Site Map

CHURCH COMMITTEE REPORTS

IX. CIA COUNTERINTELLIGENCE
A. COUNTERINTELLIGENCE: AN INTRODUCTION
1. Definition of CounterinteUigence
Counterintelligence (CI) is a special form of intelligence activity,
separate and distinct from other disciplines. Its purpose is to discover
hostile foreign intelligence operations and destroy their effectiveness.
This objective involves the protection of the United State Government
against infiltration by foreign agents, as well as the control and
manipulation of adversary intelligence operations. An effort is made
to both discern and decive the plans and intentions of enemy intelligence
services. Defined more formally, counterintelligence is an intelligence
activity dedicated to undermining the effectiveness of hostile
intelligence services. Its purpose is to guard the nation againt espionage,
other modern forms of spying, and sabotage directed against the
United States, its citizens, information, and installations, at home
and abroad, by infiltrating groups engaged in these practices and by
gathering, storing, and analyzing information on inimical clandestine
activity.'
Tn short, counterintelligence specialists wage nothing less than a
secret war against antagonistic intelligence services. "In the absence
of an effective U.S. counterintelligence 'program," notes a counterintelligence
specialist, "[adversaries of democracy] function in what is
largely a benign environment." 2
12. The Threat
The adversaries of democracy are numerous and widespread. In the
{~nited States alone, 1,079 Soviet officials were on permanent assignment
in February 1975, according to FBI figures.3 Among these, over
40 percent ha\'e been positively identified as members of the KGB or
GRU, the Soviet civilian and military intelligence units. Conservative
estimates for the number of unidentified intelligence officers raise the
figures to over 60 percent of the Soviet representation; some defector
sources have estimated that 70 percent to 80 percent of Soviet officials
have some intelligence connection.'
Furthermore, the number of Soviets in the United States has triplea
since 1960, and is still increasing.5 The opening of American deepwater
ports to Russian ships in 1972 has given Soviet intelligence
1 Counterintelligence may also he thought of as the knowledge needed for the
protection and preservation of the military, economic, and productive strength
of the United States, induding the security of the Government in domestic and
forl'ign affairs against or from espionage, sabotage, and 'all other similar
clandestine activities designed to weaken or destroy the United States. (Report
of.the Commission on Government Security Washington, D.C.. 1957, pp. 48-49.)
- Staff summary of interview, FBI counterintelligence specialist, 5/8/75.
'Staff summary of interview. FBI counterintelligence specialist. 3/10/75.
, FBI counterintelligence specialist (staff summary), 3/10/75.
" FBI counterintelligence specialist (staff summary) , 5/1'/75.
(163)
164
services "virtually complete geographic access to the United States,"
observes a counterintelligence specialist.6 In 1974, for example, over 200
Soviet ships with a total crew complement of 13,000 officers and men
called.at 40 deep-water ports in this country.
Vanous exchange groups pro\Oide additional opportunities for Soviet
intelligence gathering within the United States. Some 4,000 Soviets
entered the United States as commercial or exchange visitors in 1974.
During the past decade, the FBI identified over 100 intelligence officers
among the approximately 400 So\·iet students who -attended American
universities during this period as part of an East-West student
exchange program.' Also, in the 14-year history of this program, more
than 100 American students were the target of Soviet recruitment
approaches in the USSR.
Other areas of counterintelligence concern include the sharp increase
in the number of Soviet immigrants to the United States (less than 500
in 1972 compared to 4,000 in 1974) ; the rise in East-"West commercial
exchange visitors (from 641 in 1972 to 1,500 in 1974) ; and the growing
number of Soviet bloc officials in this conntry (from 416 in 1960 to 798
in 1975).s
Foreign intelligence agents have attempted to recruit not only executive
branch personnel, but also Congressional staff members. The FBI
has advised the Committee that there ha ve been instances in the past
where hostile foreign intelligence officers have used the opportunity
presented by overt contacts to attempt to recruit members of Congressional
staffs who might have access to secret information.sa
The most serious threat is from "illegal" agents who have no easily
detectable contacts with their intelligence service. The problem of
"illegals" is summarized by the FBI as follows:
The illegal is a highly trained specialist in espionage tradecraft.
He may be a [foreign] national and/or a professional
intelligence officer dispatched to the United States under a
false identity. Some illegals [may be] trained in the scientific
and technical field to permit easy access to sensitive areas of
employment.
The detection of ... illegals presents a most serious problem
to the FBI. Once they enter the United States with either
fraudulent or true documentation, their presence is obscured
among the thousands of legitimate emigres entering the
United States annually. Relatively undetected, they are able
to maintain contact with [the foreign control] by means of
secret writing, microdots, and open signals in conventional
communications which are not susceptible to discovery
through conventional investigative measures.Sb
• Ibid.
7 Ibid, 3/10/75.
• Ibid.
•• FBI Memorandum for the Record, 10/30/75. Such recruitment approaches
have been reported to the FBI by Congressional staff members. If the FBI otherwise
learns of such recruitments, its policy is to report the facts to the appropriate
Members of Congress.
• b FBI memorandum, "Intelligence Activities Within the United States by
Foreign Governments," 3/20/75.
165
In several instances the FBI accomplished this most difficult assignment
by carefully designed and limited mail opening programs which,
if they had ben authorized by a judicial warrant, might have been entirely
proper. It is most unfortunate that the FBI did not choose to seek
lawful authorization for such methods.Be
This brief summary of the threat facing the American counterintelligence
corps in this country is troubling enough, yet it does not take
into account the worldwide scope of the problem. As an FBI counterintelligence
expert states, hostile foreib'Il intelligence services
are alert for operational opportunities against the United
States whether they occur within this country, abroad (in
other countries) or in the home country itself. An operation
might begin in the home country with recruitment of an
American visitor; transfer to the United States with his
return; and again, even later, might be transferred to a third
country where the American agent may be met outside the
normal reach of United States counterintelligence coverage.
Regardless of the geographical location, the operation is still
directed against the United States and can cause just as much
damage from abroad as within our own borders.9
The espionage activities of the Soviet Union and other communist
nations directed against the United States are extensive and
relentless.9a
To combat this tjlreat, American counterintelligence officers have
developed various sophisticated investigative techniques to (1) obtain
information about foreign intelligence services, (2) protect our
intelligence service, and (3) control the outcome of this subterranean
struggle for intelligence supremacy. The task is difficult technically,
and raises sensitive legal and ethical questions. As the CIA Deputy
Director for Operations has testified, the
U.S. counterintelligence program to be both effective and in
line with traditional American freedoms must steer a middle
course between blanket, illegal, frivolous and unsubstantiated
inquiries into the private lives of U.S. citizens and excessive
restrictions which will render the Government's counterintelligence
arms impotent to protect the nation from foreign
penetration and covert manipulation.lO
3. 01 as Product: Information about "The Enemy"
Counterintelligence is both an activity and its product. The product
~s reJiable information about all the hostile foreign intelligence oo1'v~
ces ~ho attack the United States by stealth. To guard against hostile
mtellIgence operations aimed at this nation, a vast amount of information
is required..It is necessary to know the organizational structure
of the ~nemy serVIce, the key personnel, the methods of recruitment
and t~a~ning, an~ the specific operations.
ThIS mfo1'matlOn must be gathered within the United States and in
all the foreign areas to which U.S. interests extend. Within the intelli-
8c Testimony of W. R. Wannall, A.ssistant Director, FBI, 10/21/75, p. 5; see
Report on CIA and FBI Mail Opening.
:.FBI Counter!ntelIigence specialist (staff summary), 3/10/75.
See AppendiX III, Soviet Intelligence Collection and Operations Against the
enited States.
10 William Nelson testimony, 1/28/76, p. 5.
166
<Tence service, this acquisitive activity is referred to as intelligence
~ollection. The resulting product-pertinent information on the enemy
intelligence service-is often called "raw" intelligence data. The efforts
of intelligence services through the world to conceal such information
from one another, through various security devices and elaborate deceptions,
creates the counterintelligence specialist ,,,hat James Angleton,
former Chief of CIA Counterintelligence, calls a kind of "wilderness
of mirrors."
4. Cf as Activity: Security and Counterespionage
As an activity, CI consists of two matching halves: security and
counterespionage. Security is the passive or defensive, side of counterintelligence.
It consists basically of establishing static defenses against
all hostile and concealed acts, regardle&<; of who carries them out.
(!ounterespionage (CE) is the offensive, or aggressive, side of counterintelligence.
It involves the identification of a specific adversary and
a knowledge of the specific operation he is conducting. Counterespionage
personnel must then attempt to counter these operations by infiltrating
the hostile service (called penetration) and through various
forms of manipulation. Ideally, the thmst of the hostile operation is
turned back against the enemy.
The security side of counterintelligence includes the screening and
clearance of personnel and the development of programs to safeguard
sensitive intelligence information (that is, the proper administration
of security controls). The intelligence services try to defend three
things: (1) thei'r personnel, (2) their installations, and (3) their
operations.
At the Central Intelligence Agency, the Office of Security is respohsible
for protection of personnel and installations, while actual operations
are largely the preserve of the CI staff and the operating divisions.
Among the defensive devices used for information control by
intelligence agencies throughout the world are: security clearances,
polygraphs, locking containers, security education, document accountability,
censorship, camouflage, and codes. Devices for physical
security include fences, lighting, general systems, alarms, badges and
passes, and watchdogs. A)'eo control relies on curfews, checkpoints, restricted
areas, and border-frontier contro}.12 Thus the security side of
counterintelligence "is all that concerns perimeter defense, badges,
knowing everything you have to know about your own people;" the
counterespionage side "invol\'es knowing all about intelligence services-
foreign intelligence services-their people, their installations,
their methods, and their operations. So that you have a completely
different level of ,interest." 13 However, the Office of Security and the
CI staff exchange information to assure adequate security systems.
5. The Penetration and the Double Agent
Several kinds of operations exist within the rubric of counterespionage.
One, however, transcends all the others in importance: the penetration.
A primary goal of counterintelligence is to contain the intelligence
service of the enemy. To do so, it is eminently desirable to
12 Staff summary of interview, CIA security specialist, 8/20/75.
13 Raymond Rocca deposition, 11/25/75, p. 19.
167
kn~)W !tis plans in adyance and in detail. This admirable, but difficult,
ObJ~c~Ive may be acllle,:,ed through a high-level infiltration of the oppOSItion
serVIce: As a DIrector of the CI:~ has written, "Experience has
s~own.penetratlOnto be the most effectIve response to Soviet and Bloc
[lI1telhgence] services." 14
Moreover, a well-placed infiltrator in a hostile intelligence service
may. be better able than anyone else to determine whether one's own
serVIce has been penetrated. A former Director of the Defense
Intelligence Agency (DIA) has observed that the three principal pro~
raD?s us~ by the United States to meet, neutralize, and defeat hostIle.
lI1telhge~ce penetrations are: (1) our own penetrations; (2) secunty
screemng and clearance of personnel; and (3) our efforts for
safeguarding sensitive intelligence information."5 The importance of
the penetration is emphasized by an experienced CIA counter~
spionage operative, with mixed but expressive similes: "ConductlI1g
counterespionage with penetration can be like shooting fish in a
barrel;" in contrast, "conducting counterespionage without the act
of penetration is like fighting in the dark." 16 .
Methods of infiltrating the opposition service take several forms.
Usually the most effective and desirable penetration is the recruitment
of an agent-in-place.H He is a citizen of an enemy nation and
is already in the employ of its intelligence service. Ideally, he
will be both highly placed and venal. The individual, say a KGB
officer in Bonn. is approached and asked to work for the intelligence
service of the United States. Various inducements-including ideology-
may be used to recruit him against his own service. If the
recruitment is successful, the operation may be especially worthwhile
since the agent is presumably already trusted within his organization
and his access to documents may be unquestioned. Jack E. Dunlap,
who worked at and spied on the National Security Agency
(NSA) in the 1960s, is a well-known example of a Soviet agent-inplace
within the U.S. intelligence service. His handler was a Soviet
Air Force attache at the Soviet Embassy in WlJ,shington. Of course,
a single penetration can be worth an intelligence gold mine, as were
Kim Philby for the Soviet Union and Col. Oleg Penkovsky for the
United States.
Another method of infiltration is the double agent. Double agents,
however, are costly and time-consuming, and they are risky. Human
lives are at stake. Double agents also normally involve pure
drudgery, with few dramatic results, as new information is chec~ed
against existing files. On top of this comes the difficulty of assurlI1g
against a doublecross.
Moreover, passing credible documents can be a major problem.
The operations must be made interesting to the opposition. To make
fake papers plausible, the genuine article must be P!ovided now and
again. Classified documents must be cleared. and thIS process can be
H Memorandum from .John McCone to Chairman, President's Foreign Intel-
Ii~pnce Advisory Board, 10/8/63.
" Thf> Carroll Report on the Dunlap Case, 2/12/64.
,. ClA/CI specialist, staff summary,' 11/1175.
17 CIA/CT specialist, staff summary, 10/17/75.
168
painstakingly slow. Also, "this means letting a lot of good stuff go to
the enemy without much in return," complains a CI officer with considerable
experience.I8
To accomplish each of these tasks, hard work, careful pla.nning, and
consi.derable manpower are necessary. The extraordinary manpower
reqUIrements of the double agent operation restricted the abilities
of the British to run cases during the Second World War-approximately
150 double agents for the entire period of the war and no more
than about 25 at anyone time.I9 Moreover, their mission was eased
greatly by the ability of the British to read the German cipher
throughout most of the conflict.
6. The Defector
Almost as good as the agent-in-place and less troublesome than the
whole range of double agents is the, "defector with knowledge." Here
the procedure consists of interrogation and vrulidation of bona fides, as
usual, but without the worrisome, ongoing requirements for a skillIul
mix of false and genuine documents and other logistical support.
Though an age,nt-in-place is preferable because of the continuing useful
information he can provide, 'often a man does not want to risk his
life by staying in-place, especially where the secnrity is sophistieated;
his preference is to defect to safety. In other words, agents-in-place are
harder to come, by in systems like the, Soviet bloc countries; defection
is more, likely.20 In contrast, agents-in-place are more easily recruited
in so-called Third World areas.
Within the United States, the interrogation of intelligence service
clefectors who ha,-e defected in the U.S. is primarily the responsibility
of the FBI, though the CIA may have a follow-up session with the
individual. Sometimes the bona fides of a defector remain disputed for
many years.
CIA-recruited defectors abroad are, occasionally brought to the
United States and resettled. The, FBI is notifie,d and, afte,r the CIA
completes its interrogation, FBI may interrQgate. CIA does not bring
all defectors to the United States; only those expected to make, a significant
contribution. CIA generally handles resettlement not only of
defectors from abroad, but also (at the request of the FBI) of de,fectors
in the, United States.
7. The Deception
The penetration or double agent is closely related to another important
CE technique: the deception. Simply stated, the deception is an
attempt to give the enemy a false impression about something, causing
him to -take action contrary to his O\yn interests. Fooling the Germans
into the belief that D Day landings were to be in the Pas de Calais
ratlwr than in Normandy is a classic example of a successful deception
operation in World War 11.21
,. Rocca deposition, 11/25/75, pp. 33-34.
" Sir .John Masterman, Double Cross System of the War Of 1939-45 (New
Hawn : Yale University Press, 1972) .
.. Bruce Solie, deposition, 11/25/75, pp. 26-27.
2' Masterman, DOl/ble Cross System.
169
Deception is related to penetration because our agents operating
within foreign intelligence agencies can serve as exceNent chalUlels
through whIch misleading information can flow to the enemy. 80
double agents serve Loth as collectors of positive intelligence and
channels for deception. However, there are opportunities for deception
other than our own agents; in fact, "an infilllte variety" exists, according
to an experienced practitioner.23 One example: the U.S. can
allow penetration of its own intelligence service, and then feed fwlse
information through him.
8. Other 01 Techniques
Other counterespionage operations include surreptitious surveillance
of various kinds (for instance, audio, mail, physical, and "optical"-
that is, photography), interrogation (sometimes incommunicado
as in the case of one defector) , and provocation. Decoding clandestine
radio transmission and letters with messages written in secret
ink between the visible lines is part and parcel of the CE trade, as is
trailin~ suspected agents, observin~ "dead drops" (the exchange of
material, like documents or instructions, between a spy and his handler),
and photographing individuals entering opposition embassies
or at other locations. At the recent funeral of CIA agent Richard
Welch, two Eastern European diplomats were discovered among the
press corps snappin~ photo~raphs of CIA intelligence officers attending
the burial ceremony.24 Since the focus of offensive counterintelligence
is disruption of the enemy service, provocation can be an important
element of CE, too. It amounts, in essence, to harassment of
the opposition, such as publishing the names of his agents or sending
a defector into his midst who is in reality a double agent.
9. (}1 (J)J Organization
Security at CIA is the responsibility of the Office of Security, a
division of the Deputy Director for Administration. Counterespionage
policy is guided by the Counterintelligence Staff of the Operations
Directorate (Clandestine Service). Besides setting policy, the CI Staff
sometimes conducts its own operations, though most cr operations
emanate directly from the various geographic divisions flF tlH or field
personnel-through the practice of the counterintelligence ,ii~·,(::;)lineattempt
to ~uard against enemy manipulation of espionage and covert
action operations.
Structurally, counterintelligence services ari.' Uf'lally compoFeo .,1'
two additional sections which support Security and Operatiom;. They
are the Research and the Liaison sections. Good research i" '.TlL"rC I
to a ~ood counterintelligence effort, and it may take sev0ral fOl'iJis. It
can involve the amassing of encyclopedic intelli~nce on individuals,
including American citizens associated-wittingly or unwittting]ywith
hostile intelligence services. Specialists say that the hallmark of
a sophisticated cr service is its collection of accurate records.25 CI
research personnel 'also produce reports on topics of interest to the
specialty, including guidelines for the interrogation of defectors and
current analyses on such subjects as proprietary companies used by
%l CIA counterintelligence specialist (staff summary), 11/1175.
.. CIA counterintelligence specialist (staff summary), 1/15/76.
"'6/27/75.
"" Ibid, 6/27/75.
207-932 0 - 76 - 12
170
foreign intelligence services and the structure of Soviet bloc intelligence
services. CI researchers also analyze defector briefs and, in the
case of compromised documents, help ascertain who had access and
what damage was inflicted.
Liaison with other counterintelligence services, 'at home and abroad,
is also vital since no effective counterintelligence organization can do
its job alone. The various CI units at home are particularlyimportant,
'as counterintelligence-with all its intricacies and deceptionsrequires
coordination among agencies 'and sharing of records. Unlike
the totally unified KGB organi~ation,the American intelligence service
is fragmented and depends upon liaison to make operations more
effective. Coordination between CIA and FBI counterintelligence
units is especially critical since, in theory at least, the former has foreign
jurisdiction and the l'atter domestic, yet they must monitor the
movements of foreign spies in and out of these two jurisdictions. Sometimes
this coordination fails dramatically. In 1970, for example, J.
Edgar Hoover of the FBI terminated formal liaison with the CIA
and all the other intelligence units in the Government because of a
disagreement with the CIA on a question of source disclosure (the
Thomas Riha oose) .26
Liaison Iwith foreign intelligence services overseas can undergo
strain, too. As one CI speci'alist has said: "There are no friendly services;
there are services of friendly foreign powers." 27 Each service
fears the other has been infiltrated by hostile agents and is reluctant
to see national secrets go outside its own V'aults.Nonetheless, cooperation
does t'ake place, since all intelligence services seek information and,
with precautions, will take it where theyoon get it if it is useful.
The CIA will work with friendly services to uncover hostile intelligence
operations, including illegals, directed 'at the government of
the friendly service. For example, a CIA-recruited defector may reveal
Soviet agents in a friendly foreign government. This information
is shared with the friendly government, if there is proper protection
of the source. Protection of the CIA source is paramount.
FBI counterespionage activities within the United States are supervised
by the Counterintelligence Branch of the FBI Intelligence Division.
The Branch is made up of four Sections, three of which direct
field operations conducted by the Bureau's field offices. The fouIth
handles Jiraison with other agencies and supervises the FBI's Legal
Attaches assigned to serve in the embassies in several foreign countries.
The formal structure for counterespionage coordination between the
FBI and the military intelligence agencies was est'ablished in 1939
and embodied most recently in a "charter" for the Interdepartmental
Intelligence Conference in 1964.278 This formal body, chaired by the
FBI Director and including the heads of the military intelligence
agencies, has not played a significant decisionmaking role in recent
years.
.. Staff summary of interview, former FBI liaison person with CIA, 8/22/75.
21 Rocca deposition, 11/25/75, p. 43.
.,. Confidential memorandum from President Roosevelt to Department Heads,
6/26/39; memorandum from Attorney General Kennedy to .T. Edgar Hoover,
Chairman, Interdepartmental Intelligence Conference, 3/5/64.
171
As late as 1974, some FBI officials took the position that the B:ureau's
counterespionage activities were not under the authority of
the Attorney General, since the FBI was accountable in this area
directly to the United States Intelligence Board and the National
Security Council. A Justice Department committee chaired by Assistant
Attorney General Henry Petersen sharply rejected this view
and declared:
There can be no doubt that in the area of foreign counterintelligence,
as in all its other functions, the FBI is subject
to the power and authority of the Attorney General.27b
In recent years the FBI has taken steps to upgrade its counterespionage
effort, which had been neglected because of the higher
priority given to domestic intelligence in the late 60s and early 708.270
New career development and mid-career training programs have been
instituted. FBI agents specializing in counterespionage begin their
careers as criminal investigators and not as analysts; and Bureau
officials stress that their role is accurate fact-finding, rather than
evaluation. Nevertheless, counterespionage supervisory personnel have
recently attended high-level training courses in foreign affairs and area
studies outside the Bureau.27d
Here, then, are the key elements of counterintelligence. Together
they combine into a discipline of great importance, for the rock bottom
obligation of an intelligence service is to defend the country; meeting
this obligation is the very raison d'etre of counterintelligence. The
discipline also represents the most secret of secret intelligence activities--
the heart of the onion. Its great importance and its ultra
secrecy make counterintelligence an area of concern that cannot be
ignored by policymakers and by those responsible for legislative oversight.
As a review of current issues in CI attests, the discipline has
several problems which demand the attention of those charged with
the defense of the country and the reform of the intelligence
community.
B. CURRENT ISSUES IN COUNTERINTELLIGENOE
1. Two Philosophies
December 1974 marked the end of an era in CIA counterintelligence.
James Angleton, the Chief of Counterintelligence at the Central
Intelligence Agency since 1954, retired over differences of opinion with
Director William Colby on the proper approach to the practice of
counterintelligence.
The new regime proved to be considerably different in its approach
to counterintelligence, emphasizing a diffusion of CI responsibilimb
Report of the Petersen Committee on COINTELPRO, pp. 34-35. The committee
was especially concermed that the ad hoc equivalent of the U.S. Intelligence
Board had approved the discredited "Huston Plan" in 1970. However, the
committee complied with the FBI's request that it exclude from its review of
domestic OOINTELPRO activities the Bureau's "extremely sensitive foreign
intelligence collection techniques." (Memorandum from FBI Director Kelley to
Acting Attorney General Robert Bork, 12/11/73.)
me C. D. Brennan testimony, Hearings, Vol. 2, p. 117.
m' W. R. Wannall testimony, 1/21/76, pp. 18-22.
172
ties throughout the Operations Directorate. Presumably, this has
led to an increased flow of counterintelligence information within the
Agency but, at the same time, has raised questions concerning compartmentation
and security.
The new Chief of CIA Counterintelligence has instituted a series
of specific changes which have been studied closely by the Select
Committee. The findings are of an extremely sensitive character and
have been reported to the Senate and to the President in a classified
form. It should be noted here that CIA counterintelligence is now emphasizing
different factors than heretofore, \vhich reflect a somewhat
different philosophy than that espoused by Angleton. These diferences
in viewpoint raise several important questions concerning how
best to protect the United States, including the proper degree of compartmentation
of CI information, methods of operation, approaches
to security, research priorities, extent of liaison cooperation, and
emphasis on deception activities, among other things.
A high-level executive branch review of the classified issues which
have surfaced in this disagreement is of considerable importance. Included
in this review should be an examination of the approval process
for certain counterespionage operations.
£? Interagency Relatiom
Equally as troubling as these issues is the problem of CIA/CI relations
with other counterintelligence units in the Government. Particularly
vexing have been the on-again off-again liaison ties between the
Agency and the FBI,28 This history has been marked by turbulence,
though a strong undercurrent of cooperation has usually existed at
the staff level since 1952 (when the Bureau began sending a liaison
man to the CIA on a regular basis). The sources of friction between
the CIA and the FBI in the early days revolved around such matters
as the frequent unwillingness of the Bureau to assist the CIA within
the United States or to help recruit foreign officials in this country.
Pressure from the CIA on the Bureau to increase microphone coverage
of foreign targets within the United States was also a "red flag" to
Hoover.29
A series of such disagreements punctuated the relations between
the two agencies throughout the 1950s and 1960s. Several flaps arose,
for example, when the CIA Domestic Operations Division attempted
to recruit foreign officials within the United States and failed to advise
the Bureau.3o
In 1966 an informal agreement was negotiated between the FBI and
the CIA to regularize their "coordination." This agreement had as its
"heart" that the CIA would "seek concurrence and coordination of the
FBI" before engaging in clandestine activity in the United States, and
that the FBI would "concur and coordinate if the proposed action does
not conflict with any operation, current or planned, including active
investigation [by] the FBI." Moreover, when an agent recruited by
the CIA abroad arrived in the United States, the FBI would "be
advised" and the two agencies would "confer regarding the handling
28 Former FBI liaison person with CIA (staff summary), 8/22/75.
29 Ibid.
30 Ibid.
173
of the agent in the United States." The CIA could "continue" its "handling"
of the agent for "foreign intelligence" purposes; and the FBI
would also become involved where there were "internal security factors,"
although it was recognized that CIA might continue to "handle"
the agent in the United StaWs and provide the Bureau with "information"
bearing on "internal security matters." 30a"
Eventually, the much heralded (though actually minor) Riha incident
in 1970 became "the straw that broke the camel's back." 31 Hoover
ordered the discontinuation of FBI liaison with the Central Intelligence
Agency. Though informal means of communication continued
between CIA and FBI staff personnel, Hoover's decision was a setback
to theooordination of counterintelligence activities in the Government.
Not until Hoover was gone from the Bureau did formal
liaison relations begin to improve.32
Today, most counterintelligence officers in both agencies say that
coordination and communication linkages are good, though a recently
retired CIA/CI officer points to "a vital need for closer integration
of the CI efforts of the CIA and the FBI." 33 The most salient criticisms
of FBI counterintelligence voiced at the CIA concern (1) the
lack of sufficient CI manpower in the FBI; (:2) occasional disputes
over the bona fides of defectors: and, (3) differences of opinion on
the possibility OT hostile penetrations within the Government. Each
of these matters also requires immediate review by the executive
branch. In particular, the occasional interagency disputes over defector
bona fides and differences of opinion on suspected hostile penetrations
cry out for a higher level of authority in the executive branch
to settle these sometimes divisive disagreements.
3. The Scope and Basis of FBI Oounterintelligence
In the imperfect contemporary world where other nations have
interests which conflict with those of the United States, foreigndirected
clandestine intelligence activities in this country must be of
constant concern to the American people. One of the original reasons
for the FBI's domestic intelligence mission was that the United States
needed in the late 19308 a coordinated program for investigating "persons
engaged in espionage, oounter-espionage or sabotage." 34 By mid1939
the FBI and military intelligence had gathered a "reservoir of
information concerning foreign agencies operating in the United
States" with efficient "channels for the exchange of information." 35
There is no question that during this prewar period, foreign espionage
constituted. a serious threat to the security of the United States and
thus supported the basic decision to conduct investigations of activities
which were "not within the specific provisions of prevailing statutes" 36
30. Testimony of former FBI liaison person with CIA, 9/22/75, pp. 52-55.
31 James An/{leton testimony, 9/24/75, Hearings, pp. 657-58.
32 Scott Miller testimony, the Commission on CIA Activities Within the United
States, 3/19/75, p. 938.
113 Statement from Scott Miler to the Senate Select Committee, lj28/76, pp.
32-33.
.. Memorandum from J. Edgar Hoover to Attorney General Murphy, 3/16/39.
.. Letter from Attorney General Murphy to President Roosevelt, 6/17/39.
30 Memorandum from Hoover to Murphy, 3/16/39.
174
but which involved "potential" espionage, counterespionage, or sabotage.
37
One of the major difficulties in any attempt to base investigations
of foreign espionage on the criminal statutes has been, from the outset,
the restricted and sometimes contradictory scope of the laws. A recent
legal analysis has observed that "the legislation is in many ways incomprehensible."
38 Most notably, the espionage statutes do not make
it a crime simply to engage in the knowing and unauthorized transfer
of classified information to foreign agents.39 Moreover, the statutes
do not extend to a range of privately held information, especially on
scientific and technical matters, which would be valuable to a foreign
power.
Hostile foreign intelligence activities include more than just looking
for classified information or espionage recruits. Information of a
highly technical and strategic nature (though unclassified), which is
normally restricted or unavailable in other societies, is openly
procurable in the United States through academic institutions, trade
associatIOns, and government offices. Intelligence officers may seek out
persons who have defected to the United States, to induce them to
redefect back to their home country.40 Foreign intelligence targets in
this country may include information possessed by third nations and
their representatives in the United States.
Moreover, the type of activity which is most easy to detect and which
may indicate possible espionage does not always satisfy the normal
standard of "reasonable suspicion." As a study prepared by the Fund
for the Republic stated twenty years ago:
The problems of crime detection in combatting. espionage are
not ordinary ones. Espionage is a crime which succeeds only
by secrecy. )loreover, spies work not for themselves or
privately organized crime "syndicates," but as agents of national
states. Their activities are therefore likely to be carefully
planned, highly organized, and carried on by techniques
skillfully designed to prevent detection.41
Consequently, espionage investigations must be initiated on the basis
of fragments of information, especially where there may be only an
indication of a suspicions contact with a foreign agent and limited
data as to the specific pnrposes of the contact.
In addition, prosecution is frequently not the objective of an espionage
investigation. For one thing; the government may desire "to
37 Directive of President Roosevelt, 6/26/39. While the FBI's responsibilities
wpre also dpscribed at times as extending to "subversion," and the lack of outside
guidance allowed for overly broad FBI investigations, the problem of spying
was always paramount. See the orders of President Roosevelt and Attorney
General Biddle regarding warrantless wiretapping, discussed in report on warrantless
FBI Electronic Surveillance.
38 Harold Edgar and Benno C. Schmidt, "The Espionage -Statutes and Publication
of Defense Information." Columbia Law Review, Yo!. 53, (May, 197:l) pp.
929.934.
3ll Ibid., p. 1084.
40 FBI Memorandum, "Intelligence Activities Within the United States by Forpign
Governments," 3/20/75.
"Fund for the Republic, Digest of the Public Record of Oommunism in the
United States (New York, 1955), p. 29.
175
avoid exposing its own counterespionage practices and information."
42 In addition, the purpose of the investigation may be to find
out what a known foreign agent is looking for, both as an indication
of the espionage interest of the foreign country and as a means of
insuring that the agent is not on the track of vital information. Since
foreign agents are replaceable, it may be a better defense not to expel
them from the country or otherwise halt their activities, but rather to
maintain a constant watch on their operations. This also means investigating
in a more limited fashion many of the Americans with
whom the foreign agent associates, in order to determine what the
agent may be interested in learning from them.
In the 1930s and 1940s, another argument for going beyond the
criminal statutes was that there were significant ideological and nationality
factors which motivated persons to engage in espionage. As
Attorney General Jackson put it in 1940, individuals were a "likely
source" of law violation because they were "sympathetic with the systems
or designs of foreign dictators." 43 The 1946 Report of the Canadian
Royal Commission made similar findings. This was the most
persuasive rationale for continuing FBI intelligence investigations
of Communists and Fascists, as well as German and other nationality
groups, before World War II. It continued to be a substantial basis
for such investigations of Communists after the war.44
By the mid-fifties, however, the characteristics of foreign espionage
had changed substantially. The decline of the Communist Party caused
a shrinkage in possible recruits, with the result that Soviet intelligence
reverted "more and more .. , to the old type of conventional
spy." 45 A report prepared by the Association of the Bar of the
City of New York observed that it was "vital" to adjust the government's
security programs to "new conditions," one of which was the
"decline of the appeal of Communism." The report added:
In the 1930s and 1940s the Soviet Union could rely on the
support of a small but substantial group in this country who
were sympathetic with its asserted aims. Now this has largely
changed.... This has made a radical change in the type and
number of persons who might be lured into Communist
espionage.46
The FBI itself believed that the Community Party had become a
"potential" rather than an actual espionage dangerY While that
•• [&ii/,•
.. Proceedings of the Federal-State Conference on Law Enforcement Problems
of National Defense. 8/5--6/40.
.. "A characteristic of most of the cases in which espionage for the Soviet
Union has been prosecuted is that the participants seem to have been motivated
by ideology. . . ." Fund for the Republic. Digest of the Public Record of Communism
in the United States, p. 29.
.. Alexander DaHin, Soviet Espionage (New Haven: Yale University Press,
1955), p. 510. This authoritative study of Communist espionage added that "thl:'
traditional type of nonpolitical spy has advantages over a Communist: his past
evokes no suspicion."
<4 Report of the Special Committee on the Federal Loyalty-Security Program
of the Association of the Bar of the City of New York (New York: Dodd, Mead
& Co.• 1956), pp. 35--36.
•7 FBI Monograph, "The Communist Menace in the United States Today,"
(1955), p. (iv-v.)
176
potential threat was still significant, in view of the Party's subservience
to the Soviet Union, the counterespionage justification for
sweeping investigations of persons one or two steps removed from
the Party (e.g., "sympathizers" or "infiltrated" groups) lost much of
its force.
Nevertheless, there continue to be hostile foreign intelligence activities
which the FBI charact~rizesas "efforts to penetrate the American
political system" or attempts "to develop an agent of influence in
American politics" or efforts "to influence the U.S. policy-making
structure." 48
Therefore, the monitoring of contacts between U.S. government officials
and foreign officials who are likely to be carrying out the directions
of a hostile foreign intelligence service is a necessary part of
the FBI's investigative duties. The subject of investigation is the foreign
official, and any inquiry direded towards the American official
can be limited to determining the nature of the foreign official's interests.
Frequently it is desirable that the American official be informed
by the Bun>--au, especially when the contact is overt rather
than furtive or clandestine. (The same is also true with respect to
overt contacts with American private citizens.) 4"
There >are two areas of special difficulty in prescribing the FBI's
proper responsibility. The first im"olves cont1llcts between Members of
Congress or high-level executive officials and equally high-level forE'ign
officials. There have heeninstances where the FBI has had reason
to believe that such contacts might involve the unauthorized disclosure
of confidential information to 'a foreign government. Except in such
rare circumstances. however. contacts of this nature need not be the
subject of FBI investigation or dissemination.50
The second difficulty involves the concept "foreign subversion," used
most recently in President Ford's Executive Order defining the counterintelligence
duties of the U.S. intelligence community, including
the FBI.51 As noted above, the Bureau characterizes certain hostile
foreign intelligence activities as attempts to develop "agents of influence
in American politics." The' FBI considered one of Dr. Martin
Luther King's ,advisors to be suchan "agent of influence." In this cuse,
as with the massive investigations to uncover possible foreign "influence"
on domestic protest activities, the concern for "foreign subversion"
was distorted so far beyond reasonable definition that the term
"subversion" should be abandoned completely. Even with the qualifier
"foreign," the concept is so elastic as to be susceptible to future misuse.
Nevertheless, there remains a compelling need to investig'afe all the
activities of hostile foreign intelligence services, including their efforts
to recruit ",agents of influence." This can be accomplished by continuing
investigation of the foreign agents themselves. Where a foreign
.8 FBI Memorandum, "Intelligence Activities Within the United States by
Foreign Governments," 3/20/75.
•• Oontacts made secretly or with the apparent intent to a void detection justify
more extensive investigation.
50 Where the FBI discovers such contacts as a by-product of its investigations
for other purposes, they can 'be noted without reference to the identity of the U.S.
official in order to compile a quantitative measure of foreign activity.
0' Executive Order 11005, "United States Foreign Intelligence Activities," Sec.
2(a) (2) ; Sec. 4 (b) (4) ; Sec. 4(g) (l), 2/18/76.
177
agent makes an overt contJact with an American, a limited inquiry
regarding the American is approp6llJteto determine the nature of the
foreign agent's interests. This 'applies whether the agent's interest is
information or "influence," 'and the Bureau can frequently make its
inquiry known to the American. But the Bureau's objectives should be
eonfined solely to learning more about the overall mission of the hostile
service and the particular assignments of jots officers, as opposed to
investigating "influence" by foreign officials or agents who do not have
intelligence duties and the IMvful activities of Americans who are not
foreign agents. There is no compelling reason for intensive investigations
of U.S. officials (or privllJte citizens) simply because ,they are
targets of foreign "influence." The line must he tightly drawn so that
FBI counter-intelligence investigations do not themselves once again
intrude into the American politioal process, with consequences damaging
not only to the rights of Americans, but 'also to public confidence
in the Bureau. Citizen cooperation with the FBI is essential to its success
in detecting and countering the threait of hostile foreign ,intelligence
operations to the defense of the nation.
To achieve this end, the federal criminal statutes dealing with
espionage should be substantially revised to take account of the contemporary
counterintelligence responsibilities of the FBI. A realistic
definition of foreign-directed clandestine intelligence activity would
make it possible for the FBI to base its counterintelligence investigations
on the firm foundation of the criminallaw, rather than the shifting
interpretations of terms like "subversion" in executive orders. The
Committee agrees with Attorney General Edward H. Levi that:
the fact that the FBI has criminal investigative responsibilities,
which must be conducted within the confines of constitutional
protections strictly enforced by the courts, gives
the organization an awareness of the interests of individual
liberties that might be missing in an agency devoted solely to
intelligence work.52
C. CONCLUSIONS
1. A Subcommittee on Counterintelligence should be established
within the framework of the National Security Council (NSC). Its
purpose would be to monitor CI activities, authorize important
counterespionage operations, and adjudicate interagency disagreements
over CI policies, coordination, defector bona fides, suspected
hostile penetrations, and related matters.
2. The President of the United States, in consultation with the
oversight committee (s) of Congress, should undertake a top secret
review of current issues in the realm of counterintelligence. This review,
which should form the basis for an internal Presidential statement
on national counterintelligence policy and objectives, should
include close attention to the following issues: compartmentation,
operations, security, research, accountability, training, internal review,
deception, liaison and coordination, and manpower.
:3. Congressional oversight should devote more attention to this
52 Levi testimony, 12/10/75, Hearings, Vol. 6, pp. 314-315.
178
area to help preserve the liberties of American citizens and to prod
the intelligence community toward a more effective defense of the
nation.
(Additional recommendations on counterintelligence, including
reform of the espionage laws and legislation setting standards for
activities affecting the rights of Americans, are made in the Committee's
Report on Intelligence Activities and the Rights of Americans.)

Go to Next Page