, April 18, 1999, A13. The intelligence community goes to great lengths to determine the health of important world leaders. During the cold war, CIA assets in the Middle East managed to infiltrate the plumbing infrastructure beneath the palace of a reigning head of state. When the exalted personage flushed the royal toilet, the assets were ready, test tubes in place, far below in the labyrinth of pipes beneath the palace. The urine samples were rushed back to DS&T labs for detailed medical | 240 |
Notes to Chapter 4 analysis to assay the leaders current state of wellness (interview with retired CIA Middle East case officer, Washington, DC, May 12, 1980). 21. Richard Preston, The Demon in the Freezer, New Yorker, July 12, 1999, 44, 47. 22. This scenario is based on remarks by physicist Richard L. Garwin in William J. Broad, After Many Misses, Pentagon Still Pursues Missile Defense, New York Times, May 24, 1999, 23. 23. See the account by Richard Preston, The Hot Zone (New York: Random House, 1994). 24. See Another Sort of Asian Contagion, Economist, December 20, 1997/January 2, 1998, 125. 25. Garrett, Microbes, 40. 26. William J. Broad and Judith Miller, Government Report Says 3 Nations Hide Stocks of Smallpox, New York Times, June 13, 1999, A1; and their The Threat of Germ Weapons Is Rising, New York Times, December 27, 1999, E1. 27. Ken Alibek with Stephen Handelman, Biohazard (New York: Random House, 1999). 28. Both cited by Broad and Miller, The Threat of Germ Weapons Is Rising, E1, E5. 29. Judith Miller and William J. Broad, Clinton Describes Terrorism Threat for 21st Century, New York Times, January 22, 1999, A1. 30. Broad and Miller, 3 Nations Hide Stocks of Smallpox, D4. 31. Judith Miller and William J. Broad, Clinton to Announce That U.S. Will Keep Sample of Lethal Smallpox Virus, New York Times, April 22, 1999, A12. 32. Ken Alibek and Stephen Handelman, Smallpox Could Still Be a Danger, New York Times, May 24, 1999, A31. 33. Special assistant to the DCI for nonproliferation, Statement, Worldwide Biological Warfare Threat, U.S. House Select Committee on Intelligence, 106th Cong., 1st sess., March 3, 1999, 3. On bioweapons generally, see Richard Danzig, secretary of the navy, The Next Superweapon: Panic, New York Times, November 15, 1998, A12; Richard Falkenrath, Robert Newman, and Bradley Thayer, Nuclear, Biological and Chemical Terrorism and Covert Attack (Cambridge, MA: MIT Press, 1999); Joshua Lederberg, Biological Weapons: Limiting the Threat (Cambridge, MA: MIT Press, 1999); Peter Pringle, Bioterrorism, Nation, November 9, 1998, 1117; and John D. Steinbruner, Biological Weapons: A Plague upon All Houses, Foreign Policy (Winter 1997/98): 8596. 34. Patrick E. Tyler, China Concedes That AIDS Virus Infected Common Blood Product, New York Times, October 25, 1996, A1. Garrett writes that many nations have deliberately tried to cover up their epidemics for political and economic reasons; Microbes, 19. | 241 |
Notes to Chapter 4 35. See, for example, Michael Specter, Deep in the Russian Soul, Lethal Darkness, New York Times, June 6, 1997, E1. 36. This statistic is from an interview with hospital ofcials in Janeiro conducted by former President Jimmy Carter and reported in his State of Human Rights Address, Carter Center, Atlanta, 1991, 5. 37. The Zimbabwe statistic is from Donald G. McNeil Jr., AIDS Is the Silent Killer in Africas Economies, New York Times, November 15, 1998, A1; the TB death rates, from Alimuddin Zumla and John Grange, Tuberculosis, British Medical Journal 316 (1998): 1962. 38. Interviews with CIA analysts, Langley, VA, September 2627, 1996. 39. Maurice Strong, secretary-general of the United Nations Conference on Environment and Development (held in Brazil in 1992), statement, 40 Chernobyls Waiting to Happen, New York Times, March 22, 1992, E15. 40. Bradley Graham, Military Chiefs Back Anthrax Inoculations, Washington Post, October 2, 1996, A1. 41. Interviews with CIA managers, Langley, VA, September 2627, 1996. 42. Reuters, Zaire Fighting Endangers Refugees, U.N. Says, New York Times, October 25, 1996, A7; and George A. Gellert, International Migration and Control of Communicable Diseases, Social Science and Medicine, December 15, 1993, 148999. 43. Schumeyer, Medical Intelligence. 44. For the USAMRMCs role in combating the West Nile virus that surfaced on the East Coast of the United States in 1999 (via mosquito bites), see Jennifer Steinhauer and Judith Miller, In New York Outbreak, Glimpse of Gaps in Biological Defenses, New York Times, October 11, 1999, A1. 45. Ibid. Steinhauer and Miller note the failure of the myriad federal, state, and local health agencies to communicate well with one another during the response to the West Nile virus scare (A19). 46. Interview with NIC director, Langley VA, January 31, 1995. 47. Ryan, Virus X, 351. 48. Interviews with CIA analysts, Langley, VA, September 2627, 1996. 49. R. Jeffrey Smith and Thomas W. Lippman, FBI Plans to Expand Overseas, Washington Post, August 20, 1996, A1. 50. As Schumeyer observes, open-source medical indicators can also provide early warning with respect to an adversarys military intentions, say, by way of the enemys unusual acquisition or movement of medical resources, scheduled blood drives, and implementation of vaccination programs; Medical Intelligence, 14. 51. Barbara Hatch Rosenberg, e-mail to Diane C. Snyder, shared with me, October 16, 1996. | 242 |
Notes to Chapter 5 52. According to my periodic interviews with intelligence analysts (1998/ 99), Washington, DC, and Langley, VA. 53. The National Security Science and Technology Strategy, 54. 54. Tucker, Chemical/Biological Terrorism, 177. For a plea to improve the coordination of the broader U.S. public health infrastructure in the ght against global infectious diseases, see Stephen S. Morse, Controlling Infectious Diseases, Technology Review 98 (October 1995): 5461. 55. Cited by Thomas W. Lippman, Success Stories, Symbolism Draw Christopher to Africa, Washington Post, October 8, 1996, A12.
Notes to Chapter 5
1. See especially Report of the Commission on the Roles and Capabilities of the U.S. Intelligence Community, Preparing for the 21st Century: An Appraisal of U.S. Intelligence (Washington, DC: U.S. Government Printing Ofce, March 1, 1996) (hereafter cited as the Aspin-Brown commission); Task Force, Council on Foreign Relations, Making Intelligence Smarter (New York: Council on Foreign Relations, 1996); Allan E. Goodman, Gregory F. Treverton, and Philip Zelikow, In from the Cold (New York: Twentieth Century Fund, 1996); John H. Hedley, The Intelligence Community: Is It Broken? How to Fix It, Studies in Intelligence 39 (1996): 1119; National Institute for Public Policy, Modernizing Intelligence (Fairfax, VA: National Institute for Public Policy, 1997); and U.S. House Permanent Select Committee on Intelligence, IC21: The Intelligence Community in the 21st Century, 104th Cong., 1st sess. (Washington, DC: U.S. Government Printing Ofce, 1996). 2. On reform and abolition, respectively, see Daniel P. Moynihan, Do We Still Need the C.I.A.? The State Dept. Can Do the Job, New York Times, May 19, 1991, E17; and Seymour M. Hersh, Spy vs. Spy, New Yorker, August 8, 1994, 4. On a plea in favor of wider discretion for the intelligence agencies, see Stephen F. Knott, Secret and Sanctioned (New York: Oxford University Press, 1996). 3. Stanseld Turner, Secrecy and Democracy (Boston: Houghton Mifin, 1985), 185. 4. Robert M. Gates, From the Shadows (New York: Simon & Schuster, 1996), 43. 5. Bert A. Rockman, Americas Departments of State, American Political Science Review, December 1981, 912. Between Schlesinger and Turner came Robert M. Gates, an insider, and George Bush, another outsider-but one who avoided tampering with the CIAs stafng and operations. 6. Gates, From the Shadows, 140. | 243 |
Notes to Chapter 5 7. Colin Campbell, Political Executives and Their Ofcials, in Ada W. Finifter, ed., Political Science: The State of the Discipline (Washington, DC: American Political Science Association, 1993), 383406. 8. Interviews with intelligence ofcials (199399), Washington, DC. For published newspaper accounts on the size of the U.S. intelligence budget, see chapter 6. 9. James Q. Wilson, Thinking about Reorganization (Washington, DC: Consortium for the Study of Intelligence, 1993), 1. 10. Edward G. Shirley, Cant Anybody Here Play This Game? Atlantic Monthly, February 1998, 4561. 11. Quoted by Walter Pincus, Tenet Seeks Coordination of Intelligence Gathering, Washington Post, February 12, 1999, A33. The ICS is now known as the Community Management Staff (CMS). 12. R. James Woolsey, remark to me, Oxford, England September 24, 1999. 13. Interviews with James J. Angleton, Washington, DC, SeptemberDecember 1975. 14. For a damaging critique of the polygraphs value, written by a scientist, see Robert L. Park, Liars Never Break a Sweat, New York Times, July 12, 1999, A19. 15. Turner, Secrecy and Democracy, 186. 16. Ibid., 57. 17. Interviews with senior intelligence ofcials, Washington, DC, June 810, 1997. 18. Quoted in Loch K. Johnson, Secret Agencies: U.S. Intelligence in a Hostile World (New Haven, CT: Yale University Press, 1996), 51. 19. Rockman, Americas Departments of State, 916. 20. Wilson, Thinking about Reorganization, 5. 21. Quoted in Victor L. Marchetti and John D. Marks, The CIA and the Cult of Intelligence (New York: Knopf, 1974), 96. 22. Aspin-Brown commission, 131. 23. Remark by Frederick L. Wettering, panelist at the annual meeting of the International Studies Association, Washington, DC, February 17, 1999. 24. Richard E. Neustadt, Presidential Power (New York: Wiley, 1960). 25. John Millis, speech to Central Intelligence Retirees Association (CIRA), October 5, 1998. Not everyone at the CIA is trying to resist the SMO trend in favor of more national intelligence; some have recommended jumping on the tactical military bandwagon. As a former senior CIA ofcer noted, the Agency is trying hard to get in on SMO, because thats where the money is. See Wettering, remark. | 244 |
Notes to Chapter 5 26. Charles G. Cogan, The New American Intelligence: An Epiphany, Working Paper no. 3, Project on the Changing Security Environment and American National Interests, John M. Olin Institute for Strategic Studies (Cambridge, MA: Harvard University, January 1993), 29. 27. Panelists remarks at the CIAs The Brown Commission and the Future of Intelligence, a roundtable discussion, Studies in Intelligence 39 (1996): 9. 28. Comment at the National Intelligence and Technology Symposium, CIA, Langley, VA, November 6, 1998. 29. In 1992, Senator David Boren (D, Oklahoma) and Representative Dave McCurdy (D, Oklahoma) joined forces (via S. 2198 and H.R. 4165) in an earlier attempt to strength the Ofce of the DCI. They envisioned a new director of National Intelligence, or DNI, who would have signicantly greater authority over budgets, personnel, and operations than does the current DCI. A few minor elements of their reform package made it into the Intelligence Organization Act of 1992. See Report 102-963, U.S. House of Representatives, 102d Cong., 2d sess. (Washington, DC: U.S. Government Printing Ofce, 1992). The more sweeping reforms of the Boren-McCurdy Act died, however, strangled by allies of the secretary of defense waiting in ambush inside the Hills two Armed Services Committees. 30. See U.S. House, Intelligence Authorization Act for Fiscal Year 1997, H.R. 3259, 104 Cong., 2d sess. (Washington, DC: U.S. Government Printing Ofce, 1996). 31. Among others, see the report of the Aspin-Brown commission and the U.S. House IC21 inquiry. This is not to say that other important points of view do not exist. In fact, some reformers advocate further disaggregation, especially placing the CIAs analytic staff into the various policy departments where they would have closer immediate interaction with the consumers they serve (for example, National Institute for Public Policy, Modernizing Intelligence). The drawbacks of this approach are discussed in chapter 8 of this book. 32. Panelists remark at the CIA, The Brown Commission, 6. 33. Charles G. Cogan, formerly of the CIA, concluded, How do you overcome the problem of a weak DCI vis--vis a strong secretary of defense? You cant. Comment to panel at the annual meeting of the International Studies Association, Washington, DC, February 17, 1999. For his reform suggestions within the framework of a weak DCI, see Cogan, The New American Intelligence. 34. Quoted in Hedley, The Intelligence Community, 17. 35. Representative Porter Goss, remarks at National Intelligence and Technology Symposium. | 245 |
Notes to Chapter 5 36. Millis, speech to Central Intelligence Retirees Association (CIRA), October 5, 1998. 37. Quoted by Pincus, Tenet Seeks Coordination of Intelligence Gathering. 38. For a view that the DCIs main concern for national (civilian) intelligence does not really require much access to SIGINT and IMINT anyway, see Ernest R. May, Intelligence: Backing into the Future Foreign Affairs 71 (Summer 1992): 6372. 39. The Intelligence Organization Act of 1992 recommended this rotation reform for implementation by the DCI; yet it has been honored more in the breach than in the commission, in part because many CIA ofcers believe they will be harmed in their internal promotion opportunities if they are away from their home ofces. 40. Seymour M. Hersh, The Traitor, New Yorker, January 18, 1999, 27. 41. Interview with the external affairs coordinator, Counterterrorist Center, Langley, VA, September 30, 1993. 42. Rockman, Americas Departments of State, 925. 43. Bruce D. Berkowitz, The CIA Needs to Get Smart, Wall Street Journal, March 1, 1999, A22.
Notes to Chapter 6
1. Harold Lasswell, Who Gets What, When, and How (Chicago: University of Chicago Press, 1936). 2. The $26 million to $30 billion gure has been reported in many newspaper accounts. See, for example, Tim Weiner, C.I.A. Chief Defends Secrecy, in Spending and Spying, to Senate, New York Times, February 23, 1996, A5. Examples of spending on intelligence activities occasionally surface in the media, giving the public some sense of how the monies are dispensed. According to a newspaper account drawing on newly released U.S. intelligence documents, for much of the 1960s, the CIA provided the Tibetan exile movement with $1.7 million a year for operations against China, including an annual subsidy of $180,000 for the Dalai Lama. See Jim Mann, CIA Papers Detail 1960s Payments to Dalai Lama, Los Angeles Times, September 16, 1998, 4. A news magazine reported that federal agents paid $3.5 million to informants to help catch Mir Aimal Kansi, arrested in Pakistan four years after shootings outside CIA headquarters left two dead and three wounded. See Newsweek, June 30, 1997, 6. In 1998, $97 million went to Iraqi opposition groups, including the Iraqi National Congress. See James Risen, C.I.A. Proposal for Iraq Action Reportedly Turned Down, New York Times, May 11, 1998, 16. And the CIAs support to anti-Soviet mujahideen (soldiers of god) ghters in Afghanistan during the | 246 |
Notes to Chapter 6 1980s reportedly totaled more than $3 billion, including $500,000 in 1987 alone. See Mary Anne Weaver, The Real bin Laden, New Yorker, January 24, 2000, 3435. For comparison, Great Britain reportedly spends the equivalent of about $1.6 billion on intelligence. See Michael Herman, British Intelligence towards the Millennium: Issues and Opportunities, London Defence Studies no. 38 (London: Centre for Defence Studies, 1997), 79. 3. On the French case, see William Drozdiak, France Accuses Americans of Spying, Seeks Recall, Washington Post, February 23, 1995, A1. On the German case, see wire services, Germany Expels U.S. Diplomat Reportedly Accused of Espionage, Los Angeles Times, March 9, 1997, A4; and Alan Cowell, Bonn Said to Expel U.S. Envoy Accused of Economic Spying, New York Times, March 10, 1997, A6. 4. See Ernest R. May, Intelligence: Backing into the Future, Foreign Affairs 71 (Summer 1992): 66, citing former DCI Richard Helms. For a Brookings Institution deduction based on open sources that the CIAs budget in recent years has been $3 billion (secretly folded into a nondescript air force budget line called Selected Activities), see Business Week 27 (July 1998): 45. 5. On the more general question of NRO budget legerdemain, see Tim Weiner, After Errant $2 Billion, Spy Satellite Agency Heads Are Ousted, New York Times, February 27, 1996, A9; and David Wise, The Spies Who Lost $4 Billion, George, October 1998, 8286. According to the former staff director of the House Intelligence Committee, his panel knew of this funding, but the counterpart committee in the Senate was apparently unaware of it (correspondence with me, December 5, 1999). 6. Director of Central Intelligence William J. Casey spent so much money on intelligence hardware, covert action, and new personnel that according to a subsequent DCI, Robert M. Gates, the Agency was stacking people like cordwood in the corridors. Quoted by Tim Weiner, Big Cash Infusion Aims to Rebuild Anemic C.I.A., New York Times, October 22, 1998, A3. 7. Charles E. Lindblom, The Policy-Making Process (Englewood Cliffs, NJ: Prentice-Hall, 1968), 2627; and, generally, Aaron Wildavsky, The Politics of the Budgetary Process (Boston: Little, Brown, 1964). 8. See Commission on the Roles and Capabilities of the U.S. Intelligence Community, Preparing for the 21st Century: An Appraisal of U.S. Intelligence, Report (Washington, DC: U.S. Government Printing Ofce, March 1, 1996), 13132 (hereafter cited as the Aspin-Brown commission). 9. New York Times, October 16, 1997, A17. 10. Quoted by Steven Aftergood, Spending Increase Impedes 1999 Intel Budget Disclosure, Secrecy & Government Bulletin, Federation of American Scientists 76 (January 1999): 2. | 247 |
Notes to Chapter 6 11. Cited in Cloak over the CIA Budget, Washington Post, November 29, 1999, A22. 12. The HPSCI staff director reports making about three or four hundred changes in the intelligence budget submitted by the community in 1998: John Millis, speech to Central Intelligence Retirees Association, October 5, 1998. 13. While serving as the special assistant to Chairman Les Aspin of the AspinBrown commission in 1995, I was assigned to compare top-secret CIA reports on an outbreak of ethnic violence in Burundi with information in the public domain (such as from Oxford Analytica, Lexis-Nexis, and Janes Weekly) over a period of days at the height of the crisis. The open sources did a remarkably good job in providing thorough coverage of the events in Burundi, but the CIA did in fact add considerable value to the open reporting, especially its detailed maps of where the ghting was going on and a deeper understanding of the main points of contention. 14. Interviews with intelligence managers, Washington, DC, November 7, 1998. 15. This phrase is from President George Bush in his remarks to the CIA, Langley, VA, November 12, 1991. 16. See John D. Steinbruner, Nuclear Decapitation, Foreign Policy 40 (Winter 1981/82): 1628. 17. R. W. Apple Jr., Vietnams Student, New York Times Magazine, December 31, 1995, 32. 18. Indiana Jim and the Temple of Spooks, Economist, March 20, 1993, 34. 19. See Mark Thompson, Why the Pentagon Gets a Free Ride, Time, June 5, 1995, 2627. 20. With Speaker Newt Gingrich (R, Georgia) and Senator Sam Nunn (D, Georgia) no longer in the Congress, Lockheed-Martin (an Atlanta-based weapons manufacturer) ran into trouble with the production of the F-22, in one of the few times that the Houseled by pro-defense Republicans, no less voted against funding further production of the ghter plane on grounds of its exorbitant costs. 21. Loch K. Johnson, Secret Agencies: U.S. Intelligence in a Hostile World (New Haven, CT: Yale University Press, 1996), chap. 4. The current HPSCI chairman, Porter Goss, is a former CIA ofcer and the rst to gain a committee chair in the Congress. 22. See, for example, John Mintz, Lockheed Martin Lawsuit Delayed by Pentagon, CIA, Washington Post, February 28, 1996, A13; and Robert Kohler, The Intelligence Industrial Base: Doomed to Extinction? monograph, Working | 248 |
Notes to Chapter 6 Group on Intelligence Reform (Washington, DC: Consortium for the Study of Intelligence, 1994), 122. 23. Remarks at the National Intelligence and Technology Symposium, CIA, Langley, VA, November 6, 1998. 24. Quoted by Jim Abrams (AP), CIA Error Led to Embassy Bombing, Athens (GA) Daily News, May 10, 1999, A4. Emphasizing that intelligence isnt just something for the cold war, Goss promised a long-term rebuild of U.S. intelligence capabilities; see Weiner, Big Cash Infusion. 25. Abrams, CIA Error. 26. Remarks by a senior intelligence ofcial at the National Intelligence and Technology Symposium. 27. See James Risen, C.I.A. Proposal for Iraq Action Reportedly Turned Down, New York Times, November 5, 1998, A16. 28. Aspin-Brown commission, 131. 29. Ibid., 13132. 30. Remark to the National Intelligence and Technology Symposium. 31. Defense spending in 1998 was only 12 percent below the average level from 1976 to 1990; Lawrence J. Korb, Money to Burn at the Pentagon, New York Times, September 25, 1998, A27. 32. Weiner, Big Cash Infusion. 33. Ibid. Our work force has been spread thin, stressed DCI Tenet as he argued in favor of the spending increases; Eric Schmitt, In a Fatal Error, C.I.A. Picked a Bombing Target Only Once: The Chinese Embassy, New York Times, July 22, 1999, A9. 34. Millis, speech. 35. Interview with David Gries, director, Center for the Study of Intelligence, CIA, Rosslyn, VA, July 9, 1993. 36. Loch K. Johnson, Americas Secret Power: The CIA in a Democratic Society (New York: Oxford University Press, 1989): 85; and interviews with intelligence ofcials, Washington, DC, June 2122, 1996. People get xated on hardware, the HPSCI staff director noted; Millis, speech. 37. For remarks by Vice President Al Gore on the bloatedness of the intelligence community, see John M. Broder, Russian Premier Warns U.S. against Role as Policeman, New York Times, July 28, 1999, A8. 38. Aspin-Brown commission; and interviews with former intelligence ofcials, , Washington, DC, June 2324, 1997. 39. Some redundancy is important; for example, unmanned drone aircraft like the Predator and the Hunter are vulnerable to being shot down, and furthermore, they may not be deployed in time or the United States may lack | 249 |
Notes to Chapter 6 access to a convenient launching base near the battleeld site. Nevertheless, the degree of redundancy has been excessive and too costly. 40. For an analysis to this effect, see Memorandum for the Director of Central Intelligence from the Small Satellite Review Panel, undated but in May or June 1996, attached (as an unclassied synopsis of a larger classied report) to a press release issued by Representative Combest, then HPSCI chair, Washington, DC, June 28, 1996. 41. Remarks at the National Intelligence and Technology Symposium. 42. According to my interviews with people working on the Aspin-Brown commission, its staff budget experts as well as a few commission members came to this conclusion after spending a year (from March 1995 to March 1996) wading through intelligence agency budgets in search of economies, especially reductions in large and expensive surveillance satellites. The majority of commission members decided, though, not to propose this recommendation, so the commissions nal report stated simply that the panel as a whole was not in a position to make this assessment (Aspin-Brown commission, 135). The commissions approach was to advocate savings without being specic, although its nal report acknowledged that reduced intelligence funding may be unavoidable in the long run (134).
Notes to Chapter 7 1. For a discussion of U.S. ties to friendly foreign intelligence services, see Jeffrey T. Richelson, The U.S. Intelligence Community, 4th ed. (Boulder, CO: Westview Press, 1999), chap. 13; Jeffrey T. Richelson and Desmond Ball, The Ties That Bind: Intelligence Cooperation among the UKUSA Countries (Boston: Allen & Unwin), 1985; H. Bradford Westereld, America and the World of Intelligence Liaison, Intelligence and National Security 11 (July 1996): 52360; Michael Herman, British Intelligence towards the Millennium: Issues and Opportunities, London Defence Studies no. 38 (London: Centre for Defence Studies, 1997), chap. 12; and, for a look at the difculties of U.S.-U.K. liaison during World War II, British Security Coordination: The Secret History of British Intelligence in the Americas, 194045 (London: St Ermins Press, 1998, reprint of a British government report prepared under the direction of Sir William Stephenson in the aftermath of World War II. 2. For evidence of how the USSR as a common threat helped sustain a close relationship between the United States and West Germany, despite periods of tension or disagreement, see Wolfgang-Uwe Friedrich, ed., Die USA and die Deutsche Frage, 19451990 (Frankfurt: Campus, 1991). | 250 |
Notes to Chapter 7 3. These approximate gures are cited, respectively, in (among other sources) The Dossier on Anthony Lake, editorial, New York Times, January 17, 1997, A14; and Wir Wussten Bescheid, Der Spiegel 51 (1994): 27. 4. Westereld, America and the World of Intelligence Liaison, 523. 5. Bonn also engaged in some forms of technical intelligence collection, reportedly purchasing $700 million worth of advanced electronic listening devices from the National Security Agency between 1972 and 1977. An important condition of these sales was the expectation that the West Germans would share their information with the NSA; Dieser Dilettanten-Verein, Der Spiegel 41 (1984): 3852. 6. Christopher Simpson, Blowback: Americas Recruitment of Nazis and Its Effects on the Cold War (New Haven, CT: Yale University Press, 1990). 7. Mary E. Reese, General Reinhard Gehlen: The CIA Connection (Fairfax, VA: George Mason University Press, 1990). 8. Munich also served as the base of operations for the CIA-funded Munich Institute for the Study of the USSR, which from 1950 to 1971 produced propaganda material on the Soviet system and its policies. See Charles T. OConnell, The Munich Institute for the Study of the USSR: Origin and Social Composition (Pittsburgh: University of Pennsylvania, Center for Russian and East European Studies, 1990). 9. Kim Andrew Elliott, Too Many Voices of America, Foreign Policy 77 (Winter 1989): 11331. Since the end of the cold war, the stations have been moved to Prague where they continue to broadcast, with a greatly reduced budget but without the interference of Moscows cold war jamming. See David Binder, Protesting Changes, Leader Steps Down at Cold-War Radios, New York Times, January 12, 1994, A9; and U.S. Radio Services Move Base to Prague, New York Times, June 6, 1995, A11. 10. From a speech recorded in the Hansard, March 1, 1848, and reprinted in Evan Luard, Basic Texts in International Relations (New York: St. Martins Press, 1992), 166. 11. Tim Weiner, The Case of the Spies without a Country, New York Times, January 17, 1999, B6. 12. Interviews with James Angleton, Washington, DC, SeptemberDecember 1975. 13. See James Risen and Steven Erlanger, C.I.A. Chief Vowed to Quit If Clinton Freed Israeli Spy, New York Times, November 11, 1998, A1; and James Risen, Clinton Asks the Views of Top Aides on the Freeing of Pollard, New York Times, December 3, 1998, A8. 14. On the CIAs reluctance to share sensitive information with the BND | 251 |
Notes to Chapter 7 during the cold war for fear of Communist moles, see Dieser DilettantenVerien. 15. James Risen, Bonn Sniffs for Russian Moles, Worrying C.I.A., New York Times, June 4, 1998, A1. 16. Ibid. 17. Robert Gerald Livingston, The Quest for Stasis Old Files, Los Angeles Times, December 27, 1998, M2. 18. See, for example, David Johnston, Korean Spy Case Takes More Serious Turn, New York Times, October 3, 1996, A5, in which the U.S. ambassador in Seoul describes the CIA-Korean liaison as a very close working partnership with a continued residue of suspicion. The ABC Evening News once reported strained relations between U.S. and Italian intelligence (SISDE) over a CIA/FBI counterterrorism raid in Italy that interfered with an ongoing SISDE intelligence collection operation (December 2, 1998). 19. According to the German scholar Anselm Doering-Manteuffel, The Cold War gave the West Germans and western Europeans little room for independent action. In order to ward off the Soviet threat, they were obliged to align themselves with the United States. Thus, anticommunism became the prime and most effective impetus behind the gravitation toward the Atlantic in Germany and the political integration of western Europe; Turning to the Atlantic: The Federal Republics Ideological Reorientation, 194570, annual lecture 1998, Bulletin of the German Historical Institute 25 (Fall 1999): 17. 20. Wolfram F. Hanrieder, The German-American Connection in the 1970s and 1980s: The Maturing of a Relationship, in Carl C. Hodge and Cathal J. Nolan, eds., Shepherd of Democracy? American and Germany in the 20th Century (Westport, CT: Greenwood Press, 1992), 10521. 21. On the decreasing dominance of the United States and the rising strength of West Germany during the 1970s, see Manfred Knapp et al., Die USA und Deutschland, 19181975: Deutsch-Amerikanische Beziehungen zwischen Rivalitaet und Partnerschaft (Munich: Beck, 1978). 22. Martin J. Hillenbrand, Fragments of Our Time: Memoirs of a Diplomat (Athens: University of Georgia Press, 1998), 28081. 23. Wolfram F. Hanrieder, Vom Doppelcontainment zum Umbruch in Europa, in Wolfgang-Uwe Friedrich, ed., Die USA and die Deutsche Frage, 19451990 (Frankfurt: Campus, 1991). 24. See Willy Brandt, Begegnunger und Einsichten: Die Jahre 19601975 (Hamburg: Hoffmann und Campe, 1976); and his Erinnerunger (Zurich: Propylaen, 1989). 25. Wolfram F. Hanrieder, German-American Relations in the Postwar Decades, in Frank Trommler and Joseph McVeigh, eds., America and the Ger| 252 |
Notes to Chapter 7 mans: An Assessment of a Three-Hundred-Year History (Philadelphia: University of Pennsylvania Press, 1985), 106, 108. 26. See Wilhelm von Sternburg, ed., Die Deutschen Kanzler: Von Bismarck bis Kohl (Frankfurt/Main: Fischer Taschenbuch Verlag, 1994). 27. See Dieser Dillettanten-Verein; and Still in der Ackerfurche, Der Spiegel 51 (1994): 2527. 28. Helmut Schmidt, Menschen und Maechte (Berlin: Siedler, 1987). 29. See Johannes Fischer, Kontrolle, Konsens und Konikt, in Oswald Hauser, ed., Das Geteilte Deutschland in Seinen Internationalen Verechtunger: 15 Vortaege (Goettinger: Muster-Schmidt, 1987), 176209; and Knapp et al., Die USA und Deutschland, 19181975. 30. On the history of the U.S.-German security relationship during these years, see Hauser, Das Geteilte Deutschland; Auswaertiges Amt, ed., Aussenpolitik der Bundesrepublik Deutschland (Cologne: Verlag Wissenschaft und Politik, 1995); Friedrich, Die USA and die Deutsche Frage; Knapp et al., Die USA und Deutschland, 19181975; Hans W. Gatzke, Germany and the United States, a Special Relationship? (Cambridge, MA: Harvard University Press, 1980); Steven Muller and Gerhard Schewigler, eds., From Occupation to Cooperation (New York: Norton, 1992); and Hodge and Nolan, Shepherd of Democracy? 31. Kurt Schelter, state secretary in the Federal Ministry of the Interior, address, Symposium on International Terrorism: Are We Cooperating Enough? New York City, October 23, 1996, 2. 32. The United States began to seek the support of German antiterrorist forces during the Carter administration. In 1986, Bonn and Washington entered into a formal agreement establishing a basis for cooperation between the U.S. Delta Force (stationed at Fort Bragg, NC) and the German GSG and British SAS counterterrorist forces. In 1987, the CIA and the German equivalent of the FBI (the BfV) reportedly ran a series of newspaper ads designed to collect information on international terrorism, an arrangement subsequently denied by both agencies; Schnapp und Grief, Der Spiegel (1987): 4448. 33. Ofcial of the DCI Counterterrorist Center, Naples World Affairs Council, address, International Terrorism: Challenge and Response, February 9, 1999, 8. 34. See Michael McClintock, Instruments of Statecraft (New York: Pantheon Books, 1992); and NSA: Americas Grosses Ohr, Der Spiegel 8 (1989): 3049. The private sale of sensitive weapons matriel by German companies to Iraq is now known to have begun in the mid-1980s; Christopher Simpson, National Security Directives of the Reagan and Bush Administrations (Boulder, CO: Westview Press, 1995). The BNDs apparent lack of knowledge of these activities led many CIA ofcials to question their competence. On this point, see Imre Karacs, | 253 |
Notes to Chapter 7 Germany Expels Three CIA Spies in Secret Deal, Independent (London), September 29, 1999, 16. 35. Treffender Eindruck, Der Spiegel 14 (1992): 97101. Little is known about how much U.S. ofcials have learned from the BND about any illegal activities of American-based exporters. 36. Interviews with BND ofcials, July 29, 1993, Pullach, Germany. This focus on intelligence cooperation against terrorism is broadly true with allies throughout Europe and Asia. For a European example, see the CIA tip to French intelligence in 1994 that helped the French seize the notorious international terrorist Carlos (Ilich Ramirez Sanchez) from a hospital room in Sudan; Craig R. Whitney, Hunger Strike Continues for Terrorist Called Carlos, New York Times, November 15, 1998, A4. 37. Interview with the external affairs coordinator, CTC, Langley, VA, September 30, 1993. Personnel in the CTC are highly critical of the continuing fragmentation of the German intelligence effort against terrorism, forcing the U.S. liaison to work with three different German intelligence entities. 38. Westereld, America and the World of Intelligence Liaison, 530. 39. Robert D. Blackwill, Patterns of Partnership, in Steven Muller and Gerhard Schewigler, eds., From Occupation to Cooperation (New York: Norton, 1992), 145. 40. See Constantine C. Menges, The Future of Germany and the Atlantic Alliance (Washington, DC: AEI Press, 1991); and Burkhart Koch, Germanys New Assertiveness in International Relations: Between Reality and Misperception (Stanford, CA: Hoover Institution, 1992). 41. The CIA acquired the bulk of the Stasi files under mysterious circumstances. The information disclosed by these documents helped seal the arrest of Aldrich Ames and has been useful in a number of CIA/FBI counterintelligence investigations. Select information from these files has led to CIA breakthroughs in Europe as well, leading to the arrest in 1993 of the NATO spy known by the code name Topas. The CIAs unwillingness to share this information freely with the BND, however, has exacerbated relations between the two agencies. See Files in East Germany Aided U.S. in Spy Case, New York Times, March 7, 1994, A13; East German Files Aided U.S. in Spy Case, New York Times, March 6, 1994, 21; CIA Blockiert Ermittlunger, Der Spiegel 25 (1994): 16; and Auf den Knien zur CIA, Der Spiegel 32 (1993): 1822. 42. On the capture of the no doubt red-faced CIA ofcer who reportedly attempted to recruit a senior ofcial of the Economics Ministry, see Risen, Bonn Sniffs for Russian Moles; and Karacs, Germany Expels Three CIA Spies, who claims that there are estimated to be about 100 [U.S.] undercover agents in | 254 |
Notes to Chapter 7 Germany, keeping an eye on things the Germans would rather keep secret from their closest allies. 43. Karacs, Germany Expels Three CIA Spies. 44. Karl Kaiser, Patterns of Partnership, in in Steven Muller and Gerhard Schewigler, eds., From Occupation to Cooperation (New York: Norton, 1992), 173. 45. An observation made by Klaus Kinkel, German federal minister for foreign affairs, speech, Stuttgart, Germany, September 6, 1996, reprinted in German Information Center, Statements & Speeches 19 (1996): 8. 46. Steven Erlanger, C.I.A.s Role in Mideast Peace Prompts Outcry and a Call for Senate Hearings, New York Times, October 26, 1998, A8. 47. George J. Tenet, What New Role for the C.I.A.? New York Times, October 27, 1998, A23. 48. Ibid. 49. Madeleine K. Albright, Face the Nation, CBS News, October 25, 1998. 50. Samuel R. Berger, This Week, ABC News, October 25, 1998. 51. Quoted by Eric Schmitt, New York Times reporter, in CIA to Widen Role as Security Monitors, Atlanta Constitution, October 25, 1998, B7. 52. Ibid. 53. Harry H. Ransom, letter to the editor, New York Times, October 30, 1998, A34. 54. Quoted by Schmitt, CIA to Widen Role as Security Monitors. 55. Spies for Peace, unsigned editorial, New York Times, October 28, 1998, A26. 56. Commission on the Roles and Capabilities of the U.S. Intelligence Community, Preparing for the 21st Century: An Appraisal of U.S. Intelligence, Report (Washington, DC: U.S. Government Printing Ofce, March 1, 1996), 129 (hereafter cited as the Aspin-Brown commission). 57. Ibid.; the quotation is from Seymour M. Hersh, Saddams Best Friend, New Yorker, April 5, 1999, 35. 58. Interviews with UN ofcials, New York City, November 29, 1995. 59. Bill Gertz, Clinton Wants Hill off His Back, Washington Times, November 1, 1995, A1. 60. Tim Weiner, The Case of the Spies without a Country, New York Times, January 17, 1999, E6. 61. Scott Ritter, Endgame (New York: Simon & Schuster, 1999); A. Walter Dorn, The Cloak and the Blue Beret: Limitations on Intelligence in UN Peacekeeping, International Journal of Intelligence and Counterintelligence 12 (Winter 1999/2000): 43738. 62. Hersh, Saddams Best Friend, 36. | 255 |
Notes to Chapter 7 63. Barton Gellman, U.S. Spied on Iraqi Military via U.N., Washington Post, March 2, 1999, A1. 64. Quoted in Inspectors Helped Washington, New Zealand Herald, January 7, 1999, B1, citing a Washington Post report. 65. Ritter claims that CIA paramilitary ofcers were placed on the UNSCOM inspection team beginning in 1992, growing to nine members by 1996; Endgame. 66. Intelligence Ties with UNSCOM Defended, Otago (New Zealand) Daily Times, January 8, 1999, 8, citing Washington Post and Boston Globe reports. 67. Quoted by Christopher S. Wren, U.N. to Create Own Satellite Program to Find Illegal Drug Crops, New York Times, March 28, 1999, A10. 68. Remarks at Oxford University, September 25, 1999. 69. ABC news report, Discover News channel, October 8, 1999. 70. Dorn, The Cloak and the Blue Beret , 442.
Notes to Chapter 8
1. This discussion of the CTC is based on interviews with the centers deputy director, February 18, 1999, and with senior CTC ofcers, September 30, 1993, CIA, Langley, VA. The former CIA ofcer quoted is Reule Marc Gerecht, Alarmism Abets the Terrorists, New York Times, December 23, 1999, A29. 2. The Directorate of Science and Technology, for instance, plays an important role in determining the origins of weapons used by terrorists, such as explosives, detonating devices, and remote-control mechanisms. Each bomb maker has a signature that can reveal the identity of the terrorist, as in the case of Abra Hebrahim, a terrorist in the Middle East who crafts his explosives using a distinctive modus operandi. This identication helps the CTC trace the individual responsible for the terrorist act, an example of what CI specialists refer to as walking back the cat. 3. Interview with the external affairs coordinator, CTC CIA, Langley, VA, September 30, 1993. 4. CTC senior ofcial, address, Naples World Affairs Council, International Terrorism: Challenge and Response, Italy, February 9, 1999, 8. 5. Remark at the National Intelligence and Technology Symposium, CIA, Langley, VA, November 6, 1998. 6. John Deutch, Terrorism, Foreign Policy 108 (Fall 1997): 1022; and Walter Enders and Todd Sandler, Transnational Terrorism in the PostCold War Era, International Studies Quarterly 43 (March 1999): 14567. For two rst-rate studies on the problem of terrorism, see Jeffrey D. Simon, The Terrorist Trap: Americas Experience with Terrorism (Bloomington: Indiana University | 256 |
Notes to Chapter 8 Press, 1994); and Stanseld Turner, Terrorism and Democracy (Boston: Houghton Mifin, 1991). 7. George J. Tenet, statement, Hearings, U.S. Senate Armed Services Committee, February 2, 1999, 3. 8. Daniel Benjamin and Steven Simon (Clinton administration NSC experts on terrorism), The New Face of Terrorism, New York Times, January 4, 2000, A23. 9. See Robert D. Walpole, NIO for Strategic and Nuclear Programs, North Koreas Taepo Dong Launch and Some Implications on the Ballistic Missile Threat to the United States, speech, Center for Strategic and International Affairs, Washington, DC, December 8, 1998, 5. 10. Interview with senior CTC ofcer, CIA, Langley, VA, September 30, 1993. 11. Ibid. 12. Interview with John Millis, staff director, U.S. House Permanent Select Committee on Intelligence, Washington, DC, February 18, 1999. 13. See, for example, James Risen, Covert Plan Said to Take Aim at Milosevics Hold on Power, New York Times, June 18, 1999, A15. 14. Information operations by Americas secret agencies can be used against this nation as well, of course, perhaps by a terrorist organization seeking to sow chaos in the nancial markets of New York City through a massive computer attack aimed at Wall Street, an all-too-conceivable electronic Pearl Harbor for the United States. 15. The Dubai Islamic Bank reference is from James Risen with Benjamin Weiser, U.S. Ofcials Say Aid for Terrorists Came through Two Persian Gulf Nations, New York Times, July 8, 1999, A8; the National Commercial Bank, from ABC Evening News, July 9, 1999. 16. See U.S. Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities (the Church Committee), Alleged Assassination Plots Involving Foreign Leaders, Interim Report, S. Rept. no. 94465 (Washington, DC: U.S. Government Printing Ofce, November 20, 1975). 17. Senator Orrin Hatch (R, Utah) argued that there should be nothing that should not be on the table when it comes to ghting terrorists; Tim Weiner, Rethinking the Ban on Political Assassinations, New York Times, August 30, 1998, E3. Retired Army Lieutenant Colonel Ralph Peters declared: Until we change the rules [to permit assassinations], we will continue to lose; A Revolution in Military Ethics? Parameters 26 (Summer 1996): 106. Thomas L. Friedman recommended that the United States offer a reward for removing Saddam [Hussein] from ofce; Rattling the Rattler, New York Times, January 19, 1999, A23. Some members of the academic community have also found | 257 |
Notes to Chapter 8 this approach worthy of closer consideration. In The Spy Novels of John Le Carr (New York: St. Martins Press, 1999), Myron J. Arnoff stated, An argument could be made that it would have been more humane (in terms of loss of life), not to mention more cost effective, to assassinate the Iraqi dictator [Saddam Hussein] than to have launched Operation Desert Storm (193). David Newman and Bruce Bueno de Mesquita wrote, When hundreds and even thousands of innocent people are at risk, assassination of key terrorist leaders may be an option worthy of renewed debate; Repeal Order 12333, Legalize 007, New York Times, January 26, 1989, A23. In a particularly thorough analysis, Louis Rene Beres concluded that in rare, residual circumstances assassination may have to be carried out by the United States; Assassination and the Law, Studies in Conict and Terrorism 18 (1995): 299315. See also C. A. Anderson, Assassination: Lawful Homicide and the Butcher of Baghdad, Hamline Journal of Public Law & Policy 13 (Summer 1992): 291321; Louis Rene Beres, The Permissibility of State-Sponsored Assassination during Peace and War, Temple International & Comparative Law Journal 5 (Fall 1991): 23149; William Cowan, How to Kill Saddam, Washington Post, February 10, 1991, C2; and Daniel Schorr, Hypocrisy about Assassination, Washington Post, February 3, 1991, C7. For the CIAs latest interpretation of the assassination prohibition (a statement that generally supports the current executive order that prohibits assassinations but that points to the orders ambiguities), see Jonathan M. Fredman, CIA associate general counsel, Covert Action, Loss of Life, and the Prohibition on Assassination, Studies in Intelligence, unclassied ed., 1 (1997): 1525. 18. Executive order 12333, sec. 2.11. 19. Former Robert M. Gates, quoted by Walter Pincus, Saddam Husseins Death Is a Goal, Washington Post, February 15, 1998, A36. 20. Ibid. 21. Two recent DCIs are on record against the murder of Saddam Hussein: Robert Gates has called the idea very counterproductive; and James Woolsey, extremely irresponsible. Israeli intelligence, long known to use assassination as an instrument, is reportedly under pressure to discard this approach, because most cabinet ministers and many Mossad ofcials have concluded that it is an ineffective weapon in the war against terrorism; Yossi Melman, Israels Darkest Secrets, New York Times, March 25, 1998, A23. 22. Pincus, Saddam Husseins Death Is a Goal. 23. When American inspectors were nally granted permission by the government of North Korea in 1999 to examine an underground cavern suspected from satellite imagery as a possible nuclear weapons lab, they found instead a | 258 |
Notes to Chapter 8 huge, empty tunnel; Philip Shenon, Suspected North Korean Atom Site Is Empty, U.S. Finds, New York Times, May 28, 1999, A3. 24. On the value of OSINT, see Vernon Loeb, Spying Intelligence Data Can Be an Open-Book Test, Washington Post, March 22, 1999, A17. Robert D. Steele has also written extensively and well on this topic, including Relevant Information and All-Source Analysis: The Emerging Revolution, American Intelligence Journal 19 (1999): 2330. 25. Brent Scowcroft, remarks at U.S. Intelligence and the End of the Cold War Conference, Bush School of Government and Public Service, Texas A&M University, College Station, November 20, 1999. Anwar Sadat knew that he could not win a war with Israel, and therefore the U.S. intelligence community calculated that he would not be foolish enough to start one; yet by means of an attack, he evidently hoped to prompt new negotiations. 26. Some observers fret that analysts may be contaminated by close proximity to case ofcers, with the latters supposedly vested interests in backing the reports of sometimes biased DO assets in the eld. 27. Comment to me, Washington, DC, September 21, 1995. 28. See the Report of the Commission on the Roles and Capabilities of the United States Intelligence Community, Preparing for the 21st Century: An Appraisal of U.S. Intelligence (Washington, DC: U.S. Government Printing Ofce, March 1, 1996). Hereafter cited as the Aspin-Brown commission. 29. Ibid. 30. See Aaron Wildavsky, Speaking Truth to Power: The Art and Craft of Policy Analysis (Boston: Little, Brown, 1979). 31. On President Johnson, see Thomas L. Hughes, The Power to Speak and the Power to Listen: Reections in Bureaucratic Politics and a Recommendation on Information Flows, in Thomas M. Franck and Edward Weisband, eds., Secrecy and Foreign Policy (New York: Oxford University Press, 1974): 19; and two works by Harold P. Ford: CIA and the Vietnam Policymakers (Rosslyn, VA: Center for the Study of Intelligence, 1997); and CIA and the Vietnam Policymakers: Three Episodes, 19621968 (Washington, DC: National Technical Information Service, 1999). Gordon Oehler is quoted in Tim Weiner, C.I.A. Inquiry Asks for an Overhaul, New York Times, June 3, 1998, A8. 32. Interview, Washington, DC, August 12, 1995. 33. James Risen, Gore Rejected C.I.A. Evidence of Russian Corruption, New York Times, November 23, 1998, A8. 34. Jack Davis, The Challenge of Managing Uncertainty: Paul Wolfowitz on Intelligence-Policy Relations, interview with Paul Wolfowitz, March 1995, 8, photocopy provided to me. | 259 |
Notes to Chapter 8 35. Robert M. Gates, Conrmation Hearings, U.S. Senate Select Committee on Intelligence, 102d Cong., 1st sess., September 16, 1991. In 1995, as a member of the Aspin-Brown commission staff, I had the opportunity to examine a single current copy, randomly selected, of the highly classied Presidents Daily Brief. The content, timeliness, readability, and attractive format of that particular issue were impressive, easily passing the value-added test on that day, even though the main recipient, President Bill Clinton, has expressed an overall dissatisfaction with its lack of added value. See Walter Pincus, A Low Prole for CIA Chief, Washington Post, January 13, 1998, A13. The CIA would not allow me to conduct a more meaningful time-series analysis of the daily brief. 36. Joseph F. Nye, Jr., testimony, open hearing, 19 January 1995, Washington, D.C. 37. Interviews with both in Washington, DC, February and September 1996, respectively. 38. Interview, Washington, DC, August 22, 1997. 39. Allan E. Goodman, remark to Conference on U.S. Intelligence, CIA, Langley, VA, October 1, 1993. 40. Interview with a Department of Commerce ofcial, Washington, DC, February 22, 1995. 41. Robert Steele, e-mail to me, January 5, 2000. 42. Interviews with senior intelligence ofcers, Washington, DC, and Langley, VA, from 1993 to 1999. 43. One of the greatest sins that an intelligence ofcer can commit is twisting information to suit the political needs of decision makers, a pathology called the politicization or cooking of intelligence. See Loch K. Johnson, Secret Agencies: U.S. Intelligence in a Hostile World (New Haven, CT: Yale University Press, 1996), 9597. 44. Interview, Washington, DC, October 26, 1996. 45. Ambassador Robert D. Blackwill, interviewed by Jack Davis, A Policymakers Perspective on Intelligence Analysis, Studies in Intelligence (Summer 1994): 6.
Notes to Chapter 9
1. James Madison, Federalist Paper no. 51, February 8, 1788, reprinted in The Federalist (New York: Modern Library, 1937), 337. 2. Thomas Jefferson, Draft of the Kentucky Resolutions, October 1798, in Jefferson (New York: Library of America, 1984), 455. 3. Richard E. Neustadt, Presidential Power and the Modern Presidents (New York: Free Press, 1990), 29, italics in original. | 260 |
Notes to Chapter 9 4. Myers v. United States, 272 U.S. 52 293 (1926). 5. United States v. Curtiss-Wright Export Corporation 299 U.S. 304 (1936). 6. Stephen F. Knott, Secret and Sanctioned: Covert Operations and the American Presidency (New York: Oxford University Press, 1996). 7. Jerrold L. Walden, The CIA: A Study in the Arrogation of Administrative Powers, George Washington Law Review 39 (October 1970): 66101. 8. Interview with James R. Schlesinger, Washington, DC, June 16, 1994. 9. Richard B. Russell Library, Richard B. Russell Oral History no. 86, taped by Hughes Cates, University of Georgia, Athens, February 22, 1977. 10. U.S. Select Committee to Study Governmental Operations with Respect to Intelligence Activities, Foreign and Military Intelligence, Final Report, S. Rept. 94-755, vol. 1, 94th Cong., 2d sess. (Washington, DC: U.S. Government Printing Ofce, May 1976), 157 (hereafter cited as the Church committee). 11. Ibid., 158; Cliffords testimony to the Church committee, December 4, 1975. 12. On the Abourezk amendment (named after its sponsor, James Abourezk, D, South Dakota), see Congressional Record, October 2, 1974, 33482. 13. Loch K. Johnson, Season of Inquiry (Lexington: University Press of Kentucky, 1986); Kathryn Olmsted, Challenging the Secret Government: The PostWatergate Investigations of the CIA and FBI (Chapel Hill: University of North Carolina Press, 1996); Frank J. Smist Jr., Congress Oversees the United States Intelligence Community, 19471989 (Knoxville: University of Tennessee Press, 1990). 14. Sec. 662 of the Foreign Assistance Act of 1994 (22 U.S.C. 2422). 15. Olmsted, Challenging the Secret Government; Knott, Secret and Sanctioned. 16. Olmsted, Challenging the Secret Government, 3. 17. See U.S. Senate Select Committee on Secret Military Assistance to Iran and the Nicaraguan Opposition and U.S. House Select Committee to Investigate Covert Arms Transactions with Iran (the Inouye-Hamilton committees), Report on the Iran-Contra Affair, S. Rept. 100-216 and H. Rept. 100-433 (Washington, DC: U.S. Government Printing Office, November 1987), 379. 18. Loch K. Johnson, The CIA and the Media, Intelligence and National Security 1 (May 1986): 14369. 19. Jack Anderson, How the CIA Snooped inside Russia, Washington Post, December 10, 1973, B17; on the Glomar Explorer, see the reports in New York Times, March 20 and 26, 1975. 20. Frank Church, An Imperative for the CIA: Professionalism Free of Politics and Partisanship, Congressional Record, November 11, 1975, 3578688. 21. Representative Jack Brooks (D, Texas), Impeachment Hearings, U.S. | 261 |
Notes to Chapter 9 House Judiciary Committee, 93rd Cong., 2d sess., 1974, in Congress: We the People, Program 20, WETA television, Washington, DC (1983). 22. Robert M. Gates, From the Shadows (New York: Simon & Schuster, 1996). 23. See, for example, the citations in Loch K. Johnson, Americas Secret Power: The CIA in a Democratic Society (New York: Oxford University Press, 1989), 295, n. 63. At a recent conference, former DCI William Webster observed that during his tenure more leaks came out of the White House than the [congressional] Intelligence Committees; U.S. Intelligence and the End of the Cold War Conference, Bush School of Government and Public Service, Texas A&M University, College Station, November 20, 1999. 24. See Frederick M. Kaiser, Congress and the Intelligence Community: Taking the Road Less Traveled, in Roger H. Davidson, ed., The Post-reform Congress (New York: St. Martins Press, 1992), 279300; Smist, Congress Oversees the United States Intelligence Community; and Walden, The CIA. 25. Testimony of Vice Admiral John M. Poindexter, the Inouye-Hamilton committees, Hearings, vol. 8, 100th Cong., 1st sess. (Washington, DC: U.S. Government Printing Ofce, 1987), 159. 26. Gates, From the Shadows, 61. 27. Senior ofcial, CIA, letter to me, September 21, 1991. 28. Ibid. 29. Interview with the CIAs deputy director for congressional affairs, Langley, VA, April 1, 1994. 30. Lloyd Salvetti, director, Center for the Study of Intelligence, remarks to Joint Military Intelligence College Conference, Defense Intelligence Agency, June 18, 1999. 31. Unsigned editorial, The Keys to the Spy Kingdom, New York Times, May 19, 1996, E14. 32. Quoted by David Wise, The Spies Who Lost $4 Billion, George, October 1998, 84. This does not excuse the all-too-frequent incidence of legislative overseers asleep at the wheel from failing to follow through on reports of illegal covert actions during the early stages of the Iran-contra affair to (more recently) a willingness to look away as the Clinton administration planned a paramilitary covert action to assassinate Saddam Hussein in violation of an executive order. The plot was subsequently called off when the operation fell apart in the eld. See Walter Pincus, Saddam Husseins Death Is a Goal, Washington Post, February 15, 1998, A36. 33. President Clinton proved unwilling to back Woolsey on the NRO issue. Along with the DCIs growing frustration over seldom seeing the president, this precipitated his resignation. Woolsey no doubt understood the cardinal rule for | 262 |
Notes to Chapter 9 a DCIs success, as veteran intelligence ofcer Samuel Halpern dened it: Unless the DCI is able to walk in to see the President at will, privately, except maybe for the secretary, just these personsunless thats possible, you dont have a DCI; interviewed by historian Ralph E. Weber, November 11, 1995, Arlington, VA, and published in Ralph E. Weber, ed., Spymasters: Ten CIA Ofcers in Their Own Words (Wilmington, DE: SR Books, 1999), 129. 34. Unsigned editorial, Making the C.I.A. Accountable, New York Times, August 18, 1996, E-14. 35. Quoted by James Risen, Energy Secretary Delays Disciplining Staff over Spy Case, New York Times, June 10, 1999, A6. 36. Arthur S. Hulnick, Openness: Being Public about Secret Intelligence, International Journal of Intelligence and Counterintelligence 12 (Winter 1999/2000): 480. The Commission to Assess the Organization of the Federal Government to Combat the Proliferation of Weapons of Mass Destruction (the Deutch commission, led by former DCI John Deutch) had a point, though, in calling on Congress to consolidate the number of legislative committees with oversight and budgetary responsibility for nonproliferation programs, in order to reduce confusion and an unnecessary surcharge on the time and energies of executive ofcials in their reporting to Congress; Report (Washington, DC: U.S. Government Printing Ofce, July 1999). 37. Eric Schmitt, Leading Senators Demand That U.S. Limit Overtures to China, New York Times, March 14, 1999, A6. 38. Associated Press report, Energy Ofcials Admit to Ducking Spy Case Queries, Athens (GA) Daily News, April 16, 1999, 1B. 39. Quoted by Stanseld Turner in an op-ed piece, Purge the C.I.A. of K.G.B. Types, New York Times, October 2, 1991, A19. 40. Remarks to National Intelligence and Technology Symposium, CIA, Langley, VA, November 6, 1998. 41. James T. Currie, Iran-Contra and Congressional Oversight of the CIA, International Journal of Intelligence and Counterintelligence 11 (Summer 1998): 203. 42. Quoted by Eric Schmitt, Senate Panel and C.I.A. Fight on China Documents, New York Times, June 5, 1998, A12. 43. Quoted by James Risen, C.I.A. Admits Slow Move in Security Slip, New York Times, February 3, 2000, A18. Deutchs run-ins with the Operations Directorate, discussed in chapter 5, may have led him to believe its ofcers might be spying against him, thus causing him to seek refuge in his own home computer rather than the one on his desk at Langley (although access to a home computer would not be much of a technical challenge for DO operatives). 44. Former President George Bush, letter to me, January 23, 1994. | 263 |
Notes to Chapter 9 45. See Tim Weiner, C.I.A. Chief Defends Secrecy, in Spending and Spying, to Senate, New York Times, February 23, 1996, A5. 46. This group has been renamed the Association of Former Intelligence Ofcers (AFIO). 47. See, for example, John Mintz, Lockheed Martin Works to Save Its Older Spies in the Skies, Washington Post, November 28, 1995, D1. 48. Richard N. Haass, Dont Hobble Intelligence Gathering, Washington Post, February 15, 1996, A27. For the broader, less extreme views of the councils report, see Council on Foreign Relations, Making Intelligence Smarter: The Future of U.S. Intelligence, Report of an Independent Task Force (New York: Council on Foreign Relations, 1996). 49. See John M. Deutch, C.I.A., Bunker Free, Is Declassifying Secrets, letter to the editor, New York Times, May 3, 1996, A10; John Hollister Hedley, The CIAs New Openness, International Journal of Intelligence and Counterintelligence 7 (Summer 1994): 12942; and Tim Weiner, A Blast at Secrecy in Kennedy Killing, New York Times, September 29, 1998, A17. 50. Letter to the editor, New York Times, July 16, 1998, A18. 51. Steve Aftergood, Bulletins, Secrecy & Government Bulletin, Federation of American Scientists 79 (June 1999): 2. 52. Quoted by Karen DeYoung and Vernon Loeb, Documents Show U.S. Knew Pinochet Planned Crackdown in 73, Washington Post, July 1, 1999, A23. 53. Daniel Klaidman and Melinda Liu, Open Secret, Newsweek, March 22, 1999, 31. The HPSCI staff director questions, though, whether his committee was told directly or in such a way as to create a reaction (personal correspondence with me, November 29, 1999), the problem again of keeping the oversight panels well and clearly informed. 54. Jeff Gerth, Nuclear Lapses Known in 96, Aides Now Say, New York Times, March 17, 1999, A12. 55. Gates, From the Shadows, 559. 56. Remarks at Does America Need the CIA? Conference, Gerald R. Ford Library, November 19, 1997. 57. William E. Colby, Gesprach mit William E. Colby, Der Spiegel, January 23, 1978, 114 (my translation).
| 264 |
BIBLIOGRAPHY
Aftergood, Steven. Bulletins. Secrecy & Government Bulletin, Federation of American Scientists 79 (June 1999). . Spending Increase Impedes 1999 Intel Budget Disclosure. Secrecy & Government Bulletin, Federation of American Scientists 76 (January 1999). Albright, Madeleine K. Face the Nation, CBS News, October 25, 1998. Alibek, Ken, with Stephen Handelman. Biohazard. New York: Random House, 1999. . Smallpox Could Still Be a Danger. New York Times, May 24, 1999, A31. American Institute for Business Research. Protecting Corporate Americas Secrets in the Global Economy. Washington, DC: American Institute for Business Research, 1992. Anderson, C. A. Assassination: Lawful Homicide and the Butcher of Baghdad. Hamline Journal of Public Law & Policy 13 (Summer 1992): 291321. Anderson, Jack. How the CIA Snooped inside Russia. Washington Post, December 10, 1973, B17. Andrew, Christopher. For the Presidents Eyes Only. New York: HarperCollins, 1995. . Her Majestys Secret Service: The Making of the British Intelligence Community. New York: Viking, 1986. , and David Dilks, ed., The Missing Dimension: Governments and Intelligence Communities in the Twentieth Century. London: Macmillan, 1984. Andrews, Edmund L. Aboard Advanced Radar Flight. New York Times, June 14, 1999, A12. Apple, R. W. Jr. Vietnams Student. New York Times Magazine, December 31, 1995, 32. Arnoff, Myron J. The Spy Novels of John Le Carr. New York: St. Martins Press, 1999. Aspin, Les. Speech, Jewish Institute for National Security Affairs, September 21, 1992, Washington, DC. Aspin-Brown commission. Preparing for the 21st Century: An Appraisal of U.S. Intelligence. Report of the Commission on the Roles and Capabilities of the | 265 |
Bibliography United States Intelligence Community. Washington, DC: U.S. Government Printing Ofce, March 1, 1996. Bamford, James. The Puzzle Palace. Boston: Houghton Mifin, 1984. Barrett, David M. Glimpses of a Hidden History: Sen. Richard Russell, Congress, and Oversight of the CIA. International Journal of Intelligence and Counterintelligence 11 (1998) 27198. Beardsley, Tim. Environmental Secrets: MEDEA Brings Intelligence in from the Cold. Scientic American 273 (July 1995): 2830. Begley, Sharon. Commandos of Viral Combat. Newsweek, May 22, 1995, 4854. Benjamin, Daniel, and Steven Simon. The New Face of Terrorism. New York Times, January 1, 2000, A28. Beres, Louis Rene. Assassination and the Law: A Policy Memorandum. Studies in Conict and Terrorism 18 (1995): 299315. . The Permissibility of StateSponsored Assassination during Peace and War. Temple International & Comparative Law Journal 5 (Fall 1991): 23149. Berger, Samuel R. This Week. ABC News, October 25, 1998. Berkowitz, Bruce D. The CIA Needs to Get Smarter. Wall Street Journal, March 1, 1999, A22. , and Allen E. Goodman. Strategic Intelligence for American National Security. Princeton, NJ: Princeton University Press, 1986. Betts, Richard K. Analysis, War and Decision: Why Intelligence Failures Are Inevitable. World Politics 31 (October 1978): 6189. . Weapons of Mass Destruction. Foreign Affairs 77 (January/February 1998): 2641. Binder, David. Protesting Changes, Leader Steps down at Cold-War Radios. New York Times, January 12, 1994, A9. . U.S. Radio Services Move Base to Prague. New York Times, June 6, 1995, A11. Bobrow, Davis B. Prospecting the Future. International Studies Review 1 (Summer 1999): 110. Boren, David L. The Intelligence Community: How Crucial? Foreign Affairs 71 (Summer 1992): 5262. Borrus, Michael, and John Zysman. Industrial Competitiveness and National Security. In Graham Allison and Gregory F. Treverton, eds., Rethinking Americas Security: Beyond Cold War to New World Order. New York: Norton, 1992), 13675. Broad, William J. After Many Misses, Pentagon Still Pursues Missile Defense. New York Times, May 24, 1999, 23. | 266 |
Bibliography . How Japan Germ Terror Alerted World. New York Times, May 26, 1998, A1. . U.S. Will Deploy Its Spy Satellites on Nature Mission. New York Times, November 27, 1995, A1. , and Judith Miller. Government Report Says 3 Nations Hide Stocks of Smallpox. New York Times, June 13, 1999, A1. Broder, David. To Win the War on Drugs. Washington Post, May 2, 1999, B7. Broder, John M. Presidents Sober Response Assures Public of Counterespionage Measures. New York Times, May 26, 1999, A15. . Russian Premier Warns U.S. against Role as Policeman. New York Times, July 28, 1999, A8. Brown, Corrie C., and Barrett D. Slenning. Impact and Risk of Foreign Animal Diseases. Journal of the American Veterinary Medical Association 208 (1996): 103840. Burrows, William E. Deep Black: Space Espionage and National Security. New York: Random House, 1986. , and Robert Windrem. Critical Mass: The Dangerous Race for Superweapons in a Fragmenting World. New York: Simon & Schuster, 1994. Bush, George H. W. Letter to Loch K. Johnson, January 23, 1994. . Remarks, Central Intelligence Agency, Langley, VA, November 12, 1991. Campbell, Colin. Political Executives and Their Ofcials. In Ada W. Finifter, ed., Political Science: The State of the Discipline. Washington, DC: American Political Science Association, 1993, 383406. Carr, E. H. The Twenty Years Crisis: An Introduction to the Study of International Relations. New York: Harper & Row, 1939. Carter, Jimmy. State of Human Rights Address, Carter Center, Atlanta, 1991. Central Intelligence Agency. The Brown Commission and the Future of Intelligence. A Roundtable Discussion. Studies in Intelligence 39 (1996): 19. . CIA Report on Intelligence Related to Gulf War Illnesses. Langley, VA: Central Intelligence Agency, September 24, 1996, 19. . Directorate of Science and Technology, ETF Fiscal Year 1993 Experiments Summary. Langley, VA: Central Intelligence Agency, 1994. . National Intelligence and Technology Symposium. Central Intelligence Agency, Langley, VA, November 6, 1998. . Ofce of Public Affairs. Director of Central Intelligence Command Responsibilities. Langley, VA: Central Intelligence Agency, January 1998. . Ofcial, DCI Counterterrorist Center. Speech, Naples World Affairs Council on International Terrorism: Challenge and Response, Naples, February 9, 1999. | 267 |
Bibliography Central Intelligence Agency. Special assistant to the DCI for Nonproliferation. Statement on the World Wide Biological Warfare Threat, Hearings, U.S. House Permanent Select Committee on Intelligence, 106th Cong., 1st sess., March 3, 1999. Christopher, Warren. Foreign and Military Intelligence. Final Report. U.S. Senate Select Committee on Intelligence Activities, Rept. 94755, 94th Cong., 2d sess., May 19, 1996. . Hearings, U.S. Senate Foreign Relations Committee, 103rd Cong., 1st sess., November 4, 1993. Church, Frank. Do We Still Plot Murders? Who Will Believe We Dont? Los Angeles Times, June 14, 1983, pt. 2, p. 5. . An Imperative for the CIA: Professionalism Free of Politics and Partisanship. Congressional Record, November 11, 1975, 3578688. Clarke, Duncan L., and Robert Johnston. Economic Espionage and Interallied Strategic Cooperation. Thunderbird International Business Review 40 (July/August 1998): 41331. Clarke, Richard A. Finding the Right Balance against Bioterrorism. Emerging Infectious Diseases 5 (July/August 1999): 497. Cogan, Charles G. The New American Intelligence: An Epiphany. Working Paper no. 3, Project on the Changing Security Environment and American National Interests, John M. Olin Institute for Strategic Studies. Cambridge, MA: Harvard University, January 1993, 146. . Restructuring the CIA. Foreign Service Journal, February 1996, 3238. Cohen, William S. Conrmation Hearings, U.S. Senate Armed Services Committee, 105th Cong., 1st sess., January 22, 1997. Colby, William E. Gesprach mit William E. Colby. Der Spiegel, January 23, 1978, 114. , and Peter Forbath. Honorable Men: My Life in the CIA. New York: Simon & Schuster, 1978. Commission to Assess the Organization of the Federal Government to Combat the Proliferation of Weapons of Mass Destruction (Deutch commission). Report. Washington, DC: U.S. Government Printing Ofce, July 1999. Connor, William E. Intelligence Oversight: The Controversy behind the FY 1991 Intelligence Authorization Act. Intelligence Profession Series no. 11. McLean, VA: Association of Former Intelligence Ofcers, 1993. Council on Foreign Relations. Making Intelligence Smarter. New York: Council on Foreign Relations, 1996. Coverdale, Paul. Remarks, National Security in the 21st Century. Richard B. Russell Symposium, October 26, 1999. University of Georgia, Athens. | 268 |
Bibliography Cowan, William. How to Kill Saddam. Washington Post, February 10, 1991, C2. Cowell, Alan. Bonn Said to Expel U.S. Envoy Accused of Economic Spying. New York Times, March 10, 1997, A6. Currie, James T. Iran-Contra and Congressional Oversight of the CIA. International Journal of Intelligence and Counterintelligence 11 (Summer 1998): 185210. Dabelko, David D., and Geoffrey D. Dabelko. The International Environment and the U.S. Intelligence Community. International Journal of Intelligence and Counterintelligence 6 (Spring 1993): 2142. Davis, Jack. The Challenge of Managing Uncertainty: Paul Wolfowitz on Intelligence-Policy Relations. Interview with Paul Wolfowitz, March 1995. . A Policymakers Perspective on Intelligence Analysis. Studies in Intelligence 38 (1995): 715. Deutch, John M. C.I.A., Bunker Free, Is Declassifying Secrets, Letter to the editor, New York Times, May 3, 1996, A10. . Memorandum for the president. Washington, DC, April 5, 1996. . Terrorism. Foreign Policy 108 (Fall 1997): 1022. DeYoung, Karen, and Vernon Loeb. Documents Show U.S. Knew Pinochet Planned Crackdown in 73. Washington Post, July 1, 1999, A23. Diamond, Jared. Guns, Germs, and Steel: The Fate of Human Societies. New York: Norton, 1997. Doering-Manteuffel, Anselm. Turning to the Atlantic: The Federal Republics Ideological Reorientation, 194570. Bulletin of the German Historical Institute 25 (Fall 1999): 321. Doran, Charles F. Why Forecasts Fail: The Limits and Potential of Forecasting in International Relations and Economics. International Studies Review 1 (Summer 1999): 1142. Dorn, A. Walter. The Cloak and the Blue Beret: Limitations on Intelligence in UN Peacekeeping. International Journal of Intelligence and Counterintelligence 12 (Winter 1999): 41447. Drozdiak, William. France Accuses Americans of Spying, Seeks Recall. Washington Post, February 23, 1995, A1. Elliott, Kim Andrew. Too Many Voices of America. Foreign Policy 77 (Winter 1989): 11331. Enders, Walter, and Todd Sandler. Transnational Terrorism in the PostCold War Era. International Studies Quarterly 43 (March 1999): 14567. Erlanger, Steven. C.I.A.s Role in Mideast Peace Prompts Outcry and a Call for Senate Hearings. New York Times, October 26, 1998, A8. | 269 |
Bibliography Ernst, Maurice C. Economic Intelligence in CIA. Studies in Intelligence 28 (Winter 1984): 122. Executive Ofce of the President. International Crime Control Strategy. Washington, DC: Executive Ofce of the President, May 1998. . National Science and Technology Council, Ofce of Science and Technology Policy. The National Security Science and Technology Strategy. Washington, DC: Executive Ofce of the President, 1996. Falkenrath, Richard, Robert Newman, and Bradley Thayer. Biological and Chemical Terrorism and Covert Attack. Cambridge, MA: MIT Press, 1999. Fialka, John J. Stealing the Spark: Why Economic Espionage Works in America. Washington Quarterly 19 (1996): 17589. Finel, Bernard I., and Kristin M. Lord. The Surprising Logic of Transparency. International Studies Quarterly 43 (June 1999): 31539. Fisher, Louis. How to Avoid Iran-Contras: Review Essay. California Law Review 76 (1993): 91929. . The War Making Powers. Manhattan: University Press of Kansas, 1996. Flitner, David Jr. Presidential Commissions. In Leonard W. Levy and Louis Fisher, eds., Encyclopedia of the American Presidency, vol. 1. New York: Simon & Schuster, 1994, 26669. Ford, Harold P. CIA and the Vietnam Policymakers: Three Episodes, 19621968. Washington, DC: National Technical Information Service, 1999. Fort, Randall M. Economic Espionage: Problems and Prospects. Washington, DC: Consortium for the Study of Intelligence, 1993. Fraumann, Edwin. Economic Espionage: Security Missions Redened. Public Administration Review 57 (July/August 1997): 3038. Fredman, Jonathan M. Covert Action, Loss of Life, and the Prohibition on Assassination. Studies in Intelligence 1 (1997): 1525. Freeh, Louis. Economic Espionage. Hearings, U.S. Senate Select Committee on Intelligence, 104th Cong., 2d sess., February 28, 1996. Friedman, Thomas L. A Manifesto for the Fast World. New York Times Magazine, March 28, 1999, 40 ff. . Rattling the Rattler. New York Times, January 19, 1999, A23. Frost, Mike, and Michel Gratton. Spyworld: Inside the Canadian and American Establishments. Toronto: Doubleday, 1994. Gannon, John C. Intelligence Challenges for the Next Generation. Speech, World Affairs Council meeting, St. Louis, October 8, 1998. Garrett, Laurie. The Coming Plague: Newly Emerging Diseases in a World out of Balance. New York: Farrar, Straus & Giroux, 1994. Gates, Robert M. Conrmation Hearings, U.S. Senate Select Committee on Intelligence, 102d Cong., 1st sess., September 16, 1991. | 270 |
Bibliography . From the Shadows. New York: Simon & Schuster, 1996. . Hearings, U.S. House, Judiciary Committee, Subcommittee on Economic and Commercial Law, 102d Cong., 2d sess., April 29, 1992. . In War, Mistakes Happen. New York Times, May 12, 1999, A27. . Remarks, Conference on U.S. Intelligence, June 11, 1984, Langley, VA. . Speech, Economic Club of Detroit, April 13, 1992, Detroit. Gatzke, Hans W. Germany and the United States: A Special Relationship? Cambridge, MA: Harvard University Press, 1980. Gellert, George A. International Migration and Control of Communicable Diseases. Social Science and Medicine, December 15, 1993, 148999. Gellman, Barton. U.S. Spied on Iraqi Military via U.N. Washington Post, March 2, 1999, A1. Gerecht, Reuel Marc (aka Edward Shirley). Alarmism Abets the Terrorists. New York Times, December 23, 1999. Gerth, Jeff. Nuclear Lapses Known in 96. New York Times, March 17, 1999, A12. , and David E. Sanger. Citing Security, U.S. Spurns China on a Satellite Deal. New York Times, February 23, 1999, A1. Gertz, Bill. Clinton Wants Hill off His Back. Washington Times, November 1, 1995, A1. Goodman, Allan E., Gregory F. Treverton, and Philip Zelikow. In from the Cold. New York: Twentieth Century Fund, 1996. Graham, Bradley. Military Chiefs Back Anthrax Inoculations. Washington Post, October 2, 1996, A1. Haass, Richard N. Dont Hobble Intelligence Gathering. Washington Post, February 15, 1996, A27. Halloran, Richard. To Arm a Nation. New York: Macmillan, 1986. Hanrieder, Wolfram F. The German-American Connection in the 1970s and 1980s: The Maturing of a Relationship. In Carl C. Hodge and Cathal J. Nolan, eds., Shepherd of Democracy? America and Germany in the 20th Century. Westport, CT: Greenwood Press, 1992, 10521. . German-American Relations in the Postwar Decades. In Frank Trommler and Joseph McVeigh, eds., America and the Germans: An Assessment of a Three-Hundred-Year History. Philadelphia: University of Pennsylvania Press, 1985. Hart, C. A., and S. Kariuki. Antimicrobial Resistance in Developing Countries. British Medical Journal 317 (1998): 64750. Hastedt, Glenn. CIAs Organizational Culture and the Problem of Reform. International Journal of Intelligence and Counterintelligence 9 (Fall 1996): 24969. | 271 |
Bibliography Hastedt, Glenn. Controlling Intelligence: The Role of the DCI. International Journal of Intelligence and Counterintelligence 1 (1986): 2540. . Seeking Economic Security through Intelligence. International Journal of Intelligence and Counterintelligence 11 (Winter 1998/99): 385402. Hedley, John H. The CIAs New Openness. International Journal of Intelligence and Counterintelligence 7 (Summer 1994): 12942. . The Intelligence Community: Is It Broken? How to Fix It. Studies in Intelligence 39 (1996): 1119. Henderson, D. A. Smallpox: Clinical and Epidemiologic Features. Emerging Infectious Diseases 5 (July/August 1999): 53839. Henig, Robin Marantz. A Dancing Matrix: Voyages along the Viral Frontier. New York: Knopf, 1993. Herman, Michael. British Intelligence towards the Millennium: Issues and Opportunities. London Defence Studies no. 38. London: Centre for Defence Studies, 1997. . Diplomacy and Intelligence. Discussion Paper no. 39, Diplomatic Studies Programme, Centre for the Study of Diplomacy, Leicester University, March 1998. . Intelligence Power in Peace and War. Cambridge: Cambridge University Press, 1996. Hersh, Seymour M. The Intelligence Gap. New Yorker, December 10, 1999, 5876. . The Missiles of August. New Yorker, October 12, 1998, 3441. . Saddams Best Friend. New Yorker, April 5, 1999, 3241. . Spy vs. Spy, New Yorker, August 8, 1994, 4. . The Traitor. New Yorker, January 18, 1999, 2633. Hillenbrand, Martin J. Fragments of Our Time: Memoirs of a Diplomat. Athens: University of Georgia Press, 1998. Hirschman, Albert. National Power and the Structure of Foreign Trade. Berkeley and Los Angeles: University of California Press, [1945] 1980. Holt, Robert T. Radio Free Europe. Minneapolis: University of Minnesota Press, 1958. Homer-Dixon, Thomas. Environmental Scarcities and Conicts: Evidence from Cases. International Security 19 (Summer 1994): 3562. .Environmental Scarcity, Mass Violence, and the Limits to Ingenuity. Current History 95 (November 1996): 35965. . On the Threshold: Environmental Changes as Acute Causes of Conict. International Security 19 (Fall 1991): 76116. , and Marc Levy. Correspondence: Environment and Security. International Security 20 (Winter 1995/96): 189198. | 272 |
Bibliography , and Valerie Percival. Environmental Security and Violent Conict: Briefing Book. Toronto: University of Toronto Press, 1996. Hopgood, Stephen. American Foreign Environmental Policy and the Power of the State. New York: Oxford University Press, 1998. Hughes, Thomas L. The Power to Speak and the Power to Listen: Reections in Bureaucratic Politics and a Recommendation on Information Flows. In Thomas M. Franck and Edward Weisband, eds., Secrecy and Foreign Policy. New York: Oxford University Press, 1974. Hulnick, Arthur S. Openness: Being Public about Secret Intelligence. International Journal of Intelligence and Counterintelligence 12 (Winter 1999): 46383. . The Uneasy Relationship between Intelligence and Private Industry. International Journal of Intelligence and Counterintelligence 9 (Spring 1996): 1732. Huntington, Samuel P. The Erosion of American National Interests. Foreign Affairs 76 (September/October 1997): 2849. Inderfurth, Karl F., and Loch K. Johnson. Decisions of the Highest Order. Belmont, CA: Brooks/Cole, 1988. Inman, Bobby Ray. Interview, U.S. News & World Report, December 20, 1982, 32. Jeffreys-Jones, Rhodri. The CIA and American Democracy. New Haven, CT: Yale University Press, 1989. Johnson, Loch K. Americas Secret Power: The CIA in a Democratic Society. New York: Oxford University Press, 1989. . Analysis for a New Age. Intelligence and National Security 11 (October 1996): 65771. . Balancing Security and Liberty. Freedom Review 28 (Summer 1997): 3744. . The CIA and the Question of Accountability. In Rhodri JeffreysJones and Christopher Andrew, eds., Eternal Vigilance? 50 Years of the CIA. London: Cass, 1997, 13259; reprinted from Intelligence and National Security 12 (January 1997): 178200. . The CIA: Controlling the Quiet Option. Foreign Policy 39 (Summer 1980): 14352. . Congress and the CIA: Monitoring the Dark Side of Government. Legislative Studies Quarterly 5 (1980): 47799. . The Evolution of CIA Accountability. American Intelligence Journal (March 1995): 4346. . Intelligence and the Challenge of Collaborative Government. Intelligence and National Security 13 (Summer 1998): 17782. | 273 |
Bibliography Johnson, Loch K. Legislative Reform of Intelligence Policy. Polity 17 (Spring 1985): 54973. . The Making of International Agreements: Congress Confronts the Executive. New York: New York University Press, 1984. . Reinventing the CIA: Strategic Intelligence and the End of the Cold War. In Randall B. Ripley and James M. Lindsay, eds., U.S. Foreign Policy after the Cold War. Pittsburgh: University of Pittsburgh Press, 1997, 13259. . A Season of Inquiry: The Senate Intelligence Investigation. Lexington: University Press of Kentucky, 1986. . Secret Agencies: U.S. Intelligence in a Hostile World. New Haven, CT: Yale University Press, 1996. . Smart Intelligence. Foreign Policy 89 (Winter 1992/93): 5370. , with Annette Freyberg. Ambivalent Bedfellows: German-American Intelligence Relations, 19691991. International Journal of Intelligence and Counterintelligence 10 (Summer 1997): 16579. , with Scott A. Hershovitz. Strategic Intelligence and Environmental Security. Research Paper no. 44, Special Report, Research Institute for European Studies, February 1998, 115. , with Kevin J. Scheid. Spending for Spies: Intelligence Budgeting in the Aftermath of the Cold War. Public Budgeting & Finance 17 (Winter 1997): 727. , with Diane C. Snyder. Beyond the Traditional Intelligence Agenda: Examining the Merits of a World Health Portfolio. Journal of Conict Resolution (Fall 1998): 2946. Johnson, Paul. No Cloak and Dagger Required: Intelligence Support to UN Peacekeeping. Intelligence and National Security 12 (October 1997): 10212. Johnston, David. Korean Spy Case Takes More Serious Turn. New York Times, October 3, 1996, A5. Kahn, David. Big Ear or Big Brother? New York Times Magazine, May 16, 1976, 13 ff. . The Codebreakers. New York: Macmillan, 1967. Kaiser, Frederick M. Congress and the Intelligence Community: Taking the Road Less Traveled. In Roger H. Davidson, ed., The Post-reform Congress. New York: St. Martins Press, 1992. . Impact and Implications of the Iran-Contra Affair on Congressional Oversight of Covert Action. International Journal of Intelligence and Counterintelligence 7 (1994): 20534. Kaiser, Karl. Patterns in Partnership. In Steven Muller and Gerhard Schewigler, eds., From Occupation to Cooperation. New York: Norton, 1992. | 274 |
Bibliography Karacs, Imre. Germany Expels Three CIA Spies in Secret Deal. Independent (London), September 29, 1999, 16. Kennedy, David M. Sunshine and Shadow: The CIA and the Soviet Economy. Case Program C16911096.0, Kennedy School of Government. Cambridge, MA: Harvard University, 1991. Kent, Sherman. Strategic Intelligence for American World Policy. Princeton, NJ: Princeton University Press, 1949. Kinkel, Klaus. Speech. Reprinted in Statements & Speeches 19, German Information Center, Stuttgart, September 6, 1996. Kinzer, Stephen. Where Kurds Seek a Land, Turks Want the Water. New York Times, February 28, 1999, E3. Knott, Stephen F. Secret and Sanctioned: Covert Operations and the American Presidency. New York: Oxford University Press, 1996. Koch, Burkhart. Germanys New Assertiveness in International Relations: Between Reality and Misperception. Stanford, CA: Hoover Institution, 1992. Kohler, Robert. The Intelligence Industrial Base: Doomed to Extinction? Working Group on Intelligence Reform. Washington, DC: Consortium for the Study of Intelligence, 1984, 122. Korb, Larry. Money to Burn at the Pentagon. New York Times, September 25, 1998, A27. Kortepeter, Mark G., and Gerald W. Parker. Potential Biological Weapons Threats. Emerging Infectious Diseases 5 (July/August 1999): 52327. Kristof, Nicholas, and Sheryl WuDunn. Of World Markets, None an Island. New York Times, May 2, 1999, sec. 4, p. 1. Kupperman, Robert H., and David M. Smith. Coping with Biological Terrorism. In Brad Roberts, ed., Biological Weapons: Weapons of the Future? Washington, DC: Center for Strategic and International Studies, 1993. Lake, Anthony. Managing Complexity in U.S. Foreign Policy. Washington, DC: U.S. Department of State, Bureau of Public Affairs, March 14, 1978. Laqueur, Walter. A World of Secrets: The Uses and Limits of Intelligence. New York: Basic Books, 1985. Lasswell, Harold. What, Where, When, and How. Chicago: University of Chicago Press, 1936. Leach, James A. The New Russian Menace. New York Times, September 10, 1999, A27. Lederberg, Joshua. Biological Weapons: Limiting the Threat. Cambridge, MA: MIT Press, 1999. Levy, Marc. Is the Environment a National Security Issues? International Security 20 (Fall 1995): 3563. | 275 |
Bibliography Lewis, Anthony. When We Could Believe. New York Times, June 12, 1987, A31. Lindblom, Charles E. The Policy-Making Process. Englewood Cliffs, NJ: Prentice-Hall, 1968. Lippman, Thomas. Success Stories, Symbolism Draw Christopher to Africa. Washington Post, October 8, 1996, A12. Livingston, Robert Gerald. The Quest for Stasis Old Files. Los Angeles Times, December 27, 1998, M2. Loeb, Vernon. CIA Still Recuperating from Moles Aftermath. Washington Post, February 22, 1999, A13. . Hobbyists Track down Spies in Sky. Washington Post, February 20, 1999, A1. . Spying Intelligence Data Can Be an Open-Book Test. Washington Post, March 22, 1999, A17 Lowenthal, Mark M. Intelligence: From Secrets to Policy. Washington, DC: CQ Press, 2000. . Keep James Bond out of GM. International Economy, July/August 1992, 5254. . U.S. Intelligence: Evolution and Anatomy. 2d ed. Westport, CT: Praeger, 1992. Luard, Evan. Basic Texts in International Relations. New York: St. Martins Press, 1992. Lundberg, Kirsten, CIA and the Fall of the Soviet Empire: The Politics of Getting It Right, Case Program C16941251.0. Kennedy School of Government. Cambridge, MA: Harvard University, 1994. Macartney, John. NSA, HPSCI Butt Heads over Echelon. Weekly Intelligence Notes, Association of Former Intelligence Ofcers, June 11, 1999, 2. . Reform: Bonanza for Scholars. Intelligencer, Academic Exchange Program Newsletter, Association of Former Intelligence Ofcers 7 (Summer 1996): 35. Maggs, John. From Swords to Plowshares. Journal of Commerce, August 18, 1995, 1. Mann, Jim. CIA Papers Detail 1960s Payments to Dalai Lama. Los Angeles Times, September 16, 1998, 4. Marchetti, Victor L., and John D. Marks. The CIA and the Cult of Intelligence. New York: Knopf, 1974. Maslow, Abraham. Motivation and Personality. New York: Harper & Row, 1987. Mastanduno, Michael. Economics and Security in Statecraft and Scholarship. International Organization 4 (Autumn 1998): 82554. | 276 |
Bibliography Matthews, Jessica Tuchman. Power Shift. Foreign Affairs 76 (January/February 1997): 5066. . Preserving the Global Environment. In Eugene R. Wittkopf, ed., The Future of American Foreign Policy. 2d ed. New York: St. Martins Press, 1994, 10816. . Remarks, National Security in the 21st Century. Richard B. Russell Symposium, University of Georgia: Athens, October 26, 1999. May, Ernest R. Intelligence: Backing into the Future. Foreign Affairs 71 (Summer 1992): 6372. McClintock, Michael. Instruments of Statecraft. New York: Pantheon Books, 1992. McDonald, Kim A. NASA Satellites May Revolutionize Earth Sciences. Chronicle of Higher Education, July 9, 1999, A20, A22. McNeil, Donald G. Jr. AIDS Is the Silent Killer in Africas Economies. New York Times, November 15, 1998, A1. Melman, Yossi. Israels Darkest Secrets. New York Times, March 25, 1998, A23. Menges, Constantine C. The Future of Germany and the Atlantic Alliance. Washington, DC: AEI Press, 1991. Miller, Judith, with William J. Broad. Clinton Describes Terrorism Threat for 21st Century. New York Times, January 22, 1999, A1. . Clinton to Announce That U.S. Will Keep Sample of Lethal Smallpox Virus. New York Times, April 22, 1999, A12. . Iranians, Bioweapons in Mind, Lure Needy Ex-Soviet Scientists. New York Times, December 8, 1998, A1. Millis, John. Speech, Central Intelligence Retirees Association, Langley, VA, October 5, 1998. Mintz, John. Lockheed Martin Lawsuit Delayed by Pentagon, CIA. Washington Post, February 28, 1996, A13. Morse, Stephen S. Controlling Infectious Diseases. Technology Review 98 (October 1995): 5461. Moynihan, Daniel Patrick. Do We Still Need the C.I.A.? The State Dept. Can Do the Job, New York Times, May 19, 1991, E17. . Secrecy. New Haven, CT: Yale University Press, 1998. Muller, Steven, and Gerhard Schewigler, eds. From Occupation to Cooperation. New York: Norton, 1992. National Institute for Public Policy. Modernizing Intelligence. Fairfax, VA: National Institute for Public Policy, 1997. National Intelligence Council. The Environmental Outlook in Central and | 277 |
Bibliography Eastern Europe. Intelligence Community Assessment, ICA 9608D. Washington, DC: National Intelligence Council, December 1997, 133. National Intelligence Council.The Environmental Outlook in Russia. Intelligence Community Assessment, ICA 9808 Washington, DC: National Intelligence Council, January 1999, 135. . Global Trends 2010. Langley, VA, November 1997. National Public Radio. Interview with Apache helicopter pilot in Kosovo, July 7, 1999. National Research Council. Ofce of International Affairs. The Pervasive Role of Science, Technology, and Health in Foreign Policy: Imperatives for the Department of State. Washington, DC: National Academy Press, 1999. Neu, C. R. Comments on Economic Intelligence. Speech, Institute for International Economics, Washington, DC, April 25, 1995. Neustadt, Richard E. Presidential Power. New York: Wiley, 1960. Newman, David, and Bruce Bueno de Mesquita. Repeal Order 12333, Legalize 007. New York Times, January 26, 1989, A23. Nivola, Pietro S. American Trade Policy after the Cold War. In Randall B. Ripley and James M. Lindsay, eds., U.S. Foreign Policy after the Cold War. Pittsburgh: University of Pittsburgh Press, 1997, 23556. Nye, Joseph S. Jr. Bound to Lead: The Changing Nature of American Power. New York: Basic Books, 1990. . Open Hearings, Aspin-Brown commission. Washington, DC, January 19, 1996. .Redening National Security. Foreign Affairs 78 (July/August 1999): 2235. Oakley, Phyllis. Intelligence Support to Diplomacy: Issues and Trends. Speech, Association of Former Intelligence Ofcers, Langley, VA, November 6, 1998. OConnell, Charles T. The Munich Institute for the Study of the USSR: Origin and Social Composition. Pittsburgh: University of Pennsylvania Center for Russian and East European Studies, 1990. Omestad, Tom. Psychology and the CIA: Leaders on the Couch. Foreign Policy 99 (Summer 1994): 10522. Omsted, Kathryn. Challenging the Secret Government: The Post-Watergate Investigations of the CIA and FBI. Chapel Hill: University of North Carolina, 1996. Orme, William Jr. International Study on Water in Mideast Leads to a Warning. New York Times, March 3, 1999, A9. OToole, Tara. Smallpox: An Attack Scenario. Emerging Infectious Diseases 5 (July/August 1999): 54046. | 278 |
Bibliography Park, Robert L. Liars Never Break a Sweat. New York Times, July 12, 1999, A19. Paterson, Matthew, and Michael Grubb. The International Politics of Climate Change. International Affairs 68 (1992): 296. Perlez, Jane. Albright Says Husseins Foes Are Building Unied Front. New York Times, May 25, 1999, A4. . Clinton Pushes for Treaty to Ban the Worst Child Labor Practices. New York Times, June 17, 1999, A17. . Uncertainty Is Persisting Word on U.S.-Moscow Relationship. New York Times, June 20, 1999, A12. Peters, Ralph. A Revolution in Military Ethics? Parameters 26 (Summer 1996): 106. Pincus, Walter. A Low Prole for CIA Chief. Washington Post, January 13, 1998, A13. . Military Espionage Cuts Eyed. Washington Post, March 17, 1995, A6. . Rumsfeld Questions Over-Compartmentalization. Washington Post, May 5, 1999, A29. . Saddam Husseins Death Is a Goal. Washington Post, February 15, 1998, A36. . Tenet Seeks Coordination of Intelligence Gathering. Washington Post, February 12, 1999, A33. . U.S. Preparedness Faulted. Washington Post, July 9, 1999, A2. Pirages, Dennis. Microsecurity Disease Organisms and Human Well-Being. Washington Quarterly 18 (Fall 1995): 512. Porteous, Samuel D. Looking out for Economic Interests: An Increased Role for Intelligence. Washington Quarterly 19 (1996): 191204. Powers, Richard Gid. Introduction to Secrecy, by Daniel Patrick Moynihan. New Haven, CT: Yale University Press, 1998. Prados, John. Presidents Secret Wars: CIA and Pentagon Covert Operations since World War II. New York: Morrow, 1986. Preston, Richard. The Demon in the Freezer. New Yorker, July 13, 1999, 4461. . Hot Zone. Random House, 1994. Pringle, Peter. Bioterrorism. Nation, November 9, 1998, 1117. Purver, Ron. Understanding Past Non-Use of C.B.W. by Terrorists. Presentation, Conference on ChemBio Terrorism: Wave of the Future? Chemical and Biological Arms Control Institute, Washington, DC, April 29, 1996. Rainey, Hal. Understanding and Managing Public Organizations. 2d ed. San Francisco: Jossey-Bass, 1997. | 279 |
Bibliography Ranelagh, John. The Agency: The Rise and Decline of the CIA. New York: Simon & Schuster, 1986. Ransom, Harry Howe. The Intelligence Establishment. Cambridge, MA: Harvard University Press, 1970. . Letter to the editor, New York Times, October 30, 1998, A34. . The Politicization of Intelligence. In Stephen J. Cimbala, ed., Intelligence and Intelligence Policy in a Democratic Society. Dobbs Ferry, NY: Transnational, 1987, 2546. . Reections on Forty Years of Spy-Watching. Unpublished paper, December 7, 1994, 114. Reese, Mary E. General Reinhard Gehlen: The CIA Connection. Fairfax, VA: George Mason University Press, 1990. Richelson, Jeffrey T. The U.S. Intelligence Community. 4th ed. Boulder, CO: Westview Press, 1999. , and Desmond Ball. The Ties That Bind: Intelligence Cooperation among the UKUSA Countries. Boston: Allen & Unwin, 1985. Rielly, John E. Americans and the World: A Survey at Centurys End. Foreign Policy 114 (Spring 1999): 97114. , ed. American Public Opinion and U.S. Foreign Policy. Chicago: Chicago Council on Foreign Relations, 1991. Risen, James. Bonn Sniffs for Russian Moles, Worrying C.I.A. New York Times, June 4, 1998, A1. . C.I.A. Proposal for Iraq Action Reportedly Turned Down. New York Times, May 11, 1998, A16. . C.I.A. Sees a North Korean Missile Threat. New York Times, February 3, 1999, A6. . Clinton Asks the Views of Top Aides on the Freeing of Pollard. New York Times, December 3, 1998, A8. . Clinton Reportedly Orders CIA to Focus on Trade Espionage. Los Angeles Times, July 23, 1995, A14. . Energy Secretary Delays Disciplining Staff over Spy Case. New York Times, June 10, 1999, A6. . Gore Rejected C.I.A. Evidence of Russian Corruption. New York Times, November 23, 1998, A8. . To Bomb Sudan Plant, or Not: A Year Later, Debates Rankle. New York Times, October 27, 1999, A1, A12. , and Steven Erlanger. C.I.A. Chief Vowed to Quit If Clinton Freed Israeli Spy. New York Times, November 11, 1998, A1. Ritter, Scott. Endgame. New York: Simon & Schuster, 1999. | 280 |
Bibliography Robertson, Barbara P. Hull et al. Yellow Fever: A Decade of Reemergence. Journal of the American Medical Association, October 9, 1996, 115762. Robertson, K. G. Secrecy and Open Government. New York: Macmillan, 1999. Rockefeller commission. Report. Washington, DC: U.S. Government Printing Ofce, 1975. Rockman, Bert A. Americas Departments of State. American Political Science Review, December 1981, 91127. Rohter, Larry. Haiti Paralysis Brings a Boom in Drug Trade. New York Times, October 27, 1998, A1. Ronnfeldt, C. F. Three Generations of Environment and Security Research. Journal of Peace Research 34 (November 1997): 47382. Rosenbaum, David E. U.S. Ofcial Calls Tallies of Kosovo Slain Too Low. New York Times, April 19, 1999, A10. Ryan, Frank. Virus X: Tracking the New Killer Plagues. Boston: Little, Brown, 1997. Salvetti, Lloyd. Remarks, Joint Intelligence Conference, Defense Intelligence Agency, June 18, 1999. Sanger, David E., and Tim Weiner. Emerging Role for the C.I.A.: Economic Spy. New York Times, October 15, 1995, A1. Schelter, Kurt. Speech, Symposium on International Terrorism: Are We Cooperating Enough? New York City, October 23, 1996. Schick, Allen. Congress and Money: Budgeting, Spending and Taxing. Washington, DC: Urban Institute, 1980. Schmitt, Eric. In a Fatal Error, C.I.A. Picked a Bombing Target Only Once: The Chinese Embassy. New York Times, July 22, 1999, A9. . Leading Senators Demand That U.S. Limit Overtures to China. New York Times, March 14, 1999, A6. . Senate Panel and C.I.A. Fight on China Documents. New York Times, June 5, 1998, A12. Schorr, Daniel. Hypocrisy about Assassination. Washington Post, February 3, 1991, C7. .Washington Notebook. New Leader May 1731, 1999, 5. Schumeyer, Colonel Gerard. Medical Intelligence: Making a Difference. American Intelligence Journal 17 (1996): 1116. Schweitzer, Glenn E., with Carole C. Dorsch. Super-Terrorism: Assassins, Mobsters, and Weapons of Mass Destruction. New York: Plenum Trade, 1998. Sciolino, Elaine, and Ethan Bronner, How a President, Distracted by Scandal, Entered Balkan War. New York Times, April 18, 1999, A13. | 281 |
Bibliography Shenon, Philip. Suspect North Korean Atom Site Is Empty, U.S. Finds. New York Times, May 28, 1999, A3. Simon, Jeffrey D. The Terrorist Trap: Americas Experience with Terrorism. Bloomington: Indiana University Press, 1994. Simpson, Christopher. Blowback: Americas Recruitment of Nazis and Its Effects on the Cold War. New Haven, CT: Yale University Press, 1990. . National Security Directives of the Reagan and Bush Administrations. Boulder, CO: Westview Press, 1995. Smist, Frank J. Jr. Congress Oversees the United States Intelligence Community, 19471989. Knoxville: University of Tennessee Press, 1990. Smith, Bradley F. Sharing Secrets with Stalin: How the Allies Traded Intelligence, 19411945. Lawrence: University Press of Kansas, 1996. Smith, R. Jeffrey, and Thomas W. Lippmann, FBI Plans to Expand Overseas. Washington Post, August 20, 1996, A1. Snider, L. Britt. Sharing Secrets with Lawmakers: Congress as a User of Intelligence. Intelligence Monograph, Center for the Study of Intelligence, Central Intelligence Agency, Langley, VA, February 1987. Specter, Michael. Deep in the Russian Soul, Lethal Darkness. New York Times, June 6, 1997, E1. Steele, Robert D. Relevant Information and All-Source Analysis: The Emerging Revolution. American Intelligence Journal 19 (1999): 2330. Steinbruner, John D. Biological Weapons: A Plague upon All Houses. Foreign Policy (Winter 1997/98): 8596. . Nuclear Decapitation. Foreign Policy 40 (Winter 1981/82): 1628. Steinhauer, Jennifer, and Judith Miller. In New York Outbreak, Glimpse of Gaps in Biological Defenses. New York Times, October 11, 1999, A1. Stern, Jessica. The Prospect of Domestic Bioterrorism. Emerging Infectious Diseases 5 (July/August 1999): 51722. . The Ultimate Terrorists. Cambridge, MA: Harvard University Press, 1999. Stolberg, Sheryl Gay. DDT, Target of Global Ban, Finds Defenders in Experts on Malaria. New York Times, August 29, 1999, A1, A6. Stout, David. U.S. Photos Show Ground Work at Suspected Site of Mass Grave. New York Times, June 10, 1999, A18. Strong, Maurice. 40 Chernobyls Waiting to Happen. New York Times, March 22, 1992, E15. Talbott, Kirk, and Melissa Brown. Forest Plunder in Southeast Asia: An Environmental Security Nexus in Burma and Cambodia. In Geoffrey D. Dabelko, ed., Report: Environmental Change and Security Project, Woodrow Wilson Center 4 (Spring 1998): 5360. | 282 |
Bibliography Tenet, George J. Does America Need the CIA? Speech, Gerald R. Ford Library, Grand Rapids, MI, November 19, 1997. . Hearings, U.S. Senate Armed Services Committee, 106th Cong., 1st sess., February 2, 1999. . Letter to the editor, New York Times, July 16, 1998, A18. . Remarks, annual dinner, Nashua (NH) Chamber of Commerce, June 28, 1999. . What New Role for the C.I.A.? New York Times, October 27, 1998, A23. Thomas, Stafford T. The CIAs Bureaucratic Dimensions. International Journal of Intelligence and Counterintelligence 12 (Winter 1999): 399413. . On the Selection of Directors of Central Intelligence. Southeastern Political Review 9 (Spring 1984): 159. . Presidential Styles and DCI Selection. International Journal of Intelligence and Counterintelligence 7 (Summer 1994): 17598. Thompson, Mark. Why the Pentagon Gets a Free Ride. Time, June 5, 1995, 2627. Tolba, Mostafa K., with Iwona Fummel-Bulska. Global Environmental Diplomacy: Negotiating Environmental Agreements for the World, 19731992. Cambridge, MA: MIT Press, 1998. Traynor, Ian. Bridge of Spies. Guardian, March 26, 1997, 23. Treverton, Gregory F. Covert Action: The Limits of Intervention in the Postwar World. New York: Basic Books, 1987. . Intelligence since Cold Wars End. In Report of the Twentieth Century Fund Task Force on the Future of U.S. Intelligence, ed., In from the Cold War. New York: Twentieth Century Fund Press, 1996, 99133. . Intelligence: Welcome to the American Government. In Thomas E. Mann, ed., A Question of Balance: The President, the Congress and Foreign Policy. Washington, DC: Brookings Institution, 1990, 70108. Tucker, Jonathan B. Chemical/Biological Terrorism Coping with a New Threat. Politics and the Life Sciences 15 (September 1996): 16785. Turner, Stansfield. Democracy and Terrorism. Boston: Houghton Mifflin, 1991. . Intelligence for a New World Order. Foreign Affairs 70 (Fall 1991): 15066. . Purge the C.I.A. of K.G.B. Types. New York Times, October 2, 1991, A19. . Secrecy and Democracy. Boston: Houghton Mifin, 1985. Tyler, Patrick E. China Concedes That AIDS Virus Infected Common Blood Product. New York Times, October 25, 1996, A1. | 283 |
Bibliography Tyson, James L. U.S. International Broadcasting and National Security. New York: Ramapo Press, 1983. U.S. Congress. House. IC21: The Intelligence Community in the 21st Century, Permanent Select Committee on Intelligence, 104th Cong., 1st sess. Washington, DC: U.S. U.S. Government Printing Ofce, 1996. . House. Intelligence Authorization Act for Fiscal Year 1997. H.R. 3259, 104th Cong., 2d sess. Washington, DC: U.S. Government Printing Ofce, 1996. . House. Report 102963, 102d Cong., 2d sess. Washington, DC: U.S. Government Printing Ofce, 1992. . Ofce of Technological Assessment. Proliferation of Weapons of Mass Destruction: Assessing the Risks. Rept. OTAISC559, August 1993. . House. Select Committee on U.S. National Security and Military/ Commercial Concerns with The Peoples Republic of China (Cox committee). Report 105851, 105th Cong., 2d sess. Washington, DC: U.S. Government Printing Ofce, May 25, 1999. . Senate. Select Committee on Intelligence Activities (Church committee). Alleged Assassination Plots Involving Foreign Leaders. Interim Report, 94th Cong., 2d sess., November 1975. . Senate. Select Committee on Secret Military Assistance to Iran and the Nicaraguan Opposition and House Select Committee to Investigate Covert Arms Transactions with Iran (Inouye-Hamilton committees). Report on the Iran-Contra Affair. S. Rept. 100216 and H. Rept. 100433, November 1987. Walden, Jerrold L. The CIA: A Study in the Arrogation of Administrative Power. George Washington Law Review 39 (October 1970): 66101. Walpole, Robert D. North Koreas Taepo Dong Launch and Some Implications on the Ballistic Missile Threat to the United States. Speech, Center for Strategic and International Affairs, Washington, DC, December 8, 1998. Warner, Michael, ed. The CIA under Harry Truman. Washington, DC: Center for the Study of Intelligence, CIA, 1994. Weaver, Mary Anne. The Real bin Laden. New Yorker, January 24, 2000, 3238. Weber, Ralph E., ed., Spymasters: Ten CIA Ofcers in Their Own Words. Wilmington, DE: SR Books, 1999. Weiner, Myron, ed., International Migration and Security. Boulder, CO: Westview Press, 1993. Weiner, Tim. After Errant $2 Billion, Spy Satellite Agency Heads Are Ousted., New York Times, February 27, 1996, A9. | 284 |
Bibliography . Big Cash Infusion Aims to Rebuild Anemic C.I.A.. New York Times, October 22, 1998, A3. . A Blast at Secrecy in Kennedy Killing. New York Times, September 29, 1998, A17. . The Case of the Spies without a Country. New York Times, January 17, 1999, B6. . C.I.A. Chief Defends Secrecy, in Spending and Spying, to Senate. New York Times, February 23, 1996, A5. . C.I.A. Inquiry Asks for an Overhaul. New York Times, June 3, 1998, A8. . C.I.A.s Workaday Cloak. New York Times, April 5, 1995, A6. . A Guatemala Ofcer and the C.I.A.. New York Times, March 26, 1995, A6. . House Votes to Bolster a Drug-Trafcking Bill. New York Times, November 10, 1999, A8. . Opponents Find That Ousting Hussein Is Easier Said Than Done. New York Times, November 16, 1998, A10. . Rethinking the Ban on Political Assassinations. New York Times, August 30, 1998, E3. . U.S. Spy Agencies Find Scant Peril on Horizon. New York Times, January 29, 1998, A3. Weiser, Benjamin. U.S. Ofcials Say Aid for Terrorists Came through Two Persian Gulf Nations. New York Times, July 8, 1999, A8. Westereld, Bradford H. America and the World of Intelligence Liaison. Intelligence and National Security 11 (July 1996): 52360. , ed. Inside CIAs Private World. New Haven, CT: Yale University Press, 1995. Whitney, Craig R. Fewer Bombs Fall on a Cloudy Day in Balkan Battle. New York Times, April 12, 1999, A10. . Germany Finds That Spies Are Still Doing Business. New York Times, September 9, 1993, A1. . Hunger Strike Continues for Terrorist Called Carlos. New York Times, November 15, 1998, A4. Whitney, Merrill E., and James D. Gaisford. Economic Espionage as Strategic Trade Policy. Canadian Journal of Economics 29 (April 1996): 4699. Wildavsky, Aaron. The Politics of the Budgetary Process. Boston: Little, Brown, 1964. . Speaking Truth to Power: The Art and Craft of Policy Analysis. Boston: Little, Brown, 1979. | 285 |
Bibliography Williams, Daniel, and John M. Goshko. Reduced U.S. World Role Outlined but Soon altered., Washington Post, May 26, 1993, A1. Wilson, Edward O. The Diversity of Life. New York: Penguin Books, 1994. Wilson, James Q. Bureaucracy. New York: Basic Books, 1989. . Thinking about Reorganization. Washington, DC: Consortium for the Study of Intelligence, 1993. Wilson, Mary E. Infectious Diseases: An Ecological Perspective. British Medical Journal, December 23, 1995, 168184. Wines, Michael. Straining to See the Real Russia. New York Times, May 2, 1999, sec. 4, p. 1. .Two Views of Inhumanity Split the World, Even in Victory. New York Times, June 13, 1999, sec. 4, p. 1. Wise, David. Nightmover. New York: HarperCollins, 1995. .The Spies Who Lost $4 Billion. George, October 1998, 8286. Woolsey, James R. The Future Direction of Intelligence. Speech, Center for Strategic and International Studies, Washington, DC, July 18, 1994. . Hearings, U.S. Senate Select Committee on Intelligence, 103d Cong., 2d sess., March 6, 1993. . World Threat Assessment Brief. Statement for the record, Hearings, U.S. Senate Select Committee on Intelligence, 104th Cong., 1st sess., January 10, 1995. Wren, Christopher S. A Purer, More Potent Heroin Lures New Users to a Long, Hard Fall, New York Times, May 9, 1999, A27. . U.N. to Create Own Satellite Program to Find Illegal Drug Crops. New York Times, March 28, 1999, A10. Wright, Robert. Private Eyes. New York Times Magazine, September 5, 1999, 52, 54. Zelikow, Philip. American Economic Intelligence: Past Practice and Future Principles. In Rhodri Jeffreys-Jones and Christopher Andrew, eds., Eternal Vigilance? 50 Years of the CIA. London: Case, 1997, 16477. .American Intelligence and the World Economy. In Report of the Twentieth Century Fund Task Force on the Future of U.S. Intelligence, ed., In from the Cold. New York: Twentieth Century Fund, 1996, 137262. Zumla, Alimuddin, and John Grange. Tuberculosis. British Medical Journal 316 (1998): 196265.
| 286 |
INDEX
Abourezk, James, 261n; Abourezk amendment, 203 Academe, 218 Accountability. See Oversight Acid rain, 52 Administration, Directorate of (DA/CIA), 9899, 1034; admin personnel, 104; Ofce of Personnel Security, 104 Afghanistan, 44, 178, 179, 180, 246n Africa, 16, 75, 80 African-Americans, 20910 Agents (assets), 7, 100, 117, 148, 149, 185 Aidid, Mohamed Farah, 183, 216 AIDS, 74, 77, 80, 81 Air Force intelligence, 3 Airbus, 34 Albania, 75, 169 Albright, Madeleine K., 166 Algeria, 21 Alibek, Ken (aka Kanatjan Kalibekov), 80 Allende, President Salvador, 203 All-source intelligence, 8, 40, 85, 100, 108, 186 Alpirez, Julio Roberto, 34 Al-Qaida terrorist faction, 23 America. See United States Ames, Aldrich Hazen, 28, 104, 158, 176, 216, 254n Analysis, 1, 7, 98100, 197; budget for, 147; problems of, 18691 Anderson, Jack, 207 Angleton, James Jesus, 103, 157, 176 Angola, 205 Annan, Secretary-General Ko, 170 Anthrax, 78, 80; vaccination against, 83 Apache helicopters, 18 Apple, R. W., Jr., 137 Aral Sea, 72 Arctic circle, 54, 57 Argentina, 50; Buenos Aires, 179 Armed Forces Medical Intelligence Center, 85, 90, 238n
Armed Services Committees, 113, 217, 245n Arms control, 22 Arms Control Intelligence Staff, 22 Arms trade, 172, 193. See also Proliferation Army intelligence, 3 Arnoff, Myron J., 258 Asia, 38, 75 Asian nancial crisis, 45, 46 Aspin, Les, 194, 216, 217 Aspin-Brown commission, 12, 41, 72, 76, 86, 11314, 115, 142, 14445, 149, 167, 192, 193, 194, 197, 208, 218, 248n, 250n; on budget disclosure, 129; creation of, 216; on intelligence successes, 191 Assassination plots, 102, 103, 18284, 218; exposure of, 207 Assessment, 189 Association of Former Intelligence Ofcers, 264n Association of Retired Intelligence Ofcers, 217 Atrocities, 18 Aum Shinrikyo, 5, 21, 22 Australia, 150 Automobile trade, 41 Auxiliary precautions, 199 Awareness of National Security Issues and Response (ANSIR), 36 Baader-Meinhof gang, 161 Backre bomber, 190 Balkans, 4, 13, 16, 17, 86, 145 Base program (budget), 126 Bay of Pigs, 1, 201, 203 Bayh, Birch, 224 Bear bombers, 127 Beilenson, Anthony C., 224 Belarus, 20 Belgrade, 4 Benin, 75 Benjamin, Daniel, 178 Beres, Louis Rene, 258 Berger, Samuel R., 166
| 287 |
Index
Berkowitz, Bruce D., 120 Berlin, crisis in, 160 Betts, Richard K., 239n BfV (German equivalent of FBI), 253n Bin Laden, Osama, 6, 15, 23, 24, 178, 180, 181, 229n Biodiversity, loss of, 56 Biological warfare, 21; weapons, 179, 239n Bird u, 80 Blackleaf40, 182 Blackwill, Robert D., 39, 164, 198 BND (Bundesnachrichtendienst), 153, 154, 155, 158; competence questioned, 253n Board for International Broadcasting, 156 Boeing aircraft company, 34 Boland amendments, 205 Boland, Edward P., 208, 211, 224 Bolivia, 44 Bombs, 162; signatures on, 256n. See also Proliferation Boren, David, 166, 224, 245n Boren-McCurdy Act, 245n Bosnia, 6, 13, 15, 109, 136, 138, 143, 169 Brandeis, Justice Louis, 200, 221 Brandt, Willy, 160 Brazil, 30 British intelligence, 8, 14748, 151, 158; SAS counterterrorist force, 253 Brookings Institution, 247n Brooks, Jack, 209 Brown, Harold, 34, 113, 194, 217 Buddhism, 95 Budgets: comparative intelligence, 151; bloated U.S. intelligence, 177, 249n Bueno de Mesquita, Bruce, 258n Bugs. See Diseases Bulgaria, 138 Burden sharing, intelligence, 152. See also Liaison Bureau of Alcohol, Tobacco and Firearms, 177 Bureau of Intelligence and Research (INR), 3, 4, 110, 115 Bureau of the Budget, 202 Bureaucracy, 12 Burglary (black-bag or second-story jobs), 103 Burma, 44 Burundi, 13, 15 Bush, President George, 28, 45, 111, 136, 183, 187, 21516, 223, 243n, 248n; administration of, 196; covert action and, 205, 216 Business intelligence, 231n Cabinet (U.S.), 10910 Cali drug cartel, 6, 44 Campbell, Colin, 97 Canada, 35, 150; Canadian Security Intelligence Service, 239n Capitol Hill, 47 Caribbean, 44 Carlos the Jackal (aka Ilich Ramierez Sanchez), 191, 254n Carter, President Jimmy, 52, 161, 204; Carter Center, 76 Case (operations) ofcers (CIA), 7, 98, 100101, 184 Casey, William J., 107, 110, 111, 177, 210, 223, 247n Castro, Fidel, 96, 182, 183 Castro, Raul, 183 CD-ROM, 194 Center for CIA Security, 108 Center for Counterintelligence, 108 Center for National HUMINT Requirements Tasking, 108 Center for Support Coordination, 108 Centers for Disease Control and Prevention (CDC), 76, 90 Central Africa, 13; Great Lakes region, 52 Central Europe, 13 Central Intelligence: assistant director for administration, 114; assistant director for analysis and production, 114; assistant director for intelligence collection, 114; deputy director, 114; deputy director for community management, 114 Central Intelligence Agency (CIA), 2, 3, 39, 43, 50, 54, 75, 156; agent recruitment, 213; assassination plots, 182; budget, 202, 247n; criticism of, 213; difculty of managing, 1057; divisions of, 9899, 1057; ignored, 193; inltration of domestic organizations, 209; inspector general, 205, 206; internal cultures of, 98; managers of, 98, 1045; Ofce of Congressional Affairs, 218; Ofce of General Counsel, 218; and peace negotiations, 16667; protection of, 216; reorientation of resources, 12; scientists, 103; security ofcers, 989; ties to Maa, 96; and UN, 16772 Centrism, protean, 119 Chemical weapons, 13, 22, 24, 179, 239n; toxic chemicals, 60 Chernobyl nuclear reactor, 55, 57, 83 Chernomyrdin, Victor S., 65, 193 Child labor practices, 42 Chile, 203, 207, 219
| 288 |
Index
Chin, Wu-Tai, 104 China, 13, 14, 15, 35, 36, 56, 63; alleged spying at Los Alamos labs, 220, 227n; Chinese embassy (in Belgrade), bombing of, 4, 28, 141, 229n; hiding contaminated blood, 81; operations against, 246n; sale of weapons, 21, 25, 43 Chlorouorocarbons (CFCs), 57, 60, 67, 68 Cholera, 85 Christian Democratic Union, 161 Christopher, Warren, 47, 91 Church Committee, 72, 205, 218 Church, Frank, 205, 207, 209 Civil rights movement, 203 Civil War, 201 Classication, 167; of budget, 12931 Clausewitz, 14 Clifford, Clark, 202 Clinton, President Bill, 42, 47, 64, 74, 141, 157, 201, 240n, 262n; administration of, 11, 52, 165, 192, 216, 262n; creates intelligence commission, 216; on importance of intelligence, 1; and Israel, 165; on potential terrorist attacks, 80 Codes, 153, 189 Cogan, Charles G., 113, 245n Cohen, William S., 11 Colby, William E., 176, 207, 221, 223 Cold war, 201 Co-location (partnership), 100, 118, 177, 189 Colombia, 6, 44, 127, 162 Combest, Larry, 141, 224, 250n Comity, spirit of, 201, 222 Commerce, Department of, 26, 36, 38, 43, 45, 47, 133, 195 Committee on Foreign Investment in the United States, 43 Communism, 11 Community Management Staff, 107, 124, 133, 147, 244n; activities of, 3, 131 Companies, 33 Compartmentation, 106, 132 Computer specialists, 176 Concord Coalition, 139, 145 Congo, 182 Congress, 114, 116, 181, 200, 204, 205, 210, 214; contact with CIA, 212; deference to intelligence community, 205; oversight, 22022; stronger role in intelligence, 21112 Constant, Benjamin, 32 Constitution, U.S., 119, 200, 209 Consumers of intelligence, environmental, 55 Containment doctrine, 11, 17, 160 Coral reefs, 63 Council on Foreign Relations, 218 Counterintelligence, 2, 28, 35, 48, 110, 163, 175; Center, 28; Staff, CIA, 28; U.S.-German cooperation, 15455 Counternarcotics, 44 Counterterrorism, 54, 163; preemptive activities, 180; Counterterrorist Center (CTC), 177, 178, 179 Cover, 218 Covert action (special activities), 2, 29, 48, 122, 131, 175, 180, 199, 218; against computers and telecommunications facilities, 181; against Iraq, 141, 170; against Soviet Union, 15556; assassinations, 182; decision process for, 202, 204; nding for, 181, 204; proposal to abolish, 203 Covert Action Staff, 101 Cox Committee, 28, 35 Crime and Narcotics Center (CNC), 37, 44 Crime, international, 3738 Crowe, Admiral William J., Jr., 112 Cruise missiles, 182 C-SPAN, 125 Cuba, 182 Cuban missile crisis, 1, 137, 160, 219 Current services, 126 Currie, James T., 214 Curtiss-Wright, 222 Customs Service, 26, 90 Cut-outs, 103 Cutter, W. Bowman, 46 Cyberterrorism, 176 Czechoslovakia, 160, 198 Dalai Lama, 246n Dart gun (nondiscernible microbioinoculator), 103 DCI Center for Security Evaluation, 108 DCI Counterterrorist Center (CTC), 108, 163, 181 DCI Crime and Narcotics Center (CNC), 108 DCI Environmental Center (DEC), 53, 58, 59, 68, 70 DCI Nonproliferation Center (NPC), 26, 108, 192; director of, 26, 30, 81 Deception, 23, 28 DeConcini, Dennis, 224 Defense, Department of (Pentagon), 2, 36, 55, 75, 88, 107, 109, 113, 143, 177, 180, 218; inspector general, 131; spending, 249n Defense HUMINT Service, 2
| 289 |
Index
Defense Intelligence Agency (DIA), 2, 3, 7, 26, 54, 90, 115 Defense, Secretary of, 3, 11415, 121, 245n; budget authority, 12829; as eight-hundred-pound gorilla, 10913, 129 Demand side, 45 Democracy, 199, 221 Democratic Party, 139 Depression, 201 Detailees, 177 Dtente, 160 Deterrence, 160 Deutch, John M., 107, 108, 113, 143, 147, 215, 217, 223 Developing Espionage and Counterespionage Awareness (DECA), 36 Dicks, Norman D., 145 Diplomacy, 182, 193; diplomatic corps, 178 Director of Central Intelligence (DCI), 3, 4, 95, 223; appointment powers, 11415, 117; budget powers, 123, 12829, 133; Ofce of, 1045, 109, 113, 115, 181; new authority, 11415; reliance on persuasion, 111; titular leader, 111, 116 Director of National Intelligence (DNI), proposed, 245n Diseases, 16, 74; task force on global surveillance and analysis of, 8990 Disguises, 103 Doering-Manteuffel, Anselm, 252n Dole, Bob, 141 Dominoes, 21 Donovan, William J., 223 Dorn, A. Walter, 172 Dossiers for diplomats, 41 Doyle, Arthur Conan, 50 Drug Enforcement Administration (DEA), 4, 44 Drugs, experiments with, 103, 207; trafcking, 44, 162, 171 Dubai Islamic Bank, 181 Dulles, Allen, 185, 223 Duma, 37 Durenberger, David, 224 Earth Observing System, 69 Earth Summit, 59 Earth zones, 63 Earthquakes, 53, 58, 66 East Asian Informals, 196 East Timor, 13, 136 Ebola virus, 79 Economic Counterintelligence Program (ECP), 36 Economic Espionage Act of 1996, 36 Economic intelligence reports, 47 Economic security, 32 Economist, 45 Egypt, 178, 187 Eisenhower, President Dwight David, 175; administration of, 182, 200201 Empta, 24, 180, 229n Encryption, 7 Energy, Department of, 3, 4, 75, 176, 177; chief of counterintelligence, 214; misleading testimony of, 214 England, 35 Enlargement, 17 Environment, 16, 172; environmental conferences, 5960; environmental diplomacy, 59; environmental security, 50; environmental threats, 5153, 237n Environmental Protection Agency (EPA), 53, 54, 60, 68; Ofce of International Affairs, 55 Environmental Task Force, 61. See also MEDEA Program Environmental Working Group (U.S.-Russian), 65 Estimates, 100. See also National Intelligence Estimates (NIE) Euromissile crisis, 163 Europe, Western, 44, 163; Eastern, 163 European Space Agency, 171 European Union, 41 Executive order no. 12591 (Ford), 64, 209; no. 12333 (Reagan), 133, 182 Export control laws, 36 Fax, 194 Federal Aviation Agency (FAA), 177 Federal Bureau of Investigation (FBI), 3, 4, 26, 38, 44, 87, 89, 90, 110, 115, 121, 177, 179, 20910, 218 Federal Emergency Management Agency (FEMA), 53, 65, 6667, 89, 90 Federal Reserve Board, 40, 43, 47, 48 Federation of American Scientists, 76, 88, 130 Finding, 181 Fleming, Ian, 1 Flooding, 53, 58 Foertsch, Volker (aka Fleming), 158 Ford, President Gerald R., 161, 182, 183; administration of, 203; opposition to assassinations, 204, 209 Foreign acquisitions review, 43 Foreign Intelligence Surveillance Act (FISA) of 1978, 206
| 290 |
Index
Foreign investment, 43 Forestry agreements, 60; forest res, 62 Forward observers, intelligence, 68, 195 France, 35, 123, 151; French intelligence, 227n, 254n Fraumann, Edwin, 36 Free Democratic Party, 160 Freeh, Louis, 15, 110 Friedman, Thomas L., 257 Fusion centers, 107, 108, 120; virtual, 11819 Gadha, Muammar, 18283 Game simulation, 46 Gates, Robert M., 11, 12, 24, 26, 34, 35, 61, 96, 107, 111, 183, 223, 243n, 247n, 258n; on accountability, 199, 212, 22021; on environmental intelligence, 67; on irrelevance of some intelligence, 193 Gaza Strip, 165 General Accounting Ofce, 131 General Electric, 34 Genetic engineering, 22, 60 Genocide, 18 Geoeconomics, 16, 47 Geological Survey, U.S., 53 Georgetown University, 218 German corporations, 25 Germany, 35, 52, 123, 151, 169; GSG intelligence service, 253n; West Germany, 151, 153; East Germany, 153 Gerswin, Lawrence, 54 Gingrich, Newt, 141, 144, 248n Glickman, Dan, 224 Global Disaster Information Network, 53 Global presence, 84 Global reach, 84 Glomar Explorer, 207 Goldwater, Barry, 210, 224 Goodman, Allen E., 194 Gore, Al, Vice President, 53, 55, 61, 64, 193, 216, 249n Goss, Porter, 116, 141, 144, 224, 248n, 249n Gray sources, 47 Great Britain, 8, 21, 52, 150, 151, 156, 247n; and UN, 171, 172; and UNSCOM, 169 Greece, 6 Green political parties, 58 Greenhouse gases, 52, 56 Gries, David, 148 GRU, 159 Guatemala, 107, 213 Haass, Richard N., 218 Haiti, 44, 52, 138, 143 Hale, Nathan, 34 Halpern, Samuel, 263n Hamilton, Alexander, 115 Hamilton, Lee H., 11516, 224 Hanrieder, Wolfram F., 160 Hard power, 17 Harden (U.S. embassy security), 178 Hastert, Dennis, 141 Hatch, Orrin, 257n Hazardous wastes: dumping of, 58; export of, 60 Health intelligence, 76; scenarios regarding, 7779 Hebrahim, Abra, 256n Helms, Richard, 110, 205, 223, 247n Herman, Michael, 150 Hersh, Seymour, 118, 203 Hillenbrand, Martin J., 160 Hillenkoetter, Rear Admiral Roscoe H., 223 Hitz, Frederick P., 107 HIV virus, 75, 82, 83 Holmes, Sherlock, 50 Hong Kong, 80 Hoover, J. Edgar, 110 House Armed Services Committee, 202; Subcommittee on Military Procurement and Los Alamos scandal, 214 House Permanent Select Committee on Intelligence (HPSCI), 126, 131, 181, 184, 204, 214; creation of, 207; leadership of, 224; and NRO, 213 Hughes Space and Communications, 36 Hughes-Ryan amendment, 181, 204 Hulnick, Arthur S., 214 Human intelligence (HUMINT, espionage), 2, 7, 18, 20, 21, 24, 42, 54, 89, 100101, 148, 149, 151, 179, 184, 185, 186, 189, 19091 Human rights, 16 Humanitarian crises, 136 Hungary, 187 Huntington, Samuel P., 15 Hurricanes, 66 Hutu, 84 Hyperpluralism, 113 Ideology, 192 Ikonos, 63 Imagery intelligence (IMINT), 2, 7, 144, 159, 189, 19091; imagery derived products, 66 Immigration and Naturalization Service, 177 Impeachment, 201 India, 5, 13, 15, 20, 23, 25, 35, 75, 165
| 291 |
Index
Indicators and warning (I&W), 58, 135, 136, 172; for global disease, 86, 88 Indochina, 52 Industrial espionage, 33 Information operations, 176, 191 Information warfare, 176 Inouye, Daniel K., 224 Intelligence, 6, 150, 186; abuses, 106; aggregate spending gure, 13031; budgets, 12, 97, 122, 127, 13435, 145; civilian, 116, 117, 146; collection, 18486; competitive, 120; consumers (policymakers), 186, 187, 195, 19798; cultures, 118; current, 100, 194; cycle, 187; diversity, 119; downsizing of, 96, 97; dissemination of, 19192; efciency, 119, 121; excessive centrism, 120; expansion of programs, 97; rst line of defense, 8, 135; force multiplier, 13334, 141; geography, importance of, 152, 153; hardware, 140; as insurance, 135; institutional values, 121; as iron triangle, 140, 144; as jack of hearts, 95, 125; leadership of, 22324; myths about, 12934; need for better coordination of, 89, 109, 116, 11920, 13233; objectivity of, 165, 195; partnership between DO and DI, 101; personnel, 134, 249n; platforms, 103, 148; and policy, 165; producers, 186; proposed Department of, 115, 120; publics views on, 143, 220, 221; raw, 186; relationship to risk, 136; relevance of, 193, 195, 198; politicization (cooking) of, 197, 260n; and quality of life, 16; reform of, 8, 9596, 14749; research, 100, 194; scandals, 95, 203, 207, 20910; as a stovepipe, 117; strategic (national), 112, 138; tactical, 112, 138, 143, 169; task forces, 107, 1089, 120; voting on, 139 Intelligence Authorization Act of FY 1997, 11415, 116 Intelligence community, 2, 3, 177; centrifugal forces in, 27, 48; staff of, 101 Intelligence Community Staff, 244n Intelligence, Directorate of (DI/CIA), 39, 53, 70, 90, 9899, 100, 189 Intelligence Identities Protection Act of 1982, 205 Intelligence liaison, 30, 65 Intelligence Organization Act of 1992, 246n Intelligence Oversight Act of 1980, 204, 206 Intelligence Oversight Act of 1991, 205, 206 Intelligence Oversight Board (IOB), 3, 204, 220 Intelligence Wars (Year of Intelligence), 203 Intentions, 190 Interagency Intelligence Committee on Terrorism, 177 Interagency Security Classication Appeals Panel, 219 Interest groups, 21718 Intermediate-range nuclear forces (INF), 13; Treaty, 163 Internal Revenue Service, 4 International banks, 44 International crime, 37, 38, 110, 180 International Drug Control Program (UN), 171 International Labor Organization, 42 International organizations, sharing intelligence with, 71 International Trade Commission, 47 Inter-Services Intelligence (Pakistan), 228n, 229n Ints (types of intelligence), 7, 186 Iran, 21, 25, 43, 136, 159 Iran-contra affair, 96, 107, 205, 208, 214, 215, 221 Iraq, 5, 12, 13, 14, 15, 16, 21, 25, 28, 29, 30, 33, 38, 43, 52, 57, 136, 143, 144, 159, 162, 163, 167, 216; anthrax capability, 83; covert action against, 141, 181, 246n; hiding smallpox, 80; and oil, 145; order of battle, 189; Persian Gulf War, 112, 137, 188; and UNSCOM, 16970 Iraq Liberation Act of 1998, 29 Iraqi National Congress, 246n Iraqi Task Force, DCIs, 30 Irregulars, bureaucratic, 96 Israel, 15, 21, 29, 35, 52, 16567; Israeli intelligence, 176; recruitment of Jonathan Pollard, 157, 227n; war with Egypt, 187 Italian intelligence (SISDE), 252n Janes Weekly, 248n Japan, 5, 13, 14, 35, 83 Japanese, 41, 42 Jefferson, Thomas, 16, 200, 208, 221 Johnson, President Andrew, 200, 201 Johnson, President Lyndon, 160, 192, 193, 200 Jordan, 52 Jstars (Joint Surveillance Target Attack Radar Systems), 18 Judiciary, 212 Justice Department, 4, 215, 219 Kaiser, Karl, 164 Kansi, Mir Aimal, 246n
| 292 |
Index
Kantor, Mickey, 15 Kazakhstan, 72 Kennedy, President John F., 219; administration of, 182 Kenya, 5; embassy of, 178 KGB, 157, 159 King, Dr. Martin Luther, Jr., 209 Kissinger, Henry A., vii Knott, Steven F., 20810 Knuckle-draggers, 102 Kohl, Chancellor Helmut, 5, 164 Korean War, 1, 187 Kosovo, 4, 6, 13 , 14, 15, 18, 109, 136, 138, 143, 144, 165; Kosovo Liberation Army, 18, 181 Kurds (Turkey), 52 Kuwait, 13, 57, 112, 167 Kyrgyzstan, 72 Lake, Anthony, 13, 216 Latin America, 13, 75, 162 Law enforcement, 237n Leadership, 14042 Lebanon, 178 Leno, Jay, 229n Lexis-Nexis, 248n Liaison, 31, 68, 150, 15256, 162; ambivalence toward, 15657, 164; legislative, 218; and policy, 16566; with policymakers, 19596; risks of, 15659 Liberty, 199 Libya, 21, 25, 159, 162, 185 Lincoln, Abraham, 200, 208 Lockheed-Martin, 248n Los Alamos National Laboratory, 28, 176, 214 Lott, Trent, 141 Lumumba, Patrice, 182 Machiavelli, 222 Madagascar, 75 Madison, James, 113, 199, 200, 221 Maa, 37 Major regional conicts, 138 Malaria, 75 Malaysia, 75 Marginal incrementalism, 126 Marine Corps (U.S.), 182; intelligence, 3 Marion, Pierre, 36 Marshall, General George C., 17 Marshall Plan, 17 May, Ernest R., 48 Mayaguez, 1 McCaffrey, General Barry R., director, Ofce of National Drug Control Policy, 234n McCarthy, Joseph R., 200201 McCone, John A., 223 McCurdy, Dave, 224, 245n McPeak, General Merrill, 138 Measurement-and-signatures intelligence (MASINT), 186, 189, 19091 MEDEA Program, 6066, 6869 Media, 2067, 218 Mexico, 35, 44, 86; nancial crisis, 48 Micromanagement, 210, 222 Middle East, 52, 159, 162, 165 Military eld commanders, 55 Military intelligence, 3, 12, 26; budget for, 124 Military-industrial complex, 14 Military security, 13 Military strikes, 29 Millis, John, 112, 116, 264n Milosevic, Slobodan, 16, 182, 240n; antiMilosevic factions, 181 Mole, 176 Money-laundering operations, 44 Monitoring sanctions, 42 Montreal Protocol, 59 Moonshine stills, 237n Morality, 19 Mosquito populations, 172 Mossad, 157, 258n Mujahideen, 24647n Munich Institute for the Study of the USSR, 251n Mysteries, 188 Narcodollars, 44 Narcotics, 180 National Aeronautics and Space Administration (NASA), 64, 69 National Assessment Center (NAC), proposal for, 197 National Commercial Bank (Saudi Arabia), 181 National Economic Council (NEC), 12, 46, 47 National Foreign Intelligence Program, 132 National Imagery and Mapping Agency (NIMA), 2, 3, 54, 55, 114, 117 National Intelligence Council (NIC), 3, 17, 37, 46, 53, 60, 67, 68, 80, 85, 107, 196; relocation of, 197 National Intelligence Estimate (NIE), 57, 67, 107, 194; on Korea, 187; vetting of, 19697 National Intelligence Ofcer (NIO), 17, 53; for global affairs, 85, 90, 91
| 293 |
Index
National Oceanic and Atmospheric Agency (NOAA), 54, 64 National Photographic Interpretation Center (NPIC), 22, 28, 55, 66, 117 National Reconnaissance Ofce (NRO), 2, 3, 64, 74, 109, 114, 125, 262n; cost overruns, 213; director of, 65, 149, 214 National Security Act of 1947, 116, 181 National security adviser, 111, 114 National Security Agency (NSA), 2, 3, 6, 26, 42, 54, 74, 90, 109, 114, 148, 162, 177, 251; UN and, 16970; watch lists, 54 National Security Archives, 219 National Security Council (NSC), 3, 27, 46, 55, 68, 90, 120, 181, 197, 202; Committee on Foreign Intelligence, 114; Committee on Transnational Threats, 114; DCI as member, 116; Deputies Committee, 181; staff of, 91, 208 National Student Association, 203 NATO, 4, 15, 153, 159, 164, 167; sharing intelligence with, 82; spied on by agent Topas, 254n Natural disasters, 62, 65; global, 71 Naval Investigative Service, 177 Navy intelligence, 3, 118, 157, 170, 176; Ofce of Naval Intelligence, 26 Navy maa, 106 Nazis, 155, 159, 193 NBC weapons, 21 Nerve agent VX, 180 Neu, C. R., 40 Neustadt, Richard E., 200 New Intelligence Agenda, 17, 72, 73, 84, 91, 148, 149 New world order, 136, 143 New York Times, 45, 156, 167, 203, 213 New Zealand, 150 Newman, David, 258n NGO (non-government organizations), 172 Nicaragua, 182, 205, 208, 211 Niche intelligence, 68, 197 Nicholson, Harold, 104 Nigeria, 38, 52 Nixon, President Richard M., 160, 161, 200, 201, 209 Nonproliferation Center (NPC), 179 Nonproliferation Committee, of the intelligence community, 26 Noriega, President Manuel, 183 North American Free Trade Agreement (NAFTA), 41 North Korea, 5, 12, 13, 14, 15, 20, 21, 23, 25, 29, 38, 79, 136, 191, 216; hiding smallpox, 80; spying against, 185, 258n North Vietnam, 50 Norway, 52 Nuclear power plants: meltdowns of, 55; status of, 58 Nuclear weapons, 20 Nunn, Sam, 52, 112, 248n Nye, Joseph, S., Jr., 17, 19394 Oceans, contamination of, 57 Oehler, Gordon, 192 Ofce of Foreign Assets Control, 43 Ofce of Management and Budget, 123, 12728, 131, 132 Ofce of Personnel Security, 104 Ofce of Science and Technology Council, 74 Ofce of Transnational Issues (CIA), 53, 58, 68; Conict Issues Division, 84 Ofce of U.S. Trade Representative, 47 Oil, spills, 66; as a resource, 145 Oklahoma City, 178 Olmsted, Kathryn, 2058 Open-source intelligence (OSINT), 2, 33, 47, 48, 8182, 169, 186, 188, 193, 196, 242n; Community Open Source Program Ofce (COSPO), 196; on global health, 8688; gray sources, 186; in intelligence reports, 18586; Open Source Information System (OSIS), 196; outside experts, 119 Operation Desert Shield, 112 Operation Desert Storm, 258n Operation Guppy, 207 Operations, Directorate of (DO/CIA), 26, 70, 87, 90, 9899, 125, 177; co-location with Intelligence Directorate, 189; difculty of managing, 106; downsizing of, 96; relations with Directorate of Intelligence, 100; Special Operations Group, 180 Oral briengs, 194 Organization of Petroleum Exporting Countries (OPEC), 33 Osirak, 29 Ostpolitik, 160 Oversight (accountability), 196, 199, 201, 22122; of intelligence budget, 13132 Oxford Analytica, 248n Ozone depletion, 50, 52, 55, 57 Pakistan, 5, 13, 15, 21, 23, 25, 43, 165, 228n, 246n Palestine, 15, 52, 157, 16567 Palmerston, Lord, 156 Pan Am 103, 191
| 294 |
Index
Panama, 183 Paramilitary operations, 29, 180; assassinations, 182, 262n; cadre for, 101 Peace Corps, 19, 218 Peace dividend, 14, 143, 146 Pearl Harbor, 1, 152; an electronic, 257n Penkovsky, Oleg, 190 Pershing II missiles, 163 Persian Gulf War, 5, 6, 7, 28, 57, 137, 167, 183, 187; preparations for, 188 Personality proles, 42 Peru, 44, 191 Peters, Lieutenant Colonel Ralph, 257 Philby, Harold Kim, 157 Philippines, 75, 191 Photo-interpreters, 66 Pike Committee, 218 Pike, Otis, 205 Poindexter, Vice Admiral John M., 211, 222 Political security, 14 Pollard, Jonathan Jay, 118, 15758, 227n Polygraph, 61, 63, 104 Porteous, Samuel D., 32, 39, 40 Powell, General Colin, 52 Presidency, U.S., 3, 120, 132, 184, 200, 212; Executive Ofce of the President, 202, 204; imperial, 209 Presidents Daily Brief (PDB), 27, 187, 240n Presidents Foreign Intelligence Advisory Board (PFIAB), 3, 4, 2034, 217 Prior restraint, 207 Private industries, 176 Private-sector intelligence, 6 Program managers, 147 Proliferation, 11, 21, 180 Propaganda, 29, 101, 15556 Psychological proling, 79 Public education, about intelligence, 71, 214, 219 Public Health Service, 89, 90 Q (aka Major Boothroyd), 103 Quiet option, 29. See also Covert action (special activities) Raborn, Vice Admiral William F., Jr., 223 Radio Free Europe, 15556 Radio Liberty, 15556 Radiological agents, 21 Rain forests, 63 Ransom, Harry Howe, 1, 122, 166 Reagan, President Ronald, 74, 111, 133, 134, 161, 182, 194, 206; Reagan administration, 139, 208, 215 Recombinant DNA technology, 22 Reconnaissance aircraft, 84 Recon/Optical, 227n Reconstruction, 200 Recruitment, 7, 8, 118, 155 Redundancy, 149, 250n Refugees, 52, 58, 78, 82, 84, 86, 172 Regulars, bureaucratic, 106 Republican Party, 139 Requirements, intelligence, 56 Rescue operations, 53 Reserve for Contingencies (CIA), 13132 Reuters, 84 Ritter, Scott, 170 Rockefeller Commission, 218, 23637n Rockefeller Foundation, 86 Rockefeller, Vice President Nelson, 205 Rockman, Bert A., 96, 108, 120 Rogue (outlaw) nations, 136, 143, 163, 171 Romania, 75 Roosevelt, President Franklin D., 201 ROSE (Rich Open Source Environment), 8889 Rotation of intelligence ofcers, 118, 246n Rudman, Warren, 145 Rummel-Bulska, Iwona, 52, 57 Rusk, Dean, 202 Russell, Richard Bevard, 202 Russia, 12, 14, 19, 20, 25, 35, 37, 38, 45, 54, 63, 85, 189; anthrax capability, 83; environmental problems in, 67; hiding smallpox, 80; leaky nuclear storage sites, 56; ocean contamination, 56, 68; oil spill in, 66; open sources on, 186; research cooperation with U.S., 65; scientists in, 64; spying against, 185; spying by, 158; vodka consumption, 81 Rwanda, 13, 15, 136, 138, 143, 169 Sadat, President Anwar, 178 Saddam Hussein, 5, 26, 28, 29, 169, 170, 182, 183, 257n, 258n; assassination attempt against, 262n Satellites, 5, 6263, 64, 84, 151, 175; CORONA series, 190; launch and other costs, 149; need for smaller, 149, 185; Small Satellite Review Panel, 250n; and UN, 172 Saudi Arabia, 5, 181, 234n Scandinavia, 83 Scenarios, related to global disease, 47 Schlesinger, James R., 96, 202, 223 Schmidt, Chancellor Helmut, 16061 Schroeder, Chancellor Gerhard, 5, 164
| 295 |
Index
Science and Technology, Directorate of (DS&T/CIA), 53, 60, 64, 68, 6970, 9899, 102, 196, 256n Scientic and Weapons Research (CIA), 2425 Scowcroft, Brent, 187 Secrecy, 188, 199; declassication of, 21920; unauthorized disclosures, 210 Secret Service, 177 Security badges, 118 Senate Armed Services Committee, 202 Senate Select Committee on Intelligence (SSCI), 126, 131, 166, 181, 184, 204, 214, 216; creation of, 207; leadership of, 224; NRO and, 213 Serbia, 18, 33, 43, 136, 138, 142, 143, 145, 169, 181 Shelby, Richard, 141, 215, 224 Shining Path, 191 Signals intelligence (SIGINT), 2, 5, 6, 42, 144, 148, 186, 189, 19091 Skuratov, Yuri, 37 Smallpox, 79, 80 Smart weapons, 3, 6 Smith, General Walter Bedell, 223 Snake eaters, 102 Social Democratic Party, 160 Soft power, 17, 18 Somalia, 13, 15, 136, 138, 143, 144, 168, 183, 216 Souers, Sidney W., 223 Sources and methods, 34, 35, 66, 130, 159, 166, 168, 172, 191, 205, 219, 237n South Africa, 30 South Korea, 14, 35, 227n; intelligence liaison with U.S., 252n Soviet economic system, 32 Soviet republics, 176 Soviet Union, 23, 28, 73, 129, 136, 137, 151, 157, 163, 190, 203, 216; arms accords with, 165; intelligence reports on, 219; invasion of Czechoslovakia, 160, 187; invasion of Hungary, 187; radioactive contamination, 56, 57; spying against, 153, 19091; submarine accidents, 56; threat of, 159 Space Imaging, 63 Special Activities Division, 1012 Specter, Arlen, 224 SR71 surveillance aircraft, 190 SS20 missiles, 163 Stalin, 160, 19293 START I, 13 START II, 13 Stasi (Staatssicherheitsdienst), 158, 164 State, Department of, 3, 4, 36, 38, 47, 75, 90, 120, 177, 178; UN and, 168 State economies, 37 State, Secretary of, 110, 114, 121 Statistical modeling, 58, 59; gaming, 59 Steele, Robert D., 196 Stennis, John, 202 Stokes, Louis, 224 Strategic interests, 14 Strategic Services, Director of, 223 Sudan, 23, 24, 159, 179, 191 Suicide attack, 178 Supply side, 45 Support to diplomatic operations (SDO), 121, 146 Support to military operations (SMO), 112, 138, 143, 144, 146, 244n Surge capability, 84, 118, 189 Sutherland, Justice George, 201 Sweden, 21 Switzerland, 21 Syria, 21, 52 Taft, President William Howard, 201 Taiwan, 14, 15, 29, 35 Taliban, 15, 178 Tanzania, 5; embassy of, 178 Tasking, 56, 117 Techies (techno-weenies), 103 Technical intelligence (TECHINT), 2, 20, 152, 184, 185, 193; failures of, 148 Tenet, George J., 19, 39, 67, 113, 130, 141, 157; 16566, 223; and Los Alamos inquiry, 215; on oversight, 221; secrecy and, 219; strengthening CIA, 146, 249n; strengthening intelligence community, 147 Terrorists, 6, 80, 86, 89, 161, 162, 182, 193, 256n; bank holdings and computer networks, 175; capture of, 191; number of incidents, 178 Thailand, 86 Threat assessment, 20 Thugs. See Crime, international; Terrorists Tibet, 246n Tiger teams, 27 Tigris-Euphrates Valley, 52 Time, limits of, 192 Tolba, Mostafa K., 52, 57 Tradecraft, 132, 158, 179 Transnational issues, 91, 114, 180, 193 Transparency, 18, 112, 113, 133, 138, 149, 152, 187 Treasury, Department of, 3, 4, 38, 43, 45, 47, 48, 237n
| 296 |
Index
Truman, President Harry S, 1, 113, 120; administration of, 200201 Tuberculosis (TB), 82 Turf battles, 178 Turkey, 6, 52, 162 Turner, Admiral Stanseld, 34, 35, 96, 105, 106, 113, 223 Twentieth Century Fund, 218 U2 (spy plane), 53, 153, 170, 190 Ukraine, 55, 83 Underground economics, 44 Unfair trade practices, 40 United Arab Emirates, 181 United Nations, 76, 167; Blue Helmets, 168; counternarcotics program, 171; intelligence and, 30, 17172; intelligence assessment board, proposal for, 172; investigators, 18, 29, 30; and open-source information, 171; sharing intelligence with, 82, 16772; situation center, 171; Special Commission (UNSCOM), 25, 28, 16970; satellite surveillance by, 171 United States, 75, 151, 178, 179; as global godfather, 18384; and UNSCOM, 17071; U.S.-Japanese relations, 34; U.S. Navy, 43 United States Army Medical Research Institute for Infectious Diseases, 85, 90 United States Army Medical Research and Material Command, 85, 90, 242n United States Marines, 178 United States Trade Representative (USTR), 40 University of California, Irvine, 57 Unmanned aerial vehicles (UAVs), 149; Predator and Hunter, 249n Uruguay round, 41 U.S.S.R., 33. See also Soviet Union Value added, 193 Vanderberg, Lieutenant General Hoyt S., 223 Videotape intelligence, 194 Vietnam War, 50, 160, 192, 193, 203, 210 Virtual teams, 27 Virus, 29; viral telemetry, 88 Volcanic eruptions, 62, 66 VX (nerve agent), 24 Walker family, 176 Walking back the cat, 256n Wall Street Journal, 45 Warner, John, 144, 216, 217 Warning intelligence, 154. See also Indicators and warning (I&W) Warsaw Pact, 57, 153 Washington, George, 208, 209 Watergate scandal, 103, 200, 209 Weapons, manufacturing as a source of jobs, 139 Weapons: of mass destruction, 11; Preparedness Working Group, 27 Weapons, smart, 133 Webster, William H., 107, 223 Weiner, Tim, 156 West Bank, 165 West Nile virus, 242n Westereld, H. Bradford, 152, 163 Wettering, Frederick L., 244n White House, 27, 7576, 89, 197, 200, 204, 221; Situation Room, 3; oversight of intelligence, 21517 Wilson, Edward O., 64 Wilson, James Q., 97, 109 Wiretaps, 153, 206. See also Signals intelligence (SIGINT) Witting circle, 204 Wolfowitz, Paul, 193 Woolsey, R. James, 15, 23, 34, 37, 40, 41, 44, 106, 107, 137, 166, 223, 258n, 262n; on biological terrorism, 80, on CIA cultures, 102; creation of task forces, 1089; and oversight, 212; on NRO, 125, 213; ties to the Defense Department, 11213, 143 World Health Organization (WHO), 75, 86 World Trade Center, 178, 191 World War II, 201 Yeltsin, Boris N., 240n Yugoslavia, 20 Zaire, 79, 82, 84 Zimbabwe, 82 Zinni, Marine General Anthony C., 142
| 297 |
Loch K. Johnson is Regents Professor of Political Science at the University of Georgia and author of several books on U.S. national security and politics. He has won the Certicate of Distinction from the National Intelligence Study Center (1986) and the V. O. Key Prize from the Southern Political Science Association. He has served as secretary of the American Political Science Association and president of the International Studies Association, South. Johnson was special assistant to the chair of the Senate Select Committee on Intelligence in 197576, staff director of the House Subcommittee on Intelligence Oversight in 197779, and special assistant to the chair of the Aspin-Brown Commission on Intelligence in 199596. Born in Auckland, New Zealand, Professor Johnson received his Ph.D. in political science from the University of California at Riverside. At the University of Georgia, he has won the Josiah Meigs Prize, the universitys highest teaching honor, as well as the Owens Award, its highest research honor. His extracurricular activities include distance running, alpine skiing, and participation in civic projects.
| 298 |