http://www.fas.org/2000/signs00/000114-y2k-nro.htm
(Macartney)
US RELAXES RESTRICTIONS ON ENCRYPTION TECHNOLOGY. The action marks another retreat by the NSA and FBI, which have long opposed the export of cutting-edge encryption products, for fear they would be unable to break coded communications sent by foreign governments and terrorist groups. http://www.nytimes.com/library/tech/00/01/biztech/articles/13export.html (Macartney)
STATE DEPT INSECURITY. State Dept security officials failed to sweep scores of rooms for bugging devices and repeatedly failed to account for highly classified documents, according to a critical audit by the Department's inspector general. The inspector general said lax security procedures plagued the department's handling of "sensitive compartmented information" (SCI), the government's most sensitive intelligence reports. The report said that 140 offices handling those materials had never been swept for listening devices. It said that 239 of 1,890 SCI reports distributed from the super-secret NSA Cryptological Support Group had not been returned to the group's secure facility inside the State Department between August and October 1998. In one case, a pouch was returned empty; another was returned open with the key in it, the report said. http://www.washingtonpost.com/wp-dyn/articles/A54475-2000Jan16.html (Macartney)
NSA TECHNOLOGY FOR SORTING INTERCEPTS. A web page on IBM's Intellectual Property Network describes in detail various technologies for computer sifting of textual material for key words and phrases. These technologies are believed to be similar to those used by NSA to sort communication intercepts. (Site includes excruciating details for technogeeks) More on this from someone (who seems to know what they are writing about) on an intelligence chat group: >Contrary to popular myth, the NSA does not require special voodoo and rituals to conduct their sigint business. Similar technology may be found in the corporate sector, often implemented at a fraction of the cost NSA paid in R&D years before. While the NSA has their own in-house labs, they rely heavily on outside contractors for software and hardware support from companies such as Lockheed, TRW, AST, Raytheon, and SAIC. COTS products similar to those used in the so-called Echelon network are available from the same sources; AST produces the "TRAILMAPPER" software, rumored to be an integral part of first level data collection for the NSA. Global Integrity Corp., formerly an SAIC unit, provides comprehensive open source monitoring packages to corporate clients. (http://www.patents.ibm.com/details?&pn=US05937422__) (Macartney)
FBI DECEIVED LOS ALAMOS SCIENTIST. During interrogation, FBI agents browbeat and lied to suspected nuclear spy, Wen Ho Lee. Apparently, that is a common investigative and interrogation technique and is not "against the rules." Nevertheless, Lee's lawyer is trying to use that episode to undermine the government's case against his client. Meanwhile, in reaction to charges that Wen Ho Lee has been a victim of "racial profiling," Energy Secretary Richardson has appointed an Asian American to be DOE's ombudsman for ethnic bias complaints. (Macartney)
http://www.washingtonpost.com/wp-srv/WPlate/2000-01/19/079l-011900-idx.html
http://washingtonpost.com/wp-dyn/opinion/columns/ignatiusdavid/A63929-2000Jan19.html
ARMY & AIR FORCE TO SHARE NAVY SENSOR FUSION NET. The US Navy's Cooperative Engagement Capability (CEC) is being transformed into a joint program with air, ground and space sensors expected to be integrated into the network in coming years. CEC is not a system or a weapon. Instead, it is a sophisticated networking capability that allows all members of the network to see targets simultaneously, even if their own individual sensor has yet to detect the approaching enemy missile or aircraft. (Defense News on-line, Jan 24) http://www.defensenews.com (Macartney)
EW CAUCUS. A new Electronic Warfare Working Group is being established in the US House of Representatives to expound The requirements and needs of this arcane portion of the military budget. The bipartisan group will be led by Rep. Joe Pitts, R-Pa.. Co-chairs will be Rep. Norm Dicks, D-Wash., John Spratt, D-S.C., and Rep. Randy Cunningham R-Calif. (Defense News on-line, Jan 24) http://www.defensenews.com (Macartney)
ISRAEL WANTS SPY SATELLITES. Israel is requesting hundreds of millions of dollars worth of US space capabilities as part of a multi-billion dollar security assistance package Washington is expected to provide as part of the peace deal between Israel and Syria. (Defense News on-line, Jan 24) (Macartney) http://www.defensenews.com
BRITAIN's GCHQ EMPLOYMENT CHALLENGE: The British government's code-breaking centre -- the GCHQ -- has set a cryptic puzzle for would-be applicants, and it is reassuringly difficult. The problem is inserted into the GCHQ Internet site (www.gchq.uk). Applicants are challenged to unscramble the information and arrange it in the right order. The code involves five sets of five letters of the alphabet, each encrypted in a different form. The aim is to translate them and spell out the message. ''You don't have to solve the puzzle to join GCHQ, but if you include the message in your application form, we would certainly be very interested in talking to you,'' the site says. The code appeared just before Christmas, and within 48 hours someone had cracked it. One of the five sections was hidden graphics. Another was in Morse Code. (Calgary Herald, London, 1-14-00 // Heibel). (http://www.gchq.gov.uk/challenge.html (Macartney)
SECTION III -- BOOKS AND RELATED MATTERS
PSYCHOLOGY OF INTELLIGENCE ANALYSIS, by Richard J. Heuer, Jr. (CIA ret), CIA's Center for the Study of Intelligence (CSI) , 2000. How do you beat cognitive biases? How do you set aside preconceived mind-sets and mental models? The author emphasizes the importance of not only analyzing the substance of intelligence problems, but also of understanding the analytic thought processes. He maintains that thinking analytically is a skill like carpentry or driving a car -- it can be taught, it can be learned, and it can be improved with practice. Heuer examines cognitive biases -- subconscious pre-conceptions that impair objectivity and skew analysis in such areas as evaluation of evidence, recognition of signs of change, perception of cause and effect, and estimation of future probabilities. Heuer offers techniques for confronting such biases and diluting their impact. This book is written in a clear, crisp, concise, jargon-free mode that is readily understandable. It is of value not only to other intelligence professionals -- that is, to managers, trainers, collectors, and technicians but also to anyone that has to analyze or make
judgments, decisions, and predictions about problems and choices that arise in the course of day-to-day life. Psychology of Intelligence Analysis is available from NTIS, 800-553-6847 or 703-605-6000, for $47 plus $5 handling fee; quote order number: PB99- 928007KPV. Most major credit cards accepted. Order via e-mail: orders@ntis.fedworld.gov. Fax order to: 703-605-6900. See NTIS Web site: http://www.ntis.gov. CONTACT: Renee Edwards, Public Affairs Director of the National Technical Information Service, 703-605-6400 or redwards@ntis.fedworld.gov" (Heibel)
WHO PAID THE PIPER?: THE CIA AND THE CULTURAL COLDWAR, by Frances Stonor Saunders, Granta Books, London, 1999. (To be published in USA by New Press in April 2000.) http://granta.nybooks.com/grbook_book.cgi?trl=69389&view=full
NATIONAL INSECURITY: U.S. INTELLIGENCE AFTER THE COLD WAR, by Craig Eisendrath, (ed) , Temple U Press, Jan 2000. The book is a project of CIP and has a foreword by Senator Tom Harkin. Contributors include Mel Goodman, Pat Holt and Roger
Hilsman. "... ten prominent experts describe, from an insider perspective, what went wrong with U.S. intelligence and what will be necessary to fix it. ... they propose a radical rethinking of the United States' intelligence needs in the post-Cold War
world. http://www.us.net/cip/insecure.htm
FEET TO THE FIRE: CIA COVERT OPERATIONS IN INDONESIA, 1957-1958, by Kenneth Conboy, "Naval Inst Press, 1999.
http://usniiis.usni.org/databaseform.asp?bookisbn=1557501939&cartid=voav4428
INDUSTRIAL ESPIONAGE. USA Today (1/19) has a good article on secrecy and espionage in the business world and how firms are setting up classified info handling systems and coping. http://www.usatoday.com/news/acovwed.htm
AT COLD WAR'S END: US INTELLIGENCE ON THE SOVIET UNION AND EASTERN EUROPE, 1989-1991, Benjamin B. Fisher, ed. CIA, 1999
SECTION IIIA -- INTELLIGENCE HUMOR
There was an IMINT guy, a SIGINT guy and a MASINT guy in a bar. Now, if you don't know the intelligence discipline, IMINT is imagery intelligence, SIGINT is signals intelligence and MASINT is measurements and signatures intelligence. They were having a chat and they noticed a couple of young ladies in the bar, on the other side of the bar in the corner, having a very heated discussion. And they looked at each other and they said, "It would be really nice if we knew what those young ladies were saying. We're intelligence types, we should be able to figure this out."
The IMINT guy says," I've got it, I've got this new long-dwell imaging system," and pulls out a big telescope. "I've got a new focal point array that I can update very rapidly, I can look at the video and I can read their lips and figure out what they're saying." He sets it up, gets it calibrated, gets it in focus; and every time he gets it into focus the ladies turn and he can't see their lips. He mutters something about terrain masking and says, "I can't do it."
The SIGINT guy says, "I've got it, I've got this new joint SIGINT avionics family. It's the latest digital system for the Department of Defense." He pulls it out, says "I've got the whole spectrum digitized, I can focus in on what they're saying and figure out what they're discussing." He turns it up and at first he gets a conversation over on the other side of the bar, a couple of gentlemen discussing business. He keeps tuning and tuning, he gets an FM radio station, rock and stuff. He can't hear what the ladies are saying and he mutters something about co-channel interference and says, "I can't do it."
The MASINT guy says, "I've got it, I've got this great new technique where I use lasers to illuminate the subjects, and with a hyperspectral detector I can figure out the acoustic modulation of the salinity content of the sweat on their brow, and by that I can figure out what they're discussing." He tunes it up and gets it all set up and data comes spewing out of the system, tons and tons of data. He doesn't seem to be getting any signatures and he mutters something about aerosol scattering in the cigarette smoke and he says, "I can't do it."
So, they had pretty much given up on figuring out what the young ladies are discussing, when the young ladies come over and they say, "We understand you were trying to figure out what we were discussing."
The intel guys look at each other, sorely puzzled, and the ladies say, "What we really ended up discussing was whether or not you guys would ever figure out what we were talking about."
The IMINT guy says, "Well, how did you know that?" and one of the young ladies says, "Well, we tipped the bartender fifty bucks and he told us, that's called HUMINT," human intelligence.
WIN excerpts, commentaries and critiques are based on open sources and written by the Producer/ Editor (Roy Jonkers) and/or the two associate editors (RADM (ret )Don Harvey and Dr. John Macartney), for AFIO members and subscribers. Each of the editors is a former intelligence professional with a perspective based on 30 to 50 years of intelligence collection, analysis, teaching, operations and leadership experience. Professor Robert Heibel (FBI ret) and other AFIO members (such as George Dothyl, Clark Griffith, Tom Hart, Ed Milligan, Chip Beck and Dr. Kiracoffe) also contribute source or reference material.
WINS for 1998 and 1999 are stored on our Website at www.afio.com . The AFIO site contains a keyword search engine to facilitate WIN back-issue research.