Selected for publication in ORBIS Commanding Spies Winner … · 2018. 11. 1. · Commanding Spies...
Transcript of Selected for publication in ORBIS Commanding Spies Winner … · 2018. 11. 1. · Commanding Spies...
-
Selected for publication in ORBIS
Commanding Spies
by
Mr. Matthew A. Rose Defense Intelligence Agency
20
18 A
wa
rd W
inn
er
US
AW
C S
tud
en
t A
wa
rds
Pro
gra
m
Under the Direction of: Dr. Genevieve Lester
United States Army War College Class of 2018
DISTRIBUTION STATEMENT: A
Approved for Public Release Distribution is Unlimited
The views expressed herein are those of the author(s) and do not necessarily reflect the official policy or position of the Department of the Army, Department of Defense, or the U.S. Government. The U.S. Army War College is accredited by
the Commission on Higher Education of the Middle States Association of Colleges and Schools, an institutional accrediting agency recognized by the U.S.
Secretary of Education and the Council for Higher Education Accreditation.
-
REPORT DOCUMENTATION PAGE Form Approved--OMB No. 0704-0188 The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and
maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including
suggestions for reducing the burden, to Department of Defense, Washington Headquarters Services, Directorate for Information Operations and Reports (0704-0188), 1215 Jefferson Davis Highway, Suite
1204, Arlington, VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS.
1. REPORT DATE (DD-MM-YYYY)
01-04-2018
2. REPORT TYPE
STRATEGY RESEARCH PROJECT .33
3. DATES COVERED (From - To)
4. TITLE AND SUBTITLE
Commanding Spies 5a. CONTRACT NUMBER
5b. GRANT NUMBER
5c. PROGRAM ELEMENT NUMBER
6. AUTHOR(S)
Mr. Matthew A. Rose Defense Intelligence Agency
5d. PROJECT NUMBER
5e. TASK NUMBER
5f. WORK UNIT NUMBER
7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES)
Dr. Genevieve Lester
8. PERFORMING ORGANIZATION REPORT NUMBER
9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES)
U.S. Army War College, 122 Forbes Avenue, Carlisle, PA 17013
10. SPONSOR/MONITOR'S ACRONYM(S)
11. SPONSOR/MONITOR'S REPORT NUMBER(S)
12. DISTRIBUTION / AVAILABILITY STATEMENT Distribution A: Approved for Public Release. Distribution is Unlimited.
13. SUPPLEMENTARY NOTES
Word Count: 7,312
14. ABSTRACT
Technological advances in war continue, making once cutting-edge capabilities obsolete. The spy remains
an outlier. Historical accounts show the utility of spy networks to military commanders. These accounts
also reveal the innate tensions with commanding military spies. The military’s management of strategic
Human Intelligence (HUMINT) elements is a vexing issue. To understand the issue, exploring the tensions
between the profession of arms and HUMINT is fundamental. From this basic tension of professions, other
sub-tensions derive. Sub-tensions in command, authority, levels, and risk tolerance are observable in
historical and recent instances. Friction within the tensions routinely reduces the effectiveness of military
and intelligence elements. Past great-power conflict accounts highlight the friction points U.S. military
elements experienced. Looking forward there are three areas where friction reduction is required.
Research into the differences between the professional of arms and HUMINT and other tensions is lacking.
Next, strategic HUMINT elements and operations within the Department of Defense is an area lacking in
clear definitions. Not defining this area is fraught with risk if inaction continues. Finally, the processes used
to develop strategic HUMINT elements should be reconsidered.
15. SUBJECT TERMS
Command and Control, Intelligence, US Code Title 10, Title 50, Human Intelligence, Counterintelligence
16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT
UU
18. NUMBER OF PAGES
47 19a. NAME OF RESPONSIBLE PERSON
a. REPORT
UU b. ABSTRACT
UU c. THIS PAGE
UU 19b. TELEPHONE NUMBER (w/ area code)
Standard Form 298 (Rev. 8/98), Prescribed by ANSI Std. Z39.18
-
Commanding Spies
(7,312 words)
Abstract
Technological advances in war continue, making once cutting-edge capabilities
obsolete. The spy remains an outlier. Historical accounts show the utility of spy
networks to military commanders. These accounts also reveal the innate tensions with
commanding military spies. The military’s management of strategic Human Intelligence
(HUMINT) elements is a vexing issue. To understand the issue, exploring the tensions
between the profession of arms and HUMINT is fundamental. From this basic tension of
professions, other sub-tensions derive. Sub-tensions in command, authority, levels, and
risk tolerance are observable in historical and recent instances. Friction within the
tensions routinely reduces the effectiveness of military and intelligence elements. Past
great-power conflict accounts highlight the friction points U.S. military elements
experienced. Looking forward there are three areas where friction reduction is required.
Research into the differences between the professional of arms and HUMINT and other
tensions is lacking. Next, strategic HUMINT elements and operations within the
Department of Defense is an area lacking in clear definitions. Not defining this area is
fraught with risk if inaction continues. Finally, the processes used to develop strategic
HUMINT elements should be reconsidered.
-
Commanding Spies
Technological advances have altered the character of war throughout history.1
And while this is true of projectiles and armor, the spy is an outlier. The human element
of intelligence collection, commonly referred to as spies or espionage, is a unique
intelligence discipline. Unlike calibrated instruments that collect images or radio
frequencies, Human Intelligence (HUMINT) allows for the collection of information
inaccessible through other means.2 Although, spies are not without shortcomings. Since
the creation of the world’s second oldest profession, how to command and control
military spies has vexed commanders and historians alike. This is especially true for
those who do not offer immediate value to a theater or tactical commander. Spies who
seek strategic intelligence over operational intelligence are especially difficult to
command, direct, and integrate into military operations.
Commanding spies is paradoxical. A military commander will find themselves
attempting to control a seemingly immutable set of opposing forces. Given this fact, it
begs the question, how should the Department of Defense (DoD) manage the tensions
associated with commanding its strategic HUMINT capabilities? Examining this space
involves studying tensions. Tension, a physics term, describes the act of being
stretched by opposing forces.3 The term can also refer to mental or emotional strain on
an individual.4 Ironically, both explanations are fitting. For military commanders and
intelligence practitioners alike, navigating these tensions and reducing friction is
essential for success. “One spy in the right place is worth 20,000 men in the field,” an
idea attributed to Napoleon, summarizes the utility of a well-placed spy if the tensions
are reconciled.5
-
2
Historical examples provide insights and impacts of such perennial struggles
between operational commanders and HUMINT capabilities. The foundational tension
between the military and spies lies within the disparities in the professions. From this
foundation, subsequent tensions in command, authority, level, and risk tolerance are
apparent. Friction within these tensions occurs when influencing actors emplace
incompatible or restricting management frameworks between the opposing sides. One
size does not fit all.
This concept of tensions and friction is instinctive for Americans. The U.S.
system of government is built upon the idea of three equal parties that check and
balance one another. Removing the tensions should not be the goal; they are integral to
the design. Rather, understanding and identifying reoccurrences will assist with
managing and resolving current and future problems. Through this the DoD may
implement a system where natural tensions are expressed but managed properly by
governance, thus leading to superior outcomes.
Tension of Profession
The first tension with commanding spies is the most basic. This tension bridges
two distinct professions – HUMINT and arms. Intuitively, the United States accepts
spies are not Soldiers, Sailors, Airmen, or Marines. It is true military HUMINT collectors
are cross-trained in arms, but their primary job is not to perform routine military duties.
This relationship among professions is common to the military. Doctors, lawyers, and
engineers are other professions which have a similar relationship with the profession of
arms. However, HUMINT appears different from other vocations based on two
questions. Is HUMINT a profession and is it compatible with the profession of arms? On
-
3
compatibility consider the Peace Corps, an organization which states applicants
associated with intelligence need not apply.6
Professions are the creations of humans and fit in a specific societal role. The
study of professions is “ecological,” because they develop when society creates the
preconditions for them to exist.7 A profession provides autonomy of practice for its
members and may exclude non-members.8 As one profession grows and determines its
“jurisdiction” of practice, others interact to determine their corresponding places in
society.9 This idea describes a competition or tension among professions for jurisdiction.
John Burk, a prominent American military sociologist, relies on this definition, “a
relatively “high status” occupation whose members apply abstract knowledge to solve
problems in a particular field or endeavor.”10 He further explains the military is a
profession despite the field of sociology historically taking this for granted.11
Nations rely on their military professionals to defend their borders, respond to
disasters, and wage war. To accomplish this charge the profession of arms routinely
employs sanctioned violence. The profession of arms serves a specific purpose in the
international system of nations. Humans recognize this profession’s practice includes
the sanctioned termination of human life. This sets militaries apart from other
professions. On this point, societies hold militaries to a higher standard than other
professions.12
-
4
Figure 1. Sets of Enclosing the Profession of Arms13
Can the same be said for spies? A spy, colloquially, is “someone who is
employed by one nation to secretly convey classified information of strategic importance
to another nation.”14 The act of “spying” or using spies is referred to as espionage.15
There is little distinction between the collector and the source. Both are considered
“criminals,” if caught. Spying is almost universally a crime in all nations; each has their
own definition on what constitutes a spy.16 Conversely, almost all nations employ them
for their own benefit. Societies clearly have use for spies. While there is not one
standard definition of a spy, international norms were established to combat the idea,
one man’s soldier is another man’s spy. The international community remains firm on
distinguishing between spies and the armed forces.
Spies in the military are an enigma. They offer utility but erode the purity of the
law of war. In the Hague Regulations and Geneva Conventions, international law
-
5
recognizes that spies are different from lawful combatants.17 Therefore, combatants and
spies can be treated differently.18 Within the United States, President Abraham Lincoln
shared this view on the dishonest practice despite the Union Army’s employment of
spies. He issued General Order 100 – also known as the Lieber Code – which stated a
“spy is someone who secretly seeks information for the enemy and should be hung by
the neck regardless of their success in the endeavor.”19 Today, there is a general
international law consensus that spies are not afforded the same privileges afforded to
their military counterparts when captured by the enemy.20
Knowing that spies and soldiers are different – despite sharing similar
jurisdictions – does not de facto recognize military HUMINT as a profession. For this
point, the Central Intelligence Agency’s (CIA’s) John Cardwell presented a unique case
study for the management of spies. Cardwell contended the Holy Bible could offer
lessons on spy management for “One Nation, under God.”21 In the Old Testament, there
are two examples of the use of military spies by Israelite leaders. Moses chose twelve
prominent tribesmen to spy on Canaan. These amateurs were sent to live among the
Canaanites for forty days with the charge of determining whether Canaan was their
“Promised Land.” When the tribesmen reported back, they disagreed with each other
and lost their faith in God. This intelligence operation concluded poorly for ten of the
twelve - who were subsequently stoned to death. Adding to the intelligence failure, God
severely punished the Israelites for losing their faith.
The second example involved one of the surviving tribesmen. Joshua, who
became the Israelites leader. He chose his spies more carefully. In preparation for
entering the “Promised Land,” he selected two professionals to enter Jericho. Joshua
-
6
requested intelligence on the inhabitant’s attitudes in preparation for an military
operation. The story alludes to these spies using tradecraft to mask their movements
and send secret messages back to Joshua. The two spies discretely recruited assets
under Joshua’s authority. Unlike Moses’ management style, Joshua kept the details and
tasking of his spies hidden from prominent leaders and soldiers.
The historical accounts and veracity of details can be challenged, nevertheless,
the lessons they reveal are important. Cardwell succinctly underscores this when he
writes,
If there is a lesson to be learned, it would appear that a strong case is made for the conduct of spying activities in secret by professionals, unencumbered by other political or military responsibilities, and that these professionals should report in secret to higher authority who would make policy decisions without debate. Spies should definitely not participate in the policy-decision-making process, nor should they take their cases to the public. When that occurs, although stoning is passé, the people are likely to throw figurative rocks at the wrong people for the wrong reasons.22
Cardwell argues spying is an act best undertaken by a community of professionals who
are separate and distinct from general military duties.
Within the U.S. Intelligence Community (IC) and DoD the term “spy” is generally
not used to describe its workforce. The intelligence discipline that primarily uses
humans to collect information from other humans is HUMINT.23 Other military
intelligence elements or special operating forces can also be regarded as “spies,” under
international definitions or by adversaries. But “HUMINT practitioners” are most
analogous to spies. The DoD’s HUMINT field of practice consists of clandestine, overt,
and interrogation elements.24 The primary task of all within this field is to collect
intelligence. Endeavors that go beyond collecting intelligence are more akin to those
conducted by special operating forces or other elements, and thus not “spying.”
-
7
But the underlying question remains: is military HUMINT a profession? One could
argue HUMINT is not a “high status” occupation, but would be hard pressed to convince
others that HUMINT practitioners do not apply abstract knowledge to solve problems in
the endeavor of collecting intelligence.25 HUMINT is clearly a profession using most
accepted definitions of the term. Although the compatibility between the military and
HUMINT remains a contention.
The profession of arms and HUMINT are dissimilar despite both being vocations
of war. In the U.S. military, the profession of arms is, “a vocation comprised of experts
certified in the ethical application of land combat.”26 As further described by the 18th
Chairman of the Joint Chiefs of Staff, the profession is built through shared “knowledge,
skills, attributes, and behaviors.”27 The attributes of the profession of arms are starkly
different from those in HUMINT. The ethical behaviors and norms acceptable for
HUMINT collectors are generally unacceptable in military circles.
A clash of ethical norms and behaviors is evident. Consider the common flow of
information between service members. Within military circles, subordinates do not
withhold information from their commanders or staff. Withholding pertinent information
from superiors could be labeled insubordination. On the other the hand, HUMINT
collectors must operate with secrecy and discretion. Withholding source and other
information is normal practice, even between supervisors and their direct subordinates.
Internationally, the military is expected to remain in clear sight for all to see,
hence the uniforms. HUMINT professionals on the other hand do not.28 The interaction
and subsequent friction between members of opposing professions cannot be solely
attributed to differences in process, jurisdiction, or organizational structures. Rather it is
-
8
the strong undercurrents of distinctly different values and norms which influence those
members.
John P. Langan studied the moral damage associated with the profession of
intelligence collectors noting, “In intelligence agencies there is a general recognition that
the acquisition of intelligence from human sources requires deception and
manipulation.”29 Lieutenant General Vernon Walters, an adept military intelligence
officer with experience in the Central Intelligence Agency (CIA) and Defense
Intelligence Agency (DIA), explained, “Americans have always had an ambivalent
attitude towards intelligence. When they feel threatened, they want a lot of it, and when
they don’t, they regard the whole thing as somewhat immoral.”30 Members of
professions customarily place limits on what is acceptable and not. These limits are
routinely based on their corresponding codes of ethics. The Hippocratic Oath taken by
physicians is a manifestation of this idea. In intelligence, and HUMINT in particular, the
limits of practice are this: don’t get caught.31 A former DoD legal advisor, highlighted this
clash, “Intelligence operatives live in a dark and shadowy world, while military forces are
the proverbial knights on white horses. Advocates of military transparency want to
ensure the reputation of America’s men and women in uniform remains untarnished by
association with the shadowy world of espionage.”32 Both professions are controlled by
stringent laws and rules, but society views one as dishonest and the other as honorable.
These examples show military HUMINT members are influenced by a different
set of norms, ethics, and required skills than their general military counterparts. The
anecdotal differences are the friction points within the tension of profession.
Understanding there is a difference is useful when considering other sub-tensions.
-
9
Acknowledgment of the differences is not the same as concluding the profession of
arms and HUMINT should not be intermingled. The DoD must meld several professions
into its overall organizational structure to achieve success. Intermingling professions
into the military is a valid pursuit. But, the differences between HUMINT and arms are
the bedrock from which misunderstandings, opposition, and other tensions arise.
Sub-Tensions
Like house’s foundation, the tension of professions is the bedrock from which
other sub-tensions branch. On one side a tension is HUMINT and on the other, the
profession of arms. There are sub-tensions of command, authority, level, and risk
tolerance. These sub-tensions are apparent in historical and contemporary examples.
The historical examples show several tensions their frictions at play, but for simplicity
each was examined separately. Commonly, the friction occurring in the tensions are the
events or influencers that attempt to pull actors to an opposing side. There are other
unexplored tensions, but they too also branch from the tension of professions.
-
10
Figure 2. Tensions with Commanding HUMINT Framework 33
Tension of Command
The first sub-tension resides in military doctrine. The opposing sides in this
tension are command concepts adopted in doctrine, and the HUMINT practitioner’s
preferred modus operandi. Military command is hierarchical so their organizations and
management structures generally follow suit. On the other side, strategic HUMINT
collectors prefer flexibility and the ability to use discretion due to the inherent
uncertainties within their field of practice. To examine this tension one must understand
military command concepts and their purpose, and how these concepts can clash with
HUMINT’s modus operandi.
-
11
Military command and control (C2) refers to exercising authority and direction of
forces to complete a task.34 C2 is innate for all U.S military members; it permeates
throughout all levels of military culture, doctrine, and policy.35 There are slight definition
differences among the military services, but the idea applies to all. Joint Doctrine
bridges the differences. This doctrine applies to all military services; therefore it
provides the widest applicability for this examination. The Marine Corps and Army
doctrine also provide useful insights into this topic, undoubtedly because the business
of spying and land combat both occur where people live.
The modern view is C2 and unity of command are inseparable. Unity of
command is a concept that traces back to General John J. Pershing during World War I.
General Pershing found it difficult to apply combat power in a multinational command
structure where different commanders were equal.36 Command unity describes how no
military force has two or more commanders who exercise the same type of relationship
over them. To achieve this unity, a force should have only one commander empowered
with the requisite authority. This concept is fundamental and necessary for optimal
combat operations according to military doctrine and experts.37 Unity of command is a
military principal that compliments others such as mass, offense, and maneuver.38
Today, command authority from a higher to a lower commander is delegated
through command and support relationships. The transfer of command authority and
forces is sometimes restricted. For example, United States Code (USC) Title 10,
Section 164, prohibits the delegation or transfer of Combatant Command authority,
except by the President or Secretary of Defense (SECDEF).39 While restrictions remain,
-
12
the overall framework for command and support relationships ensure unity of command
can be achieved.
When unity of command is not possible – usually because of inadequate
authorities - unity of effort is described as next best. Unity of effort is defined as, “forces
under different commands coordinating and cooperating to achieve a common
objective.”40 Unity of effort describes how commanders at an equal level, or non-military
interagency partners, support one another in the pursuit of an objective, goal, or
mission. Recent doctrine suggests that unity of effort is only guaranteed through unity of
command. The “if this then that” statement is communicated in doctrine, “attaining unity
of effort through unity of command…may not be politically feasible, but it should be a
goal,” and “unity of command is central to unity of effort.” 41 This premise is important for
understanding the difficulty with commanding HUMINT. The premise leads to the
following argument, HUMINT forces can best support a theater commander if they are
under the same chain of command.
A thought experiment can show how this premise creates a tension of command
and subsequent friction. HUMINT practitioners are generally expected to operate as
singletons or in small groups. Militaries are generally most effective when massed into a
unified force.42 Military commanders are normally given areas of responsibility. At the
highest command level below the SECDEF, Geographic Combatant Commanders are
given missions and geographic boundaries to conduct operations.43
-
13
Figure 3. Areas of Responsibility (AOR) for Geographic Combatant Commanders 44
Strategic HUMINT’s ability to gather intelligence is not limited by the
commander’s priorities or geographic area the collectors may find themselves in.
Collectors are safer and operations are more permissive in areas where adversarial
control is limited. For example, an American collector, operating against the military in
North Korea a risky endeavor. It is often the case, particularly in strategic collection, that
the opportunity to collect against the primary target occurs somewhere in the world. This
is why interrogating suspected terrorists at Guantanamo Bay offers a more permissive
environment. In both cases, the commanders in the permissive environments have
higher theater priorities than North Korea or outside terrorist groups.
-
14
Using the doctrinal command and support relationships, HUMINT elements
prefer to be in general or direct support to local commanders. This provides the element
increased flexibility necessary to operate. Commanders, although, are advised to seek
unity of command so they pursue command relationships like Operational Control
(OPCON). This relationship restricts the element’s ability to operate within the
commander’s AOR.
The tension of command is a creation of our own design. C2, unity of command,
and associated frameworks serve a purpose for managing military forces. However,
select activities suffer from a broad-brush approach. Strategic HUMINT elements and
their operations suffers when command relationships restrict an element’s flexibility and
movement. Joint Doctrine does not prohibit the SECDEF, defense agencies, or
Geographic Combatant Commanders figuring out how to achieve command across-
AORs. U.S. adversaries do not limit their operations based on U.S. AOR boundaries,
therefore it makes little sense that we should engage in such self-limiting behavior when
pursuing intelligence against these very same adversaries. The idea that strategic
HUMINT is akin to general land forces, who can be neatly organized and positioned
within the sight of a commander is itself the tension.
Tension of Authority
The second sub-tension involves the authorization behind HUMINT and military
operations. Andru Wall succinctly framed this tension when he wrote, “the law permits
while Congress attempts to restrict.”45 The authority to conduct all military operations
stems from executive branch powers and law. The framers of law influence executive
power and the authority to conduct operations by adding restrictions. The merits of each
-
15
legal restriction are irrelevant. Understanding that legislatures influence how military and
HUMINT operations can be conducted, and by whom, is germane.
Looking back, it appears the first Commander-in-Chief, General George
Washington, understood this tension. He was commissioned as the Commander-in-
Chief of the Continental Army in June 1775.46 For the management of war Congress
provided General Washington with the “full power and authority to act as you shall think
for the good and welfare of the service.”47 He clearly wielded power and authority over
the armed forces, and like many prominent generals before him, he understood the
utility of spies.48
The British military chief of intelligence in the colonies, Major George Beckwith,
noted after the war, “Washington did not really outfight the British, he simply outspied
us.”49 General Washington conceived a human-centric intelligence system and left the
management to skillful officers like Benjamin Tallmadge. 50 Washington not only created
his own network of strategic spies, he understood the risks associated with intelligence
operations supporting the military.51
The necessity of procuring good Intelligence is apparent & need not be further urged--all that remains for me to add, is, that you keep the whole matter as secret as possible. For upon Secrecy, Success depends in most Enterprizes of the kind, and for want of it, they are generally defeated, however well planned and promising a favourable issue. I am Sir Yr Most Obedt servt Go: Washington.52
Washington’s authority to conduct the war did not fully extend into all areas like
strategic diplomacy and espionage. The Second Continental Congress created Secret
Committees, “for the sole purpose of corresponding with our friends in Great Britain,
Ireland, and other parts of the world.”53 The Continental Congress Intelligence
-
16
Committee corresponded with General Washington to synchronize the military’s efforts
with those areas retained by Congress.54
Quite a lot has changed since 1775, but not Congress’s view on spying and their
control of funding. As noted, the overall authority used by the military nests with the
powers of President of the United States. Authority is the underlying foundation of
command; it provides legitimacy, and characteristically follows a hierarchical structure.55
Thus, a military commander’s authority is not limitless. The executive branch also does
not have limitless authority, due to congressional oversight and dynamic changes in
law. USC Title 10 provides the SECDEF with the “authority, direction, and control over
the Department of Defense.”56 All DoD military and intelligence operations stem from
USC Title 10 or other delegated authorities.57
Unpacking the authority, congressional restrictions on organizational roles,
funding, and oversight become readily apparent. Legal code additions and restrictions
add ambiguity, nevertheless, the three pertinent statutes for Defense HUMINT are; USC
Title 10 Armed Forces, USC Title 50 War and National Defense, and Executive Order
12333, as amended. USC Title 50 and Executive Order 12333 provides the SECDEF
with a redundant authority stream, funding, and oversight outside of Title 10. Under this
supplementary stream, SECDEF and select defense agencies are provided the
authority to conduct intelligence activities within the National Intelligence Program
(NIP).58 The NIP includes IC members, and excludes the activities conducted by military
departments or Combatant Commands for planning and executing tactical military
operations.59 Operations conducted within the NIP fall under the oversight of the House
and Senate Intelligence Committees.60
-
17
The same statutes also provide guidance to focus the activities of DoD HUMINT
collection elements. EO 12333 states military services shall collect intelligence for
departmental requirements and national requirements as appropriate. EO 12333 also
states the DIA is charged with “collecting information to support national and
departmental missions with the tasking of the Under Secretary of Defense for
Intelligence, Chairman of the Joint Chiefs of Staff, Combatant Commanders, and other
components and agencies.”61
These statues created leanings for DoD organizations and their HUMINT
elements. Despite the law stating the SECDEF can use any DoD element to accomplish
his tasks, Geographic Combatant Commands are generally precluded from expending
NIP monies because they are not IC members. IC membership is defined in USC Title
50 and EO 12333.62 On the other hand, the DIA and Special Operations Command
(SOCOM) are not limited by this restriction.
Table 1: Organizational Lean for HUMINT Based on Authorities 63
Organization Title 10 Title 50
Military Services X
Defense Intelligence Agency X
Geographic Combatant Commands X
Joint Task Forces within Combatant
Commands X
U.S. Special Operations Command X X
-
18
Title 10 and 50 authorities arguments routinely gloss over the fact that the
SECDEF maintains control and direction of all DoD HUMINT. This power can only be
limited by the President.64 The compartmentalization, organizational leanings, and
subsequent funding authorizations with oversight, are congressional limitations on
executive powers. It is not the authorities that produce the tension, but rather the age-
old separation of powers among the legislative and executive branches of government.
Tension of Levels
The third sub-tension occurs between the levels of war and intelligence. To begin
to understand this tension, one should put themselves in the shoes of a World War II
soldier. This soldier, dug in on the forward line of troops, does not necessarily care
about the enemy’s strategic stocks or manufacturing capability. This soldier is worried
about what is over the next hill.65 This illustration describes how intelligence
requirements vary in different levels of war.66 While the levels of war and intelligence are
extensively defined in doctrine, the levels of HUMINT operations and the elements who
conduct them are not. This immaturity and difficulty with defining HUMINT operations
and elements as strategic, operational, or tactical causes friction between collectors and
commanders.
-
19
Figure 4. Levels of Warfare 67
Sherman Kent, often referred to as the father of intelligence analysis, described
the differences in intelligence levels noting in 1949, “the words “high-level” are there to
exclude what is called “operational” intelligence, tactical intelligence, and the
intelligence of small military formations in battle known as combat intelligence.”68 Kent
postulated there were levels of intelligence in both war and peacetime. Today, military
and intelligence professionals understand this idea when they discuss the three levels
of intelligence; strategic, operational, and tactical. The levels of intelligence share the
same names as the levels of warfare.69
-
20
Table 2. Levels of Intelligence and Consumers.70
Level of Intelligence Definition Likely Consumers
Tactical Intelligence Intelligence required for the planning and conduct of tactical operations.
Tactical Commanders, Units, & Elements.
Operational Intelligence Intelligence that is required for planning and conducting campaigns and major operations to accomplish strategic objectives within theaters or operational areas.
Joint Task Forces, Combatant Commanders, & Campaign Planners
Strategic Intelligence Intelligence required for the formation of policy and military plans at national and international levels.
President, SECDEF, Congress, Military Service Secretaries, Policy Makers, and Combatant Commanders
By definition, the intelligence levels are differentiated by the finished product and
intended consumer. Strategic intelligence aligns with the strategic level of war. What is
missing is pivotal. The intelligence operations and associated elements are absent in
the definitions. The DoD does not define “strategic intelligence operations,” or “strategic
HUMINT elements.”
A partial reason for this is the non-standardized intelligence collection process.
Strategic intelligence is not solely collected in strategic operations or by strategic
elements. A tactical collector could gather intelligence that fulfills a knowledge gap for a
policy maker, albeit, this example is the exception rather than the rule. It is generally
understood certain elements and operations yield different values of intelligence.
Counterpoints to this idea rely on anecdotes to show the uncertain nature associated
with collection. But collection is not a trivial pursuit; collectors generally understand the
-
21
type of intelligence that may result from their operations. They also have the discretion
on the type of sources they approach.
Consider military attachés. They are regarded as an overt collection element
among international military circles.71 The type of information these attachés are
expected to collect leans toward the strategic side, but this does not preclude them from
collecting tactical or operational information.72 Attachés must maintain a set of highly
specialized cultural, language, and tradecraft skills to successfully serve in their posts.
They also operate under a unique chain of command. In the U.S. military system,
attachés are not beholden to subordinate commanders, rather to the Chief of Mission.73
Their specialization, unique chain of command, and focus on strategic intelligence infers
they are a “strategic element.” This is not the case for all military HUMINT elements.
While the title of some DoD HUMINT elements denote they are part of a “strategic
element” – strategic debriefer for example- they routinely support operational or tactical
intelligence requirements.74
The separation of strategic assets is not novel. Outside of intelligence, the DoD
determined the nuclear weapons triad remains a strategic military capability. 75 The
triad’s C2, operations, and capabilities are unique compared to other operational and
tactical elements. The triad still serves a critical role in the DoD despite their separation
from regular military elements.
Another military idea useful for understanding this tension is reconnaissance
push and pull. This concept is found in Marine Corps doctrine. Push explains when a
commander knows his foe and requires intelligence to support operations. Pull is used
when knowledge of the enemy or terrain is lacking and a commander has not yet
-
22
committed to a plan.76 This idea may appear to be useful for tactical or operational
levels of war, but the Romans offer another historical lesson. Julius Caesar cataloged
his use of spies during his time as a supreme military commander. These accounts
survive today in his Bellum Gallicum texts, wherein, Caesar personally questioned
merchants, prisoners of war, and his legates for intelligence purposes. He also
managed his own network of professional spies to supplement overt means. These
professionals were prominent Romans such as, Volsenus, and a cadre of clandestine
operatives called the Speculatores. This array of human sensors provided Caesar with
an understanding of foreign people, terrain, and political-military dynamics for his own
military purposes.77
Analysis of Bellum Gallicum suggests human-derived intelligence was pivotal to
Caesar’s campaigns. The importance of this type of intelligence cannot be overstated.
A.C. Bertrand astutely noted, “Caesar adjusted his military goals to the amount of
intelligence available rather than gathering the intelligence relevant to his military
objectives.” This idea rivals common understanding of the use of intelligence as an
ancillary tool for commanders.78
When Caesar allowed his HUMINT capabilities to operate in a pull mode, he
surrendered partial control and the ability to direct these assets. This mode enabled his
strategic HUMINT forces to operate more freely than others. This freedom was not
required or given to all of his forces. Only those who required this maneuver space to be
successful, and had the requisite skills, were afforded this luxury.
The DoD does not define a strategic equivalent to Caesar’s Volsensus. Instead
all HUMINT elements are considered the same because they are defined as such. The
-
23
military intelligence and HUMINT communities may differentiate select operations as
more sensitive than others, but this falls short of defining operations and elements as
“strategic.” Definitional gaps leave the analysis and judgement to a case by case basis,
thus causing friction among actors. Because differentiation between strategic and other
HUMINT elements is not explicitly stated, military commanders tend to view all
capabilities as potential available forces. At best, military commanders seek more
capable units to support their operations. At worst, military commanders limit HUMINT
collector’s freedom of movement who are operating in their AORs and possibly against
targets above their respective levels of war.79
Tension of Risk Tolerance
The final sub-tension with commanding spies is risk tolerance. Intelligence
gathering is a risky business. When military intelligence operations are compromised,
the impacts can be calamitous. Risk is seemingly well understood in military circles. A
joint staff officer stated, “risk is the most important dialogue there is [in the DoD]. Either
you can [achieve objectives] or you can’t.”80 But, this risk assessment is incomplete and
does not adequately fit HUMINT. Compromises and attribution are generally not
factored into military risk assessments in the way they are for HUMINT. Despite recent
expansions, joint doctrine’s risk discussions still gather around the probability of not
reaching an objective.81 The risks associated with an operation going awry and
subsequent implications are often misunderstood. Risk tolerance, usually an investment
term, refers to one’s “ability to tolerate something”, or “the limit of enduring a force.”82
Both definitions are useful for this tension. This tension explores how commanders
tolerate risks, except the implications of a compromise shift and exceed their, or even
their higher commander’s, risk limits.
-
24
For the DoD, risk is visualized as the force between an organization’s strategy
and its objectives. Plainly put, risk is uncertainty. Assigning ownership to risk is a tricky
endeavor. Past DoD risk studies concluded ownership is ambiguous and often
misunderstood. Operational commanders are expected to describe, identify, assess,
and communicate their risk to higher-level commanders. Thusly indicating, risk
ownership flows upward along the chain of command. The overall risk owner for military
operations is the Commander in Chief. The Office of the President may statutorily own
all military risk, but it is the citizens who elect the President, partially by assessing and
inferring the candidate’s risk tolerance. 83
Figure 5. The Lykke Model: Strategy Stool.84
Tolerance and ownership are two altogether different things. One commander’s
personal tolerance varies from the next. A commander’s tolerance is also influenced by
environmental factors. One’s tolerance could be higher when their forces are in war
versus a peacetime environment. Peacetime commanders are presumably less tolerant.
-
25
Risk tolerance in the HUMINT discipline is no different. However, what is unique to
HUMINT is the shifting ownership and ability to forecast compromising effects.
When a HUMINT operation begins there might be a knowable and manageable
amount of risk. Regardless of the operation type, overt or clandestine, personal and
operational risk changes overtime. HUMINT operations generally take time to develop.
Interrogations or development of clandestine sources can be prolonged. Unique to
HUMINT is when a seemingly tactical operation could fail and thrust parties into a
conflict or cause the failure of a battle.
When military risk exceeds a commander’s tolerance and ownership limits, the
higher commander must approve. In HUMINT, an expected operational failure could be
the compromise of a source and or loss of a collector. The commander may still
approve the HUMINT operation. However, an event that causes national
embarrassment or congressional inquiry would have precluded the operation from
occurring. This describes a tolerance mismatch and tension.
-
26
Figure 6: Risk Tolerance Framework for HUMINT
A recent illustration of this are the congressional investigations on DoD and CIA
detainment and interrogation abuses.85 Secretary of Defense Rumsfeld testified before
both Armed Services Committees regarding the abuse in Abu Ghraib prison.86 Later, the
Senate Intelligence Committee concluded its investigation on CIA’s interrogation
program. Upon full declassification, the allegations, details, and findings were
intolerable for the U.S. population.87 Subsequent restrictions were emplaced on the
DoD. Congress then levied the requirement to videotape DoD “strategic intelligence
interrogations” in the 2010 National Defense Authorization Act.88 The DoD and IC
members were required to conform to the law and changed their policies to respond.89
In this case, when the detainment and interrogations began, the risk tolerance
was within assessed limits. The American public generally had a positive view of
-
27
coalition operations based on media portrayals and service member accounts. The risk
mismatch was initially realized once the detainment abuses were published throughout
international media outlets. Congress responded. The U.S. population’s tolerance was
further reduced once the details were released in declassified reports. The DoD,
Congress, U.S. population and host nation are just a few groups who had a lower
tolerance post event than they did pre-event. Those savvy within the Washington
Beltway commonly refer to this phenomena as the “Washington Post Test.”90 The test
explains how the tolerance of groups is constricted in compromises. Other examples of
compromises, failures, and embarrassments are littered in the media and outside of
classified channels.
-
28
Figure 7. Risk Tolerance Fluctuations Model 91
Few HUMINT operations are compromised. When compromises occur, not all
will have strategic impact. Some do. The select operations that carry high strategic risk
and are conducted and managed by lower echelons are mismatched. Additionally, when
select commanders experience past HUMINT failures, this can create a lower personal
tolerance for accepting HUMINT-related risk. Intelligence, and HUMINT in particular, is
a risky proposition. Collectors pursuing intelligence for national purposes will indubitably
share spaces where tactical and operational level operations occur. Not allowing
HUMINT elements to operate because of risk, indubitably restricts the operations and
blunts the capability’s effectiveness. EO 12333 lays out a framework for the IC –
supported by all federal departments and agencies – to provide intelligence for “the
protection of the United States national interests from foreign security threats.”92.
-
29
Figure 8. Example of an Alleged Compromise Reported to the United Nations 93
A Look Back
The tensions of profession, command, authority, levels and risk are apparent in
historical examples. A useful example for viewing all the tensions involves the Office of
Strategic Services (OSS) during World War II.
Colonel William Donovan, the presidentially designated “Coordinator of
Information (COI)” who was disinclined to serve as an intelligence officer, addressed a
convincing letter to President Franklin D. Roosevelt (FDR) on the importance of the
Philippines. His letter to the Commander in Chief urged U.S. military action in the
Philippines and requested, “…that I be permitted to serve with this force in any combat
capacity.”94 The Chief of Staff for the War Department, General George C. Marshall,
-
30
responded, “Your request for service in a combat capacity is typical of you [William
Donovan], I will watch for a suitable assignment in that area, and will call call [sic] on
you as soon as it develops.”95 That was not to be, instead he soon found himself the
director of the nation’s first centralized intelligence agency. FDR, in part based on the
advice of British Prime Minister Winston Churchill, found a suitable assignment for
Director Donovan, leading a dedicated agency focused on intelligence and clandestine
and covert operations.96 Formed from hand-me-down units disregarded by the military
services, one of OSS’s inherited missions was espionage.97
The OSS, a nascent intelligence organization, was still technically a military
organization. Despite his formal military rank, Donovan was considered by fellow
officers to be a civilian.98 The tension of control over the organization was widespread.
The COI answered to FDR, but the OSS was administratively placed under the Joint
Staff. Outside of Washington DC, the Secret Intelligence (SI) elements – the espionage
arm of OSS- were controlled by OSS officers with the oversight of the chiefs of
diplomatic missions or the theater military commander. These SI elements were
focused on collecting what would modernly be referred to as national HUMINT, instead
of military HUMINT. A declassified OSS field manual shows this bifurcated command
and control and focus.
It is essential that SI cooperate closely with the armed forces both in Washington and in theaters of operations. In Washington, liaison is maintained between the Military Intelligence Division (MID) and SI on a reciprocal basis in order to insure a free and rapid interchange of appropriate intelligence. Similar arrangements exist with the Office of Naval Intelligence (ONI) and Air Intelligence (A-2). In theaters of operation, the coordination of SI activities with the armed forces is still more complete, since all OSS operations come under the direct control of the theater commander.
-
31
Although combat intelligence does not normally come within the province of SI, SI organizations in theaters of operations may at times be called upon to assist in the collection of this type of intelligence. However, SI should not engage in the collection of combat intelligence unless specifically requested to do so by the theater commander.99
The tension over who controlled and directed SI collection was fierce. FDR and
senior military commanders understood the necessity of strategic intelligence. On
command relationships, G.C. Marshall and Eisenhower recommended to FDR the
COI/OSS be under the Joint Chiefs of Staff (JCS). Once there, the Army did not
approve of its officers conducting espionage and covert actions. To assuage this
concern, Eisenhower thought these operations should “be conducted by individuals
occupying a civilian rather than a military status.”100 Once under the JCS and until the
OSS was disestablished, the tension between collecting strategic and military combat
intelligence was evident.
Figure 9. Declassified OSS Planning Process for Military Operations.101
Firsthand accounts from OSS officers who served in Northern Africa, Sicily, Italy,
and Burma describe this tension.102 In Operation TORCH and HUSKY, OSS officers
admitted, “[the OSS agent’s] appalling ignorance of military matters,” and “the traditional
intelligence services such as “G-2, Counterintelligence Corps (CIC), and the office of
-
32
Naval Intelligence (ONI) often displayed open hostility toward the OSS because they did
not understand its work and its true objectives.”103 The new organization had to prove its
value to the JCS and war effort. Instead of focusing on the strategic intelligence – the
area they were arguably better fit to gather- the OSS focused on collecting military
intelligence to support the amphibious landing in Africa.104 Looking back, the OSS’s
efforts supporting this operation were faulty. The collection and analysis did not
represent the ground truth and the allied landings were contested. The Allied landing
operation was a success, but the intelligence collected and assessments provided by
OSS did not accurately display the armed opposition. Historians note Marshal Pétain
and the French Vichy waged a fierce resistance against Allied landing forces, causing
bloodshed on both sides.105
Despite this initial failure, the OSS was able to provide valuable strategic
intelligence to FDR, British Allies, and General Eisenhower in an environment of
conflicting personality issues.106 While military intelligence was not necessarily their
forte, examples like Detachment 101 in Burma, displayed how intended strategic
intelligence units did provide valuable intelligence to theater and operational
commanders.107
This significant historical example clearly embodies the tensions inherent in
commanding spies. The places, names and dates are different today, but the same
arguments continue in national security circles in both Washington and in theaters
around the world.
Looking Forward
As noted, identifying and understanding the tensions with commanding spies is
the first step to effective management. But just as great powers clashed during WWII,
-
33
the same may occur in the future.108 To prepare for the future, understanding the
tensions and implementing policies to restrict friction is imperative. Otherwise, the
military is choosing to enter a conflict with one arm tied behind its back.
Further study of the tensions and friction points is required. This examination
briefly surveys select areas where the military and HUMINT are strained. Tensions of
support, communication, benefits for members, and talent management are other
notable areas. Developing a more in-depth understanding on the tensions for similar
fields like counterintelligence and special operations is also a noble pursuit.
Understanding the tensions and friction supports productive interactions with outside
parties like Congress, the IC, and legal circles.
Next, defining strategic HUMINT operations and elements is imperative. National
HUMINT was codified by the Director of National Intelligence in policy. The DoD is an
important member of the “national HUMINT capability,” and already provides highly
capable collectors to de facto national elements.109 An example of this is the High-Value
Detainee Interrogation Group (HIG). According to DoD HIG policy, the group is
responsible for the interrogation of high-value persons in DoD custody, who are
presumably of national interest. 110 The HIG, military attachés, and other DoD HUMINT
elements are examples of “strategic HUMINT elements.” There remains a definition gap
at the DoD-wide level. This definitional gap and the compounding effect of the
disestablishment of the Defense Counterintelligence and HUMINT Intelligence Center
(DCHC) is causing friction between military services, IC members, and combatant
command intelligence staffs.111 A definition could be coordinated across the DoD
HUMINT enterprise and then incorporated into policy. Not taking action opens risk for
-
34
outside elements like the IC, and Congress, who are already creating definitions in
policies and law. Congress created the term “strategic intelligence interrogation,” in the
National Defense Authorization Act for fiscal year 2010. There are definition threshold
gaps in what is strategic and what is not.112 Technological cyber advancements in the
operating environment and risks of inaction predicate a need for this change.
Also, building a strategic HUMINT force is necessary to operate in both
peacetime and conflict environments. The HUMINT discipline is different than other
non-human capabilities. Yet, HUMINT collectors are sensors and expected to operate
as designed and directed. Strategic and operational HUMINT elements will certainly
require more advanced training and skills than their tactical counterparts. Unfortunately,
the DoD routinely builds its HUMINT forces using a personnel readiness model verses
an acquisition model for things like aircraft carriers or firearms. The acquisition process
for material capabilities is stringent but ensures requirements are paired with deliverable
capabilities. Military attachés, HIG members, and clandestine case officers are just a
few examples where filling two-thirds of the necessary requirements could seriously
hinder operations. The necessary skills in a technologically advancing and more
dangerous operating environment are expected to broaden. Ensuring strategic and
operational HUMINT elements are funded, built, and their talent managed appropriately
is more crucial now than ever.
Endnotes
1 Caleb Carr, comp, The Book of War: Sun-Tzu The Art of War & Karl Von Clausewitz On War (New York: The Modern Library, 2000), 264-265, 445-446.
2 Norman B Imler, “Espionage in an Age of Change: Optimizing Strategic Intelligence Services for the Future,” in Intelligence and the National Security Strategist, Roger Z. George and Robert D. Kline, eds. (Lanham, MD: Rowman & Littlefield, 2006), 217.
-
35
3 Merriam-Webster, “Online Dictionary, Tension,” https://www.merriam-
webster.com/dictionary/tension?utm_campaign=sd&utm_medium=serp&utm_source=jsonld (accessed February 16, 2018).
4 Ibid.
5 Robert G. Folsom, The Life and Mysterious Death of Ian Mackintosh: The Inside Story of the Sandbaggers and Television’s Top Spy (Dulles, VA: Potomac Books 2012), https://books.google.com/books?id=TjG1-Uh_J4EC&pg=PT38&lpg=PT38&dq=napoleon+quote+a+spy+in+the+right+place+is+worth+20000+soldiers&source=bl&ots=lzA3KHC4k_&sig=ReRN2fmJ0Uw-vhArDxNxhde52WY&hl=en&sa=X&ved=0ahUKEwjgjaCYjobZAhWN7VMKHZAYDHAQ6AEIRzAH#v=onepage&q&f=false (accessed February 16, 2018).
6 Peace Corps, “Eligibility,” https://www.peacecorps.gov/about/agency-jobs/eligibility/ (accessed March 23, 2018).
7 Paul DiMaggio, “Review of The System of Professions: An Essay on the Division of Expert Labor by Andrew Abbott,” American Journal of Sociology, 95, no. 2 (1989): 534-535, https://www.journals.uchicago.edu/doi/10.1086/229319 (accessed May 29, 2018).
8 U.S. Army War College, Academic Year 2018 Carlisle Scholars Program Strategic Leadership Directive (Carlisle, PA: July 6, 2017), 25.
9 DiMaggio, “Review of the System of Professions,” 534-535.
10 James Burk, “Expertise, Jurisdiction, and Legitimacy of the Military Profession,” in The Future of the Army Profession, 2nd ed., Lloyd J. Matthews, ed. (New York: McGraw-Hill, 2005), 41.
11 Ibid., 44-47.
12 John Mark Mattox, “The Moral Foundations of Army Officership,” in The Future of the Army Profession, 2nd ed., Lloyd J. Matthews, ed (New York: McGraw-Hill, 2005), 390-392.
13 Ibid., 390.
14 Merriam-Webster, “Online Dictionary, Spy,” https://www.merriam-webster.com/dictionary/spy (accessed February 16, 2018).
15 Merriam-Webster, “Online Dictionary, Espionage,” https://www.merriam-webster.com/dictionary/espionage (accessed February 16, 2018).
16 International Committee of the Red Cross, “International Humanitarian Law, Customary Law,” https://ihl-databases.icrc.org/customary-ihl/eng/docs/v2_rul_rule107 (accessed February 16, 2018).
17 Ibid.
https://www.merriam-webster.com/dictionary/tension?utm_campaign=sd&utm_medium=serp&utm_source=jsonldhttps://www.merriam-webster.com/dictionary/tension?utm_campaign=sd&utm_medium=serp&utm_source=jsonldhttps://books.google.com/books?id=TjG1-Uh_J4EC&pg=PT38&lpg=PT38&dq=napoleon+quote+a+spy+in+the+right+place+is+worth+20000+soldiers&source=bl&ots=lzA3KHC4k_&sig=ReRN2fmJ0Uw-vhArDxNxhde52WY&hl=en&sa=X&ved=0ahUKEwjgjaCYjobZAhWN7VMKHZAYDHAQ6AEIRzAH#v=onepage&q&f=falsehttps://books.google.com/books?id=TjG1-Uh_J4EC&pg=PT38&lpg=PT38&dq=napoleon+quote+a+spy+in+the+right+place+is+worth+20000+soldiers&source=bl&ots=lzA3KHC4k_&sig=ReRN2fmJ0Uw-vhArDxNxhde52WY&hl=en&sa=X&ved=0ahUKEwjgjaCYjobZAhWN7VMKHZAYDHAQ6AEIRzAH#v=onepage&q&f=falsehttps://books.google.com/books?id=TjG1-Uh_J4EC&pg=PT38&lpg=PT38&dq=napoleon+quote+a+spy+in+the+right+place+is+worth+20000+soldiers&source=bl&ots=lzA3KHC4k_&sig=ReRN2fmJ0Uw-vhArDxNxhde52WY&hl=en&sa=X&ved=0ahUKEwjgjaCYjobZAhWN7VMKHZAYDHAQ6AEIRzAH#v=onepage&q&f=falsehttps://books.google.com/books?id=TjG1-Uh_J4EC&pg=PT38&lpg=PT38&dq=napoleon+quote+a+spy+in+the+right+place+is+worth+20000+soldiers&source=bl&ots=lzA3KHC4k_&sig=ReRN2fmJ0Uw-vhArDxNxhde52WY&hl=en&sa=X&ved=0ahUKEwjgjaCYjobZAhWN7VMKHZAYDHAQ6AEIRzAH#v=onepage&q&f=falsehttps://books.google.com/books?id=TjG1-Uh_J4EC&pg=PT38&lpg=PT38&dq=napoleon+quote+a+spy+in+the+right+place+is+worth+20000+soldiers&source=bl&ots=lzA3KHC4k_&sig=ReRN2fmJ0Uw-vhArDxNxhde52WY&hl=en&sa=X&ved=0ahUKEwjgjaCYjobZAhWN7VMKHZAYDHAQ6AEIRzAH#v=onepage&q&f=falsehttps://www.peacecorps.gov/about/agency-jobs/eligibility/https://www.journals.uchicago.edu/doi/10.1086/229319https://www.merriam-webster.com/dictionary/spyhttps://www.merriam-webster.com/dictionary/spyhttps://www.merriam-webster.com/dictionary/espionagehttps://www.merriam-webster.com/dictionary/espionagehttps://ihl-databases.icrc.org/customary-ihl/eng/docs/v2_rul_rule107
-
36
18 A. John Radsan, “The Unresolved Equation of Espionage and International Law,”
Michigan Journal of International Law, 28, Issue 3, 595 (2007): 599-607, https://repository.law.umich.edu/mjil/vol28/iss3/5/ (accessed May 29, 2018)
19 Yale Law School, “General Orders No.100: The Lieber Code,” http://avalon.law.yale.edu/19th_century/lieber.asp#art88 (accessed February 16, 2018).
20 International Committee of the Red Cross, “International Humanitarian Law, Customary Law,” https://ihl-databases.icrc.org/customary-ihl/eng/docs/v2_rul_rule107 (accessed February 16, 2018).
21 John M. Cardwell, “A Bible Lesson on Spying (Declassified 1978),” Studies in Intelligence, (Fall 1978), https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/index-of-declassified-articles/index-of-declassified-articles-by-author.html and http://southerncrossreview.org/44/cia-bible.htm (accessed May 29, 2018).
22 Ibid.
23 Central Intelligence Agency, “News and Information, Intelligence: Human Intelligence,” April 30, 2013,linked from the Central Intelligence Agency Home Page, https://www.cia.gov/news-information/featured-story-archive/2010-featured-story-archive/intelligence-human-intelligence.html (accessed February 16, 2018).
24 United States Army Recruiting, “35M Human Intelligence Collector (DLAB required),” August 3, 2012, video file, https://www.youtube.com/watch?v=_J3zHYURirQ (accessed February 16, 2018); John A. Wahlquist, Interrogation, World War II, Vietnam and Iraq (Washington, DC: National Defense Intelligence College, 2008), 7, http://ni-u.edu/ni_press/pdf/Interrogation_WWII.pdf (accessed February 18, 2018).
25 Burk, “Expertise, Jurisdiction, and Legitimacy,” 41.
26 U.S. Department of the Army, The Profession of Arms (Washington, DC: Department of the Army, December 8, 2010), 4, http://data.cape.army.mil/web/repository/white-papers/profession-of-arms-white-paper.pdf (accessed February 16, 2018).
27 U.S. Department of Defense, “General Dempsey’s Letter to the Joint Force,” DoDLive entry posted on October 1, 2011, http://www.dodlive.mil/2011/10/01/general-dempseys-letter-to-the-joint-force/ (accessed February 16, 2018).
28 Office of the Under Secretary of Defense for Intelligence, Human Intelligence Division and Defense Intelligence Agency, Directorate for Operations, interview by author, February 12, 2018, On location.
29 John P Langan, “Morale Damage and Justification of Intelligence Collection from Human Sources,” in Ethics of Spying. A Reader for the Intelligence Professional (Lanham, MD: The Scarecrow Press, 2006), 106.
30 Imler, Intelligence and the National Security Strategist, 230.
https://repository.law.umich.edu/mjil/vol28/iss3/5/http://avalon.law.yale.edu/19th_century/lieber.asp#art88https://ihl-databases.icrc.org/customary-ihl/eng/docs/v2_rul_rule107https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/index-of-declassified-articles/index-of-declassified-articles-by-author.htmlhttps://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/index-of-declassified-articles/index-of-declassified-articles-by-author.htmlhttp://southerncrossreview.org/44/cia-bible.htmhttps://www.cia.gov/news-information/featured-story-archive/2010-featured-story-archive/intelligence-human-intelligence.htmlhttps://www.cia.gov/news-information/featured-story-archive/2010-featured-story-archive/intelligence-human-intelligence.htmlhttps://www.youtube.com/watch?v=_J3zHYURirQhttp://ni-u.edu/ni_press/pdf/Interrogation_WWII.pdfhttp://ni-u.edu/ni_press/pdf/Interrogation_WWII.pdfhttp://data.cape.army.mil/web/repository/white-papers/profession-of-arms-white-paper.pdfhttp://data.cape.army.mil/web/repository/white-papers/profession-of-arms-white-paper.pdfhttp://www.dodlive.mil/2011/10/01/general-dempseys-letter-to-the-joint-force/http://www.dodlive.mil/2011/10/01/general-dempseys-letter-to-the-joint-force/
-
37
31 Tony Pfaff, “Bungee Jumping off the Moral Highground, Ethics of Espionage in the
Modern Age,” in Ethics of Spying. A Reader for the Intelligence Professional (Lanham, MD: The Scarecrow Press, 2006), 75.
32 Andru E. Wall, “Demystifying the Title 10-Title 50 Debate, Distinguishing Military Operations, Intelligence Activities and Covert Action,” Harvard Law School, National Security Journal, (December 2011), 87, http://harvardnsj.org/2011/12/demystifying-the-title-10-title-50-debate-distinguishing-military-operations-intelligence-activities-covert-action/ (accessed March 15, 2018).
33 This framework is an original creation of the author. It shows the foundational tension between military and HUMINT professions. Sub-tensions stem from these differences. The identified sub-tensions are described in this study. Other tensions exist, but were not described in this work.
34 U.S. Department of Defense, DoD Dictionary of Military and Associated Terms, (Washington, DC: Pentagon, August 2017), 41, http://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/dictionary.pdf?ver=2017-12-23-160155-320 (accessed February 16, 2018).
35 Joint Chiefs of Staff, Doctrine for the Armed Forces of the United States, Joint Publication 1, (Washington, DC: Joint Staff, March 25, 2013, Incorporating Change 1, July 12, 2017) V-1.
36 John Perry, Pershing: Commander of the Great War, (Nashville, TN: Thomas Nelson, 2011), 134, https://books.google.com/books?id=CfjpTz8eQzYC&pg=PA134&lpg=PA134&dq=unity+of+command+principle+pershing&source=bl&ots=z0ACtzVdkn&sig=C1gLaKfHdsR3usYQMHYHnZ7T4N8&hl=en&sa=X&ved=0ahUKEwi6ufjpt_HYAhXQJt8KHdHyCbEQ6AEIQDAG#v=onepage&q=unity%20of%20command%20principle%20pershing&f=false (accessed February 11, 2018); See here for full text excerpt: Unity of Command. The decisive application of full combat power requires unity of command. Unity of command results in unity of effort by coordinated action of all forces toward a common goal. Coordination may be achieved by direction or by cooperation. It is best achieved by vesting a single commander with requisite authority. U.S. Department of the Army, Field Service Regulations–Operations, Field Manual 100-5 (Washington, DC: U.S. Department of the Army, 1954), 25-27.
37 Joint Chiefs of Staff, Doctrine for the Armed Forces, V-1, xix; U.S. Marine Corps, Marine Corps Command and Control, MCDP 6 (Washington, DC: Department of the Navy, October 1996), 77, http://www.marines.mil/Portals/59/Publications/MCDP%206%20Command%20and%20Control.pdf (accessed 15 March 2018); U.S. Army, “Operations,” FM 3-0, (Washington DC: Department of the Army, October 2017), C1, 1-19, 4-24; Colonel Ian Hope, Unity of Command in Afghanistan: A forsaken Principle of War (Carlisle Barracks, PA: U.S. Army War College, November 2008), https://www.globalsecurity.org/military/library/report/2008/ssi_hope.pdf (accessed 10 March 2018).
38 Joint Chiefs of Staff, Doctrine for the Armed Forces, V-1.
39 Ibid., V-2.
40 Ibid., V-1.
http://harvardnsj.org/2011/12/demystifying-the-title-10-title-50-debate-distinguishing-military-operations-intelligence-activities-covert-action/http://harvardnsj.org/2011/12/demystifying-the-title-10-title-50-debate-distinguishing-military-operations-intelligence-activities-covert-action/http://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/dictionary.pdf?ver=2017-12-23-160155-320http://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/dictionary.pdf?ver=2017-12-23-160155-320https://books.google.com/books?id=CfjpTz8eQzYC&pg=PA134&lpg=PA134&dq=unity+of+command+principle+pershing&source=bl&ots=z0ACtzVdkn&sig=C1gLaKfHdsR3usYQMHYHnZ7T4N8&hl=en&sa=X&ved=0ahUKEwi6ufjpt_HYAhXQJt8KHdHyCbEQ6AEIQDAG#v=onepage&q=unity%20of%20command%20principle%20pershing&f=falsehttps://books.google.com/books?id=CfjpTz8eQzYC&pg=PA134&lpg=PA134&dq=unity+of+command+principle+pershing&source=bl&ots=z0ACtzVdkn&sig=C1gLaKfHdsR3usYQMHYHnZ7T4N8&hl=en&sa=X&ved=0ahUKEwi6ufjpt_HYAhXQJt8KHdHyCbEQ6AEIQDAG#v=onepage&q=unity%20of%20command%20principle%20pershing&f=falsehttps://books.google.com/books?id=CfjpTz8eQzYC&pg=PA134&lpg=PA134&dq=unity+of+command+principle+pershing&source=bl&ots=z0ACtzVdkn&sig=C1gLaKfHdsR3usYQMHYHnZ7T4N8&hl=en&sa=X&ved=0ahUKEwi6ufjpt_HYAhXQJt8KHdHyCbEQ6AEIQDAG#v=onepage&q=unity%20of%20command%20principle%20pershing&f=falsehttps://books.google.com/books?id=CfjpTz8eQzYC&pg=PA134&lpg=PA134&dq=unity+of+command+principle+pershing&source=bl&ots=z0ACtzVdkn&sig=C1gLaKfHdsR3usYQMHYHnZ7T4N8&hl=en&sa=X&ved=0ahUKEwi6ufjpt_HYAhXQJt8KHdHyCbEQ6AEIQDAG#v=onepage&q=unity%20of%20command%20principle%20pershing&f=falsehttp://www.marines.mil/Portals/59/Publications/MCDP%206%20Command%20and%20Control.pdfhttp://www.marines.mil/Portals/59/Publications/MCDP%206%20Command%20and%20Control.pdfhttps://www.globalsecurity.org/military/library/report/2008/ssi_hope.pdf
-
38
41 Ibid., xix, V-1.
42 Imler, Intelligence and the National Security Strategist, 230.
43 U.S. Department of Defense, “Unified Command Plan,” https://www.defense.gov/About/Military-Departments/Unified-Combatant-Commands/ (accessed March 15, 2018).
44 Library of Congress, “The World with Commanders’ Areas of Responsibility,” 2005, Created by St. Louis MO, National Geospatial-Intelligence Agency, https://www.loc.gov/item/2005633566/ (accessed March 19, 2018).
45 Wall, “Demystifying the Title 10-Title 50 Debate,” 92.
46 Library of Congress, U.S. Continental Congress, Journals of the Continental Congress, 1774-1789, Entry Thursday, June 15, 1775, https://memory.loc.gov/cgi-bin/query/r?ammem/hlaw:@field(DOCID+@lit(jc00236)) (accessed March 10, 2018).
47 Library of Congress, U.S. Continental Congress, Journals of the Continental Congress, 1774-1789, Entry Saturday, June 17, 1775, https://memory.loc.gov/cgi-in/query/r?ammem/hlaw:@field(DOCID+@lit(jc00238)) (accessed March 10, 2018).
48 Roger Kaplan, “The Hidden War: British Intelligence Operations during the American Revolution,” The William and Mary Quarterly, 47, no. 1 (January 1990): 115-138; Sam Roberts, “War of Secrets; Spy History 101: America’s Intelligence Quotient,” New York Times, September 8, 2002, http://www.nytimes.com/2002/09/08/weekinreview/war-of-secrets-spy-history-101-america-s-intelligence-quotient.html (accessed March 20, 2018); Joseph C. Goulden, “Book Review: ‘George Washington’s Secret Six,’” Washington Times, December 3, 2013, https://www.washingtontimes.com/news/2013/dec/3/book-review-george-washingtons-secret-six/ (accessed March 20, 2018).
49 Defense Intelligence Agency, “George Washington: More than a General and a President,” April 20, 2014, http://www.dia.mil/News/Articles/Article-View/Article/566965/george-washington-more-than-a-general-and-a-president/ (accessed March 20, 2018).
50 Kathryn White, “Benjamin Tallmadge,” George Washington’s Mount Vernon, 2018, http://www.mountvernon.org/digital-encyclopedia/article/benjamin-tallmadge/ (accessed March 20, 2018).
51 George Washington, “Historical Letters 1789-1797,” Central Intelligence Agency, July 7, 2008, https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/our-first-line-of-defense-presidential-reflections-on-us-intelligence/washington.html (accessed March 20, 2018).
52 George Washington, “From George Washington to Colonel Elias Dayton, 26 July 1777,” National Archives, Founders Online, https://founders.archives.gov/documents/Washington/03-10-02-0415 (accessed March 20, 2018).
53 Defense Intelligence Agency, “Secret Committees,” May 11, 2014, linked from the Defense Intelligence Agency Home Page, http://www.dia.mil/News/Articles/Article-View/Article/566976/secret-committees/ (accessed February 16, 2018); U.S. Department of
https://www.defense.gov/About/Military-Departments/Unified-Combatant-Commands/https://www.loc.gov/item/2005633566/https://memory.loc.gov/cgi-bin/query/r?ammem/hlaw:@field(DOCID+@lit(jc00236))https://memory.loc.gov/cgi-bin/query/r?ammem/hlaw:@field(DOCID+@lit(jc00236))https://memory.loc.gov/cgi-bin/query/r?ammem/hlaw:@field(DOCID+@lit(jc00238))https://memory.loc.gov/cgi-bin/query/r?ammem/hlaw:@field(DOCID+@lit(jc00238))http://www.nytimes.com/2002/09/08/weekinreview/war-of-secrets-spy-history-101-america-s-intelligence-quotient.htmlhttp://www.nytimes.com/2002/09/08/weekinreview/war-of-secrets-spy-history-101-america-s-intelligence-quotient.htmlhttps://www.washingtontimes.com/news/2013/dec/3/book-review-george-washingtons-secret-six/https://www.washingtontimes.com/news/2013/dec/3/book-review-george-washingtons-secret-six/http://www.dia.mil/News/Articles/Article-View/Article/566965/george-washington-more-than-a-general-and-a-president/http://www.dia.mil/News/Articles/Article-View/Article/566965/george-washington-more-than-a-general-and-a-president/http://www.mountvernon.org/digital-encyclopedia/article/benjamin-tallmadge/https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/our-first-line-of-defense-presidential-reflections-on-us-intelligence/washington.htmlhttps://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/our-first-line-of-defense-presidential-reflections-on-us-intelligence/washington.htmlhttps://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/our-first-line-of-defense-presidential-reflections-on-us-intelligence/washington.htmlhttps://founders.archives.gov/documents/Washington/03-10-02-0415https://founders.archives.gov/documents/Washington/03-10-02-0415http://www.dia.mil/News/Articles/Article-View/Article/566976/secret-committees/http://www.dia.mil/News/Articles/Article-View/Article/566976/secret-committees/
-
39
State, Office of the Historian, “Secret Committee of Correspondence, Committee for Foreign Affairs, 1775-1777,” https://history.state.gov/milestones/1776-1783/secret-committee (accessed February 16, 2018).
54 George Washington, “George Washington Papers, Series 4, General Correspondence: Continental Congress Intelligence Committee to George Washington, September 2, 1777,” Manuscript/Mixed Material, retrieved from the Library of Congress, September 2, 1777, https://www.loc.gov/item/mgw448198/ (accessed February 5, 2018); Jimmy Dick, “The Committee of Secret Correspondence,” Journal of the American Revolution, https://allthingsliberty.com/2013/08/the-committee-of-secret-correspondence/ (accessed February 5, 2018).
55 U.S. Department of Defense, DoD Dictionary of Military, 41; Joint Chiefs of Staff, Doctrine for the Armed Forces, III-11.
56 Cornell Law School, Legal Information Institute, “United States Code, Title 10, Section 113, Secretary of Defense,” https://www.law.cornell.edu/uscode/text/10/113 (accessed February 18, 2018).
57 National Defense Authorization Act for Fiscal Year 2003, Public Law 107-314, 107th Cong., (Dec. 2, 2002), 116 STAT. 2619, https://www.gpo.gov/fdsys/pkg/PLAW-107publ314/pdf/PLAW-107publ314.pdf (accessed February 5, 2018).
58 Cornell Law School, Legal Information Institute, “United States Code, Title 50, Section 3038, Responsibilities of Secretary of Defense Pertaining to National Intelligence Program,” https://www.law.cornell.edu/uscode/text/50/3038 (accessed February 18, 2018).
59 Cornell Law School, Legal Information Institute, “United States Code, Title 50, Section 3003, Definitions,” https://www.law.cornell.edu/uscode/text/50/3003 (accessed February 16, 2018).
60 Wall, “Demystifying the Title 10-Title 50 Debate,” 87-90.
61 Executive Order 12333, United States Intelligence Activities, as amended by Executive Orders 13284 (2003), 13355 (2004), and 13470 (2008), Public Law 108-458, (July 31, 2008), Sec. 1.7 (b), https://fas.org/irp/offdocs/eo/eo-12333-2008.pdf and https://www.gpo.gov/fdsys/pkg/WCPD-2008-08-04/pdf/WCPD-2008-08-04-Pg1064.pdf (accessed February 16, 2018).
62 Cornell Law School, Legal Information Institute, “U.S. Code Title 50, Responsibilities of Secretary of Defense pertaining to National Intelligence Program, 50 USC sec. 3038 (d),” https://www.law.cornell.edu/uscode/text/50/3038 (accessed March 15, 2018).
63 Table created by author using the data provided in Executive Order 12333. Executive Order 12333, United States Intelligence Activities, as amended by Executive Orders 13284 (2003), 13355 (2004), and 13470 (2008), Public Law 108-458, (July 31, 2008) https://fas.org/irp/offdocs/eo/eo-12333-2008.pdf and https://www.gpo.gov/fdsys/pkg/WCPD-2008-08-04/pdf/WCPD-2008-08-04-Pg1064.pdf (accessed February 16, 2018).
64 Wall, “Demystifying the Title 10-Title 50 Debate,” 99.
https://history.state.gov/milestones/1776-1783/secret-committeehttps://www.loc.gov/item/mgw448198/https://allthingsliberty.com/2013/08/the-committee-of-secret-correspondence/https://www.law.cornell.edu/uscode/text/10/113https://www.gpo.gov/fdsys/pkg/PLAW-107publ314/pdf/PLAW-107publ314.pdfhttps://www.gpo.gov/fdsys/pkg/PLAW-107publ314/pdf/PLAW-107publ314.pdfhttps://www.law.cornell.edu/uscode/text/50/3038https://www.law.cornell.edu/uscode/text/50/3003https://fas.org/irp/offdocs/eo/eo-12333-2008.pdfhttps://www.gpo.gov/fdsys/pkg/WCPD-2008-08-04/pdf/WCPD-2008-08-04-Pg1064.pdfhttps://www.law.cornell.edu/uscode/text/50/3038https://fas.org/irp/offdocs/eo/eo-12333-2008.pdfhttps://www.gpo.gov/fdsys/pkg/WCPD-2008-08-04/pdf/WCPD-2008-08-04-Pg1064.pdfhttps://www.gpo.gov/fdsys/pkg/WCPD-2008-08-04/pdf/WCPD-2008-08-04-Pg1064.pdf
-
40
65 Discussions between Troy Sacquety and author were conducted regarding the focus and
utility of special intelligence provided by the OSS in World War II. Troy J. Sacquety, e-mail message to author, February 1, 2018.
66 Robert Bateman, “Understanding Military Strategy and the Four Levels of War,” Esquire Magazine Online, November 25, 2015, https://www.esquire.com/news-politics/politics/news/a39985/four-levels-of-war/ (accessed February 16, 2018); Joint Chiefs of Staff, Doctrine for the Armed Forces, V-1-7.
67 Joint Chiefs of Staff, Doctrine for the Armed Forces, V-1.
68 Sherman Kent, Strategic Intelligence for American World Policy (Princeton: Princeton University Press, 1966), 3, https://muse.jhu.edu/book/43068 (accessed May 29, 2018).
69 Joint Chiefs of Staff, Doctrine for the Armed Forces, V-1.
70 U.S. Department of Defense, DoD Dictionary of Military, 114.
71 Caryle Murphy, “Soldier, Diplomat, Gossip, Spy in Capital,” Washington Post, November 3, 1982, https://www.washingtonpost.com/archive/local/1982/11/03/soldier-diplomat-gossip-spy-in-capital/f6340339-e2f5-4d96-8b41-ac6742512ac7/?utm_term=.241476fd60c9 (accessed March 15, 2018); Central Intelligence Agency, “(C) Unrecognized Potential in the Military Attaches (Declassified by CIA Historical Review Program, Sept. 18, 1995),” https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol4no2/html/v04i2a01p_0001.htm (accessed February 5, 2018); Georgetown National Security Archive, “A National Security Archive Electronic Briefing Book, Jeffrey T. Richelson, ed., May 23, 2001, https://nsarchive2.gwu.edu/NSAEBB/NSAEBB46/index2.html (accessed February 5, 2018); Jeffrey T. Richelson, “A Century of Spies,” Washington Post, 1996, http://www.washingtonpost.com/wp-srv/style/longterm/books/chap1/a_centur.htm (accessed February 5, 2018); Statement by U.S. Ambassador to Russia on the Expulsion of Russian Intelligence Officers, Youtube, video file, https://www.youtube.com/watch?v=_8a5KaR6hF4 (accessed March 27, 2018).
72 Central Intelligence Agency, “(S) Communications to the Editors (Declassified by CIA Historical Review Program, Sept. 18, 1995),” https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol4no3/html/v04i3a08p_0001.htm (accessed February 5, 2018); Central Intelligence Agency, “The Role of the US Army Military Attaches Between the World Wars,” June 27, 2008, linked from Central Intelligence Agency Home Page, https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/95unclass/Koch.html (accessed February 5, 2018).
73 U.S. Marine Corps, “Marine Corps Support to the Defense Attaché Service (DAS),” http://www.hqmc.marines.mil/intelligence/Intel-OPS-PERS/Defense-Attache-Program/ (accessed February 16, 2018); U.S. Marine Corps, “Marine Attaché Frequently Asked Questions,” http://www.hqmc.marines.mil/Portals/133/Docs/Web%20Update%20FAQ.pdf (accessed February 16, 2018); Defense Intelligence Agency, “Joint Military Attaché School,” September 2017, linked from Defense Intelligence Agency Home Page, http://www.dia.mil/Portals/27/Documents/Training/JMAS/JMAS_Student_Info_SEPT-2017.pdf (accessed February 16, 2018).
https://www.esquire.com/news-politics/politics/news/a39985/four-levels-of-war/https://www.esquire.com/news-politics/politics/news/a39985/four-levels-of-war/https://muse.jhu.edu/book/43068https://www.washingtonpost.com/archive/local/1982/11/03/soldier-diplomat-gossip-spy-in-capital/f6340339-e2f5-4d96-8b41-ac6742512ac7/?utm_term=.241476fd60c9https://www.washingtonpost.com/archive/local/1982/11/03/soldier-diplomat-gossip-spy-in-capital/f6340339-e2f5-4d96-8b41-ac6742512ac7/?utm_term=.241476fd60c9https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol4no2/html/v04i2a01p_0001.htmhttps://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol4no2/html/v04i2a01p_0001.htmhttps://nsarchive2.gwu.edu/NSAEBB/NSAEBB46/index2.htmlhttp://www.washingtonpost.com/wp-srv/style/longterm/books/chap1/a_centur.htmhttps://www.youtube.com/watch?v=_8a5KaR6hF4https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol4no3/html/v04i3a08p_0001.htmhttps://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol4no3/html/v04i3a08p_0001.htmhttps://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/95unclass/Koch.htmlhttps://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/95unclass/Koch.htmlhttp://www.hqmc.marines.mil/intelligence/Intel-OPS-PERS/Defense-Attache-Program/http://www.hqmc.marines.mil/Portals/133/Docs/Web%20Update%20FAQ.pdfhttp://www.dia.mil/Portals/27/Documents/Training/JMAS/JMAS_Student_Info_SEPT-2017.pdf
-
41
74 The Free Library, “Debriefing Branch: Defense Strategic Debriefing Course,” October 1,
2010, https://www.thefreelibrary.com/Debriefing+branch%3A+defense+strategic+debriefing+