Professional Documents
Culture Documents
A Thesis
The Degree of
MASTER OF SCIENCE
IN
APPLIED INTELLIGENCE
A Thesis
Submitted to the Faculty of Mercyhurst College
In Partial Fulfillment of the Requirements for
The Degree of
MASTER OF SCIENCE
IN
APPLIED INTELLIGENCE
Submitted By:
Certificate of Approval:
_____________________________________
Stephen Marrin
Assistant Professor
Department of Intelligence Studies
_____________________________________
William Welch
Instructor
Department of Intelligence Studies
_____________________________________
Phillip J. Belfiore
Vice President
Office of Academic Affairs
March 2009
Copyright © 2009 by George P. Noble, Jr.
All rights reserved.
iii
DEDICATION
This work is dedicated to my dear friend and colleague Nancy Calzaretta, who taught me
iv
ACKNOWLEDGEMENTS
I would like to thank Allen Bostdorff for his encouragement and ideas. I would also like
to thank my primary reader, Stephen Marrin, for his adroit direction and many hours of
wise counsel. Finally, I am grateful to my family and my employer for allowing me this
v
ABSTRACT OF THE THESIS
By
The views expressed in this thesis do not necessarily represent the views of the FBI.
This paper explores how source reporting can be distorted at each stage of the
human intelligence (HUMINT) process within the United States Intelligence Community
(USIC) and how that distortion may impact perceptions of source reliability. It first
descriptions from other fields to bolster the definition within intelligence. The paper
continues with a look at the HUMINT process, followed by detailed discussions of the
potential for distortion of source reporting by and between the source, collector, analyst,
and editor, again looking at other fields for contributions to understanding. It concludes
The target audience includes the USIC, especially the Central Intelligence Agency
(CIA) and the Federal Bureau of Investigation (FBI), which both rely heavily on
HUMINT collection. Social scientists, journalists, and legal scholars may be interested in
the discussion of reliability and how their fields compare with intelligence.
vi
TABLE OF CONTENTS
Page
COPYRIGHT PAGE………………………………………………………………. iii
DEDICATION…………………………………………………………………...... iv
ACKNOWLEDGEMENTS……………………………………………………...... v
ABSTRACT……………………………………………………………………...... vi
TABLE OF CONTENTS………………………………………………………….. vii
LIST OF ABBREVIATIONS…………………………………………………....... x
CHAPTER
1 INTRODUCTION……………………………………...... 1
2 LITERATURE REVIEW………………………………... 3
3 PROCEDURES….……………………………………..... 8
4 RESULTS………………………………………………... 10
The HUMINT Process…………………………………… 10
The HUMINT Source……………………………………. 18
The HUMINT Collector…………………………………. 29
The Editor………………………………………………... 56
5 CONCLUSION……….………………………………….. 61
Recommendations………………………………………... 65
Conclusions………………………………………………. 67
BIBLIOGRAPHY…………………………………………………………………. 68
APPENDICES……………………………………………………………………... 74
Appendix A………………………………………………. 75
Appendix B………………………………………………. 77
Appendix C………………………………………………. 78
Appendix D………………………………………………. 79
Appendix E………………………………………………. 80
Appendix F………………………………………………. 81
vii
LIST OF ABBREVIATIONS
viii
RIP Recruitment-in-Place
SS Surveillance Specialist (FBI)
SSG Special Surveillance Group (FBI)
SVR Foreign Intelligence Service (Russian)
TECHINT Technical Intelligence
US United States
USAF US Air Force
USIC US Intelligence Community
USN US Navy
WFO Washington Field Office (FBI)
WMD Weapons of Mass Destruction
ix
1
INTRODUCTION
This paper explores how the routine development of source reporting within the
USIC through targeting, acquisition, documentation, evaluation, and exploitation can lead
sources. The source reliability caveat contained in most reporting and finished
intelligence products1 speaks only to the characteristics of the spy, including his/her
The collector and/or dedicated evaluators use the caveat to sum up their
evaluation of the asset’s motives, abilities, access, and the accuracy of his/her actual
output. But are there others involved in the HUMINT process who may potentially distort
reporting they pass through liaison channels to other domestic and foreign agencies?
This paper will explore the many, sometimes conflicting, meanings of reliability,
seeking useful descriptions from other fields to bolster the definition within intelligence.
It will continue with a look at the HUMINT cycle, followed by detailed discussions of the
potential for distortion of source reporting by and between the source, collector, analyst,
The target audience for this thesis includes the United States Intelligence
Community, especially the Central Intelligence Agency (CIA) and the Federal Bureau of
Investigation (FBI), which both rely heavily on HUMINT collection. Social scientists,
1
In the writer’s experience, when an analyst draws from a segment of source reporting for use in certain
intelligence products, the analyst inserts a warning notice ahead of the specific text to highlight the
sensitivity and reliability of the source of that part of the overall text. A brief end of warning statement lets
the reader know that the highlighted text is complete.
2
journalists, and legal scholars may be interested in the discussion of reliability and how
LITERATURE REVIEW
This writer has discovered nothing written specifically on how HUMINT from
clandestine sources might be distorted by those who collect, analyze, and publish it.
in the context of the vulnerability of their data to distortion as they are collected,
processed, analyzed, and disseminated. In this age of spy satellites, the literature tends to
Service (CRS), focuses exclusively on TECHINT in his 2005 review of surveillance and
reconnaissance.2
No literature was uncovered that outlines a specific HUMINT process and how
the reliability of source reporting can be distorted through that process. Such a process
would apply the collection, processing, analysis, production, and dissemination nodes of
the traditional intelligence cycle. Biographies of Aldrich Ames, Robert Hanssen, John
Walker, among others, tell individual stories of espionage but say little about the elements
of the intelligence cycle beyond the interaction between source and handler. Even general
studies of HUMINT, like Frederick Hitz’s Importance and Future of Espionage,3 focus
intelligence, but it focuses on assessing the source and thus has little applicability to this
thesis. In particular, David A. Schum and Jon R. Morris developed the MACE (Method
2
Best, Richard A., Jr. Intelligence, Surveillance, and Reconnaissance (ISR) Programs : Issues for
Congress, CRS Report for Congress, 22 February 2005.
3
Hitz, Frederick P. “The Importance and Future of Espionage,” in Strategic Intelligence Vol. 2: The
Intelligence Cycle, ed. Loch K. Johnson (Westport, Connecticut: Praeger Security International, 2007).
4
for Assessing the Credibility of Evidence) system, which uses Baconian and Bayesian
analysis to rate incremental pieces of evidence to discern the probability that a human
source is providing competent and credible information. Schum and Morris’s interest in
applying lessons learned in cross examination of witnesses may have some application in
future research based on this paper’s conclusion that asset vetting ought to adopt the
courtroom model.4
The intelligence literature lacks coverage of the operational side of the HUMINT
process, especially the period between the meeting of source and handler and the
Sherman Kent5 and Arthur Hulnick6 from the CIA’s Directorate of Intelligence (DI), and
even Richards J. Heuer, Jr.7 from the CIA Directorate of Operations, have written much
of the scholarly literature on the intelligence process over the past fifty years from the
inside the Beltway perspective of national intelligence analysis. Their writings have a DI-
centric view that focuses on the CIA’s obligation to communicate with the highest levels
of government. They do not elaborate on the operational side of the intelligence cycle.
The DI perspective has so overwhelmed the literature that intelligence method has
begun to normalize the analytical priority of the intelligence cycle. Hulnick’s dismissal of
4
Schum, David A. and Jon R. Morris. “Assessing The Competence and Credibility Of Human Sources Of
Intelligence Evidence: Contributions From Law And Probability.” Law, Probability, and Risk, Vo. 6 No. 1-
4, pp. 247-274, 7 April 2007.
5
For further information, see "Sherman Kent and the Profession of Intelligence Analysis." (Davis, Jack.
Occasional Papers 1, no. 5. Washington, DC: CIA, The Sherman Kent Center for Intelligence Analysis,
November 2002). Davis says, "Of the many individuals who paved a pathway for the development of
intelligence analysis as a profession, [Sherman] Kent stands out -- both for his own contributions to
analytic doctrine and practice, and for inspiring three generations of analysts to build on his efforts to meet
changing times.... If intelligence analysis as a profession has a Founder, the honor belongs to Sherman
Kent.” Prominent writings include his Strategic Intelligence For American World Policy (Princeton:
Princeton University Press, 1949).
6
Hulnick’s writings include “The Intelligence Producer-Policy Consumer Linkage: A Theoretical
Approach” (Intelligence and National Security, vol. 1 no. 2, 1986); “Managing Analysis: Strategies For
Playing The End Game” (Journal of Intelligence and Counterintelligence, vol. 2 no. 3, 1988).
7
Heuer is especially well known for his Psychology of Intelligence Analysis (Washington, DC: CIA, Center
for the Study of Intelligence, 1999).
5
the intelligence cycle writ large suggests that the absence of writings about fieldwork
have made the distortion complete. With a strong DI bias, Hulnick finds the intelligence
CIA, provides a good example of how the available writings lack coverage of the internal
process. His book, The Great Game: The Myth And Reality of Espionage, compares what
the author knows and can say about the real world of espionage with its coverage in spy
fiction. Unfortunately, spy novels do not delve into the HUMINT process beyond the
officers and their assorted agents and contacts. The internal elements of the construction
and processing of source reporting will not sell many books. HUMINT reliability is more
likely affected in an agent handler’s boring struggle with word processing software as
he/she recounts the details of a clandestine meeting than in his/her adventures with
One book that does cover the internal process, if to a limited degree, is Ronald
Kessler’s Spy vs. Spy, the sensational 1988 exposé of FBI counterintelligence operations
against the Soviets.9 Unfortunately, while Kessler set the scene and told stories of arrests,
expulsions, and prosecutions, he offered little description of the inner workings of the
HUMINT process at the Washington Field Office. Kessler was not seeking to write an
academic piece, so it is probably unfair to suggest that he squandered his opportunity, but
8
Hulnick, Arthur S. “What’s Wrong With The Intelligence Cycle?” in Strategic Intelligence (Vol. 2): The
Intelligence Cycle, edited by Loch K. Johnson (Westport, Connecticut: Praeger Security International,
2007), pp. 1-21.
9
Kessler, Ronald. Spy vs. Spy: Stalking Soviet Spies In America. New York: Charles Scribner’s Sons, 1988.
6
few other books have gotten that close to operations. This report gleans what it can from
Kessler’s book.
community might distort source information through its collection and processing.
As an aside, the writer found the sociologist Erving Goffman10 and his study of
analysis of the HUMINT process. Goffman puts life’s players on an imaginary stage and
examines their social behavior in assorted contexts12, so it is easy to overlay the roles and
behaviors of intelligence sources, their handlers, and analysts on these social situations
indiscreet informer who plays a discrepant role by going backstage on opening night to
discover the exciting secret climax of the show (performance) that the cast (team) has
been keeping from the public for months. Goffman says that when the informer goes back
to his seat to expose the big secret to his neighbors in adjoining rows, he/she spoils the
10
Goffman’s works include The Presentation of Self in Everyday Life New York: Doubleday Anchor Books,
1959; Frame Analysis: An Essay on the Organization of Experience. New York: Harper Colophon Books,
1974; Interaction Ritual: Essays in Face-to-Face Behavior. Chicago: Adline Publishing Co, 1967;
and Strategic Interaction. Philadelphia: University of Pennsylvania Press, 1969. Goffman’s work, rooted in
philosophy’s phenomenology, prompted the development of both ethnomethodology and symbolic
interactionism.
11
His field is called microsociology.
12
Goffman, The Presentation of Self, p. 72.
13
Goffman, The Presentation of Self, p. 72. The author is famous for examining life’s interactions as if
people were players on a stage, something called the dramaturgical perspective. As he says, “All the world
is not a stage, of course, but the crucial ways in which it is not are not easy to specify.”
14
Goffman, The Presentation of Self, p. 145.
7
espionage, and the negative results of an inadequate defense against a potential threat in a
model of human interaction that can be readily overlaid on intelligence themes.15 His
15
Goffman, The Presentation of Self, p. 141-145.
8
PROCEDURES
Given that the existing literature is deficient in the study of how the intelligence
community can distort source reporting as it targets, acquires, documents, evaluates, and
rich body of books, scholarly articles, media, and other qualitative sources in the social
sciences, journalism, and the law to see how other fields deal with this problem. The
paper will look at a variety of meanings of reliability, then review the elements of the
HUMINT process before moving on to examine the players in that process: source,
collector, analyst, and editor. It will conclude with observations and recommendations.
resulting from a literature search. The writer’s thirty years of on-the-job experience in
degree of bias is inevitable given that the researcher will personally select the writings to
at the unclassified level, this researcher intends to examine the writings of other
disciplines with substantially similar framing and attempt to reach useful conclusions for
The interdisciplinary aspect of this research assumes that the HUMINT process
• The Newsroom: The source of a news story (source) provides information to the
identical with the reporter, writes the article and submits it to fact checkers and
the news editor (editor), who publishes the article for his/her organization’s
observes and interviews a target society (source), creating and maintaining logs
and notes, and then publishing his/her findings. The logs and notes are eventually
processed and published for use by other researchers (analyst). A peer review
board (editor) oversees the publication of social research studies in a journal for
anthropologist, or ethnographer – and the person or people he/she studies, are the
RESULTS
The collection, writing, analysis, and editing of source reporting within the
outright lie, a collector can just as easily misquote the source, fail to make note of
important for all concerned to recognize that the HUMINT process can be led astray by
HUMINT focus, but that effort is sizeable and important. Each develops an individuated
internal process for day-to-day operations geared to its agency’s particular responsibilities
the military intelligence services, the Central Intelligence Agency (CIA), and the Federal
through the CIA’s National HUMINT Manager. According to General Michael Hayden,
who introduced the position to the Congress, “This official will set Community-wide
policies, guidelines, and tradecraft standards, ensuring that our human intelligence
The CIA’s HUMINT process might be called the Foreign Intelligence (FI) Model.
In his article “What’s Wrong With the Intelligence Cycle?”17 Arthur S. Hulnick explains
16
Office of the DNI. General Michael V. Hayden Before House Permanent Select Committee Subcommittee
on Oversight, 28 July 2005, (http://www.dni.gov/testimonies/20050728_testimony.htm)
17
Hulnick, Arthur S. “What’s Wrong With The Intelligence Cycle?” in Strategic Intelligence (Vol. 2): The
Intelligence Cycle, edited by Loch K. Johnson (Westport, Connecticut: Praeger Security International,
11
some elements of the CIA’s HUMINT process. The most remarkable part is his
discussion of the alienation between agent handlers and analysts, who were for years
compartmented from each other for security reasons. Even though the two elements have
now been commingled, Hulnick opines that the union of forces remains shaky, a situation
that bodes ill for the reliable conveyance of source reporting through the HUMINT
intelligence organization can feel isolated from recruitment operations due to OPSEC
in the above article whether CIA operational analysts work closely with agent handlers. 18
Ronald Kessler offers a rare glimpse into the HUMINT process in Spy vs Spy:
(FCI) work at the FBI’s Washington Field Office (WFO) late in the Cold War.19 The FCI
model discussed below provides a useful vehicle to discuss the basic outline of a
HUMINT process.
The FBI’s FCI Model contains the elements of a typical HUMINT cycle and
serves adequately to show how source reliability fits into the process. FCI-related
three main facets of the threat faced by the United States from any sophisticated hostile
intelligence service (HIS): 1) its officers and their agents, especially their recruitments
within the USIC; 2) its collection requirements; and 3) its operational methodologies.
Since HIS officers are traditionally found under diplomatic or commercial cover in
2007), p. 2. Hulnick seems to mistakenly limit the definition of HUMINT to the operation of clandestine
agents.
18
Hulnick, pp. 2-5.
19
Kessler, Ronald. Spy vs. Spy: Stalking Soviet Spies In America. New York: Charles Scribner’s Sons, 1988.
12
Washington, DC; New York, NY; and a few other major cities, the FBI’s largest FCI
operations are found in these locations. The HUMINT collection effort involves FBI
In the 1980s, Special Agents and analysts at FBI headquarters conducted all-
source analysis, the vetting of clandestine foreign sources, and the dissemination of
finished intelligence outside of the agency. The FBI’s Washington and New York field
offices dedicated Special Agent staff to work with FCI squads as operational analysts. In
the mid-1990s, and especially since 9/11, the Bureau’s ranks have filled with professional
Special Agents and operational analysts work in the following three areas of
HUMINT collection to produce and refine source reporting: observation, interaction, and
Observation
routinely watch FCI targets from fixed-site and mobile surveillance platforms and make
note of their observations in formal reports. Special Agents occasionally conduct their
human observations are filed in official reports. While photography and beacons may be
20
Kessler, Spy vs. Spy, p. 16.
21
Fixed site surveillance is typically conducted from a convenient office or apartment nearby. Within the
FBI, the operation, the site, and the operator can each be referred to colloquially as a lookout.
13
nature, like aerial photography and satellite imagery, and is therefore not labeled as
Interaction
is important to comprehend the scope of the interaction phase of the HUMINT process. A
Special Agent, for example, might discern HIS collection requirements by interviewing a
target’s recent contacts to learn what sort of questions the target is asking. The FBI would
control the target’s contacts in any future meetings. The Special Agent might even dangle
against Soviet military intelligence (GRU) in the 1950s. In that operation, the FBI used a
US Army master sergeant “as a double agent channel to supply deceptive information to
mislead, disrupt, and reduce the effectiveness of the Soviet chemical weapons
program.”23
Established informants, walk-ins and volunteers from the general public can
provide the Special Agent with a goldmine of useful information. Unreliable sources in
this category can just as easily redirect a case to disastrous and embarrassing results, such
as the volunteer who led the FBI to an unwarranted but wide-ranging investigation of
terrorism charges against the Committee in Solidarity with the People of El Salvador
occasions provided F.B.I. agents with information that was later found to be 'blatantly
22
Kessler, Spy vs. Spy, pp. 36-37.
23
Bennett, Michael and Edward Waltz. Counterdeception Principles and Applications For National
Security. Norwood: Artech House, 2007, pp. 131-132.
14
and valuable insights on HIS planning and operations. A RIP can be both a feedback and
feedforward channel in a deception operation, letting the FBI know what is happening
inside an HIS operation and injecting new information meant to confuse that operation
still further. A disloyal source in such a position can upend the deception operation by
turning those channels in a direction favorable to the HIS, turning advantage into defeat.26
capacity and thus be both collector and source. An undercover operative can be doubled
back against the USIC, fed controlled or deceptive information, or fail to maintain
discipline and begin to report unreliably. An FBI liaison officer provides the opportunity
Operational analysts rarely interact with an asset during a debriefing, but all-
source analysts occasionally attend to interview the asset about one or more topics
A Special Agent will routinely document a source debriefing soon after the
intelligence section, which provides the objective product of the interview – what was
asked and what was said in response – as well as the interviewer’s opinions and
extrapolations from the event. Notation is also made of any documents or other items
passed between the parties during the meeting. Source reporting also includes an
administrative portion, which speaks to the asset’s health and mental state, the time and
place of the meeting, attendees, countersurveillance, and other such details. Operational
analysts sort through this reporting to fill in incomplete or unclear information, develop
follow up questions, confirm accuracy, discern inconsistencies, and verify that collection
The Special Agent and operational analyst will collaborate to judge the source for
reliability. Headquarters analysts may also review the file to determine source reliability.
stopped. If most or all sources are deceptive, these confirmations can be meaningless.
Multiple sources saying the same thing proves reliability, not validity.
Source reporting can lose reliability as editors and managers review the document
Management can include the collector’s immediate supervisor or any lateral or vertical
management colleague that the approving official shows deference towards. The editing
and approval processes can each distort HUMINT through alterations made to source
reporting without sufficient referral back to the original. Details may be added or
removed, or changes made in emphasis, not merely edits for grammar and style. Haste
16
causes many errors at this stage, as draft versions proliferate and reviews become more
cursory. Politics and expediency can be insidious factors of distortive change. Some
reporting has something to say that is deemed inconvenient or otherwise not supportive
out of an overabundance of caution. Reliability might not survive the argument, “It has
The next stage of the process is when all-source analysts write finished
intelligence products relying at least in part on this clandestine foreign HUMINT source
reporting. The all-source analyst is typically compartmented from the original source, so
Parallel Processes
The HUMINT process has its equivalents in other fields, from which this paper
hopes to draw out useful parallels and contrasts. The roles of source, collector, analyst,
and editor are not only found in intelligence work. In a social science like anthropology,
the villagers are both target and source, the anthropologist is the collector and analyst,
and the scientific journal is the editor. In the television entertainment news business, the
starlet is the target, her neighbor is the source, the reporter is the collector, the TV news
anchor is the analyst, and the Nielsen ratings are the editor. In the criminal courtroom, the
defendant is the target, the witness is the source, the police are the agent handler and
operational analysts, the district attorney is the case agent/officer, the defense attorney is
the strategic analyst, the jurors are those who evaluate the reporting, and the judge is the
This paper will briefly explain the HUMINT process from the perspective of the
collector, analyst, and editor, and then elaborate on the lessons learned by their effective
foreigner; recruited or a volunteer; and be sent on a mission or tapped for what he/she
and sensitive, often about his/her own intelligence service, armed forces, terrorist
trusted contact, or, colloquially and somewhat pejoratively, a spy. His/her espionage is
The major known American traitors by espionage have been USIC insiders:
Aldrich Ames, Robert Hanssen, John Walker, Jonathan Pollard, and Christopher Boyce.
They each volunteered, meaning these sources stepped up and offered their services to a
foreign government without a recruitment approach. And each served clandestinely, some
for many years, working “in place” for a foreign intelligence service from within their
respective organizations.
19
At the other end of the scale are intelligence-controlled volunteers, such as the
dangle, the turned recruitment (double agent), and the turned double agent (triple agent).
source reporting through the HUMINT Process, reliability can suffer from a more basic
flaw: the source may be deceptive or unintentionally provide incorrect information. One
way or the other, the information funneled into the system is wrong from the very
beginning. The interaction between source and collector as a nexus for loss of reliability
The unreliable source can be categorized based on his/her motives. The source
can intentionally lie or provide a potent admixture of half-truths and fabrication as part of
armies to direct valuable resources towards bogus threats and leave nations vulnerable to
genuine dangers. Or the source can be well meaning but unintentionally provide
Schum and Morris suggest parallels between HUMINT reliability and witness testimony
in law, as well as between HUMINT and source statements in journalism. They probe the
history of the “testimony credibility problem” in some depth, but give little attention to
There are many purposeful deceits in the world of HUMINT. For example, a
establishing a double agent case. A corrupt volunteer can cause the opponent to expend
valuable resources and make incorrect threat assessments. And once the deception is
discovered, the HIS is less willing to readily accept the next volunteer.
The KGB defector, Anatoliy Golitsyn, sowed seeds of paranoia that prompted the
CIA to dismiss subsequent Soviet defectors, like Yuriy Nosenko, as agent provocateurs
and its director, James Jesus Angleton, to launch a damaging mole hunt within the
agency.28
The victim of an HIS recruitment pitch can report the approach and be doubled
the recruiting agency. The reliability of a developmental can only be assessed over time.
For example, in the last days of the Cold War, the CIA thought its recruitment-in-
place nicknamed CURLY was its East Berlin station’s first active duty asset in East
German surveillance. But CURLY was controlled by the Stasi and only feigned
recruitment. The CIA met with this double agent for months “as the German poured out
meeting pattern was quickly resolved with a warm personal meeting between the source
and the agent handler. The latter wrote in his report to headquarters, “I looked into his
eyes and I realized that he was good.”29 Oddly enough, internal reporting of what the CIA
was willing to pay such an asset provoked another Stasi officer to offer his services and
expose the double agent operation. “He in turn would soon become the most important
American spy in East Germany, turning over thousands of pages of documents from
The maverick Juan Pujol (Appendix B) dangled himself to the Nazis during
deceive a hostile government, Pujol was eventually taken under the control of Allied
intelligence and successfully operated against the Germans. Operation GARBO would
become famous for its role in the deception of the Nazis during the Normandy invasion.
Convinced that Normandy was a diversionary tactic, Chancellor Adolf Hitler maintained
his powerful tank divisions near the Pas de Calais in anticipation of a main invasion force
Effective deception can be disorienting. Soviet spy Richard Sorge infiltrated the
German Embassy in Tokyo, providing Joseph Stalin with highly valuable intelligence
throughout the pre-war period.32 When the Japanese arrested Sorge in October 1941, the
Eugen Ott, Ambassador of Germany to Japan, was shocked, having assessed Sorge as a
The audience is in large part to blame for any connivance that they allow,
according to the sociologist Erving Goffman. He suggests that those around such a person
misunderstand the situation and come to conclusions that are warranted neither by the
individual’s intent nor by the facts.”34 He suggests that more deceptions would be
exposed were it not for social graces, like tact, and fear of embarrassment on the part of
31
Pujol, Juan and Nigel West. Operation GARBO: The Personal Story of the Most Successful Double Agent
of World War II. New York: Random House, 1985, pp. 44-46.
32
Sorge is particularly renowned for his timely but unheeded warning of Operation Barbarossa, the Nazi’s
surprise attack against the Soviet Union.
33
Deakin, F. W. and G. R. Storry. The Case of Richard Sorge. New York: Harper and Row, 1966, p. 17.
34
Goffman, Presentation of Self, p. 6.
22
the victims. The eventual exposure of false identity, Goffman says, causes a “definitional
deception and betrayal along a scale of audacity that ranges from the bald-faced lie to the
white lie.36 A skillful communicator can misdirect while avoiding lies altogether through
impressions of themselves and others, and to varying degrees are aware of each other’s
actions. The projection can be purposeful, even when unwitting, and the reception can be
individual, will find it to his/her benefit to control the collector and his/her agency,
especially how they define the relationship, how they respond to him/her, and,
An unreliable HUMINT volunteer may turn out to have had little or no access and
questionable motives. Some sources offer information out of a sense of patriotism, while
others seek to bolster their ego or image. Some want to be part of the game, while others
seek to be helpful. Despite a lack of useful information, the informant may either dangle
whole cloth. A volunteer who files a false report is not only deceitful, he/she misdirects
the intelligence process and, if not discovered early, can waste valuable investigative and
analytical resources. In criminal cases, filing a false report can even be illegal.41
Journalists encounter deceptive news sources that rival those in the world of
espionage. Business executives may stonewall or mislead the media during critical
periods in the company’s life to preserve goodwill and protect the corporate image. Word
Popular entertainers may toy with veracity when confronted by the media,
according to John Brady, former editor-in-chief of Writer’s Digest.43 John Lennon started
the ball rolling, Brady says, when the popular member of the Beatles rock group on a US
tour was asked, “How do you find America?” Lennon teasingly replied, ”Turn left at
Greenland.” And not unlike a defector who has tired of endless debriefings, or the
prisoner under unceasing interrogation, Brady says a star may “lie you blind” just to pass
the time through a tedious interview. Brady quoted Alice Cooper, another rock star, as
underlying theme is the desire of each participant to guide and control the responses made by the others
present….”
41
Bobo, Jeff. Would-be Informant Charged With Filing a False Report. Kingsport, Tennessee: Kingsport
Times-News, 14 February 2007. http://www.timesnews.net/article.php?id=3731380
42
Adams, Sally, and Wynford Hicks. Interviewing For Journalists. London: Routledge, 2001, pp. 63-64.
43
Brady, John. The Craft of Interviewing. Cincinnati: Writer's Digest, 1976, p. 189; Brady’s biography is
currently available online at the website of the E. W. Scripps School of Journalism, where he is a visiting
professor. http://scrippsjschool.org/faculty/faculty_details.php?oak=bradyj
24
saying, “I really like lying…. Vogue magazine asked me what was the biggest lie I had
ever told, and I could not think of one, so I lied about that.”44
Sources need not be deceitful to lead an intelligence agency astray. Even well
Francis Wellman wrote of eyewitnesses in court over a hundred years ago, “People as a
rule do not reflect upon their meager opportunities for observing facts, and rarely suspect
Recollection
Before the early twentieth century, few challenged the reliability of those who
According to Hugo Munsterberg, the first sociologist to study the dismal record of
eyewitness testimony, anyone can grasp intentional lying, but “confidence in the
In recounting his own flawed testimony as witness to the burglary of his home,
Munsterburg makes the point that the source need not be deceptive, only misinformed, or,
as in his case, encouraged by the police to reach conclusions useful to the prosecution’s
44
Brady, p. 189.
45
Wellman, Francis L. The Art of Cross-Examination. New York: Macmillan Company, 1904, p. 25.
Reprint, Birmingham: Legal Classics Library, 1983.
46
Munsterberg, Hugo. On The Witness Stand. (1908) (http://psychclassics.yorku.ca/Munster/Witness/)
47
Munsterburg, On The Witness Stand, “The Memory of the Witness.”
(http://psychclassics.yorku.ca/Munster/Witness/memory.htm)
25
Eyewitness for Psychology Today, which launched her career as an expert defense witness
reconstruction, not unlike “playful, curious children” packing and unpacking dresser
drawers. Memories are not a filmed record that is stored deep in the brain but snippets of
recollection that must be adjusted to resolve the details that do not seem to fit until “a
coherent construction of the facts is gradually created that may bear little resemblance to
Loftus says that each time a human summons a memory, he/she processes the
available elements through a subjective filter that may fill in the gaps, remove some or all
of the uncomfortable aspects, and/or even recombine the snippets to tell a more
convincing tale. The memories that surface through this interpretative process vary from
those previously packed away and over time gradually obscure our original impressions.
“[O]ur representation of the past takes on a living, shifting reality,” Loftus explains,
adding, “[Our memory] is not fixed and immutable, not a place way back there that is
In 1983, Arye Rattner, of Ohio State University, reported in his doctoral thesis
that mistaken eyewitness testimony was responsible for over half of wrongful convictions
innocent.51
48
Loftus, Elizabeth and Katherine Ketcham. Witness For the Defense: The Accused, The Eyewitness, And
The Expert Who Puts Memory On Trial. New York: St. Martin’s Press, 1991, p. 7.
49
Loftus and Ketcham, p. 20.
50
Loftus and Ketcham, p. 20.
51
Loftus and Ketcham, pp. 26-27.
26
Loftus suggests that some witnesses can be expected to modify their recollections
of events to make better sense of what they’ve seen or to bring their recollections more in
line with the testimony of other witnesses. As they permanently alter their long-term
memories through this reconstruction process, these witnesses become more and more
confident that their altered recollections are an accurate record of what actually occurred.
Witnesses to violent crime may desperately want to be helpful but are traumatized by the
event and possess only a vague mental image of the culprit. In such cases, witnesses are
vulnerable to improperly conducted photo arrays, line-ups, and show-ups52 that suggest
Loftus tells the story of how Bobby Joe Leaster spent sixteen years in prison for
the murder of a storeowner based solely on the faulty eyewitness testimony of the widow
in a one-person show-up outside the hospital where her husband had just died. The police
walked her up to the car window and asked her to make the identification. Trembling and
still shaken from all that had happened, the widow peered into the car and said he “looks
Misinformation from eyewitnesses abounds after a plane crash, hold up, or school
shooting. It is typically set aside as the authorities seek out forensic evidence and other,
firmer clues. Witness testimony often leads in conflicting directions, so it is not a priority
when evidence from a surveillance camera or a black box can provide solid
documentation.
52
Lipton, Jack P. “Legal Aspects of Eyewitness Testimony,” in Psychological Issues in Eyewitness
Identification, ed. Siegfried Ludwig Sporer, Roy S. Malpass, and Guenter Koehnken,. (Mahwah: Lawrence
Eerlbaum Associates, 1996.) According to Lipton, a photo array allows the police to verify the
identification of a suspect with the help of an eyewitness through the use of a set of mug shots. A line-up
substitutes live subjects for photographs but otherwise has the same purpose. A show-up involves the
witness and the suspect and is often done on the scene of the crime.
53
Loftus and Ketcham, pp. 20, 23-25.
54
Loftus and Ketcham, pp. 24-25.
27
“For many investigators, the only infallible witness is a twisted piece of metal,”
one correspondent said, summing up the National Transportation Safety Board (NTSB)’s
feelings about first reports. Ted Lopatkiewicz, an NTSB spokesman, remarked, ''I do not
think I'm making any news by saying that eyewitness testimony at a plane crash and
55
probably at many traumatic events is unreliable.'' Eyewitnesses often provide wildly
varying reports in a crisis, such as in the wake of the 12 November 2001 crash of
Dr. Charles R. Honts, a professor of psychology at Boise State University and the
editor of The Journal of Credibility Assessment and Witness Psychology, says “The
biggest mistake you can make is to think about a memory like it's a videotape; there's not
a permanent record there.'' Instead, Honts suggests that plane crash witnesses fill in what
they do not understand. And they apply previous experience to a current situation, even if
all they know about plane crashes is what they’ve seen on television or in the movies.57
This is not to say that first reports of witnesses are not accepted and eventually
processed by federal, state, and local agencies. ''Can you imagine if we did not interview
New York Times, which was covering the board’s investigation of the Flight 587 crash. 58
Perspective
55
Cable News Network. “Breaking News: Gunman Fires On Another San Diego School.” CNN.com
Transcripts, 22 March 2001. (http://transcripts.cnn.com/TRANSCRIPTS/0103/22/bn.09.html)
56
Woodberry, Jr, Warren. “Many Saw Flight 587 On Fire Before Crash.” The New York Daily News, 5 June
2002. (http://www.nydailynews.com/archives/news/2002/06/05/2002-06-
05_many_saw_flight_587_on_fire_.html)
57
Wald, Matthew L. “Ideas and Trends: For Air Crash Detectives, Seeing Isn’t Believing.” The New York
Times, 23 June 2002.
(http://query.nytimes.com/gst/fullpage.html?res=9A04E6DB133FF930A15755C0A9649C8B63&scp=33&
sq=%22twa+flight+800%22&st=nyt)
58
“Gunman Fires On Another San Diego School.” CNN.com Transcripts, 22 March 2001.
28
A legitimate source can misapprehend events due to distortions resulting from the
source’s physical vantage point or biases stemming from the source’s circle of associates,
Investigators of the mid-air explosion of TWA Flight 800 on Long Island Sound
found that the physical vantage point of witnesses affected their perception of events in
the sky. The physics of sound and light caused witnesses at varying distances from the
explosion to look up to see what was happening as much as a minute earlier. What they
heard at the relatively slow speed of sound triggered witnesses to turn their eyes skyward
to view what was happening in virtually real time with their eyes. According to Matthew
Wald, “[H]undreds of people saw an upward streak that they assumed was a missile,
although investigators said it was the body of the plane itself, streaking upward after the
Bias also played a role in suggesting testimony to potential witnesses. The NTSB
criticized the FBI’s witness interview process in the TWA Flight 800 investigation after
receiving testimony that for some period of time FBI agents had inappropriately led
witnesses to support the so-called missile theory through their questioning and failed to
The use of foreign spies is the most rare and least reliable of the HUMINT
options. While it can yield rich rewards, it can also lead to utter disaster or accomplish
59
Wald, Seeing Isn’t Believing.
60
National Transportation Safety Board. Aircraft Accident Report: In-flight Breakup Over the Atlantic
Ocean, Trans World Airlines Flight 800 Boeing 747-131, N93119 Near East Moriches, New York July 17,
1996 (NTSB/AAR-00/03 DCA96MA070 PB2000-910403 Notation 6788G Adopted 23 August 2000),
Witness Document Issues (1.18.4.2). Washington, DC: Diane Publishing, pp. 233-234.
(http://books.google.com/books?id=Sd9rSiFtSwIC&pg=PA232&lpg=PA232&dq=%22twa+flight+800%22
+%22sound+to+travel%22&source=web&ots=n6Rq6W-bCn&sig=5T5tTMMg6l2b-6uE-ex52g34-
Is&hl=en#PPA233,M1)
29
nothing. For thousands of years, source reliability merely involved the proper training
and use of a decision maker’s own staff, soldiers, or other fellow countrymen, who would
be sent on missions to reconnoiter the opponent and return with information of strategic
importance. Only in modern times have nations routinely developed, recruited and
Reliability of the HUMINT source can be problematic for the collector. Consider
for a moment the sorts of nagging questions that an agent handler would like to ask about
• CONTENT: What exactly do you know? How do you know it? When and
where did you learn it? Whom did you learn it from? This includes issues of
• MOTIVE: Why do you know it? And why are you telling me? Are you
• ABILITY: Can and will you continue to get information for me? This includes
But there is also the issue of source reporting reliability, a diminishment of value through
There are two critical junctures beyond the source’s control where the HUMINT
collector can distort source reporting. The first point is during the interaction between
source and collector, when the latter receives and absorbs intelligence from the former
critical nexus is that moment when the collector sets down his/her memories, notes,
30
and/or recordings of the interaction phase in an official written form called source
reporting. The second phase may include the participation of an operational analyst, who
helps to sort, assemble, and otherwise make sense of raw collection as it is processed for
is an outsider or a member of the group being studied, and whether the culture and
appearance of his/her subjects is utterly familiar or quite different, he/she may still distort
The collector and operational analyst use what limited time is available to them to
refine and exploit the HUMINT yield prior to its official documentation and
dissemination. This process can introduce distortion to source reporting as collector and
analyst hastily resolve the inevitable ambiguities and incomplete thoughts resulting from
the typical exchange between source and collector. A supervisor or reports officer, serving
as editor, will offer corrections and elaborations that can also potentially distort the
Interviewing
business that can affect the reliability of source reporting. The well-trained agent handler
maintains the source’s relative calm by keeping the support team out of sight and the
meeting place comfortable and quiet. Any number of other agents, intelligence analysts,
and technicians participate in the staging of the debriefing of a HUMINT source, but the
handler always minimizes exposure of the team to the source. A secure meeting under
61
Georges, Robert A. and Michael O. Jones. People Studying People: The Human Element In Fieldwork.
Berkeley, CA: University of California Press, 1980, p. 23.
31
hostile conditions can ramp up the source’s anxiety and lead to errors and
misrepresentations. The agent handler’s team can also become anxious as they arrange
OPSEC for the debriefing of a RIP or defector at a safe house. Despite everyone’s best
Errors and omissions can also emerge when the collector takes notes during a
source meeting, as well as when he/she later converts his/her notes and memories to
debriefing, there is no guarantee that the collector will more carefully summarize a
recording than a live person. Either way, the completion of a successful clandestine agent
interview can make its documentation seem tedious in comparison, leading to potential
States today that some label America the “Interview Society”. 62 The interview has
"become the most feasible mechanism for obtaining information about individuals,
specialized role relations.”63 But the collector can take the interview process for granted
and not prepare adequately, leading to errors and misjudgments.64 Its routine usage belies
how difficult it is to conduct a good interview, how easily both the questions and the
responses can be misunderstood. Andrea Fontana and James H. Frey suggest that there is
62
Fontana, Andrea and James H. Frey. “The Interview: From Structured Questions to Negotiated Text,” as
Chapter 24 of Handbook of Qualitative Research, edited by Norman K. Denzin and Yvonna S. Lincoln
(Thousand Oaks: Sage Publications, 2000), p. 646.
63
Mishler, E. G. Research Interviewing: Context and Narrative. Cambridge, MA: Harvard University Press,
1986, p. 23.
64
Mishler, p. 23.
32
“always a residue of ambiguity, no matter how carefully we word the questions and how
We have come to rely on the interview and tend to trust its results as valid,
dismissing the possibility that bias might creep into source reporting due to the
individuals in-depth. Data collection consists of the observations and quotes the
fieldworker records, like the coded survey responses collected by the quantitative
researcher. Unlike a survey, the fieldworker’s detailed notes are more individuated and
In the social sciences, according to Cole, in-depth interviews allow the researcher
and source to freely discuss a few selected topics in a less structured manner. 68 Cole says
this technique can encourage the source to expound on issues that might get only cursory
coverage in a standard interview with a list of questions.69 This can be especially useful
when the topic is unfamiliar to the agent handler, who can feel free to interact with the
source and learn more.70 While this might produce an interview report with uneven
coverage of the scheduled topics for discussion, Cole suggests the richer results can
65
Fontana and Frey, p. 645.
66
Fontana and Frey, p. 646.
67
Cole, Stephen. The Sociological Method (Second Ed.). Chicago: Rand McNally College Publishing
Company, 1976, p. 161.
68
Cole, The Sociological Method, p. 161.
69
Cole, The Sociological Method, p. 161.
70
Cole, pp. 193-194.
71
Cole, p. 161.
33
On the other hand, Cole cautions that in-depth interviews can encourage the
source to fabricate information that will please the interviewer and/or make the source
seem important. The source can also elaborate from a poor vantage point, responding to a
An intelligence collector can only use the in-depth interview technique when time
is relatively abundant for asset meetings, as with a defector. An agent handler typically
has to prioritize a veritable battery of questions for an RIP, so the only way to make room
for in-depth interviewing in such a case would be to meet longer or more frequently with
the source, a rare luxury under typical OPSEC procedures. Depending on the case, it may
be impossible to delve deeply into individual questions, but an agent handler should be
The sociologists Fontana and Frey encourage the investment of time in give and
take discussions between the collector and source. Feedback in the interview process,
including the presentation and correction of field notes, assures the collector that he/she
has developed valid and reliable information. The source also gains confidence that the
transform a collector and his/her source into collaborators in the construction of new
verification, however important, would distract the interviewee who is beginning to open
72
Cole, pp. 193-194.
73
Fontana and Frey, p. 646.
74
Fontana and Frey, p. 646.
34
up.”75 If “rapport is good and your subject methodical,” Brady adds, “your man would
Due to laziness or bias, a journalist may produce routine source reporting that is
shallow and misleading to his/her audience. Biased reporting can also express a world
view that protects and defends the political interests of the journalist’s native land. The
publishing the sensational accounts of personal tragedy favored by their editors and
readership. They developed a callous routine, providing daily coverage of the Japanese
front and Japanese and Chinese press conferences from their "ringside seat" in and near
the International Settlement. "For a break in this routine, they could sit in the Park Hotel,
drinks in hand, and watch the Japanese dive-bombers, or go up on the roofs of apartment
blocks and see Japanese gun batteries in action." Their newspapers sought stories like:
"Corpses are as thick as flies on fly paper in the summer-time. Limbs and mutilated
A reporter has a responsibility to dig deep enough to develop the important stories
and not be misled. Talking to the wrong sources (or no sources) and not asking the
difficult questions of the right sources will often result in a distorted view of affairs.
politics behind the Japanese invasion of China while his colleagues sensationalized the
gruesome carnage. Knightley says Snow was the first to interview Mao Tse-Tung and
75
Brady, p. 186.
76
Brady, p. 186.
77
Knightley, Phillip. The First Casualty: From the Crimea to Vietnam: The War Correspondent as Hero,
Propagandist, and Myth Maker. New York: Harcourt, Brace, Jovanovich, 1975, p. 270.
35
Chou En-lai, taking great risks to find them in the field and bring their Communist
Wall Street reporters likewise must probe deeply for the story or be fooled by self-
serving pundits. James Surowiecki, in his reporting on the sub-prime loan crisis and one
particularly loathsome offender, says there is no dearth of biased financial gurus with
conveniently timed insider information to mislead the media on Wall Street.79 Surowiecki
decries the poor reporting methods of his colleagues, saying, “[T]he picture we’re getting
of the market—and of the economy as a whole—may reflect what people want to happen
An exasperated Marek Fuchs, pursuing this same story, complained that the media
and investors did not exercise due diligence when accepting the “one-man campaign of
self-interest” of this one source, noting that the source “did not get to where he is by
Participant Observation
towards the collection of reliable qualitative research.82 That collection can be overt or
covert, depending on whether or not the sociologist chooses to disclose his/her collection
activities, not unlike the declared vs. undercover work of a HUMINT collector.83
78
Knightley, The First Casualty, pp. 271-272.
79
Surowiecki, James. “Profits of Doom,” The New Yorker, 3 September 2007.
(http://www.newyorker.com/online/2007/09/03/070903on_onlineonly_surowiecki)
80
Surowiecki, James. “Profits of Doom,” The New Yorker, 3 September 2007.
(http://www.newyorker.com/online/2007/09/03/070903on_onlineonly_surowiecki)
81
Fuchs, Marek. “Media Taken For a Ride by Countrywide CEO.” TheStreet.com, 24 August 2007.
(http://www.thestreet.com/newsanalysis/maven/10376247.html)
82
Cole, p. 161.
83
Cole, p. 161.
36
The major nineteenth century European powers developed today’s system of trading
military attaches to conduct what Maureen O’Connor Witter calls sanctioned spying in
both times of war and peace.84 Armed forces intelligence services routinely task their
military attachés, who are declared intelligence officers for all practical purposes, to
passively collect while on assignment overseas. This may or may not preclude
must take extraordinary care in the conduct of espionage operations, for fear of causing
an international incident if they are caught. Declared intelligence officers are known to
the host country and are expected to nose around a bit but otherwise behave themselves.
Such was the story of James Lilley, the first US intelligence officer in China and a
85
declared CIA operative. As Henry Kissinger’s man in Beijing, nothing Lilley might
collect clandestinely would be worth the loss of the new relationship between the United
States and China, so his extracurricular duties, while productive, were decidedly
related activities, as well as the development of Eastern European officials based in the
Chinese capital.87
A covert agent, like any good performer, works hard to leave a highly consistent
impression on an audience that is contrary to reality in some significant ways and thereby
achieve his/her objectives. 88 The traitor is committed to the selected persona because the
84
“Sanctioned Spying: The Development of the Military Attaché in the Nineteenth Century,” contained in
Intelligence and Statecraft: The Use and Limits of Intelligence in International Society, Peter J. Jackson and
Jennifer L. Siegel, ed. Westport, Connecticut: Praeger, 2005, pp. 87-103.
85
Lilley, James with Jeffrey Lilley. China Hands: Nine Decades of Adventure, Espionage, and Diplomacy
In Asia. New York: Public Affairs (Perseus Group), 2004, p. 177.
86
Lilley, p. 177.
87
Lilley, p. 177.
88
Goffman, Presentation of Self, pp. 4-11.
37
disclosure in one area of an individual’s activity will throw doubt on the many areas of
activity in which he may have nothing to conceal.”90 Once his/her legend has been
developed, the undercover agent can and should expect to be treated according to the
cover story persona. At the same time, the undercover agent should be competent to
his/her position and/or intentions and use confederates as fieldworkers in order to “induct
natural context” through deception. This is much the same as an intelligence officer
fieldworker’s information-gathering tasks and provide the potential for more thorough
records they produce,” according to sociologists Georges and Jones.93 But unlike a
target or use overt surveillance techniques like a camera or tape recorder. Intelligence
professionals can still learn from the problems faced by sociological fieldworkers related
to the use of observation technology. Georges and Jones provide the following four
examples.
3. Feelings of guilt over perceived intrusions can prompt the collector to alter or
bias.”97
Beyond the use of technology, the intelligence target may simply become
resentful of collectors altogether, not unlike the tribesmen in New Mexico who rejected
about [to] learn secrets about people and write funny stories.”98
The observed may even completely turn the tables on the collector, effectively
reversing the direction of information flow away from the collector and diminishing the
observed is never as clearly drawn in the field as it is in the literature, Georges and Jones
explain. “[It can be] a continual reversal of roles … that [leaves] sometimes one, and
95
Georges and Jones, p. 143.
96
Georges and Jones, p. 143.
97
Georges and Jones, p. 144.
98
Georges and Jones, pp. 19-20.
99
Georges and Jones, p. 21.
39
The observed may have had previous negative encounters with collectors,
The target community or its leadership may become annoyed at the intrusions of
collectors into their privacy, causing the censure or expulsion of fieldworkers and
possible long-term damage to the operation itself.101 In the case of the Zuni, a tribal
leader offered his overall disappointment with the arrangement when he said, ”Nobody
comes here to help us. Everyone who comes has his own self-interest at heart.”102
Unlike the rapid-fire feedback that occurs in an interview, a social scientist only
commentary for the record. 103 Feedback can prompt defensive responses from the source,
according to Miles, and is thus generally not productive as a means towards refining
collection validity. Reliability instead rests not on feedback but on the skills of the
Documenting
The agent handler memorializes each asset meeting by summarizing the pertinent
intelligence collected, recording all the administrative details surrounding the particular
debriefing event, and evaluating the overall operation. The handler creates separate
reports for administrative and intelligence purposes, the latter typically being referred to
as source reporting. The asset never sees this documentation, which restricts HIS
100
Georges and Jones, p. 19.
101
Georges and Jones, p. 19.
102
Georges and Jones, pp. 19-20.
103
Miles, Matthew B. “Qualitative Data As An Attractive Nuisance: The Problem of Analysis,” in
Qualitative Methodology, edited by John Van Maanen (Newbury Park, California: Sage Publications, 1979,
1983, sixth printing 1990), p. 128.
104
Miles, p. 128.
40
evaluation of internal methods and capabilities through a double agent; however, there is
an analyst will edit for singularity by removing obvious details that tend to identify the
clandestine source. The writer may even break up the reporting into smaller, disseminable
pieces and/or disguise the origination point of the intelligence to disguise a sudden inflow
of intelligence that could put a source at risk. Persons other than the agent handler, his/her
operational team, and selected managers and staff ought not to see unexpurgated
debriefing documents.
source's reliability, both in context of the source's entire reporting record and any recent
incremental changes the handler or others have observed. The handler looks at criteria
The handler and his/her supervisor, along with analysts and other managers, will
develop a formal statement of source reliability called a caveat, which is paired with the
for accurate evaluation of source reliability. Consumers want to know that the
intelligence they are reading is worth the paper it is written on. Beyond that, consumers
who routinely read the latest intelligence reports will inevitably attempt to discern trends
in the underlying source reporting that might boost their confidence in the intelligence.
41
high profile media organizations. An analyst citing a Washington Post piece, for example,
may value the vaunted reputation of the newspaper over the records of the individual
journalists, research assistants, and editors who prepared, checked, and tweaked the
article before it was approved for publication. Yet journalists continue to be caught
fabricating their stories at reputable publications, such as Stephen Glass and Jayson Blair,
Abuse of Authority
can manipulate source reporting to advance his/her career and/or political objectives.
Depending on the objective, this abuse of authority can reach into management and
beyond. Such a breakdown of integrity in the HUMINT process can boost the face value
The 1982 investigation and trial of two men for an Oklahoma murder is a perfect
example of such prosecutorial malfeasance. Due to poor detective work and the misuse of
confidential sources, two innocent men ended up in prison, one on death row, while the
real murderer received scant investigative attention despite obvious connections to the
case. The murderer even provided evidence against one of the defendants.105 Later
investigations revealed that the local police regularly relied on jailhouse snitches to
provide convenient if dubious testimony against their fellow prisoners to aid the
105
Grisham, John. Innocent Man: Murder and Injustice in a Small Town. New York: Doubleday, 2006.
106
Grisham, Innocent Man, p. 161.
42
op-ed piece in the New York Times. Familiar to those in judicial and legal circles in New
blend of the words testifying and lying. Dershowitz blames the lawyers that routinely take
advantage of such tainted testimony as well as the judges who look the other way.
Dershowitz says the police compel false testimony from coerced witnesses and shore up
Dershowitz told the story of one police officer who was caught on tape
threatening a witness with bodily harm (“he would run him over ‘with a truck’”) if he
testified truthfully in court. The tape clearly contained the police officer’s promise to
deny having ever made this threat if it came out. When the recording was played in
Federal court in New York, the police officer stood his ground and denied having said it,
Abuse of authority can reach the highest levels of government. Consider the case
of Vice President Dick Cheney, who orchestrated a system of leaks through which he
infused unreliable source reporting with the credibility of The New York Times and other
major national media outlets in order to promote his goal of war in Iraq. 108 Speaking to
Frontline, Tom Rosenstiel, Director, Project for Excellence in Journalism, pointed out
how the Times’ unique position as an authoritative outlet for national security stories
107
Dershowitz, Alan M. “Controlling the Cops: Accomplices To Perjury.” The New York Times, 2 May
1994.
108
Buying the War, Bill Moyers Journal, 25 April 2007.
(Full video, description, and transcript http://www.pbs.org/moyers/journal/btw/watch.html)
(Pertinent section from You Tube http://www.youtube.com/watch?v=p1TliKIRcy4)
News War: Part II: The Reporting on Iraq’s WMD, Frontline, 13 February 2007.
(Full series, with description http://www.pbs.org/wgbh/pages/frontline/newswar/view/)
(Pertinent section from You Tube http://www.youtube.com/watch?v=VnMW4K-JYgs)
43
intelligence.109 This questionable deception practice, which could also be called source
2. Leak your version of the story off the record to a credible but hungry
dispatches resemble government news releases and should be met “with some
skepticism.”110
In the rush of patriotic fervor, a collector can take sides and lose all
109
News War: Part II: The Reporting on Iraq’s WMD, Frontline, 13 February 2007.
110
Knightley, The First Casualty, p. 319.
44
missions, carried and used guns, parachuted behind enemy lines, captured whole
towns, and even received medals.111 Knightley tells the extreme example of
Ronald Monson, a war correspondent who "became so angry after seeing Belsen
concentration camp that, as he said, 'I drove my car into a column of German
112
prisoners. My God, did they scream!" Reporting can become distorted in such
emotional environments.
circumstances surrounding the collector can negatively affect collection and reporting.
For example, a new agent handler may find the job difficult to master, maybe even
distasteful or otherwise unsuitable. This collector may produce unreliable reporting for
several years until a new assignment comes along. Turmoil in a veteran collector’s
personal life can bring on sudden changes in product quality that may distort source
reporting. The collector may lack an appreciation for the target nation’s culture. Or the
rigors of the operational environment may be so personally abhorrent that the collector
Likewise the novice anthropologist might get the impression in training that the
job is fairly straightforward. But, according to Georges and Jones, the newcomer to
fieldwork can be startled to learn that mastering the basics of the interview and
observation were only the beginning of learning. They note, “Fieldwork guides tend to
111
Knightley, The First Casualty, p. 316.
112
Knightley, The First Casualty, p. 316.
45
leave the impression that the logic of inquiry, which the authors have reconstructed, is the
suffer.113
collector. Lowenthal, in his Intelligence: From Secrets to Policy, says diverse collection
on the all-source model can provide a synergy that helps overcome the shortcomings of
particular collection methods114, but this only pertains to scope and depth of coverage and
not bias and subjectivity. It is important to remember that there is no average collector;
Georges and Jones suggest that anthropologists are encouraged to document their
personal biases and subjectivity in their reporting to illuminate for the consumer the
collector’s perspectives and mindsets. Even issues such as the reasons for the collector’s
choice of assignment could affect reporting and were therefore listed.115 In intelligence,
order to document possible biases. For example, they complain that the anthropologist
Ruth Benedict “implies in her writings that she had probed the minds and actions of
individuals […] but evaluation of her work is difficult without knowledge of her
113
Georges and Jones, p. 9.
114
Lowenthal, From Secrets To Policy, pp. 70-71.
115
Georges and Jones, p. 33
46
methods.” Benedict relied on interpreters, they added, but she “never identifies them,
explains how they were chosen, or indicates their role in her investigations.”116
documenting his/her reporting. A collector may also distort reporting by letting power,
personal difficulties, or bias interfere with the proper fulfillment of his/her duties.
The Analyst
The analyst wrestles with others’ estimates of source reliability in his/her daily
reading of current intelligence reporting and carries forward others’ source reliability
caveats while researching and composing new intelligence products for dissemination.
But the analyst can also affect the reliability of source reporting.
Richards J. Heuer, Jr. says that CIA analysts simply do not believe that HUMINT data
can be standardized and aggregated because too much detail is lost in the process.
Intelligence analysis contends with many distinct pieces of information that are often
difficult to generalize and aggregate for broader study. Attempts to quantify data in
individual HUMINT cases can lead to data distortion and loss of reliability. Government
analysts do not believe that unique events can be uniformly measured and processed,
Heuer explains, leading many to favor subjective distortion over the statistical kind.117
repeatable in order to test hypotheses, so measurements are taken and the data aggregated
116
Georges and Jones, p. 8.
117
Heuer, “Adapting Academic Methods,” pp. 4-5.
47
so other scientists can repeat the research and attempt to disprove a theory. Reliability is
based on repeatability and consistency. Distortion is factored into the results as a margin
distortion. It also tends to generalize and weaken the evidence regarding specific
individuals or groups.
research, something fundamentally different from the quantitative analysis done by most
social scientists at the time.118 Social science scholarship has in fact broken free of its
descriptive terminologies that allow more precise study of people, places, and events.119
This is especially valuable for intelligence, where the behavior of specific humans in their
Kirk and Miller make the point that “the description of reliability and validity
ordinarily provided by nonqualitative social scientists rarely seems appropriate to the way
in which qualitative researchers conduct their work.”120 While they admit that the
numbers vs. no numbers argument is a bit of a contrivance, Kirk and Miller stress the
unique path that qualitative methodology has taken in the social sciences and how vital
induction, content analysis, semiotics, hermeneutics, elite interviewing, the study of life
118
Heuer, Richards J., Jr. “Adapting Academic Methods and Models to Governmental Needs,” as Chapter 1
of Heuer, ed. Quantitative Approaches to Political Intelligence: The CIA Experience. Boulder: Westview
Press, 1978, pp. 1-10.
119
Janesick, Valerie J. “The Choreography of Qualitative Research Design - Minuets, Improvisations, and
Crystallization,” as Chapter 13 of Handbook of Qualitative Research, 2nd edition, edited by Norman K.
Denzin and Yvonna S. Lincoln. Thousand Oaks: Sage Publications, 2000, p. 393.
120
Kirk, Jerome and Marc L Miller. Reliability and Validity in Qualitative Research. Beverly Hills: Sage
Publications, 1986, p. 14.
121
Kirk and Miller, p. 10.
48
Kirk and Miller explain the difference between reliability through repeatability
versus validity by using the story of two thermometers and a pot of boiling water (100
degrees C). In their example, a malfunctioning thermometer registers the same incorrect
82 degree C temperature each time, while a more accurate one provides a range of
temperatures that average the correct 100 degree C temperature. “The second
thermometer would be unreliable but relatively valid, whereas the first would be invalid
but perfectly reliable,” they conclude, adding, “It is easy to obtain perfect reliability with
approaches often lack a common vocabulary to help regulate their expectations for
reliability.124 Sam D. Sieber stresses the importance of validity in qualitative research and
percentage margin of error. Tests for repeatability are inadequate to detect deception and
122
Kirk and Miller, p. 10.
123
Kirk and Miller, p. 19.
124
Sieber, Sam D. "A Synopsis and Critique of Guidelines for Qualitative Analysis Contained in Selected
Textbooks,” Project on Social Architecture in Education. New York: Center for Policy Research, 1976.
Sieber is cited by Matthew B. Miles in “Qualitative Data As An Attractive Nuisance: The Problem of
Analysis,” in Qualitative Methodology, edited by John Van Maanen. Newbury Park, California: Sage
Publications, 1979, 1983, sixth printing 1990; p. 126.
125
Sieber, p. 126.
49
error. Users of HUMINT demand that a source not just be consistent in his/her reporting
but that accurate in that reporting. The USIC favors knowledgeability, accuracy, and
foolproof methodology. When most sources are lying as part of an active deception
Fact Checking
role with an agent handler, both before and after an asset meeting. Preparation for the
interview can prompt the development of good questions for the agent handler. More
importantly, the analyst can research pertinent topics and make sure the agent handler is
well briefed. The operational analyst can also help the agent handler check through the
results of the asset meeting, crosschecking details with other source reporting and
clarifying incomplete names, vague dates, and unfamiliar places and organizations. The
process can include an assessment of the asset’s bona fides, the status of INFOSEC if not
In journalism these notions are called research and fact checking. Allan E
Goodman, the chief presidential briefing coordinator for Jimmy Carter, testified before
the Commission on the Roles and Capabilities of the United States Intelligence
Community on how much more rigorous journalistic fact checking was in comparison to
what he had experienced in government. For a Foreign Policy article, Goodman said,
“The intern [assigned to fact-check his article] proceeded to ask for the source of virtually
everything that I was saying in the article that could be construed to be a matter of fact as
50
well as the interpretations based on those facts that I was presenting. She also said she
would be calling other experts in the field to verify both my sources and my analysis.”126
Goodman recommends that intelligence analysts fact check an equivalent number of their
stars do their homework and things go smoothly, while others risk disaster because they
fail to conduct adequate preliminary research. A journalist like Gloria Steinem “reads
acquaintances,” Brady says, adding, “[S]he starts her interviews by asking her subjects
what they think has been accurate and inaccurate in previous writings about them.” 128 An
gossip and innuendo when he told a cub reporter, “'Let it be known around town that just
because someone says something -- regardless of how big a star he is -- you are not
properly formed questions, can develop useful information as well as stop the
Fact checking takes place after the reporter’s interview. If fact checking is weak
found elsewhere in the media. According to Neil MacNeil of The New York Times, "The
reporter who believes all that he is told will not last long. The competent reporter takes all
126
Goodman, Allan E. “Testimony: Fact-checking at the CIA.” Washington: Foreign Policy, Spring 1996,
p. 180.
127
Goodman, p. 181.
128
Brady, p. 191.
129
Brady, p. 186.
51
the data he can get. He may ask embarrassing questions. He checks one person's
statement against another's and against the known facts. ... He makes certain that he has
“Reasonable journalism” encourages weak libel laws to address the media’s fear
of litigation but leads them at the same time to poor fact checking practices and
ultimately unreliable reportage. The Canadian courts have lightened the burden on the
media in a recent judgment: if the source provides misinformation but a reasonable effort
is made by the journalist to discern the facts—and that reasonableness is defined by the
courts – then libel cannot be charged. This is an unfortunate development, considering the
defense attorney challenges the witness much the same as an analyst challenges reporting
from a HUMINT source. The courtroom parallel offers much to the study of distortion in
source reporting is asked to fill the void until something fresher can be collected. A long
gap in applicable current intelligence can leave that last useful strand of reporting dog-
The perpetuation of truly dated but once reliable HUMINT is a sign of poor
analytic methodology. Director of the CIA (DCIA) Michael Hayden recently stressed
how the Iraq War intelligence failure was caused in part by the perpetuation of dated
130
Brady, p. 185.
131
McQueen, Mark. Has Justice Robert J. Sharpe Put Process Before Truth in Libel Ruling? Best Way to
Invest, 19 November 2007. http://www.bestwaytoinvest.com/display/6733.
52
source reporting. A continual lack of fresh intelligence should have prompted analysts to
lower their confidence levels, but this did not happen. “Even though our recent reporting
had been very thin, we still kind of carried the old conclusions forward without frankly
holding them up enough to the light in order to see whether or not they were still valid.”
Hayden mentioned that his analysts have now learned to recalibrate analytic confidence
in intelligence estimates in such cases, citing one example in particular where a CIA
analyst told him that an estimate was downgraded “because the intelligence on which it
Freshness of source reporting can affect the reliability of advice given to combat
pilots seeking legal justification for a pending air strike, according to Judge Advocate
General (JAG) Charles Dunlap (USAF). JAG lawyers are embedded in military
operations centers to grant pilots permission to launch weaponry and kill people. They
must remain aware of the latest source reporting and cannot rely solely on the highly
information to authorize the taking of a life. Dunlap says the military must apply the
lesson of poor eyewitness accuracy to this command post situation. Embedded JAG
lawyers must develop “other intelligence indicators that would tell [them] that that [blip]
really is the enemy and that [the pilots] really do need to kill that human being.”133
analyst cannot easily pierce. The handler and source develop an exclusive bond of trust
132
Meet The Press, 30 March 2008. (http://www.msnbc.msn.com/id/21134540/vp/23867579#23867579)
133
CSPAN. JAG Charles Dunlap (USAF) spoke on 16 November 2007 at the American Bar Association,
Washington, DC on the subject "Law In Times of War,” as part of the America and the Courts series on
CSPAN. (The video begins with Sandra Day O'Connor speaking at another event. JAG Dunlap begins
speaking at 45:14. Link auto-invokes Real Player: javascript:playClip('rtsp://video.c-
span.org/60days/ac012708.rm')
53
that promotes reliable communication. The source depends on the handler for security,
and they spend much time together. The agent handler has legitimate OPSEC concerns
and will limit outside contacts with the source to minimize risk, effectively becoming the
source’s guardian and overseer. Beyond this, a agent handler’s career may skyrocket
through the development of a major recruitment case, so there are personal reasons for
This custodial relationship can make it difficult for analysts to discern a source’s
reliability first hand, to study non-verbal cues and mannerisms that do not appear in
reporting documents. As Goffman says, "Many crucial facts lie beyond the time and place
of interaction or lie concealed within it. For example, the 'true' or 'real' attitudes, beliefs,
and emotions of the individual can be ascertained only indirectly, through his avowals or
Six blind men in an Indian proverb (Appendix A) failed to discern that they
beheld an elephant because they each assessed a different part of the beast and could not
reconcile their findings from their unique perspective. They failed to realize that the scale
and complexity of their problem made their individual reports appear in conflict and
which to evaluate collection collaboratively. Only then can reliability be rated. 135
parading as fact simply because the media published irresponsible remarks. Arthur
Herzog, author of the B. S. Factor, said, 'When people sound knowledgeable, others
134
Goffman, The Presentation of Self, p. 2.
135
Kirk and Miller, pp. 49-51.
54
believe them. ... So much in modern life is guesswork and confusion that almost anybody
who seems to know what he is talking about will be promptly smuggled between
quotation marks."136
unintentionally index138 even the most mundane aspects of social life, producing
hopelessly biased reporting in the process.139 While criticized by some, Douglas seems
A source will sometimes make strong, persistent claims but lack evidence that
might substantiate his/her dog-eared hypothesis. While it is the duty of the agent handler
to make a serious effort to separate fact from supposition while composing source
reporting, it becomes the responsibility of the analyst to meticulously avoid including any
such assertions in his/her finished intelligence products. This is not an ideal situation, as
all-source analysts often have no contact with sources and may inadvertently distort the
136
Brady, p. 185.
137
A term coined in the 1960s by sociologist Harold Garfinkel, ethnomethodology suggests that social
investigators impose their own frameworks and values on the components of life.
138
Indexicality derives from pragmatics, a field of linguistics, which suggests that meaning can be inferred
in other ways than direct semantic argument.
139
Douglas, Jack D. Investigative Social Research: Individual and Team Field Research. Beverly Hills:
Sage, 1976.
140
Bainbridge, William Sims. Review. Social Forces. Chapel Hill: University of North Carolina Press,
September 1977, Vol. 56, No. 1, pp. 300-301. Bainbridge, of the University of Washington, gave Douglas’s
book a harsh review, dismissing it as emotional in its substance (“The only proper aim of social science, we
are told, is the discovery of the human experience.”) and deficient in its measurements (“No talk of
variables, causal models, or hypothesis testing here.”), not to mention its tendency to be autobiographical in
its nature. Bainbridge seems to criticize it for its qualitative aspects. The very qualities of the book that
Bainbridge found most dangerous to the probationary sociologist (“The neophyte may come away … with
a dangerous and unscientific superspy model of how field work should be done.”) are particularly
applicable to this thesis.
55
The Editor
process, which can occur at several points after clandestine source information has been
received and before it is sent to consumers. The writer has unpacked the dissemination
stage to see where the distortion of clandestine source information might occur after
agent handlers and analysts have completed their drafts of source reporting and finished
intelligence products. This chapter is thus designated The Editor, which captures this
Peer Review
Informal peer review and other report editing schemes, as well as the formal fact
When editors, reports officers, and management make revisions to drafts, they too
can potentially distort the HUMINT in source reporting and finished intelligence
products. It is incumbent upon the submitting writer to review any changes to the draft to
assure that the revised document continues to convey the spirit and substance of the
regarding people, places, and events can be verified. The media are motivated by a fear of
lawsuits. New Republic reporter Stephen Glass was able to manipulate his publication’s
fact checking system by conducting personal interviews, which were not subject to
review under the magazine’s guidelines. An online magazine’s fact checkers discerned
56
the deception and published an embarrassing exposé, criticizing both Glass and the
misconduct. The New York Times correspondent Jayson Blair created sources out of thin
air, embarrassing the reputable newspaper. It is important that all intelligence personnel
remain vigilant for such excesses, which can misdirect operations and cause untold
harm.142
The management review and approval process provides the USIC with its final
bulwark against the dissemination of HUMINT that is either purposely deceptive, well
meaning but erroneous, or distorted by agent handlers and analysts in their collection,
processing, and writing of source reporting and finished intelligence products. The
for quality workmanship by collectors and analysts in the preparation of drafts, especially
receiving agencies, can lead to catastrophe. Consider the case of international liaison
between Germany and the United States regarding Germany’s CURVEBALL source.143
141
60 Minutes. “Stephen Glass: I Lied For Esteem.” 17 August 2003.
(http://www.cbsnews.com/stories/2003/05/07/60minutes/main552819.shtml); Ebert, Roger. Review of
“Shattered Glass”
(http://rogerebert.suntimes.com/apps/pbcs.dll/article?AID=/20031107/REVIEWS/311070305/1023)
142
Editors of The New Atlantis. “Technology: The Great Enabler? How Jayson Blair Conned The New York
Times.” The New Atlantis (No. 2, Summer 2003), pp. 110-111
(http://www.thenewatlantis.com/publications/technology-the-great-enabler) ; Nwazota, Kristina. “Jayson
Blair: A Case Study of What Went Wrong At The New York Times,” Online NewsHour (Website of the PBS
program NewsHour With Jim Lehrer)
(http://www.pbs.org/newshour/media/media_ethics/casestudy_blair.php)
143
The Bundesnachrichtendienst (BND) internally assessed this Iraqi defector source as unreliable but
circulated dozens of reports to the USIC anyway, according to David Kay. Kay noted that the German
intelligence agency refused access to the source for proper vetting. The CIA, which used this source to
57
Error and confusion in the international transference of one source reliability assessment
caused the Defense Intelligence Agency (DIA) and CIA to produce shaky intelligence
that became the basis for war in Iraq in 2003. In a New York Times Book Review article on
Robert Drogin’s Curveball: Spies, Lies, and the Con Man Who Caused A War,
Christopher Dickey details the incomprehensible failure of the HUMINT vetting process
in this case, both within individual intelligence agencies and in international and
interagency liaison.
David Kay, charged with finding Saddam Hussein’s weapons of mass destruction
(WMD) as head of the Iraq Survey Group, heaps a significant share of the blame for the
confusion caused within the USIC regarding Iraqi WMD on the BND and the more than
100 unreliable CURVEBALL reports it issued. The Germans not only failed to properly
vet their asset, but they inexplicably complicated the matter by failing to identify him to
the USIC or provide access to him, according to Kay, adding, “It was a blockade that
made it impossible for any other service to validate his information. The German service
did not live up to their responsibilities or to the level of integrity you would expect from
such a service.”145
support part of Secretary of State Colin Powell’s presentation to the United Nations in the US justification
for war, is chastised for its assumption of the source’s reliability.
144
Dickey, Christopher. “Artificial Intelligence”. The New York Times Book Review, 18 November 2007.
(http://www.nytimes.com/2007/11/18/books/review/Dickey-t.html?_r=1&oref=slogin)
145
Goetz, John and Marcel Rosenbach. “Spiegel Interview With Iraq WMD Sleuth David Kay,” Spiegel
Online International, 22 March 2008. (http://www.spiegel.de/international/world/0,1518,542888,00.html)
58
this asset should unquestionably have been labeled unreliable, the intelligence agencies
unreliability miss the point. Within the concept of source reliability must be an
assessment not only of the asset but the HUMINT process employed, including the
responsibility of the final editors. Management bears the burden to assure that source
reliability caveats are accurate on outgoing disseminations and that their staff do
everything within their power to detect deceitful and erroneous foreign sources, as well as
reporting or HUMINT-based analytical pieces when they either disagree with the
prevailing views or fail to support the known positions of higher-level authorities. There
can be considerable pressure on managers to be team players, avoid rocking the boat, and
not make trouble. Approving innovative intelligence products that fly in the face of upper
especially if these products diminish the perceived threat and/or negatively affect budget
allocations.
Eugen F. Burgstaller suggests that analysts might err on the side of caution and
information available from other collection sources, diplomatic reporting and public
media.” And he allows that policymakers might choose to show “effective disregard for
established general line of policy … or judges that basing a policy decision on such
One should also assume that intelligence management, set squarely between
analysis and policymaking, might tinker with intelligence output in order to reduce
146
Burgstaller, Eugen F. “Major Future Problems and Limitations Of Human Collection” in Intelligence
Requirements for the 1980’s (No. 5): Clandestine Collection, edited by Roy Godson (New Brunswick,
USA: Transaction Books, 1982), pp. 78-79.
60
CONCLUSION
This paper has explored how source reporting can be distorted at each stage of the
HUMINT process within the USIC and how that distortion may impact perceptions of
source reliability. It is clear that source reliability pertains not only to the trustworthy,
deceptive, or misinformed human source of intelligence but also to the process through
The writer found no specific writings on this subject. The field of operational
practices is severely underrepresented. There is a bias towards writings on the “inside the
Beltway” battle between analysts and policymakers, with little focus on the HUMINT
History (Chapter 4) demonstrates that decision makers who use HUMINT for
answers have always preferred to deploy their own agents, resorting to the use of
clandestine foreign sources only when agent access is denied. National leaders as far back
as Moses sent soldiers, diplomats, and executive agents into the field to see what an
opponent is up to.
The United States spends most of its intelligence budget on technical collection,
spymasters have recruited spies against the British in the American Revolution, the
Confederacy in the US Civil War, and the Soviets in the Cold War. As non-governmental
61
organizations, today’s terrorist groups are a new and particularly difficult type of
HUMINT target, but the basics of HUMINT collection against a hard target in time of
war remain the same: the recruitment and operation of dependable foreign spies, and that
It may seem a truism, but espionage also requires an opponent. Today’s world
requires estimates of national threat and a steady stream of indicators and warning, but
decision makers will reduce efforts in clandestine HUMINT collection and revert to
surveillance and reconnaissance whenever the diminished sense of threat allows it. This
writer expects that, once the War on Terrorism has passed fifty years hence, the USIC will
directions and avoid the next surprise attack. As concerned as he was about Osama bin
Laden and Al Qaeda, Richard A. Clarke offers no “lessons learned” from the build up to
9/11 that might teach the USIC how to smoothly shift directions.147
draw from the experiences of other fields with similar frame works, such as
anthropology, journalism, and the law. The intelligence field has only begun to look to
other social sciences, journalism, and the courtroom to bolster its theory and application.
Future researchers must venture into the best practices of anthropologists, sociologists,
criminologists, district attorneys and defense lawyers, reporters, and their editors and
overlay what they have learned onto the intelligence realm. Goffman’s The Presentation
147
Clarke, Richard A. Against All Enemies: Inside America’s War on Terror. New York: Free Press (Simon
& Schuster), 2004.
62
source reliability scale, can be made. The writer hopes that this thesis provides the
conversion of those observations and interactions into source reporting. The HUMINT
process involves the development of that source reporting, which is then pooled for the
reporting can occur anywhere in the process, including the editing and approval stages
what are the motives of the source in providing this information? The reliable source
provides accurate and useful information. The unreliable source either misrepresents the
facts or unintentionally gets the information wrong, often due to poor recollection or
perspective.
The distortion of HUMINT reporting begins with the collector (Chapter 8) and
thorough exchange of ideas between the two parties to an interview, including feedback
observer situation but lacks the interviewer’s ability to promptly record his/her findings.
disgruntled over personal issues and generate an assortment of distorted source reporting.
Unchallenged bias and subjectivity can produce great distortion of HUMINT collection.
The analyst (Chapter 9) plays the role of journalistic fact checker or the defense
also keeps an eye on the shelf life of old, once reliable source reporting. Access to the
source may be limited to the agent handler, putting the analyst outside the privileged
relationship, thus limiting the analyst’s ability to assess both source reliability and the
quality of source reporting. The analyst may use source information to buttress an
(Chapter 10), which can cause distortion. Writers are encouraged to offer their
publications for peer review. Reports officers may adjust a document for content or style
before disseminating it to other agencies. And the supervisor and his/her upper
management can weigh in on the writings of their staff. A manager might take the “better
safe than sorry” approach and tone down particular statements for political reasons, or the
agenda.
Finally, the consumer needs a better awareness of the pitfalls of source reporting.
The courtroom’s experience with false eyewitness testimony provides a unique solution
64
to this problem. Jurors are either instructed by the judge or provided an overview by an
Recommendations
Awareness Training
branch appointees, and their staffs. The curriculum could include an explanation of
We learn from Loftus that her expert court testimony and/or a judge’s detailed
testimony. Increased awareness, especially in capital crime cases, can ratchet down the
The information flow between agent handler and source is necessarily one-way.
No collector wants expose his/her list of intelligence gaps to a double agent, for example.
But journalism and anthropology can teach the intelligence field something about
improving the reception of source information through feedback and logical follow-up. A
participant observer in a tribal village might bring his/her report back to the subject to
verify that his/her observations are accurate and complete. There may be follow-up
questions on both sides that can be addressed in such secondary discussions. A journalist
148
Loftus and Ketcham, pp. 27-28.
65
may do extensive research and then present his/her findings to the subject of the
investigation, as well as witnesses and contacts. This feedback and follow-up is noted in
the final report. Too often this is not done in the intelligence realm. To be sure, both
anthropology and journalism have some cautionary tales of this sort of practice backfiring
Cross-Examination
Asset vetting could be conducted in a model courtroom, with the agent handler
taking the role of the prosecuting attorney and representing the operational side of the
house, and an all-source analyst playing the defense lawyer would represent the
analytical position. On the witness stand would be someone well versed in the asset’s
testimony, demeanor, and overall situation, preferably someone, as they say, without a
horse in the race. The judge, another independent role, could be the master of ceremonies
and prompt the flow of discussion. Operational and analytical management would play
the more political roles of the district attorney’s office and public interest groups.
HUMINT techniques and separate it from their attempts to incorporate TECHINT into
operations. Recent popular intelligence analysis books by Mark Lowenthal (From Secrets
to Policy) and Robert M. Clark (A Target-Centric Approach) totally ignore the role of
Operational Theory
66
Sources and methods must be protected, but a way must be found to open the discussion
of the fundamentals. This writer suspects there may be a structural bias within the USIC
Conclusions
The reliability of source reporting is affected not only by the character of the
HUMINT source but also by the process through which that reporting is collected,
analyzed, and edited. The fields of journalism, sociology, and the law provide a rich base
of experience through which the IC can learn more about the obtaining and delivering of
source information.
67
BIBLIOGRAPHY
Adams, Sally, and Wynford Hicks. Interviewing For Journalists. London: Routledge,
2001.
Bainbridge, William Sims, review of Investigative Social Research: Individual and Team
Field Research, by Jack D. Douglas, Social Forces. Chapel Hill, NC: University
of North Carolina Press, September 1977, Vol. 56, No. 1.
Bearden, Milt and James Risen. The Main Enemy: The Inside Story of the CIA’s Final
Showdown With the KGB. New York: Random House, 2003.
Bennett, Michael and Edward Waltz. Counterdeception Principles and Applications for
National Security. Norwood, MA: Artech House, 2007.
Best, Richard A., Jr. Intelligence, Surveillance, and Reconnaissance (ISR) Programs:
Issues for Congress, CRS Report for Congress, February 22, 2005.
www.fas.org/sgp/crs/intel/RL32508.pdf (accessed March 18, 2009).
Bobo, Jeff. “Would-be Informant Charged With Filing a False Report.” Kingsport Times-
News, February 14, 2007. http://www.timesnews.net/article.php?id=3731380
(accessed March 18, 2009).
Brady, John. The Craft of Interviewing. Cincinnati, OH: Writer's Digest, 1976.
Cable News Network. “Breaking News: Gunman Fires on Another San Diego School.”
CNN.com Transcripts, 22 March 2001.
http://transcripts.cnn.com/TRANSCRIPTS/0103/22/bn.09.html (accessed March
18, 2009).
Cole, Stephen. The Sociological Method. 2nd ed. Chicago: Rand McNally College
Publishing Company, 1976.
Dunlap, Charles. “Law in the Times of War.” American Bar Association address as part of
the America and the Courts series on CSPAN, November 16, 2007.
68
Deakin, Frederick W. and G. Richard Storry. The Case of Richard Sorge. New York:
Harper and Row, 1966.
Dershowitz, Alan M. “Controlling the Cops: Accomplices to Perjury.” The New York
Times, May 2, 1994.
Dickey, Christopher. “Artificial Intelligence”. The New York Times Book Review,
November 18, 2007. http://www.nytimes.com/2007/11/18/books/review/Dickey-
t.html?_r=1&oref=slogin (accessed March 18, 2009)
Douglas, Jack D. Investigative Social Research: Individual and Team Field Research.
Beverly Hills, CA: Sage, 1976.
Fontana, Andrea and James H. Frey. “The Interview: From Structured Questions to
Negotiated Text.” Chap. 24 in Handbook of Qualitative Research, edited by
Norman K. Denzin and Yvonna S. Lincoln, pp. 645-672. Thousand Oaks, CA:
Sage Publications, 2000.
Frontline. “News War: Part II: The Reporting on Iraq’s WMD.” 13 February 2007. Full
series, with description http://www.pbs.org/wgbh/pages/frontline/newswar/view/
(accessed March 18, 2009).
Fuchs, Marek. “Media Taken For a Ride by Countrywide CEO.” TheStreet.com, August
24, 2007. http://www.thestreet.com/newsanalysis/maven/10376247.html
(accessed March 18, 2009).
Georges, Robert A. and Michael O. Jones. People Studying People: The Human Element
in Fieldwork. Berkeley, CA: University of California Press, 1980.
Goetz, John and Marcel Rosenbach, “Spiegel Interview With Iraq WMD Sleuth David
Kay,” Spiegel Online International, March 22, 2008
http://www.spiegel.de/international/world/0,1518,542888,00.html (accessed
March 18, 2009).
Goodman, Allan E. “Testimony: Fact-checking at the CIA.” Foreign Policy, Spring 1996.
Grisham, John. Innocent Man: Murder and Injustice in a Small Town. New York:
Doubleday, 2006.
Heuer, Richards J., Jr. “Adapting Academic Methods and Models to Governmental
Needs.” Chap. in Quantitative Approaches to Political Intelligence: The CIA
Experience, edited by Richards J. Heuer. Boulder, CA: Westview Press, 1978.
Kessler, Ronald. Spy vs. Spy: Stalking Soviet Spies in America. New York: Charles
Scribner’s Sons, 1988.
Kirk, Jerome and Marc L. Miller. Reliability and Validity in Qualitative Research.
Beverly Hills: Sage Publications, 1986.
Knightley, Phillip. The First Casualty: From the Crimea to Vietnam: The War
Correspondent as Hero, Propagandist, and Myth Maker. New York: Harcourt,
Brace, Jovanovich, 1975.
Lilley, James and Jeffrey Lilley. China Hands: Nine Decades of Adventure, Espionage,
and Diplomacy in Asia. New York: Public Affairs, 2004.
Loftus, Elizabeth and Katherine Ketcham. Witness For the Defense: The Accused, The
Eyewitness, And The Expert Who Puts Memory On Trial. New York: St. Martin’s
Press, 1991.
70
Lowenthal, Mark M. Intelligence: From Secrets to Policy. 3rd ed. Washington, DC: CQ
Press, 2006.
McQueen, Mark. Has Justice Robert J. Sharpe Put Process Before Truth in Libel Ruling?
Best Way to Invest, 19 November 2007.
http://www.bestwaytoinvest.com/display/6733. (accessed March 18, 2009)
Meet The Press, 30 March 2008, an interview with DCIA Michael Hayden on Iraqi
WMD. http://www.msnbc.msn.com/id/21134540/vp/23867579#23867579
(accessed 18 March 2008).
National Transportation Safety Board. Aircraft Accident Report: In-flight Breakup Over
the Atlantic Ocean, Trans World Airlines Flight 800 Boeing 747-131, N93119
Near East Moriches, New York July 17, 1996 (NTSB/AAR-00/03 DCA96MA070
PB2000-910403 Notation 6788G Adopted 23 August 2000), Witness Document
Issues (1.18.4.2). Washington, DC: Diane Publishing.
Editors of The New Atlantis. “Technology: The Great Enabler? How Jayson Blair Conned
The New York Times.” The New Atlantis 2 (Summer 2003): 110-111
http://www.thenewatlantis.com/publications/technology-the-great-enabler
(accessed March 18, 2009).
Nwazota, Kristina. “Jayson Blair: A Case Study of What Went Wrong at The New York
Times,” Online NewsHour.
http://www.pbs.org/newshour/media/media_ethics/casestudy_blair.php (accessed
March 18, 2009).
Office of the DNI. General Michael V. Hayden Before House Permanent Select
Committee Subcommittee on Oversight, 28 July 2005.
http://www.dni.gov/testimonies/20050728_testimony.htm (accessed March 18,
2009).
Pujol, Juan and Nigel West. Operation GARBO: The Personal Story of the Most
Successful Double Agent of World War II. New York: Random House, 1985.
Schum, David A. and Jon R. Morris. “Assessing The Competence and Credibility Of
Human Sources Of Intelligence Evidence: Contributions From Law And
Probability.” Law, Probability, and Risk 6, no. 1-4, (2007): pp. 247-74.
71
Shenon, Philip. “FBI Admits Informer Misled Inquiry.” The New York Times, February
24, 1988.
Sieber, Sam D. "A Synopsis and Critique of Guidelines for Qualitative Analysis
Contained in Selected Textbooks,” Project on Social Architecture in Education.
New York: Center for Policy Research, 1976.
Leung, Rebecca. “Stephen Glass: I Lied For Esteem.” 60 Minutes, August 17, 2003.
http://www.cbsnews.com/stories/2003/05/07/60minutes/main552819.shtml
(accessed March 18, 2009).
Wald, Matthew L. “Ideas and Trends: For Air Crash Detectives, Seeing Isn’t Believing.”
The New York Times, June 23, 2002
http://query.nytimes.com/gst/fullpage.html?res=9A04E6DB133FF930A15755C0
A9649C8B63&scp=33&sq=%22twa+flight+800%22&st=nyt (accessed March
18, 2009).
Woodberry, Jr, Warren. Many Saw Flight 587 On Fire Before Crash. New York Daily
News, June 5, 2002.
http://www.nydailynews.com/archives/news/2002/06/05/2002-06-
05_many_saw_flight_587_on_fire_.html (accessed March 18, 2009).
72
APPENDICES
C. Richard Sorge
E. Edgar Snow
Moral:
So oft in theologic wars,
The disputants, I ween,
Rail on in utter ignorance
Of what each other mean,
And prate about an Elephant
Not one of them has seen! 149
149
Saxe, John Godfrey. Blind Men and the Elephant. (Word Info)
(http://www.wordinfo.info/words/index/info/view_unit/1/?letter=B&spage=3)
75
150
Pujol with West, pp. 44-46.
76
After the outbreak of the European war, Sorge was invited to edit a
German Embassy news bulletin, and occupied an office for this purpose,
where he read the official press telegrams from Berlin. He received a
formal payment for this service. As an enterprising newspaperman, and as
a former soldier with a brilliant war record, he established close relations
with the successive military and naval attaches, and exchanged with them
material and opinions on technical problems.
151
Deakin, F. W. and G. R. Storry. The Case of Richard Sorge. New York: Harper and Row, 1966, p. 17.
77
152
Woodberry, Jr, Warren. Many Saw Flight 587 On Fire Before Crash. New York Daily News, 5 June 2002.
(http://www.nydailynews.com/archives/news/2002/06/05/2002-06-
05_many_saw_flight_587_on_fire_.html)
78
153
Knightley, The First Casualty, pp. 271-272.
79
Distortion in the HUMINT process can be better understood by looking back at its
century to handle HUMINT collection, analysis, and dissemination, the decision maker
and his/her immediate staff would handle source reporting directly, or, most recently, with
the foreign travelers and soldiers subjected to interview, interrogation, and tortured, the
main risk to source reliability was through HUMINT collection and processing by the
internal problem as most sources were on the government’s payroll. Government sources
have always included the soldiers who watch vigilantly at the borders and report unusual
events. But before intelligence organizations and spymasters created elaborate systems
for the collection, analysis, and dissemination of intelligence, decision makers would
dispatch soldiers and private agents to answer specific intelligence requirements. They
were their personal spies, selected for their skills of cunning, stealth, and observation, as
well as their loyalty to the regime and overall trustworthiness. The early decision maker
would thus rely on the most basic forms of surveillance and reconnaissance to collect the
In large part, the decision maker achieved HUMINT source reliability by using
his/her own people to collect and by keeping the collection tasks exceedingly simple and
80
straightforward. Initial intelligence reports from combat patrols and border guards would
have typically been delayed and distorted in their transmission to the leadership through
the chain of command, but these were unsophisticated systems and little thought would
have been given to such weaknesses. As for spies sent abroad, early leaders could hardly
have considered using what were often untrained and inexperienced spies for the
History had yet to devise the agent handler or insurgency coordinator. The decision
maker would have been content to have loyal domestic agents who could be trusted with
the spy mission’s reconnaissance goals and expected to return with raw, unfiltered
strategic information about the opponent that was reasonably accurate, timely, and
reconnaissance as early as the 16th century BCE, when, Biblical scholars estimate, Moses
sent men from his tribe to reconnoiter the land of Canaan. 154 Moses provided them with a
detailed list of economic and military collection requirements to assess the land, its towns
and its people.155 In preparation for the Battle of Jericho, Joshua also sent spies on a
reconnaissance mission. A woman of ill repute hid Joshua’s men from the authorities
while they made their strategic observations, and she abetted their departure from the
walled city in exchange for promises of protection during the coming Israeli attack.156
In these cases, the spies were fellow countrymen and well known to Moses and
Joshua, making them exceedingly trustworthy agents. The Bible makes no mention of
154
Numbers 13:1–14:9.
155
Numbers 13:17-20.
156
Joshua 2:1-22.
81
their skills as observers and notetakers, nor does it attribute to them any ability to recruit
and operate clandestine foreign agents. Presumably they accomplished their objectives
through passive reconnaissance methods and returned with adequate notes. The Bible
suggests that the tribe assessed their reporting, but there are no details of the process
involved.
in Greek mythology’s coverage of the 11th century Trojan War. The story of the Trojan
spy Dolon (“the trickster”) appears in both the tenth book of Homer’s 8th century BCE
classic Iliad and Euripedes’ 5th century BCE The Rhesus. 157 Homer tells the story of the
pre-emptive ambush of Dolon by Odysseus behind his own lines. While Dolon is also
disguised as a wolf, intent to fool their sentinels and overhear the plans of the Greek
for centuries. While the term spy is used in the above instances, these men were not
reconnaissance or espionage. He defines the first as an open effort to view the enemy,
either alone, with ground forces, or aboard ship. Espionage is the realm of “disguised or
otherwise hidden agents,” according to Richmond. While Richmond weighs the evidence
and decides that when Dolon cloaked himself in animal skin garb this “put him more
157
Myres, Sir John, F.B.A., review of Emile Miriaux: Les Poemes d’Homere et l’Histoire Grecque, II.
L’Iliade, l’Odyssee, et les rivalites colonials , by Albin Michel, Greece and Rome, Vol. 21 No. 61 (January
1952), pp. 1, 8; G. Richards. “The Problem of the Rhesvs”. Classical Quarterly, Vol. 10, No. 4 (1916), p.
192; Adele J. Hart. “ ‘The City-Sacker Odysseus’ in Iliad 2 and 10”. Transactions of the American
Philological Association (1974-), Vol. 120 (1990), pp. 50-52; G. Elderkin. “Dolon’s Disguise in The
Rhesus,” Classical Philology, Vol. 30, No. 4 (1935), pp. 349-350.
158
Myres review; Richards, “The Problem of the Rhesvs”; Hart. “The City-Sacker Odysseus”; Elderkin,
“Dolon’s Disguise”.
82
clearly in the category of a disguised, despised spy!” 159, it seems clear that Dolon was a
soldier on a covert reconnaissance mission and not a spy in today’s sense of the word.
In another example, the Macedonian king Alexander the Great prepared for war
with the Persian Empire in the 4th century BCE by dispatching trusted diplomats into the
region as his spies, according to Donald Engels.160 Alexander would have also counted
Macedonia, who owed their existence in large part to Alexander’s father and would have
had no motivation to betray his son, Engels explains. Alexander would have also relied
on reporting from Greek soldiers who had previously waged war in the area, Engels says,
might also have been obtained from merchants, travelers, artisans, and Macedonian and
There are current examples of the routine collection of HUMINT through the use
military. The FBI employs lookout and Special Surveillance Group (SSG) personnel as
collection.162 The jury is out on their effectiveness in major cases, as Soviet agents
Aldrich Ames (CIA officer), John Walker (US Navy), Robert Hanssen (FBI agent), and
Felix Bloch (State Department official) respectively ignored, tempted, avoided, and
159
Richmond, J. A.. Spies in Ancient Greece. Greece & Rome, 2nd Ser. Vol. 45, No. 1, 1998, pp. 2-3.
160
Engels, Donald. “Alexander’s Intelligence System,” Classical Quarterly, New Series, Vol. 30, No. 2
(1980), pp. 328-329.
161
Engels, “Alexander’s Intelligence System,” pp. 328-329.
162
Walker, David M., Comptroller General of the United States, in testimony before the Subcommittee on
Commerce, Justice, State, and the Judiciary, Committee on Appropriations, House of Representatives, in
FBI Reorganization: Progress Made in Efforts to Transform, but Major Challenges Continue. (GAO-03-
759T, 18 June 2003) (http://www.gao.gov/htext/d03759t.html); Wise, David. Spy: Inside Story Of How The
FBI’s Robert Hanssen Betrayed America. New York, Random House, 2002, pp. 208-209.
83
and virtually lost in the new Intelligence, Surveillance and Reconnaissance (ISR)166
terminology.167 The US Army’s Intelligence Field Manual mentions that combat patrols
and other ISR operations must report their findings to HUMINT collectors, but it does
not label surveillance and reconnaissance among its six specific HUMINT techniques.168
Mark M. Lowenthal’s From Secrets to Policy makes only one reference to surveillance
and reconnaissance, in which it equates ISR with the totality of intelligence collection. 169
Foreign Spies
163
Crime Library. “CIA Traitor Aldrich Ames,” p. 3
(http://www.crimelibrary.com/terrorists_spies/spies/ames/3.html); Peter Earley. Family of Spies: Inside the
John Walker Spy Ring. Toronto: Bantam Books, 1988, pp. 62, 66.
Wise, Spy, pp. 54, 116-117. Hanssen used the mail and traditional spy methods (dead drops) to avoid
entering a diplomatic establishment. Bloch was surveiled by FBI agents.
164
“Surveillance: The systematic observation of aerospace, surface, or subsurface areas, places, persons, or
things, by visual, aural, electronic, photographic, or other means.” (DOD Dictionary of Military Terms
http://www.dtic.mil/doctrine/jel/doddict/)
165
“Reconnaissance: A mission undertaken to obtain, by visual observation or other detection methods,
information about the activities and resources of an enemy or adversary, or to secure data concerning the
meteorological, hydrographic, or geographic characteristics of a particular area. Also called RECON.”
(DOD Dictionary of Military Terms http://www.dtic.mil/doctrine/jel/doddict/)
166
“Intelligence, Surveillance, and Reconnaissance: An activity that synchronizes and integrates the
planning and operation of sensors, assets, and processing, exploitation, and dissemination systems in direct
support of current and future operations. This is an integrated intelligence and operations function. Also
called ISR.” (DOD Dictionary of Military Terms http://www.dtic.mil/doctrine/jel/doddict/)
167
Best, Richard A., Jr. Intelligence, Surveillance, and Reconnaissance (ISR) Programs : Issues for
Congress, CRS Report for Congress, 22 February 2005, p. 1.
168
Intelligence Field Manual (FM 2.0), Headquarters, Department of the Army, May 2004, Chapter 6. The
field manual names six HUMINT techniques: debriefing, screening, liaison, HUMINT contact operations,
document exploitation (DOCEX), and interrogation.
169
Lowenthal, From Secrets to Policy, p. 68. Lowenthal’s definitions of intelligence, surveillance, and
reconnaissance come directly from a footnote to CRS Report For Congress RL 32508.
170
Clark, Robert M. Intelligence Analysis: A Target-Centric Approach, Second Edition. Washington, DC:
CQ Press, 2007.
84
Distortion of source reporting becomes more likely when Sun Tzu, the 6th century
BCE Chinese author of The Art of War, suggests that decision makers begin to rely on
foreigners for some of their intelligence needs. Sun Tzu recommends that a ruler turn
foreign spies against their governments and use this newfound access to examine the
reliability of other spies. Sun Tzu felt that a government must also recruit natives of
great rewards to their spies to maintain loyalty. His writings provide possibly the first
intelligence.171
The 9th century Chinese poet Tu Mu commented on the writings of Sun Tzu,
that recruited foreign government officials can be “two-faced, changeable, and deceitful,”
informants. The collector must be “deep and subtle” to discern what is accurate and
useful (and what is not) in such source reporting, so as to avoid paying great rewards for
empty words.173
Spymasters
In the 16th century, Francis Walsingham took an enormous step forward in the use
reliable network of spies and his significant oversight of information within the kingdom,
171
Griffith, Samuel B., The Art of War. trans. New York: Oxford University Press, 1971, Chapter 13.
172
Martin Frost website. http://www.martinfrost.ws/htmlfiles/sun_tzu.html
173
Griffith, Chapter 13.
85
imprisoned Mary Queen of Scots and aided by France, Spain, and the Catholic Church at
Rome.174
information flow at the palace so as to be informed of virtually every rumor, plot, and
tryst.175 Walsingham kept all manner of book, guide, and directory in his office. His
people monitored arrivals from abroad and checked correspondence they might be
carrying. His minions were at the ports and on horseback in the countryside to inquire
into the travels of both strangers and the well known. And, to collect the latest
desperation or vanity or longing to believe in their own importance – or, the cooler ones,
out of simple business calculation of what they possessed and what someone else would
Most of his agents, however, were “men of affairs and men of the world … not
even paid for their troubles … less spies than reporters.”177 These were simply expatriates
residing overseas and foreigners living in England. They wrote to him constantly of what
Few of these spies were under Walsingham’s control as an agent handler, although
some were obliged to him by remuneration. As can be seen in his examination of the case
of treason against Sir Edward Stafford, Walsingham could weigh the reliability of his
sources against each other’s reporting. By having so many spies, he gained a great many
174
Andrew, Christopher. Her Majesty's Secret Service: The Making of the British Intelligence Community.
New York: Elisabeth Sifton Books (Viking), 1986, p. 1.
175
Budiansky, Stephen. Her Majesty's Spymaster: Elizabeth I, Sir Francis Walsingham, and the Birth of
Modern Espionage. New York: Viking Books, 2005, pp. 90-94.
176
Budiansky, pp. 93-94.
177
Budiansky, pp. 93-94.
178
Budiansky, pp. 90-94.
86
perspectives on what was happening and could discern trends and isolate lies and
distortions. With his sources and through his position near the throne, Walsingham could
cross check source reporting, elicit clarifications from sources, witnesses, and even the
accused, and thereby fill gaps in his knowledge better and faster than anyone else in the
kingdom.179
180
Nearly two centuries after Walsingham first began tracking spies in London,
George Washington entered that same world through his HUMINT experiences in the
French and Indian War, eventually becoming America’s first spymaster during the
seen a day’s service as a soldier” when he approached Governor Dinwiddie and his
Council at Williamsburg to deliver their message to the French regarding the latter’s
unwelcome encroachment into the Ohio country.181 Washington had clear intelligence
French, passed the message and received the French reply. Dinwiddie and the Council
179
Neale, J. “The Fame of Sir Edward Stafford.” English Historical Review, Vol. 44, No. 174 (1929), pp.
203-219.
180
Pollard, A. F. “Sir Francis Walsingham,” in Encyclopedia Britannica, 11th ed. Vol. XXVIII (Cambridge:
Cambridge University Press, 1910), pp. 295-296
(http://www.luminarium.org/encyclopedia/walsingham.htm)
181
Freeman, Douglas Southall. George Washington, Vol. 1: Young Washington. New York: Charles
Scribner’s Sons, 1948, pp.266, 268, 273, 275-276.
182
Freeman, pp.266, 268, 273, 275-276.
183
Freeman, pp.266, 268, 273, 275-276; Fort Huachuca. Masters of the Intelligence Art: Major George
Washington’s Reconnaissance. (http://huachuca-www.army.mil/History/PDFS/mwashing.pdf)
87
When the American Revolution began twenty years later, Washington applied his
HUMINT skills against England and found his intelligence operation effective and its
Royal Printer of New York, as well as local patriots like John Honeyman. Washington
operations throughout the greater New York City area, including New Jersey,
Connecticut, and New York State. Major Benjamin Tallmadge ran the Culper Ring,
Colonel Elias Dayton operated the Merserau Ring, and Lieutenant Colonel Thomas
including the use of HUMINT, denial and deception (D&D) and counterintelligence, was
vital to the war effort and the British defeats at both Trenton, which saved the American
of the United States to facilitate reliable HUMINT collection. Named the Contingent
Fund of Foreign Intercourse by Act of Congress in 1790 (and later called the Secret
Service Fund), this money was used by the Executive branch for years, primarily to send
agents abroad or to pay bribes to foreign officials.185 Doubtless few of the funds were
February 1831 debate in the US Senate, US Senator John Forsyth tells a colleague quite
184
Finley, James P., ed. US Army Military Intelligence History: A Sourcebook. Fort Huachuca: US Army
Intelligence Center, 1995, p. 16. http://huachuca-www.army.mil/History/PDFS/reader.pdf; Lawson, John.
“The Remarkable Mystery of James Rivington, Spy.” Journalism Quarterly, 35 (1958), pp. 316-323;
Holloway, Charlotte Molyneux. “The First Sacrifice of the Revolution: Nathan Hale, The Patriot Martyr
Spy.” Connecticut Magazine, 6 (May-June 1900), pp. 224-236.
185
Miller, p. 57.
88
plainly that the fund is “[f]or spies, if the gentleman pleases,” providing a healthy roster
Despite the establishment of this fund, the development and use of clandestine
foreign sources could not be managed by the chief executive and so went on hiatus. With
the exception of the Civil War period, the US government would not conduct effective
HUMINT collection until the armed forces established intelligence organs in the 1880s.187
Instead, the President and Governors preferred to nominate their own agents for specific
situations and analyze the intelligence reporting themselves. Distortion was once again
confined within the government’s own HUMINT process as foreigners were excluded.
In the aftermath of the Louisiana Purchase, for example, the Thomas Jefferson
considerable experience on the frontier, to explore the southwest border of the new
territory. Napoleon had only recently compelled Spain to sign over its Louisiana
holdings, so the borders of the purchase from France were still in dispute. The Spaniards
captured Pike as he explored the origins of the Arkansas and Red rivers, but he eventually
returned with much needed reconnaissance of the Spanish defenses at Santa Fe after his
186
Benton, Thomas Hart. Abridgement of the Debates of Congress, from 1789 to 1856, Vol. XI, pp. 244-
245.http://books.google.com/books?id=SicPAAAAYAAJ&pg=PA244&lpg=PA244&dq=%22Contingent+F
und+of+Foreign+Intercourse%22&source=web&ots=hqqT7S1dFt&sig=ZCy8dCCwXGcsiv_HGVJ9pcqG
xNA&hl=en#PPA244,M1 “It was given for all purposes to which a secret service fund should or could be
applied for the public benefit. For spies, if the gentleman pleases; for persons sent publicly and secretly to
search for important information, political or commercial; for agents to carry confidential instructions,
written or verbal, to our foreign Ministers, in negotiations where secrecy was the element of success; for
agents to feel the pulse of foreign Governments, to ascertain if treaties, commercial or political, could be
formed with them, and with power to form them, if practicable.”
187
Bethell, Elizabeth. “The Military Information Division: Origin Of The Intelligence Division,” in James
P. Finley, ed. US Army Military Intelligence History: A Sourcebook. Fort Huachuca: US Army Intelligence
Center, 1995, pp. 62-63. http://huachuca-www.army.mil/History/PDFS/reader.pdf According to Bethell, the
US Navy’s Office of Naval Intelligence (ONI), founded in 1882, is the longest continuously running
intelligence organ in the USIC. The US Army’s Military Information Division (MID), established in 1889,
oversaw the military attaché program, which was established by Act of Congress in 1888 and began in
1889 with the placement of attaches in London and Berlin. MID was abolished in 1908 and was replaced in
1917 by the Military Intelligence Division (MID).
89
captors thoroughly exposed their operations to Pike while holding him prisoner.
Distortion of source reporting was likely as Pike’s handler, Governor of the Upper
Louisiana Territory James Wilkinson, turned out to have been a double agent for Spain
and a “scoundrel.” Wilkinson and Aaron Burr would later conspire in an attempt to use
the military to split the western territories from the rest of the United States.188
The occasional volunteer would submit reporting, which was accepted by the
submitted a detailed letter to the US Secretary of War in 1830 to announce his discovery
along the Oregon Trail of the South Pass to the Pacific Ocean. As an aside, he also
Smith’s letter was praised by the US Senate as an “excellent intelligence report” 189 and
prompted the War Department to adopt similar methods, if with a more reliable source.
The US Army sent its own man, Benjamin Bonneville, under deep cover as a fur trader,
to reconnoiter California and other western lands. For deniability purposes, Bonneville
officially separated from the US Army but took with him a long list of the military’s
intelligence requirements. His wide-ranging report, submitted to the department upon his
Early in the Civil War, the US Army continued to find reliable sources only from
within the military. Union General Winfield Scott sent Lafayette C Baker to Richmond on
a covert reconnaissance mission. Baker’s cover was as an itinerant photographer, the son
188
Ameringer, Charles D. US Foreign Intelligence: The Secret Side of American History. Lexington,
Massachusetts: Lexington Books, 1990, pp. 35-36; US National Park Service. Zebulon Pike: Hard-Luck
Explorer or Successful Spy? The Lewis and Clark Journey of
Discovery.(http://www.nps.gov/archive/jeff/LewisClark2/Circa1804/WestwardExpansion/EarlyExplorers/Z
ebulonPike.htm)
189
Ameringer, pp. 36-37.
190
Ameringer, pp. 36-37.
90
convinced President Jefferson Davis of his innocence and escaped back to the North.191
Intelligence Organizations
For a few years the Civil War became too complex to manage without the
Bureau, the use of HUMINT became noticeably more sophisticated. Dodge was rated
highly innovative and effective for his use of African-American slaves as spies and
couriers to travel and observe the enemy throughout Alabama, Missouri, and Tennessee.
These former slaves were not unlike foreign sources to a heretofore-white military, but
their reliability was proven as Dodge’s intelligence reports received high praise. These
Negro agents were formed into the First Alabama Infantry Regiment and the First
Alabama Cavalry, both units dedicated to intelligence work. Among their many credits,
they proved effective at Vicksburg, where they supported General Grant by infiltrating
the city and providing the Union command with the latest assessments on the impact of
the siege.192
Dodge was also willing to rely on reporting from Union sympathizers in the
South. He recruited Phillip Henson, a supporter of the Union living in Vicksburg. Henson
not only provided reconnaissance reports to Union forces but, due to his Southern roots
and cultivated connections, was able to infiltrate Confederate military planning and
provide useful strategic intelligence as well.193 Likewise, Elizabeth Van Lew, a wealthy
191
Schlup, Leonard. “Lafayette C. Baker and His Association with Abraham Lincoln and Andrew Johnson.”
Lincoln Herald, vol. 98, 2 (summer 1996), 54-59.
192
Miller, Nathan. Spying for America: The Hidden History of U.S. Intelligence. New York: Paragon House,
1989, pp. 138-140.
193
Markle, Donald. Spies and Spymasters of the Civil War. New York: Hippocrene Books, 1994, pp. 126-
130.
91
resident of Richmond and a fervent Abolitionist, used her own money and risked her life
to establish a large spy ring, pass intelligence out of the city to Union forces, and help
both Union prisoners and escaped slaves make their way to the North.194
in Europe to track Confederate diplomatic and commercial efforts across the Atlantic.195
The United States established its first permanent intelligence organization with
the founding of the Office of Naval Intelligence (ONI) in 1882. The Army would follow
in 1884, but would not resolve its need for continuous intelligence operations until the
For the acquisition of intelligence information during the Spanish American War,
the US Navy sent its own agents to conduct human collection. Commodore George
Dewey dispatched his personal aide to Hong Kong to interview arriving ships’ crews
regarding the Spanish naval position in the Philippines. Dewey also relied for intelligence
But the US Navy also saw the importance of clandestine foreign sources. ONI
sent undercover naval intelligence officers William Buck and Henry Ward to Spain and
assigned Lieutenant William Sims, the naval attaché in Paris, to oversee them as they
organized an intelligence network that stretched from the Canary Islands to Port Said and
194
Intelligence Collection – The North. Central Intelligence Agency, 2007.
https://www.cia.gov/library/publications/additional-publications/civil-war/p11.htm
195
Miller, p. 116.
196
Casey, Dr. Dennis. A Little Espionage Goes A Long Way. Air Intelligence Agency (AIA)
http://www.fas.org/irp/agency/aia/cyberspokesman/99-11/history1.htm ; Miller, p. 167.
92
to several locations in the Mediterranean. Sims even had spies working in the Spanish
When Europe exploded into the First World War, the United States was soon
drawn into the fray. There were rumors of possible German involvement in the Mexican
detention of a US naval vessel at Veracruz in 1914, yet the United States was unable to
reports being filed at the Army War College from 1908 until 1917. And ONI’s HUMINT
collection was focused on foreign navies. Eventually Argentina, Brazil, and Chile
Foreign governments were now sending covert intelligence officers to the United
activity that “no state openly admitted” at the time.199 Lacking diplomatic relations with
the US, Soviet intelligence established Amtorg Trading Corporation in New York in 1924
as commercial front for its spying operations.200 The FBI suddenly found itself in the
foreign counterintelligence (FCI) business in earnest in 1929, when Amtorg spy Georgiy
With the onset of the Second World War, the US military and naval intelligence
services, joined by the Office of Strategic Services (OSS), began to use all manner of
deception. Of particular note, they ran two now famous bogus spy networks: The Twenty
Committee (XX or Double Cross) system and Operation: GARBO. The Double Cross
system began with a Welshman named Arthur Owens, who briefly explored working with
the Germans but changed his mind and turned himself in. A Spaniard named Juan Pujol
took the personal initiative to dangle himself to the Germans and was eventually run by
the British as the double agent GARBO. The British ran both operations throughout the
war, along with some doubled Nazi spies, disinforming and misdirecting countless Nazi
operations. Pujol was especially valuable to Operation FORTITUDE in the lead up to the
D-Day invasion, when he reinforced the deception of the Calais landing and the
Normandy feint.202
While the level of clandestine HUMINT collection expanded with the onset and
expansion of the Cold War, “the slow, painstaking process of recruiting spies” was
discounted and the butt of jokes from those who favored the high profile realm of covert
action. “[S]py recruiters and handlers … were dubbed ‘the patient professionals’ and
The West’s most prominent HUMINT penetrations of the Soviet Union and
Russia include the operation of these clandestine sources: Oleg Penkovskiy (AGENT
Tretyakov, and Morris Child (SOLO) of the Communist Party USA (CPUSA). 204 The
202
Pujol, Juan with Nigel West. Operation GARBO: The Personal Story of the Most Successful Double
Agent of World War II. New York: Random House, 1985, pp. 56-67, 115-151.
203
Hitz, Frederick P. “The Importance and Future of Espionage,” in Strategic Intelligence Vol. 2: The
Intelligence Cycle, ed. Loch K. Johnson (Westport, Connecticut: Praeger Security International, 2007),
pp.76-77.
204
Penkovskiy, Oleg. The Penkovskiy Papers. New York: Random House, 1982; Hitz, “The Importance and
Future of Espionage,” pp. 78-79, 86. Earley, Pete. Comrade J: The Untold Secrets of Russia’s Master Spy
in America After the End of the Cold War. New York: G. P. Putnam’s Sons, 2007; Barron, John. Operation
94
East’s best-known recruitments include Kim Philby of the Cambridge Five, Aldrich Ames
For the last ten years of the Cold War, the USIC emphasis was on technical
collection. While the Soviets devoted five times the personnel to intelligence collection,
the United States used its financial wherewithal to build spy satellites and other devices
to mechanically observe the Soviets and the Warsaw Pact. As America increased its use
of spy satellites for military and arms control treaty verification purposes in its rivalry
with the East, Christopher Andrew virtually rang the death knell for HUMINT when he
wrote, “The role of humans in intelligence collection will no doubt decline still further.
amateurs. … Even professional spies are on the decline. The limited range of human eyes
and ears compares rather poorly with the ability of spy satellites…. Worse still, spies can
A great many spy handlers and area specialists left the intelligence services, both
East and West, when the Soviet Union collapsed and the Cold War ended. . Russia’s
Foreign Intelligence Service (SVR) alone lost 40% of its senior staff between 1991 and
its Soviet operations and sought to expand its efforts against terrorism, drugs, crime, and
weapons proliferation.208
In the wake of terror attacks in New York and Washington, DC, the 9/11
Commission recommended that the CIA pick up the pieces of its dysfunctional
non-state actors were a new kind of target for an Intelligence Community that had
dealt for years with nation states with large armed forces and intelligence
bureaucracies like their own. Even the lines between domestic and foreign
lead-up to the al-Qaeda attacks on the World Trade Center and the Pentagon on 11
through the use of risk management techniques that weigh the consumer need for
clandestine sources.213
The jury is still out on whether the USIC can perpetuate the development