
Sign up to save your podcasts
Or


For proper formatting (bold, italics, etc.) and graphics (where applicable) see the PDF version. Copyright: 2020 Retraice, Inc.
Re4: Trust No OneOn problems of trust: 'contrived leaks' and betrayals.
Dulles - Craft of Intelligence, Chpt. 15, 'Security in a Free Society', Part 3.
Air date: Thursday, 10th Sep. 2020, 10 AM Pacific/US.1
He was primarily a messenger and clerk responsible for the distribution and circulation of documents within NSA. What was in these documents may not even have been entirely intelligible to him. But it didn't have to be. All Dunlap had to do was photograph them and make sure that the film reached the Soviet officer handling him. If Dunlap had lived, it is unlikely that he could have recalled more than a small part of the material he passed the Soviets.2
We talked yesterday about three kinds of problems in Dulles's3 Chpt. 15, 'Security in a Free Society': problems of information, problems of trust, and problems of survival. We focused on information problems, 'giveaways' and 'careless leaks'. Main points—unintended problems and problems of trustIf giveaways and careless leaks are your team's unintended information problems, contrived leaks (e.g. whistle-blowers, or press manipulation by group-internal competitors) and betrayals are intended information problems, which are, for your team, better described as trust problems: first picking whom you trust carefully, and second, hardening your team's valuables4, bulwarking, against betrayals—by temporary dissenters, and by permanent enemies.
Problems of trust—'contrived leaks' and betrayalsDulles's two problems of trust are distinguished by the motivations of the actors involved.
'Contrived leaks'—when the motivation is sub-group hostilityHere, the problem of trust is that even a group's friends or allies might see fit to strategically leak privileged information, perhaps for the good of the group directly, or perhaps because the friend or ally thinks their own standing should be higher for the good of the group, and so leaking serves both their own and the group's interests.
This is as much deterrence as hardening: the fewer the people, the harder a group is to compromise; but even if someone in the group has been inserted or turned, they now need to have an escape plan if they're going to leak anything.8
In terms of cases, he gives many. And more generally, he says: "Dunlap's case was one frequently encountered in intelligence history where an insignificant employee, of meager understanding and less education, performing menial tasks but located at a vulnerable point in the internal workings of a highly secret undertaking, can do as much damage as a top-ranking official."11
Lowenthal says this might be what happened with James Angleton after Kim Philby was exposed: "[T]he basic tendency within any intelligence organization (or any organization, for that matter) is to trust its own people, who have been vetted and cleared. They work with one another every day. Familiarity can lead to lowering one's guard or being unwilling to believe that one's own people may be disloyal…. But the alternative behavior—unwarranted suspicion—can be just as debilitating as having a spy in one's midst. James Angleton, who was in charge of the CIA's counterintelligence from 1954 to 1974, became convinced that a Soviet mole—a deeply hidden spy—had penetrated the CIA. Some believe that Angleton was reacting to the fact that his close British associate, Kim Philby, had turned out to be a Soviet agent. Angleton was unable to find the mole, and some believe that he tied the CIA in knots by placing virtually anyone under suspicion. Some suggested that Angleton himself was the mole….14
Compare Peter Grose on the idea of a 'mole': A relatively recent term, and mostly fictional: "The CIA—along with the rest of the world—never succeeded in penetrating the mind of Stalin, and did only marginally better with the Soviet leaders who succeeded him. Acquiring such intelligence would ideally require a 'mole,' a well-connected agent within the Kremlin who could accurately and confidently report out his findings. (The term 'mole' is a relatively recent addition to the lexicon of espionage. It was coined by the British novelist John le Carré.) Though such a boon sometimes appears in the history of intelligence, it generally belongs in the category of what Allen [Dulles] called 'story-book stuff.' "15
Information problems (careless leaks, giveaways) are different from trust problems (contrived leaks, betrayals), based on the intentions, and group memberships, of those involved. Everyone has selfish motives, and most have selfless motives (for the good of the group) as well. Money, ideology, compromise or coercion, and ego, can change motives. But even solving a particular trust problem case can lead to paranoia and profound dysfunction. Strategic intelligence is a world of inherent, complex problems, and any group trying to survive would seem to need subtle, if not complex, solutions to its strategic intelligence problems.
NextWe'll talk about survival, and the role of strategic intelligence generally, and spies in particular.
ReferencesCharney, D. L., & Irvin, J. A. (2016). A guide to the psychology of espionage. In Oleson (2016).
Dulles, A. (2016). The Craft of Intelligence. Lyons Press / Rowman & Littlefield. First published 1963. This edition copyright Joan Buresch Talley, daughter of Dulles. ISBN: 978-1493018796. Searches: https://www.amazon.com/s?k=978-1493018796 https://www.google.com/search?q=isbn+978-1493018796 https://lccn.loc.gov/2016017105 Different editions available at: https://archive.org/search.php?query=The%20Craft%20of%20Intelligence
Grose, P. (1994). Gentleman Spy: The Life of Allen Dulles. Houghton Mifflin. ISBN: 0395516072. Also available at: https://archive.org/details/gentlemanspylife00gros
Hersh, S. M. (2018). Reporter: A Memoir. Vintage / Penguin Random House. ISBN: 978-0307276612. Searches: https://www.amazon.com/s?k=978-0307276612 https://www.google.com/search?q=isbn+978-0307276612 https://lccn.loc.gov/2017051856
Lowenthal, M. M. (2020). Intelligence: From Secrets to Policy. CQ Press / SAGE Publications, 8th ed. ISBN: 978-1544358345. Searches: https://www.amazon.com/s?k=978-1544358345 https://www.google.com/search?q=isbn+978-1544358345 https://lccn.loc.gov/2019027254 Other editions available at: https://archive.org/search.php?query=Intelligence%3A%20From%20Secrets%20to%20Policy
Oleson, P. C. (Ed.) (2016). AFIO's Guide to the Study of Intelligence. Association of Former Intelligence Officers, 1st ed. Citations are of the pbk edition, ISBN: 978-0997527308. PDF edition available at: https://www.afio.com/40_guide.htm Retrieved 10th Sep. 2020.
Retraice (2020/09/11). Re5: Hints From Inside. retraice.com. https://www.retraice.com/segments/re5 Retrieved 22nd Sep. 2020.
Schneier, B. (2003). Beyond Fear: Thinking Sensibly About Security in an Uncertain World. Copernicus Books. ISBN: 0387026207. Searches: https://www.amazon.com/s?k=0387026207 https://www.google.com/search?q=isbn+0387026207 https://lccn.loc.gov/2003051488 Similar edition available at: https://archive.org/details/beyondfearthinki00schn_0
1Retraice works on the question 'What's going on out there?' Our point of departure is the concept of intelligence, which seems to have at least three kinds: natural, artificial, and strategic. Here, we're working on strategic intelligence.
2Dulles (2016) p. 249
3Dulles (2016)
4On 'valuables', cf. Hersh (2018) p. 208 on the CIA's 'family jewels'.
5Dulles (2016) p. 241par21.
6Dulles (2016) p. 238par12.
7Dulles (2016) p. 243.
8Cf. Schneier (2003) pp. 176-178 on the nature and efficacy of deterrence, including its inextricable link to education.
9See Retraice (2020/09/11) p. 3, 'Dulles Recap' point 4.
10Dulles (2016) p. 249par43.
11Dulles (2016) p. p. 249par45.
12Charney & Irvin (2016) p. 465.
13Dulles (2016) p. 250par48.
14Lowenthal (2020) p. 213.
15Grose (1994) p. 469.
By Retraice, Inc.For proper formatting (bold, italics, etc.) and graphics (where applicable) see the PDF version. Copyright: 2020 Retraice, Inc.
Re4: Trust No OneOn problems of trust: 'contrived leaks' and betrayals.
Dulles - Craft of Intelligence, Chpt. 15, 'Security in a Free Society', Part 3.
Air date: Thursday, 10th Sep. 2020, 10 AM Pacific/US.1
He was primarily a messenger and clerk responsible for the distribution and circulation of documents within NSA. What was in these documents may not even have been entirely intelligible to him. But it didn't have to be. All Dunlap had to do was photograph them and make sure that the film reached the Soviet officer handling him. If Dunlap had lived, it is unlikely that he could have recalled more than a small part of the material he passed the Soviets.2
We talked yesterday about three kinds of problems in Dulles's3 Chpt. 15, 'Security in a Free Society': problems of information, problems of trust, and problems of survival. We focused on information problems, 'giveaways' and 'careless leaks'. Main points—unintended problems and problems of trustIf giveaways and careless leaks are your team's unintended information problems, contrived leaks (e.g. whistle-blowers, or press manipulation by group-internal competitors) and betrayals are intended information problems, which are, for your team, better described as trust problems: first picking whom you trust carefully, and second, hardening your team's valuables4, bulwarking, against betrayals—by temporary dissenters, and by permanent enemies.
Problems of trust—'contrived leaks' and betrayalsDulles's two problems of trust are distinguished by the motivations of the actors involved.
'Contrived leaks'—when the motivation is sub-group hostilityHere, the problem of trust is that even a group's friends or allies might see fit to strategically leak privileged information, perhaps for the good of the group directly, or perhaps because the friend or ally thinks their own standing should be higher for the good of the group, and so leaking serves both their own and the group's interests.
This is as much deterrence as hardening: the fewer the people, the harder a group is to compromise; but even if someone in the group has been inserted or turned, they now need to have an escape plan if they're going to leak anything.8
In terms of cases, he gives many. And more generally, he says: "Dunlap's case was one frequently encountered in intelligence history where an insignificant employee, of meager understanding and less education, performing menial tasks but located at a vulnerable point in the internal workings of a highly secret undertaking, can do as much damage as a top-ranking official."11
Lowenthal says this might be what happened with James Angleton after Kim Philby was exposed: "[T]he basic tendency within any intelligence organization (or any organization, for that matter) is to trust its own people, who have been vetted and cleared. They work with one another every day. Familiarity can lead to lowering one's guard or being unwilling to believe that one's own people may be disloyal…. But the alternative behavior—unwarranted suspicion—can be just as debilitating as having a spy in one's midst. James Angleton, who was in charge of the CIA's counterintelligence from 1954 to 1974, became convinced that a Soviet mole—a deeply hidden spy—had penetrated the CIA. Some believe that Angleton was reacting to the fact that his close British associate, Kim Philby, had turned out to be a Soviet agent. Angleton was unable to find the mole, and some believe that he tied the CIA in knots by placing virtually anyone under suspicion. Some suggested that Angleton himself was the mole….14
Compare Peter Grose on the idea of a 'mole': A relatively recent term, and mostly fictional: "The CIA—along with the rest of the world—never succeeded in penetrating the mind of Stalin, and did only marginally better with the Soviet leaders who succeeded him. Acquiring such intelligence would ideally require a 'mole,' a well-connected agent within the Kremlin who could accurately and confidently report out his findings. (The term 'mole' is a relatively recent addition to the lexicon of espionage. It was coined by the British novelist John le Carré.) Though such a boon sometimes appears in the history of intelligence, it generally belongs in the category of what Allen [Dulles] called 'story-book stuff.' "15
Information problems (careless leaks, giveaways) are different from trust problems (contrived leaks, betrayals), based on the intentions, and group memberships, of those involved. Everyone has selfish motives, and most have selfless motives (for the good of the group) as well. Money, ideology, compromise or coercion, and ego, can change motives. But even solving a particular trust problem case can lead to paranoia and profound dysfunction. Strategic intelligence is a world of inherent, complex problems, and any group trying to survive would seem to need subtle, if not complex, solutions to its strategic intelligence problems.
NextWe'll talk about survival, and the role of strategic intelligence generally, and spies in particular.
ReferencesCharney, D. L., & Irvin, J. A. (2016). A guide to the psychology of espionage. In Oleson (2016).
Dulles, A. (2016). The Craft of Intelligence. Lyons Press / Rowman & Littlefield. First published 1963. This edition copyright Joan Buresch Talley, daughter of Dulles. ISBN: 978-1493018796. Searches: https://www.amazon.com/s?k=978-1493018796 https://www.google.com/search?q=isbn+978-1493018796 https://lccn.loc.gov/2016017105 Different editions available at: https://archive.org/search.php?query=The%20Craft%20of%20Intelligence
Grose, P. (1994). Gentleman Spy: The Life of Allen Dulles. Houghton Mifflin. ISBN: 0395516072. Also available at: https://archive.org/details/gentlemanspylife00gros
Hersh, S. M. (2018). Reporter: A Memoir. Vintage / Penguin Random House. ISBN: 978-0307276612. Searches: https://www.amazon.com/s?k=978-0307276612 https://www.google.com/search?q=isbn+978-0307276612 https://lccn.loc.gov/2017051856
Lowenthal, M. M. (2020). Intelligence: From Secrets to Policy. CQ Press / SAGE Publications, 8th ed. ISBN: 978-1544358345. Searches: https://www.amazon.com/s?k=978-1544358345 https://www.google.com/search?q=isbn+978-1544358345 https://lccn.loc.gov/2019027254 Other editions available at: https://archive.org/search.php?query=Intelligence%3A%20From%20Secrets%20to%20Policy
Oleson, P. C. (Ed.) (2016). AFIO's Guide to the Study of Intelligence. Association of Former Intelligence Officers, 1st ed. Citations are of the pbk edition, ISBN: 978-0997527308. PDF edition available at: https://www.afio.com/40_guide.htm Retrieved 10th Sep. 2020.
Retraice (2020/09/11). Re5: Hints From Inside. retraice.com. https://www.retraice.com/segments/re5 Retrieved 22nd Sep. 2020.
Schneier, B. (2003). Beyond Fear: Thinking Sensibly About Security in an Uncertain World. Copernicus Books. ISBN: 0387026207. Searches: https://www.amazon.com/s?k=0387026207 https://www.google.com/search?q=isbn+0387026207 https://lccn.loc.gov/2003051488 Similar edition available at: https://archive.org/details/beyondfearthinki00schn_0
1Retraice works on the question 'What's going on out there?' Our point of departure is the concept of intelligence, which seems to have at least three kinds: natural, artificial, and strategic. Here, we're working on strategic intelligence.
2Dulles (2016) p. 249
3Dulles (2016)
4On 'valuables', cf. Hersh (2018) p. 208 on the CIA's 'family jewels'.
5Dulles (2016) p. 241par21.
6Dulles (2016) p. 238par12.
7Dulles (2016) p. 243.
8Cf. Schneier (2003) pp. 176-178 on the nature and efficacy of deterrence, including its inextricable link to education.
9See Retraice (2020/09/11) p. 3, 'Dulles Recap' point 4.
10Dulles (2016) p. 249par43.
11Dulles (2016) p. p. 249par45.
12Charney & Irvin (2016) p. 465.
13Dulles (2016) p. 250par48.
14Lowenthal (2020) p. 213.
15Grose (1994) p. 469.