Pages

Wednesday, November 26, 2014

CIA Reactions to JFK Assassination Included “Suspicions of Soviet or Cuban Involvement”; Desire to “Bond” with LBJ


Kryptos close-up
“Kryptos” (1990), by James Sanborn, a sculpture containing a message encoded with frequency tables, located at the CIA’s New Headquarters Building. (Photo credit: CIA)
Washington, D.C.  The CIA’s reactions to the November 22, 1963, assassination of President John F. Kennedy — 51 years ago this week — went from initial shock to suspicions of Soviet or Cuban involvement, to increasingly bureaucratic concerns such as the desire to establish a positive “bond” with incoming President Lyndon Johnson, according to a newly declassified internal CIA article published for the first time today by the National Security Archive (www.nsarchive.org).
Fears that Moscow might have masterminded the president’s killing rose sharply when the CIA was unable to locate Soviet Premier Nikita Khrushchev for 24-48 hours afterwards.  Agency officials worried  that he was “either hunkering down for an American reprisal, or possibly preparing to strike the United States.”
This article is one of several from the CIA’s Studies in Intelligence in-house journal that the agency released as a result of litigation by a former CIA official against his former employer.  It appears today as part of an update to a compilation of similar articles the National Security Archive posted in June 2013.
The documents, both those from the original posting as well as the more recent ones, provide insider perspective and accounts of a variety of topics, including:
  • The Presidential ban against CIA assassinations of foreign leaders, first enacted in 1976, which reflected both moral and practical reasons but never spelled out the exact scope of the prohibition
  • A proposal for a far more draconian version of the Intelligence Identities Protection Act – including secret courts for intelligence officers accused of violating that law and criminalizing any revelation or purported revelation of a covert intelligence officer’s identity. (Document 10)
  • A description of how President Kennedy ordered Director of Central Intelligence John McCone to halt his effort to launch a second investigation of the actions of U-2 pilot Francis Gary Powers — who had been shot down during a May 1, 1960 overflight of the Soviet Union. (Document 14)
  • An account of how CIA and Army intelligence analyses in the late 1970s indicated that the U.S. had significantly underestimated North Korean military strength — and derailed President Carter’s plan to withdraw U.S. ground forces from South Korea. (Document 5)
  • A description of the evolution of the CIA’s role in counterterrorism — with the Directorate of Operations initially being the primary component dealing with terrorist issues, and the Directorate of Intelligence eventually emerging in a leading role. (Document 23)
  • A 2004 interview with current Director of the Central Intelligence Agency, John Brennan. (Document 20)
  • An account of the origins of the CIA’s first human intelligence organization — the Office of Special Operations (Document 16).
  • The recollections of Michael J. Morell, who would go on to become Deputy Director of the Central Intelligence Agency, of September 11, 2001, which he spent with President Bush. (Document 22).
  • A description of the origins and applications of U.S. nuclear intelligence by Henry Lowenhaput, whose career in the field lasted for six decades. (Document 18).
The CIA began publishing Studies in Intelligence in 1955 to help build an understanding within the agency of the intelligence profession based on the insights and recollections of practitioners. The items in today’s updated posting fall into a number of categories — legal issues, intelligence analysis, CIA-NSA relations, counterintelligence, interviews, intelligence support and liaison, ‘denied in their entirety,’ the Kennedy assassination, and odds & ends.
New Revelations from Studies in Intelligence Articles
By Dr. Jeffrey T. Richelson
Image, right: Sherman Kent, the “father of intelligence analysis,” with the inaugural issue of Studies in Intelligence. (Photo credit: CIA)
In 1955, at the suggestion of Sherman Kent, the head of the Board of National Estimates, the CIA launched a classified journal, titled Studies in Intelligence, “to promote a sense of professional identity, enhance proficiency, and build knowledge of intelligence cumulatively from the shared insights of its practitioners.”1 The journal soon evolved into a quarterly containing articles whose classification, with rare exceptions, ranged from Unclassified to Secret. While the articles are not official statements of CIA or federal government views or policy, they do represent the thinking and recollections of an assortment of intelligence professionals.
Eventually, the CIA began declassifying some of the articles and releasing them to the National Archives and Records Administration (NARA). In 1992, the agency also published its first unclassified edition of Studies — available to anyone interested. In 2002, the CIA began posting on its website unclassified articles from classified issues of Studies — a practice that continues to this day.
Today, information about and copies of Studies articles can be found on the CIA website – in addition to the 1992 and beyond material. They appear in an index of declassified articles (which apparently only lists articles declassified by the CIA at its initiative); other indices which allow direct access to some of the declassified articles; and the CREST/Electronic Reading Room collection. Apparently not available electronically are articles that have been declassified in response to FOIA/Mandatory Declassification Requests or litigation.
FOIA/MDR and Litigation
Over the last decade, the author filed a series of FOIA requests, starting with a 2002 request for tables of contents of 1997-2002 issues of Studies as well as any unclassified articles that appeared in those issues. (As noted above, the CIA did not post unclassified articles from classified issues until sometime in 2002). Subsequent requests covered tables of contents for 1985-1996, and years subsequent to 2003. Tables of contents for those and other years were also obtained via litigation by the National Security Counselors organization.2
Classified articles of interest whose titles appeared in the declassified tables of contents were then requested under the FOIA. Today’s collection consists of articles obtained from those requests as well as some of the unclassified articles obtained from the 2002 request.
The first posting would have been more extensive had the CIA not denied, over a period of two years, requests (in their entirety) for 17 of 20 articles.3 Four of those articles have since been released as the result of lawsuit on behalf of Jeffrey Scudder a former CIA employee who had filed a FOIA request for hundreds of articles — an act that apparently cost him his job.
The Posted Articles
The 26 posted articles in this briefing book can be grouped into a number of categories — legal issues, intelligence analysis, CIA-NSA relations, counterintelligence, interviews, intelligence support and liaison, ‘denied in their entirety,’ the Kennedy assassination, and odds & ends.
LEGAL
John Brennan, currently CIA director, previously served as director of the Terrorist Threat Integration Center. (Photo credit: CIA)
Legal issues covered in these Studies articles include prepublication review, the protection of the identities of U.S. intelligence officers, and assassination. The prepublication review process is treated (Document 24) by a former Directorate of Intelligence representative to the Publications Review Board, who offers an anodyne view of the process and an extensive list of “myths and realities.”4
The protection of intelligence officer identities is the subject of two articles. One (Document 11) provides a history of the Intelligence Identities Protection Act (IIPA) — from initial proposals, through opposition and revisions, to final passage. Another (Document 10) suggests that the legislation did not go nearly far enough. Thus, the author, who served as a law clerk in the CIA’s Office of General Counsel, asks: “if an intelligence officer may sign away his First Amendment right to free speech, then cannot the same officer also contract away his Sixth Amendment right to a public court?”
With respect to journalists, the author also suggests removing the limitations of the IIPA in prosecuting those who reveal the identity of a covert intelligence officer. While numerous newspapers and books have stated that the IIPA prohibits such disclosure, it actually only prohibits the disclosure by those who have had authorized access to such an identity (e.g. John Kiriakou) or who engage in a “pattern of activities” which seek to undermine/expose the U.S. intelligence effort.5The author suggests criminalizing not only any disclosure but any purported disclosure – so that even an erroneous disclosure would be a criminal offense. Further, his suggested wording for amended legislation would seem to leave open the possibility of prosecution for disclosing information that might lead to such identification even if it was not explicit.
A 1996 article (Document 3) is a significant contrast to post-9/11 legal issues concerning targeted killings. Its focus is on the implications of the prohibition on assassination that appeared in President Gerald Ford’s 1976 executive order and subsequent executive orders on intelligence.6 The article addresses the implications with regard to support for paramilitary operations, coup preparations (addressing the specific case of Panama and Gen. Manual Noriega), counterproliferation operations, and even deception operations directed at individuals — which might result in their imprisonment, torture, or execution by their own government. This is in sharp contrast to the discussion of legal issues in the Justice Department’s white paper on targeted killings, which focuses on the legal justification for a targeted killing of a U.S. citizen.
INTELLIGENCE ANALYSIS
Four articles deal with various aspects of intelligence analysis. In one case (Document 12), the article focuses on a subject of concern to many intelligence analysts during the Cold War – the cost of Soviet defense programs and the burden they imposed on the Soviet economy. Another (Document 17) examines intelligence analysis related to the Strategic Defense Initiative and successor missile defense programs.
A third article (Document 5), is the result of a CIA-funded study at the John F. Kennedy School of Government at Harvard — and illustrates the decades-long difficulty of producing reliable studies and estimates concerning North Korea. It examines the intelligence estimates produced by the CIA and Army concerning North Korean military strength — which significantly altered previous conclusions – and how they ultimately derailed President Carter’s plan to withdraw U.S. ground forces from South Korea.
Also, of contemporary relevance is the article (Document 23) on the inception and evolution of terrorism analysis in the CIA. The author notes that there was little pressure on the agency to produce terrorism analysis during its first quarter-century, and products such as the 1968 special national intelligence estimate, Terrorism and Internal Security in Israel and Jordan “were relative rarities.” The article goes on to describe increasing policy maker interest subsequent to the 1972 murder of Israeli Olympic athletes, and resulting Intelligence Community focus on the issue. He also describes how initially the Directorate of Operations’ clandestine collection activities were the principal element of the CIA’s counterterrorism activities — before the emergence of the Directorate of Intelligence as a key player in that effort.
CIA & NSA
Image, right: James Jesus Angleton, head of counterintelligence and “CIA’s answer to the Delphic Oracle” from 1954-1974. (Photo credit: CIA)
Various works on intelligence have noted both the past competition and present cooperation between the CIA and National Security Agency.7 In “A Brave, New World” (Document 19), the author states that the CIA and NSA “are moving their strategic partnership beyond the optional cooperation of the past into a new era of collaboration,” and notes that the Director of Central Intelligence – George J. Tenet at the time – had viewed much of the success against al-Qaeda and its allies as the “direct result of CIA and NSA working together.”
He goes on to examine the origins of CIA-NSA discomfort in World War II and beyond, barriers to partnership, hints of change, the impact of the September 11, 2001 attacks, tangible results, asks if the partnership would last, and addresses the challenges ahead. Among the challenges identified are the development of joint strategic planning forums, increasing the pace and scope of efforts to find joint solutions to technical problems, and the incorporation of the concerns of line officers.
COUNTERINTELLIGENCE
Two articles address counterintelligence issues during very different portions of the CIA’s history. One (Document 23) addresses the roles of CIA counterintelligence chief (1954-1974) James J. Angleton and KGB defector Anatoliy Golitsyn in promulgating the thesis of widespread and successful Soviet deception against the West (the “Monster Plot”) and their impact on CIA operations and personnel. Among those whose lives or careers suffered were former KGB officer Alexandr Cherepanov (who was executed after the U.S. embassy returned materials he had provided), Yuri Nosenko (who was incarcerated by the CIA), and CIA officers Richard Kovich and David Murphy, who would each come under suspicion of being a Soviet mole. 8
Another treatment of counterintelligence (Document 21), by former chief of the National Clandestine Service Michael J. Sulick, focuses on counterintelligence in the counterterrorist effort. He argues that, because of how history played out, while counterintelligence failures during the Cold War were never exploited by the Soviet Union to launch attacks, similar failures against terrorist groups could result in “catastrophic” damage. Sulick goes on to discuss several topics: how terrorist groups operate like intelligence services; terrorist attempts to infiltrate their targets; the fact that there are now “more employees to worry about” because “personnel and facilities must also be defended from individuals with minimal or no clearance;” terrorist denial and deception; intelligence sharing; and further steps to be taken.
INTERVIEWS
Image of Document 8 (“Passing the Intelligence Identities Protection Act,” 1982)
Numerous issues of Studies have contained interviews with former or current senior intelligence personnel. In 1999, Studies published an extensive interview with John M. McMahon (Document 14), who joined the CIA in 1951, and eventually became Deputy Director for Operations, Deputy Director for Intelligence, and finally Deputy Director of Central Intelligence before retiring in 1986.
The interview covers his first years with the CIA in Germany, the U-2 program, the battle during the 1960s with the National Reconnaissance Office over satellite reconnaissance systems, a number of his senior positions (including DDO, DDI, and DDCI), relations with Congress, and covert action with regard to Iran and Afghanistan. With regard to U-2 pilot Francis Gary Powers (who was shot down in May 1960 over the Soviet Union, captured, and subsequently exchanged), he “did exactly what he was told,” McMahon noted. He went on to state that DCI John McCone was not convinced and planned to have Powers investigated for a second time – by the Air Force Office of Special Investigations – until President John F. Kennedy called McCone and ordered him not to pursue the matter.
The following year, Studies published an interview with then NSA director Lt. Gen. Michael V. Hayden (Document 15). Hayden spoke, inter alia, about his attempts to bring significant change to NSA, the impact of telecommunications change on NSA ( “our technological adversary is not a nation state but the global telecommunications industry”), the relationship between NSA and CIA, signals intelligence requirements, and limitations on NSA support to military commanders.
In 2004, current Director of the Central Intelligence Agency and then-director of the Terrorist Threat Integration Center (the predecessor of the National Counterterrorism Center) John Brennan was interviewed by Studies (Document 20) — an interview which focused on terrorism analysis. Brennan noted the TTIC had access to 26 unclassified and classified networks, and discussed whether “counterterrorism analysis” would represent a distinct career track; TTIC organization and practices as a model for the Intelligence Community; the need to break down the distinction between foreign and domestic intelligence; the distribution of terrorism analysis in the Intelligence Community; and information sharing.
Two additional interviews were conducted with former NSA Director and Deputy Director of Central Intelligence William O. Studeman (Document 2) and former NSA Deputy Director William Crowell (Document 1). The interviews focus on both internal Intelligence Community issues as well as public and Congressional attitudes concerning the Intelligence Community.
INTELLIGENCE SUPPORT & LIAISON
Three articles deal with three aspects of intelligence support and liaison. One focuses on intelligence support to Congress, another on support to policymakers, and the third on support to military commanders. In “CIA’s Intelligence Sharing with Congress” (Document 6), the author describes “the phenomenon of the President’s own finished intelligence being used by Congress to question and attack the President’s foreign policy initiatives.” Specific examples include Indochina (during the Nixon administration), the Persian Gulf, and Haiti.
CIA support to executive branch policymakers is the subject of a 1998 article (Document 9), written by a CIA official who spent two years as the agency’s liaison to the State Department’s Ambassador-at-Large for the New Independent States — a position established “to improve the CIA’s ability to understand the policy priorities and concerns of the bureau.” Half of the four-page article is devoted to the author’s specification of six ways in which CIA support for senior policymakers could be improved — which include “living with the customer” and “early bird service.”
Intelligence support to military forces, in the form of National Intelligence Support Teams (NISTs) is the subject of an article (Document 8) in a 1998 issue of Studies. The author reviews the background and operation of NISTs, which combined personnel and provided support from key national and defense intelligence agencies (including CIA, the Defense Intelligence Agency, the National Security Agency, and the National Imagery and Mapping Agency) and provide support to commanders of joint task forces such as those involved with Operations UPHOLD DEMOCRACY (Haiti) and JOINT ENDEAVOR (Bosnia). In addition, the author makes a number of suggestions for improvements.
THE KENNEDY ASSASSINATION AND THE DCI
The posted article (Document 26) was drawn from a classified history of John McCone’s tenure as Director of Central Intelligence (1961-1965). One part focuses on the initial investigation of a possible conspiracy — domestic or foreign — and McCone’s role. It notes that the CIA’s “inability to locate Nikita Khrushchev right after the assassination especially alarmed McCone and his deputies. The Soviet premier’s apparent absence from Moscow could have meant that he was in a secret command center, either hunkering down for an American reprisal, or possibly preparing to strike the United States.”
‘DENIED IN THEIR ENTIRETY’
What is particularly notable about four of the articles is that they were denied in their entirety by the CIA between 2010 and 2012 in response to FOIA requests — with the agency claiming that there were no releaseable portions either because information was classified or revealed sources and methods. The denied articles concerned a diverse set of topics — intelligence support to the U.S. Transportation Command (Document 4), the founding of the CIA’s human intelligence unit (Document 16), the origins and applications of nuclear intelligence (Document 18), and the recollections of a CIA officer (Document 22) of spending September 11, 2001 with President George W. Bush. An appeal of the denial ofDocument 4 was also denied.
The articles are notable in two ways. One is that they illustrate serious problems with the way the CIA responds to FOIA requests — often denying requests in their entirety based on no objective standard, and often seemingly on factors (such as convenience) other than legitimate FOIA exemptions. An examination of these articles released due to the Scudder lawsuit reveal a multitude of paragraphs that clearly should have been released, many clearly marked as unclassified.
The four articles also provide yet another illustration of the differences between Freedom of Information Act requests and litigation. The prospect of  the CIA having to justify its refusal to release documents, in whole or in part, before a judge often produces a more reasonable response with regard to the release of information.
ODDS & ENDS
Ribbon-cutting ceremony at the Terrorist Threat Integration Center, May 1, 2003. (Photo credit: FBI)
Two additional articles concern events separated by over two hundred years. One (Document 7), focuses on Britain’s penetration of the United States diplomatic mission to France during the Revolutionary War. Penetration involved British recruiting of agents with access to mission members, theft of a mission member’s journal and Britain’s control of agents ostensibly operating on behalf of the United States.
In November 1990, at its Langley headquarters, the CIA dedicated an encrypted sculpture named ‘Kryptos’ – a structure with several messages carved into its surface, but messages whose content was concealed through encryption. [Since that time three of the four messages contained in the sculpture have been solved.9 One of the individuals, from the Directorate of Intelligence, in a 1999 article (Document 13) a member of the Directorate of Intelligence describes his work in decrypting the message.
For more information contact:
Jeffrey T. Richelson 202/994-7000 or nsarchiv@gwu.edu
Updated – November 20, 2014 (Originally Posted – June 4, 2013)

THE DOCUMENTS
Document 1: William Nolte, "An Interview with William P. Crowell, Deputy Director, NSA, Studies in Intelligence 39, 3 (1996). Secret.
Source: Scudder Litigation Release.
This interview with the Deputy Director of NSA, discusses, inter alia, key issues facing the Intelligence Community (which Crowell identifies as including information systems and the volume of NSA collection), the interaction between different intelligence collection techniques, and the declassification of VENONA material (concerning the decryption of Soviet diplomatic communications from the 1940s that identified a large number of U.S. citizens spying for the Soviet Union).
Document 2: William Nolte, "An Interview with Adm. William O. Studeman, Studies in Intelligence, 40, 1 (1996). Secret.
Source: Scudder Litigation Release.
This interview with Studeman, who served as Director of the National Security Agency (1988-1992) and Deputy Director of Central Intelligence (1992-1995), covers his early career  and a number of issues — including the problems of interaction with other intelligence agencies, the problem of the Intelligence Community's transition to the post-Soviet world, public and Congressional attitudes toward NSA, and Congressional oversight.
Document 3[Deleted], “Covert Action, Loss of Life and the Prohibition on Assassination, 1976-1996,” Studies in Intelligence, 40, 2 (1996). Classification Not Available.
Source: CIA Freedom of Information Act Release.
In this article, the author examines the effect of the decision no longer to employ assassination as an instrument of U.S. policy, and the issues the prohibition raised with respect to other CIA activities that might result in the loss of life. These include lethal operations that directly risk the loss of life, lethal operations indirectly risking loss of life (e.g. demolition of a facility when it is believed to be unoccupied), and nonlethal operations (e.g. deception) directed at identifiable persons.
Document 4: [Author Name Deleted], “National Intelligence Support to the US Transportation Command,” Studies in Intelligence 40, 2 (1996). Secret.
Source: Scudder Litigation Release.
The U.S. Transportation Command (TRANSCOM) was established in 1987 to centralize the Defense Department’s strategic airlift resources. The article explores operations in Somalia, the command’s information requirements, the command’s evolution, Intelligence Community support, connectivity between the Intelligence Community and TRANSCOM’s intelligence component.
Document 5: Joe Wood, “Persuading a President: Jimmy Carter and American Troops in Korea,” Studies in Intelligence, 40, 4 (1996). Classification Not Available.
Source: CIA Freedom of Information Act Release.
During his 1976 presidential campaign, Jimmy Carter promised to withdraw U.S. ground forces from South Korea. This article is the result of a case study prepared at Harvard’s John F. Kennedy School of Government, and funded by the CIA. It reports on the intelligence estimates and studies on North Korean military strength produced early in Carter’s administration, and how those estimates resulted in U.S. forces remaining in South Korea.
Document 6: [Deleted], “CIA’s Intelligence Sharing With Congress,” Studies in Intelligence, 41, 3 (1997). Classification Not Available.
Source: CIA Freedom of Information Act Release.
This short article focuses on “the phenomenon of the President’s own intelligence being used to question and attack the President’s foreign policy initiatives.” Specific cases discussed concern Indochina, the Persian Gulf, and Haiti.
Document 7: [Deleted], “British Penetration of America’s First Diplomatic Mission,” Studies in Intelligence, 41, 4 (1997). Classification Not Available.
Source: CIA Freedom of Information Act Release.
The focus of this article is Britain’s penetration of the U.S. diplomatic mission in Paris during the Revolutionary War. Successes included recruiting several access agents to provide intelligence on mission activities as well as the theft of the journal of mission member Arthur Lee, and the mission’s “recruiting” agents who were actually under British control.
Document 8: Capt. James M. Lose, “The National Intelligence Support Team,” Studies in Intelligence, 42, 1 (1998) . Unclassified.
Source: CIA Freedom of Information Act Release.
The author reviews the background and operation of National Intelligence Support Teams (NISTs) — combining personnel from key national and defense intelligence agencies (including CIA, the Defense Intelligence Agency, the National Security Agency, and the National Imagery and Mapping Agency) — which provided support to commanders of joint task forces such as those involved with Operations UPHOLD DEMOCRACY (Haiti) and JOINT ENDEAVOR (Bosnia). In addition, the author makes a number of suggestions for improvements.
Document 9: [Deleted], “Increasing CIA’s Value Added to the Senior Policymaker,” Studies in Intelligence, 42, 2 (1998). Unclassified
Source: CIA Freedom of Information Act Release.
This article is based on the author’s two years serving as the CIA’s liaison to a State Department component and focuses on his suggestions for increasing the CIA’s value to policymakers — including “living with the customer,” better service for “second tier” officials, one-stop shopping for “the facts,” stronger community partnerships, and “early bird” service.
Document 10: [Deleted], “Legislative and Judicial Safeguards for US Intelligence Personnel,” Studies in Intelligence, 42, 2 (1998). Unclassified.
Source: CIA Freedom of Information Act Release.
The author, who served as a law clerk with the CIA’s Office of the General Counsel, examines the history and enforcement of the Intelligence Identities Protection Act (IIPA), as well as exploring a number of options to enhance the protection of US intelligence personnel — including secret trials, and amending the IIPA to allow criminal penalties for any individual who reveals or purports to reveal the identity of covert intelligence personnel.
Document 11: [Deleted], “Passing the Intelligence Identities Protection Act of 1982,” Studies in Intelligence, 42, 3 (1998). Unclassified
Source: CIA Freedom of Information Act Release.
This article provides a short history of the background behind the IIPA, the initial proposals for a law criminalizing the revelation of the identify of covert intelligence personnel, the various attempts to pass such legislation, opposition to some proposed provisions, and the ultimate passage of the IIPA.
Document 12: [Deleted], “Analyzing Soviet Defense Program, 1951-1990,” Studies in Intelligence, 42, 3 (1998). Unclassified
Source: CIA Freedom of Information Act Release.
This article focuses on what was a major concern of some intelligence analysts during the Cold War — determining the actual cost of Soviet defense programs and the burden they placed on the Soviet economy. Among the author’s assertions was that “in every case, the [Intelligence Community] concluded that Soviet economic difficulties would impinge only marginally, if at all, on Soviet defense plans” and that “Only when Gorbachev’s perestroika was foundering was the idea of economic constraints on the defense budget gain a foothold in the national estimates arena, and even then the majority opinion rejected the notion that the USSR would unilaterally reduce its defense spending as it did in 1989.”
Document 13: [Deleted], “Cracking the Courtyard Crypto,” Studies in Intelligence, 43, 1 (1999). Unclassified.
Source: CIA Freedom of Information Act Release.
In 1990, the CIA unveiled a sculpture name “Kryptos” in the agency’s courtyard — a sculpture whose surface was covered with an encrypted message. This article, by a member of the Directorate of Intelligence, describes the process by which he deciphered most of the message.
Document 14: [Deleted], “An Interview with Former DDCI John N. McMahon,” Studies in Intelligence, 43, 1 (1999). Classification Not Available.
Source: CIA Freedom of Information Act Release.
This interview, with John N. McMahon, who joined the CIA in 1951 and served in a variety of positions before he retired in 1986, covers his early days in the agency, the U-2 program, battles over satellite reconnaissance systems, as well as his tours as head of the clandestine service, the intelligence directorate, and as Deputy Director for Central Intelligence. In addition, he discusses the CIA-Congressional relationship as well as covert action with regard to Iran and Afghanistan.
Document 15: [Deleted], “An Interview with NSA Director Lt. Gen. Michael V. Hayden,” Studies in Intelligence , 44, 1 (2000). Secret/[Deleted]
Source: CIA Freedom of Information Act Release.
In this interview, Michael Hayden, then the director of the National Security Agency, discusses his attempt to bring significant change to NSA, his belief that “our technological adversary is not a nation state but the global telecommunications industry,” the relationship between NSA and the CIA (also discussed in Document 19), and other topics.
Document 16: Michael Warner and Kevin Ruffner, “The Founding of the Office of Special Operations,” Studies in Intelligence 44, 2 (2000). Secret/Noforn.
Source: Scudder Litigation Release.
This article, written by two CIA historians, focuses on the CIA’s first human intelligence organization — which would be merged in 1952 with the Office of Policy Coordination to form the Directorate of Plans (subsequently the Directorate of Operations and today the National Clandestine Service). It discussed  the early post-World War II development of U.S.  espionage activities, foreign liaison dilemmas, observations by foreign services, and moving from theory to practice. Despite the decades that have passed since the events described, the article has been heavily redacated before release.
Document 17: [Deleted], “Intelligence and US Missile Defense Planning,” Studies in Intelligence, 45, 2 (2001). Classification Not Available.
Source: CIA Freedom of Information Act Release.
After providing a brief introduction to the early origins of missile defense, this article addresses the establishment of the Strategic Defense Initiative, the post-Cold War shift in U.S. missile defense emphasis and the challenges of providing intelligence on threats, technical issues, and foreign reactions.
Document 18: Henry S. Lowenhaupt, “Origins and Applications of Nuclear Intelligence,” 47, 3 (2003). Secret.
Source: Scudder Litigation Release.
This article, written by one of the CIA’s long-time experts on nuclear intelligence, particularly the intelligence on the Soviet nuclear program, explores the early years on the U.S. nuclear intelligence effort. Lowenhaupt discusses nuclear intelligence collection in World War II, the detection of nuclear detonations, tracking airborne radioactivity, seismic technology, acoustic and EMP measurement, measuring plutonium production, environmental collection, as well as the contribution of U-2 and infrared imagery. A number of the sections are heavily redacted and the section on nuclear detection satellites is deleted in its entirety (despite the substantial amount of declassified information on the subject).
Document 19: [Deleted], “A Brave, New World,” Studies in Intelligence, 48, 2 (2004). Classification Not Available .
Source: CIA Freedom of Information Act Release.
This article addresses the relationship between the CIA and National Security Agency in the aftermath of the September 11, 2001 terrorist attacks. It notes the origins of CIA-NSA enmity going back to World War II, barriers that have existed to a partnership between the two agencies, hints of change in the late 1990s, and the impact of 9/11. Its final sections focus on tangible results, the likelihood that the partnership will last, and the challenges ahead.
Document 20: [Deleted], “An Interview with TTIC Director John Brennan,” Studies in Intelligence, 48. 4 (2004). Secret.
Source: CIA Freedom of Information Act Release.
This interview with John Brennan, currently the Director of the Central Intelligence Agency, was conducted in 2003 — when he was the director of the Terrorist Threat Integration Center (which was subsequently absorbed by the National Counterterrorism Center). Questions include those about the center’s access to intelligence data, counterterrorism analysis as a specialty, the different components of the Intelligence Community involved in counterterrorism analysis, and the division of responsibilities for different aspects of counterterrorism analysis.
Document 21: Michael J. Sulick, “Counterintelligence in the War Against Terrorism,” Studies in Intelligence, 48, 4 (2004). Secret/[Deleted].
Source: CIA Freedom of Information Act Release.
The author, who served as CIA Associate Deputy Director for Operations and became chief of the National Clandestine Service in 2007, notes that whereas U.S. counterintelligence defeats during the Cold War were never exploited by the Soviet Union in an actual war, terrorists “can immediately exploit information gained through espionage to launch attacks.” He goes on to explore the subjects of “terrorists as intelligence operatives;” “exposing terrorist spies;” “more employees to worry about;” terrorist denial and deception; intelligence sharing; and further actions.
Document 22: Michael J. Morell, “11 September 2001: With President,” Studies in Intelligence, 50, 3 (2006) Secret/Noforn.
Source: Scudder Litigation Release.
This article recounts the author’s experience with President Bush on the day of the al-Qaeda attacks on New York and Washington. Morell, who subsequently served as Deputy Director of the CIA (2010-2013) begins in the hours before the attack and continues until Morell arrived back in Washington. It focuses less on intelligence and more on the movements and reactions of Bush and others.
Document 23: [Deleted], “Terrorism Analysis in the CIA: The Gradual Awakening (1972-80),” Studies in Intelligence, 51, 1 (2007). Secret.
Source: CIA Freedom of Information Act Release.
This article, after discussing the emergence of terrorism as an international issue, traces the development of terrorism analysis in the CIA from the Truman to Nixon administrations. It covers increased policymaker interest in the subject (particularly following the murder of Israeli Olympic athletes by Palestinian terrorists in 1972), and the resulting increased Intelligence Community interest; the initially ascendant role of the Directorate of Operations; the Directorate of Intelligence’s subsequent larger role in terrorism analysis; and early analytical challenges.
Document 24: [Deleted], “CIA Prepublication Review in the Information Age,” Studies in Intelligence, 55, 3 (September 2011).Confidential.
Source: CIA Freedom of Information Act Release.
The author, who served as the first senior representative of the Directorate of Intelligence on the CIA Publication Review Board (PRB) offers an anodyne view of the publication review process. Topics covered include the origins and evolution of the PRB and review process, the impact of a vast increase in the number of submitted manuscripts, the meaning of the ‘appropriateness’ requirement, and “myths and realities of the process.” Asserted myths included that “the prepublication review process is unfair, arbitrary, capricious” and that “the PRB often doesn’t know what has already been released.”
Document 25: [Deleted], “James J. Angleton, Anatoliy Golitsyn, and the ‘Monster Plot’: Their Impact on CIA Personnel and Operations,” Studies in Intelligence, 55, 4 (December 2011). Secret.
Source: CIA Freedom of Information Act Release.
This article examines the roles of CIA counterintelligence chief James J. Angleton and KGB defector Anatoliy Golitsyn in the formulation of the “Monster Plot” — which asserted that the Soviet Union had conducted decades-long, massive and successful deception operations against the West, including the use of false defectors and volunteers. It then examines the impact of Angleton and Golitsyn’s thinking on a number of cases and individuals — including Yuriy Nosenko, Lee Harvey Oswald, and several CIA officers who were alleged to be possible Soviet moles.
Document 26: David Robarge, “DCI John McCone and the Assassination of John F. Kennedy,” Studies in Intelligence 57, 3 (September 2013). Secret.
Source: CIA Freedom of Information Act Release.
Director of Central Intelligence John McCone’s actions in the aftermath of the assassination of President Kennedy is the subject of this article, drawn from a classified book on the Mc Cone’s tenure as DCI. It notes that McCone’s first action after hearing that the president had been shot was to visit Robert Kennedy at his home. The remainder of the article discusses  McCone’s oversight of the investigation of a possible conspiracy, his interaction with the Warren Commission, the impact of detection of KGB officer Yuri Nosenko, and his participation in what the author describes as a ‘benign conspiracy.’
NOTES
1. H, Bradford Westerfield, Inside CIA’s Private World: Declassified Articles from the Agency’s Internal Journal, 1955-1992 (New Haven: Yale University Press, 1995), pp. vii, xii-xiv.
2. The tables of contents, starting with the initial issue of Studies, can be found at www.nationalsecuritylaw.org. A significant disparity existed between the CIA’s response to the 2010 FOIA request for 1985-1996 tables of contents and their response to National Security Counselors litigation. Approximately 130 more titles were released in response to litigation than to the author’s FOIA request. Some of the titles not released in response to the FOIA request but produced under litigation include: “Psychology of Treason,” “The Decline and Fall of the Shah,” “On Analytic Success and Failure,” “The DI’s Organizational Culture,” and “Observation Balloons and Reconnaissance Satellites.” “Psychology of Treason” actually appeared in the Westerfield collection (pp. 70-82) while “Observation Balloons and Reconnaissance Satellite” had been released in its entirety and could be found on the CIA’s website.
3. Articles denied in their entirety included “Overhead Imagery during the Yom Kippur War,” “Sifting the Evidence on Vitaly Yurchenko,” “Iraq’s Nuclear Weapons Program,” and “The Need for Improved Strategic Counterintelligence Analysis.” On Scudder’s background, actions, and the results, see Greg Miller, “CIA employee quest to release information ‘destroyed my entire career’,” www.washingtonpost.com,  July 4, 2014.
4. Various authors have found the PRB process less than reasonable. For example, see David H.Sharp, The CIA’s Greatest Covert Operation: Inside the Daring Mission to Recover a Nuclear-Armed Soviet Sub (Lawrence, Ks.: University Press of Kansas, 2012), pp. xi-xii; Robert Wallace and H. Keith Melton, Spycraft: The Secret History of the CIA’s Spytechs from Communism to Al-Qaeda (New York: Dutton, 2008), pp. xx-xxi.
5. Thus, the new head of the National Clandestine Service, who is still officially undercover, as well as the temporary head (also undercover) have been named without a violation of the law. See “CIA’s New Chief Spy Outed on Twitter,” www.gawker.com, accessed May 9, 2013.
6. Although it is often assumed that the first prohibition of assassination was Gerald Ford’s 1976 executive order, DCI’s Richard Helms and successor William Colby had issued internal directives prohibiting such action – Richard Helms, “Allegations of Assassinations,” March 6, 1972; William E. Colby, Subject: Policy Against Assassination,, August 29, 1973.
7. For example, see James R. Taylor, Deputy Director of Operations, National Security Agency, Subject: Thoughts on Strategic Issues for the Institution, April 9, 1999, Document 21 in Jeffrey T. Richelson (ed.), NSA Electronic Briefing Book #24, The NSA Declassified , March 11,2005,www.gwu.edu/~nsarchive/NSAEBB/NSAEBB24.
8. Two major accounts of Angleton and the Molehunt are: Tom Mangold, Cold Warrior – James Jesus Angleton: The CIA’s Master Spy Hunter(New York: Simon & Schuster, 1991), and David Wise, Molehunt: The Secret Search for Traitors that Shattered the CIA (New York: Random House, 1992).
9. On Kryptos, see “Flash Movie Text,” www.ciagov, accessed May 6, 2013; “Kryptos,” http://en.wikipedia.org/wiki/Kryptos.

No comments:

Post a Comment