About US Intelligence
Artur Victoria
The information actions promoted by governments are not only under the responsibility of
the intelligence community of a country, despite their centrality. The person responsible for
these activities will vary according to the situation of peace or war and the kind of
propaganda action to be unleashed.
In addition, the available information products have quite different characteristics, and the
type of employment can be tactical or strategic. Although the information service is the field
of secret services par excellence, it encompasses, to a certain extent, the entire US public
machine.
Institutional responsibilities for informational and psychological operations, for example, are
defined by the status of the target country's relations with the US. In the case of peace, the
strategic objectives to which the other organs must subordinate are the Department of
State, and this task remains under its control until the beginning of the hostilities. In a
situation of conflict, the burden is passed on to the Department of Defense, which then
becomes the centralizer of the use of such instruments, linking these informational actions
with the other military measures involved.
Whether in a situation of peace or war, intelligence services are primarily employed in the
operation of information products involving the use of disinformation, under the logic of
plausible denial, thus preserving the figure of the Secretary of State or the president of
possible international constraints.
The CIA is primarily responsible for the actions of disinformation abroad, directly assuming
such measures when in the service of the Department of State, or acting jointly with military
intelligence, when in situations of conflict.
With the attacks of 2001 and the consequent restructuring of the US intelligence system,
the actions of disinformation and propaganda by the US Intelligence were coordinated by
the National Clandestine Service (NCS). This service since 2004 is centralized by the CIA and
brings together all human intelligence agencies (Humint). Within the NCS, it is from the
Division of
special activities109 that all covert operations developed by the intelligence community are
carried out. The covert actions, in turn, are divided into paramilitaries and political actions,
the latter being the responsibility of the Political Action Group or political action group.
Under the prism of the covert actions promoted by this group, we have the political actions,
the actions of psychological operations.
Psychological operations
Psychological operations, or PSYOPs, are the privileged informational instrument for actions
in which the behavioural change of the target public is objectified. With this type of
measure, one expects more than the commitment of the capacity of perception of reality on
the part of the affected population, but, mainly, the possibility of stimulating certain
behaviour. As such, the affected sectors could be encouraged to give up fighting in a
particular war or to elect a candidate as president appropriate to US interests. As defined by
US military doctrine:
The mission of PSYOP is to influence the behaviour of the foreign target audience to support
US national goals. PSYOP accomplishes this, transmitting selected information and / or
advising actions that influence the emotions, motivations, objective reasoning and, finally,
the behaviour of the foreign public. The behaviour change is at the root of the PSYOP110
mission (DEPARTMENT OF ARMY, 2005, p.1-2).
In this way, one seeks to shape the adversary's understanding of the world, so that, without
his knowledge, it may be possible to direct him according to the interests of the North
American state.
The advantages of psychological operations are many. The affected public can not only lose
the ability to perceive for itself, but also have their behaviour shaped. Therefore, US values
and interests can be reproduced worldwide, enabling eventual antagonists to become docile
allies. Thus, however much military interventions may be required, they may require an
effective lowering and may occur less often.
Psychological operations are used in broad-spectrum interventions, supporting not only the
military objectives but also the goals that can be obtained in a peace situation. The following
table presents the information tools and US strategic objectives with PSYOPS, according to
the contexts of war and non-war.
It is interesting to note that a number of apparently inoffensive items, such as comic books,
are viewed by American doctrine as instruments of ideological domination.
Informational products and their use
An important facet that determines the division of interagency responsibility in
psychological operations relates to the type of information product to be employed. By the
doctrine of the army, the information products are differentiated, mainly, from the diffusion
of its origin, or the restriction on this one. In this way, information whose origin is known
tend to be signed by formal and formal institutions such as the State Department, the
Treasury, or the White House itself. On the other hand, the disinformation, whose source is
hidden, would be part of the covert actions promoted by the intelligence services. Under
this logic, once the adversary finds the source of the disinformation, the State Department
or the president can always rely on plausible denial, claiming that the initiative was
autonomous and restricted to the intelligence services. We have the following list of
informational products that support psychological operations (DEPARTMENT OF ARMY,
2005, pp. A-3):
a) Open product - They are informational products in which the original source is provided,
and therefore signed, which makes it possible to identify immediately its authorship. Its
purpose is not to deceive the public, at least as to its origin. In the field of information
declared is the following product:
1) White - These products have their origin patent and are used as support for the public
and formal actions of the US State. They have as their advantages the credibility, the
possibility of corroborating the information divulged from other sources. This type of
information makes it difficult for the opponent's actions to demoralize the source, since
they are usually factual, and have increased their credibility from the perception of power
emanating from the US, "whether this diplomatic, informational power, military or
economic111 "(DEPARTMENT OF ARMY, 2005, pp. A-1). On the other hand, with the
disclosure of the source, the adversary can more easily target his refutation campaign by
focusing attacks on it. In addition, the type of information employed tends to be more
restricted and the correction of errors of approach more difficult, since the flaws tend to
scratch the image of the institutions involved.
b) Covered product - These products require a great capacity for coordination and
integration between the component agencies. Mistakes often cost participants a price,
affecting the country's image.
The information disclosed is disclosed in a way that does not know the origin of the
information, that is, its authorship is concealed or even falsified. It also makes the
prescription of this type of product the use of the artifice of plausible denial, in which case
the information sponsor is found, the information can "plausibly" deny its involvement.
As a rule, the information whose source is hidden make up the list of measures employed by
the covert actions of the intelligence services. As already mentioned, if the origin of the
misinformation is discovered, the involved agency and its employees take the blame,
preserving the other institutions of the State. They present the following information
products:
1) Gray - Are informational products that hide or do not identify their origin. They are
usually employed to support operational actions, such as elections or military battles. Its
advantages are related to the information being dissociated from the prestige (or discredit)
of the original source in relation to the target public. Thus, the United States can intervene
in proceedings in countries such as Iraq, Afghanistan or Iran, dissociating the dissemination
of ideas or facts from its North American origin, which in the region
2) Black-They are products that emanate the misinformation proper, since they propose to
spread lies or half truths. As positive points for their use of black products has as a great
advantage the fact that they can be produced in or near the opponent's territory, quickly
reaching the target audience.
The presumption of information originated within the territory of the antagonist lends
credibility to it and helps to demoralize the enemy implying the presence of internal
dissidents.
With proper form and content, disinformation may be indistinguishable from the original
propaganda of the adversary, causing him to invest many resources to preserve the integrity
of his original speech. Another important facilitator is the difficulty in identifying its origin,
which hinders the actions of the enemy with a view to appeasing their effects.
As a negative counterpoint to its users, the black information provokes great investment in
security measures information for the protection of the source. Another aspect relates to
the articulation with projects of more extensive psychological operations. Since such
information is served by less formal channels, it is difficult to coordinate them with the
broader psychological goals.
Aspects such as safety and long-term planning also limit flexibility. Another obstacle is that
this type of information product is very vulnerable to the discovery, manipulation and / or
physical elimination of the source when operating within the opponent's territory. This
endangers human sources within the country.
Finally, in order to be effective the black product requires great planning and coordination,
in order to have an orchestrated performance with the other information media employed.
Because of this, their employment tends to be difficult in a timely manner outside the
strategic framework, given the degree of planning involved and the necessary minutiae
(DEPARTMENT OF ARMY, 2005, p.A3).
Psychological operations may also vary in scope, and may have tactical or strategic scope.
Thus:
1) Tactical operations - They are used to support small and medium-size objectives, both in
peace situations and in military confrontation. One example involves confronting the United
States with Communist influence in the Italian elections of 1948. Concerned that PCI112
might win the election, the US government orchestrated a broad campaign to strengthen
Christian Democrats. Employing white goods, the State Department reported on the
difficulty of financing Italy with the Marshall Plan if the Communists took over the state, and
the American press, like Time magazine, proclaimed in its March 22 - 1948, that Italy would
find itself "on the verge of catastrophe" with the victory of the Communists. In the covert
dimension, the CIA, in addition to funding the centre parties, forged documents and letters
on behalf of the CIP, is radicalizing its power speech. He also published material focusing on
the brutality of the occupation of the Red Army in Germany, as well as the impact of the
Communist victory in Poland and Czechoslovakia (RICHELSON 1995: 244). As a result the
Communist Party lost the elections.
Tactical-level psychological operations are also employed in warfare. In this type of
situation, intelligence organizations work together with the tactical intelligence sectors,
blending the use of open and covert sources.
During World War II, the English and North Americans developed several disinformation
operations in order to deceive the German command about the landing points allied in the
north of France. To this end, ostensible means such as radio broadcasts, newspapers, official
communiqués, among others, were used, while disinformation was transferred from the
network of German double agents at the service of the allies. (GODSON, WIRTZ 2008: 108)
2) Strategic operations - They are used to promote long-term interests of the American
power. They tend to blend open and covert information, however, as they involve a large
time period, informational measures have to be taken with care and planning, as errors can
compromise the action itself, as well as tarnish the image of the promoter. An example of
this type of action, already cited in this paper, is related to the operation developed by the
CIA with a view to winning the Cold War culture.
Between 1950 and 1967, employing a facade entity called Congress for Cultural Freedom,
the CIA promoted the ideological-cultural positions of interest to the United States.
Dozens of prestigious magazines have been published, books of respected intellectuals have
been published, international conferences held, as well as promoted musicians and artists
whose art has been seen as a promoter of American liberal interests.
Accordingly with Saunders : “ The degree to which the American spy ring has extended its
reach to the cultural affairs of its allies in the West, acting as the unrecognized facilitator of
a wide range of creative activities, and positioning the intellectuals and their work as
chessmen to be played in the Great Game, remains one of the most thought-provoking
legacies of the Cold War”.
An operation of this size, combining various actions and types of propaganda and
disinformation, needs extreme care. The intellectuals in question will only remain useful to
the extent that they do not lose their credibility, which would inevitably occur if the bond
with the US intelligence agency was discovered.
Information operations
While these are disciplines of military doctrine for employment during the war, the fields
that make up this doctrine have been widely applied by US intelligence agencies in both
peace and conflict situations. As a significant part of the intelligence organizations' doctrine
regarding information operations, they are confidential, understanding the US Department
of Defence’s vision allows understanding the resources and concepts available on the
ground of the informational conflict. In addition, the doctrines of IO give the dimension of
relevance given by the US military and civilian intelligence services over the domain of all
the informational spectrum, either by controlling the content or the physical medium.
Information operations emerged during the 1990s in the context of US military and
intelligence bodies, from the moment the information society became part of the model of
victorious globalization imposed by the post-war hegemonic power Cold.
Digital technologies began to play a central role as ordering social relations, doing the same
with the dimension of conflict. With the primacy of the Internet, but with other
communication networks and data traffic, several processes migrated to digital support and
were integrated into networks. In addition to issues such as communication, access to news
and creation of virtual communities, are also integrated economically more relevant
dimensions, such as the financial system of nations, the control of power plants or airports.
The fact that digital networks carry these informational relations, as well as several cultural
facets, allows such networks to be a privileged arena for the exercise of soft power.
The IOs can also be divided into two sets of capacities related to the actuation of
information content and information systems. The disciplines that act on the sense that the
information produces are the psychological operations, operations of security and
disinformation military. The skills used to affect the physical structure that supports
information are electronic warfare and computer network operations (PAUL, 2008). This
combination of possibilities allows us to combine means to distort the content of
information, while
access to networks and communications systems. The following will describe what each
grouping of processes consists of. Information operations are the employment of the core
capabilities of electronic warfare, computer operations operations, psychological
operations, military deception, and operations security, in concert with specified supporting
and related capabilities, to affect or defend information and information systems, and to
influence decision-making.
Informational content
The action on the content of the information itself involves the ability to re-signify the
meaning of the adversary, either by making their own point of view or by deliberately
misleading them. In addition, in this sphere related to information content are also involved
the ability to obtain protected data from the opponent, as well as the ability to protect their
operations from the enemy. Therefore, the following fields are used:
a) Psychological operations - PSYOPS, as addressed in another topic, are intended to
provide information to the adversary and induce him to change his behaviour in a way that
benefits US interests. Psychological operations use the gradations of black, gray and white
propaganda, which are determined by the veracity of the information made available, as
well as by the disclosure of its origin. The PSYOPS have as their specificity the quest for the
enemy's attitude change, implying action, and the comprehensiveness of their targets,
which can be even all the people of a country or continent.
b) Military disinformation - MILDEC has the function of deceiving the opposing commander
so that it is led to a misunderstanding of the position of allied troops, as well as the
intentionality of their use. Although military disinformation uses techniques common to
PSYOPS, for example, it differs from it by the restriction of its objective, since it pretends to
deceive only the command of the enemy army, whereas the psychological operations can
target a whole population. Eventually such targets may overlap with psychological
operations indirectly supporting the actions of MILDEC. In this way, the
Groups that are suitable for PSYOP targeting in support of MILDEC operations include
adversary command groups, personnel planning teams, specific factions within teams, nonmilitary interest groups that can influence policy and military decisions and analysts of
intelligence systems (DEPARTMENT OF ARMY, 2006, pp. II-3).
The American military doctrine conceptualizes MILDEC as follows: Military disinformation
(MILDEC), carried out at strategic, operational, and tactical levels, is defined as the actions
performed to deliberately mislead adversary decision makers about military capabilities,
intentions and operations allied forces, causing the adversary to take specific actions (or
inaction) that will contribute to the accomplishment of the Allied forces' mission (Dept. of
Arms, 2006, p. viii).
Centrally military disinformation therefore seeks to deny the enemy the knowledge about
the real pretensions and strengths of the US military when in operations, confusing the
ability to make an adversary decision.
c) Security operations - OPSEC aims to identify information American or Allied forces, in
order to enemy intelligence can obtain such information. From this diagnosis they are
measures to eliminate or reduce the opponent's identify such information (PAUL, 2008,
p.76). It is important to note that OPSEC not deal with classified data or with the
establishment of criteria for the access to information. Their concern is with open sources
and due care to the failures that may exist in informational operations in progress. Thus,
security operations are defined by the US Army:
Safety Operations (OPSEC) is a process that identifies critical national information to
determine whether allied actions can be observed by the opposing intelligence system,
determines whether the information obtained by the adversaries could be interpreted in a
way that is employable to them, and then carries out appropriate measures that eliminate
or reduce the exploitation of critical information by the opponent.
OPSEC is a methodology that denies critical information to the opponent. Unlike security
programs to protect classified information, OPSEC measures identify, control, and protect
generally non-classified information that is associated with sensitive operations and
activities116 (DEPARTMENT OF ARMY, 2006b, P. vii).
Military deception (MILDEC), conducted at strategic, operational, and tactical levels, is
defined as being those actions executed to deliberately mislead adversary decision makers
as to military capabilities, intentions, and operations, thereby causing the adversary to take
specific actions or inactions) that will contribute to the accomplishment of the friendly
mission. (OPSEC) is a process that identifies critical information to determine if it can be
observed by adversary intelligence systems and if executes selected by adversaries could be
interpreted to be useful to them. measures that eliminate or reduce adversary exploitation
of friendly critical information.
OPSEC is a methodology that denies critical information to an adversary. Unlike security
programs that seek to protect classified information, OPSEC measures identify, control, and
protect generally unclassified evidence that is associated with sensitive operations and
activities.
In this way the security operations tend to be dynamic, working by project. Whenever a
determined informational operation begins, those responsible for security will try to
anticipate the risks of the opponent perceiving the action, and, from there, take protective
measures. In this focus OPSEC differs from PSYOPS and MILDEC, since it acts with central
target the enemy intelligence and other sectors responsible for perceiving the manoeuvres
of disinformation of the enemy.
Another difference of security operations is that, although they act on the content of the
information provided, distorting it according to the needs of the current operation, they
may also employ "direct attacks against the adversary's intelligence system" (DEPARTMENT
OF ARMY, 2006b, P. II-4), if necessary to compromise the intelligence system and the
intelligence capacity of the enemy forces.
Information systems
Informational operations also act on the physical structure of the adversary information
system. By compromising the antagonist's informational tools and technologies, one's ability
to perceive ongoing actions, or even to develop one's own measures, is eliminated.
Unlike the above disciplines, which attempt to manoeuvre the enemy's perception,
electronic warfare and computer network operations will attempt to eliminate or
circumvent the technological means available. In this way, they act by undermining the
ability to collect data about the surrounding environment, trying to leave the adversary, in
an analogy with humans, deprived of fundamental meanings such as sight, hearing or
speech. It presents the following modalities:
a) Electronic Warfare -EW involves the ability to gain mastery of the electromagnetic
spectrum, while denying the opponent the use of this. US Army doctrine divides this area
into three categories (DEPARTMENT OF ARMY, 2003, pp. 2-7):
1) Electronic protection -EP is responsible for the protection of communication systems and
transmission of data before the attack of opponents.
2) Support Electronic Warfare - ES acts to identify the electromagnetic signals emitted by
the adversary, in order to support the planning of electronic warfare operations against this
enemy. The information obtained by ES also supports the actions of collecting intelligence of
signals, as well as attacks against human targets, that can be located by the emissions of its
apparatus of communication.
3) Electronic attack - EA is the sector responsible for "the use of electromagnetic energy,
directed energy, anti radiation weapons, to attack personnel, facilities, or equipment with
the intent of degradeing, neutralizing or destroying enemy combat capability"
(DEPARTMENT OF ARMY, 2003, pp. 2-8). For this can be used from communications
equipment, with the aim of shuffling the enemy communications, to electromagnetic
missiles that will physically destroy the equipment of the enemy and the data collected by
it.
b) Computer Network Operations - CNE involves the dispute of the control of the digital
information networks of the opponent, denying the use to this and protecting their own.
CNE has three sub-disciplines, which are (DEPARTMENT OF ARMY, 2003, pp. 2-9):
1) Attack of Network of Computers - CNA. In this sphere, the adversary's information
system, as well as its weapons system, is attacked, destroyed, broken, or corrupted. Both
attempts to destroy the network infrastructure and corruption of stored data. CNA employs
lethal instruments, such as bombs, and other warlike and non-lethal devices to invade the
enemy network.
2) Computer Network Defence - Acts defending the allied information system against attack
by opposing forces. It resembles the measures that ordinary users adopt to protect their
systems from hackers and virus attacks, adding some complexity.
3) Computer Network Exploration - CNE works centrally with gathering intelligence about
the adversary system. Thus, it penetrates the networks of the enemy collecting data of its
software and hardware, in order to feed the knowledge about it. (DEPARTMENT OF ARMY,
2003, pp. 2-11).
Bibliography:
PAUL, Christopher. Information operations – Doctrine e practice: a reference handbook. London, Wesport:
Praeger Security International, 2008.
Frances Stonor Saunders is the author of the bestselling Hawkwood, and of Who Paid the Piper?,
Institutional reports
U.S. The 9/11 Commission Report. New York, London: W.W. Norton & Company, 2004.
NATIONAL RECONNAISSANCE OFFICE - NRO. Management of the National Reconnaissance Program 19601965. In: A History of Satellite Reconnaissance. Vol. 5, Washington, NRO, 1969. Available at:
<http://www.nro.gov/foia/HOSR/HOSR_VolumeV.pdf>.
NATIONAL RECONNAISSANCE OFFICE - NRO. A History of Satellite Reconnaissance. Vol. 1. Washington, 1997.
PEDLOW, Gregory W .; WELZENBACH, Donald E. .. The CIA and the U2 Program. Langlay: Central Intelligence
Agency, 1998.
RAND Corporation. Preliminary Design of an Experimental World - Cycling Spaceship. Santa Monica: RAND,
May 2, 1946.
The Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction WWD. Report to the President of the United States. Washington, March 31, 2005.
Documents of the intelligence community
CENTRAL INTELLIGENCE AGENCY - CIA. Background paper on CIA's combined use of interrogation techniques.
Washington,
CIA,
December
30,
2004.
Available:
<http://www.aclu.org/torturefoia/released/082409/olcremand/2004olc97.pdf>.
CENTRAL INTELLIGENCE AGENCY - CIA. The CIA's Family Jewels. Washington: National Security Archive, 2007.
Available at: <http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB222/family_jewels_full_ocr.pdf>.
DEPARTMENT OF ARMY. Psychological Operations Tactics, Techniques, and Procedures. Washington,
December 31, 2003. Available at: <http://www.fas.org/irp/doddir/army/fm3-05-301.pdf>.
DEPARTMENT OF ARMY. Information Operations: Doctrine, Tactics, Techniques, and Procedures. Washington,
November 28, 2003b. Available at: <http://www.fas.org/irp/doddir/army/fm3-13.pdf>.
DEPARTMENT OF ARMY. Psychological Operations.
<http://www.fas.org/irp/doddir/army/fm3-05-30.pdf>.
Washington,
April
15,
2005.
Available at: