|
|
|
Weekly Intelligence Notes
11 February 2000
|
WINs are covered by copyright laws and may not be reproduced without permission from the
Producer / Editor, Roy Jonkers afio@afio.com. Commentary and
opinions included are those of the Editor or the associate editor listed in the
byline.
Members: Keep AFIO healthy and effective! Sponsor a new member! For Membership
details see our website at https://www.afio.com
We need:
1000 NEW MEMBERS IN 2000
EVERY MEMBER SPONSOR A MEMBER!
Warning Notice: Perishability
of Links: WINs, sent weekly to members, often contain numerous webpage
links to fast-breaking news, documents or other items of interest; unfortunately, after four weeks many of these websites [especially newspaper and other media sites] remove items
or shift them into fee-only archives.
This underscores the benefit of receiving the WINs as they are released.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
SECTION I: CURRENT INTELLIGENCE
FORMER DCI SECURITY VIOLATION -- John Deutch, the former Director of
Central Intelligence and Deputy Secretary of Defense, who lost his CIA
clearances last summer for violating security rules, volunteered Tuesday to give
up his Defense Department industrial security clearances. Pentagon spokesman
Kenneth Bacon said the clearances would be withdrawn in line with Deutch's wish.
Dr Deutch has not (yet) been accused of compromising CIA or Pentagon secrets.
DCI George Tenet has said that the CIA had found no evidence that national
security information was lost due to Deutch's security lapses, but that
``potential for damage to U.S. security existed.'' After a deluge of weekend
news reports about Deutch's continued access to Defense Department classified
information, the Pentagon's inspector general finally asked the CIA for its
evidence on Deutch's security breaches. Defense Secretary William Cohen told
reporters. ``I think it should have been done sooner, but it was not."
The Deutch matter is being examined by the House and Senate Intelligence
committees, and the controversy has spilled over into the realm of politics and
embroiled the current DCI, George Tenet. Chairman Porter Goss, House PSCI, has
taken the view that he has been kept informed all along by the DCI, and that
there was no "slow-rolling" of the investigation by the Agency. Goss
did state that he was concerned about the actions of two former high-ranking CIA
officials, Nora Slatkin and Michael O'Neill.
Chairman Richard Shelby, Senate SCI, however, has invoked the possibility of a
"cover-up," and has questioned the months of delay in notifying the
Department of Justice. Shelby's committee has met behind closed doors with both
Tenet and CIA Inspector General Britt Snider, who issued a report that included
the conclusion that Tenet "should have involved himself more forcefully to
ensure a proper resolution of this matter." Shelby also has invited John
Deutch to testify.
Some call the Deutch affair the "intelligence scandal du jour," but
for intelligence personnel, the implications for leadership by example remain to
be addressed. ""Sloppy" security examples by top leaders is not
only dangerous to national security, it is not inspiring, nor does it provide
moral support for prosecution of security transgressions by line and staff
personnel. (AP and miscel press 10 Feb 00; V Loeb, Wpost 11Feb2000,p. A39) ) (Jonkers)
IRAQ SITREP - Evidence from satellite photographs and other intelligence
sources indicates that Iraq is repairing some of the damage done to the one
hundred military and industrial sites destroyed by the 1998 US/British air
strikes. Of those targets, 12 were missile factories or industrial sites that
were defined as involved in Iraq's efforts to produce "weapons of mass
destruction." Some intelligence sources are said to be concerned about the
reconstruction. Others are of the opinion that the reconstruction of walls and
roofs is not necessarily dangerous.
The production of nuclear, chemical or biological weapons is a non-trivial
exercise and expensive. But Iraq is earning dollars by smuggling oil, evading
the sanctions. Last month, Iraq's illicit trade reached the highest levels since
the Persian Gulf war. More than 130 ships left Basra and skirted the Iranian
coast, staying in Iranian territorial waters to evade the US Navy ships trying
to intercept them. The Navy nevertheless boarded 36 ships, and seized four. One
of those involved a Russian ship that caused a minor diplomatic dust-up; the oil
cargo was confiscated and is being off-loaded in Oman. At full market prices the
oil smuggled in this month alone could be worth as much as $60M to Iraq. Such
income decreases the leverage the US has to force inspectors on Iraq.
To place all this in context, US officials say that there are three Red Lines
that the Iraqis will not be permitted to cross: a threat against a neighboring
country like Kuwait or Saudi Arabia, an attack on the Kurdish minority in the
north, or a reconstitution of nuclear, chemical or biological weapons programs.
It is no secret that Iraq remains under intense US and allied intelligence
surveillance. (NT Times, p. A1, 1 Feb 2000) (Jonkers)
PRESIDENT'S FY 2001 BUDGET - President Clinton's proposed $1.84 trillion
budget includes millions of dollars in new spending on technology and law
enforcement programs. The record budget request for the 2001 fiscal year, which
begins 1 October, asks Congress for more money for wiretapping, police
databases, antitrust enforcement, and computer crime forensics. One of the
heftiest increases, from $15 million to $240 million, will pay telephone
companies to rewire their networks to facilitate federal and state wiretapping.
Under the 1994 Communications Assistance to Law Enforcement Act (CALEA),
Congress may "reimburse" phone companies for their efforts, but the
controversial process is the subject of a lawsuit currently before a federal
appeals court.
The administration's final budget is also laced with information technology
proposals. Many of them focus on information security and electronic government
initiatives. The most obvious addition to the list is IT security.
"Protecting information systems that the federal government depends on and
that are critical to the. economy is growing in importance as society's use of
technology and reliance on interconnected computer systems increases," the
budget said. "Government agencies must follow the Y2K
example in reaching out to private industry to assist and encourage sensible
infrastructure protection efforts." http://www.gcn.com/vol1_no1/daily-updates/1297-1.html
http://www.wired.com/news/politics/0%2C1283%2C34164%2C00.html
(Sulc)
GOVERNMENT INTERNET SITES HACKED - The hackers behind a recent series of
invasions of government-run Web sites may have gained access to the sites by
stealing the user names and passwords belonging to the engineers operating the
systems, according to investigation sources. The hackers may have replaced the
user names and passwords with new ones after illegally entering computer servers
that operate the Web sites. The hackers are also suspected of erasing
communications records -- known as logs -- in an attempt to remove information
that could help trace them. Currently, specialists and investigators are trying
to work out how hackers gained access to the Web site servers. The sites broken
into include those run by the Science and Technology Agency and the National
Institute for Research and Advancement (NIRA), an affiliate of the Economic
Planning Agency.
http://www.yomiuri.co.jp/newse/0208cr21.htm
(L. Sulc)
INTERNET VIRUS ATTACKS - The FBI is investigating massive
"attacks" on major Internet Portal routers, knocking them out of
action for hours at a time. Yahoo, the world's most frequently visited Internet
Web Portal, which was knocked out of service for a number of hours on Monday,
attributed it to being the victim of the equivalent of a phone prank. The site
was hit by a so-called denial-of-service attack. A person or machine was sending
packets of data in such volume that it prevented users from accessing parts of
the site. The attack originated from 50 different Internet Protocol addresses,
according to the company. Up to 1GB of requests per second flooded Yahoo's
routers.During succeeding days other Internet providers experienced similar
attacks
It appears that the attack involved a new software virus strategy called
"tribe flood," or "tribal flood," that has recently arrived
on the scene. Tribe flood goes out and infects many computers at once -
typically computers at a university or government
installation that have broadband Internet access and are constantly powered up.
It drops software into the computers that causes them, on command, to start
calling up a particular site and flooding the access to it. (http://www.newsbytes.com/pubNews/00/143526.html)
(L. Sulc)
NEW DCI COLLECTION CONCEPT CENTER -- The intelligence game is never dull.
As expertise in Information Systems becomes global, and knowledge about
intelligence system capabilities widens, actual or potential adversaries are
becoming increasingly adept at denial and deception. They hide projects from
reconnaissance satellites, use sophisticated encryption for communications, find
new ways to launder funds, etc. To deal with this phenomenon, a DCI Collection
Concept Development Center has been created under Charles Allen, Assistant
Director of Central Intelligence for collection. This year it plans to focus on
three hard target problems, bringing together analysts and collection officers
from the CIA, FBI, NSA, DIA, and NIMA to focus on each problem intensively. (WPost
11Feb00, p.A39, Loeb) (Jonkers)
NRO EVALUATION COMMISSION MEETS - The new commission to review the
operation of the National Reconnaissance Office (NRO) held its first meeting
yesterday. The 11-member panel was chartered by Congress. Senator Bob Kerrey,
who wrote the enabling legislation, announced the ingoing bias: "I think
the NRO has serious problems." It appears that the problems involve the old
Washington funding game. Billions are being invested in a new generation of
stealthier space reconnaissance platforms, but the funding for the necessary
computer processing and communications systems is probably lagging behind. As
noted before, getting a new system funded often involves containing the
announced cost by budgeting for the collection system first, then letting this
approved investment later drive the funding for the processing and
dissemination. Commission members include former NRO Director Marty Faga and Lt
General Patrick Hughes, USA (ret), former director of DIA, among others,
including Rep. Porter Goss (R-Fla.),
Eli Jacobs and Larry Cox. (Wpost, 11Feb00, Loeb) (Jonkers)
SECTION II: CONTEXT AND PRECEDENCE
KOSOVO ASSESSMENT UPDATE - Two Serbs, a man and a woman, were killed and
five others injured on Feb. 2 when a UN refugee bus was hit by a terrorist
rocket between the Serb village of Banja and the divided northern town of
Kosovska Mitrovica. The bus, leased by the United Nations High Commissioner for
Refugees (UNHCR) and protected by an escort of French soldiers from the NATO-led
Kosovo Force (KFOR), was carrying 49 Serb men, women and children. The bus
convoys are the UNHCR's latest attempt at providing some measure of freedom for
Serb peasants remaining in Kosovo.
The Kosovo Liberation Army (KLA) has continued and stepped up its campaign of
murder and intimidation against Serb and other non-Albanian men and women under
the US/NATO occupation, continuing its twenty-year old effort to gain control of
the province. Nearly 250,000 non-Albanian Kosovars (including not only Serbs,
but Turks, Gypsies, Jews and other minorities) have fled the province in the
wake of NATO's bombing campaign last June and the subsequent KLA terror
campaign. It constitutes a notable, if unlamented (by the US) and under-reported
ethnic cleansing. It may be recalled that the KLA was considered a criminal
narcotics-trading terrorist organization before being suddenly publicly embraced
by the Administration last year.
There are indications that the deteriorating situation on the ground is
stimulating the Administration to redefine its policy in Kosovo. When the United
States and NATO ultimately engineered a "victory" (by blowing the
civic infrastructure of Yugoslavia apart) last June, they expected to bring
closure by occupation of Kosovo. This has not happened. The alliance began an
open-ended occupation in which the mission did not correspond to the reality on
the ground. The avowed mission of NATO forces was to ensure the security of all
residents. The reality has been that NATO forces have been, quite against their
stated intentions, acting as the agents of the Kosovo Liberation Army (KLA). The
KLA used the NATO occupation as a means for institutionalizing KLA rule in the
province. The effect was to turn the presumed victims into victimizers and NATO
peacekeepers into their unwitting tools.
It is therefore no surprise that SecDef Cohen recently said that military
commanders were " concerned about the possibility of mission creep - that
the military is being called upon to engage in police functions for which they
are not properly trained and we don't want them to carry out." The
administration has acknowledged that the situation is getting out of hand. The
solution that is evolving in Washington is to blame the Europeans and demand
that they shoulder more of the burden. But the Europeans are not eager to
undertake full responsibility for KFOR. Except for the British government, the
rest of Europe was more than a little restrained in their enthusiasm for the
war.
European governments also regard the ramifications of the end game of Kosovo, in
which the Russians were arrogantly humiliated, as a Pyrrhic victory. After
needlessly pushing the Russians into an increasingly wary posture, we must now
deal with the inevitable corollaries -- including a potential Russian-Chinese
rapprochement. Whether our strategic interests and national security are served
by these developments is highly questionable. Henry Kissinger is calling for a
return to historical perspective and a course correction on emotional moral
crusades.
U.S. troops are now caught in the crossfire between Kosovo factions, and the
apparent irrationality of the operation will require political action in this
election year. It is possible that the assassinations of several Serb leaders
recently ( including Arkan, accused of warcrimes), and the ongoing covert and
overt efforts to stimulate the secession of Montenegro from Yugoslavia, as well
as recent further strengthening of economic sanctions on Yugoslavia/Serbia (a
form of mass punishment of questionable effectiveness in terms of its goal, the
overthrow of Milosevic) are all expressions of the Administration's increased
priority on pulling out of this quagmire - without throwing the baby out with
the bathwater. (Ref. miscellaneous, including: Sources, Feb 00, Stratfor Weekly
/global Intelligence Update 7 Feb 00; and AP, Robert Burns; miscellaneous press
reports; Kissinger in Wpost 10 Jan2000, p.A19) (Jonkers)
WHOSE MAIL SHOULD WE READ? It was in 1923 that Secretary Daniels directed
the Army to close its signals intercept operations, saying "Gentlemen do
not read other gentlemen's mail." A December 1999 letter to the editor of a
Washington paper illustrates that such high-minded (and a touch naive)
sentiments still bedevil hard-working intelligence officers. The Director of the
Center for National Security Studies wrote a letter to the editor informing the
paper that the NSA's regulations for intercept of overseas Americans'
communications do not meet constitutional standards -- such as "requiring a
warrant prior to any surveillance." The letter continued: "Equally
troubling is the fact that no law prevents the agency from targeting overseas
communications from non-Americans, whether they be Russian or Egyptian human
rights activists labeled terrorists by their governments or individuals
suspected, rightly or wrongly, of criminal activity. Such surveillance,
conducted in secret and without probable cause, is wholly unrestricted under
existing law. Unlike Cold War surveillance of the Soviet Union, NSA
eavesdropping on such individuals violates their universally guaranteed human
rights to privacy and due process of law."
The difference between intercepting Libyan communications related to the bombing
of American servicemen in a Berlin nightclub or "Cold War surveillance of
the Soviet Union" is not readily apparent. The electronic surveillance of
Saddam Hussein's communications to his terrorist groups is something most
Americans would hope the NSA is doing, even if done in secret and without
"probable cause." Since Americans and American interests abroad are
the largest target of a variety of terrorist groups and a number of
international criminal rings, it seems grotesque to be greatly concerned about
violation of their "universally" (whose universe?) guaranteed human
rights. (Wash. Post 16 Dec '99, p. A38 ) (Harvey)
SECTION III: BOOKS and REFERENCES
VINCE CANNISTRARO LETTER. The Feb 9 Washington Post carries a letter from
former senior CIA official (and AFIO Member), Cannistraro. The letter takes
issue with a Jim Hoagland column that appeared in the Post on Jan 16. In his
Post column, Hoagland had blamed CIA, in part, for recent Islamic terrorist
activity because of CIA aid to the Afghan mujahadin in the 1980's. In response,
Cannistraro points out the CIA did not recruit the "Arab zealots" who
came to join the Afghan resistance, and, moreover, most of those Arab fighters
came later, after the Soviets had pulled out of Afghanistan and US support had
been withdrawn.(Macartney)
http://www.washingtonpost.com/wp-srv/WPlate/2000-02/09/014l-020900-idx.html
SECDEF ANNUAL REPORT ON NATIONAL SECURITY. Annual Report to the President
and Congress (part of the FY2001 budget documents) is available in pdf format
(2193K, 351 pages). http://www.dtic.mil/execsec/adr2000/adr2000.pdf
HOME COMPUTER RISK FROM HACKERS. Home computer users who believe hacking
is a threat only to government and corporate networks need to realize that the
Internet puts them at risk of being invaded by computer predators, too.
http://www.msnbc.com/news/366221.asp
(Macartney)
FLAWED BY DESIGN: THE EVOLUTION OF THE CIA, JCS, and NSC, by Amy Zegart,
Stanford U Press, Nov 1999, 342 pages. This book was the winner of the American
Political Science Association's White award, the highest honor for a public
administration doctoral dissertation.
"The NSC was established by accident, the byproduct of political
compromise; Navy opposition crippled the JCS from the outset; and the CIA
emerged without the statutory authority to fulfill its assigned analysis role,
thanks to rival intelligence organizations. Not surprisingly, the new agencies
performed poorly as they struggled to overcome their initial handicaps. Only the
NSC overcame its institutional origins as presidents exploited several loopholes
in the National Security Act to reinvent the NSC staff. The JCS, by contrast,
remained mired in its ineffective design for nearly 40 years, throughout the
Cold War, and the CIA's pivotal analysis branch has never recovered from its
origins. In sum, the agencies Americans count on most to protect them from
enemies abroad are, by design, largely incapable of doing so. " (Macartney)
TRAPPED IN THE COLD WAR, by Hermann Field, Stanford U Press, 1999, 345pp.
The author is Noel FIELD's brother. Noel, an avid Communist, was recruited for
the NKVD/GRU by Hede MASSING when he was in the State Department in the mid-1930s.
After going to Switzerland, he worked for KRIVITSKY in Europe before the war and
DULLES/OSS in Berne during the war as an agent of sorts. He refused to return to
the USA after the war because he knew the truth about HISS and didn't want to
testify. He and his wife went instead behind the Iron Curtain where they were
imprisoned as a CIA spies. His brother (Hermann) went after him and was himself
imprisoned. Then Noel's "adopted" daughter went after both, and she
too was imprisoned in the Soviet GULAG for 5 years and then sent home. Hermann,
who was eventually released and returned to the States, is the only one left.
(Hayden Peake)
OPERATION ROLLBACK: AMERICA'S SECRET WAR BEHIND THE IRON CURTAIN,
forthcoming in May by Peter Grose, tells of the CIA's early Cold War attempts
(mostly unsuccessful) to insert resistance fighters into Eastern Europe. Book
reveals that George Kennan, usually known as an apostle of moderation, was chief
architect and advocate in the late 40's and early 50's of these covert action
programs.
http://www.washingtonpost.com/wp-srv/WPlate/2000-01/31/016l-013100-idx.html
INFO WAR.COM. Web site focusing on IW has, among other things, a page
devoted to intelligence matters. http://www.infowar.com/class_2/class_2.shtml
WHAT DO INTELLIGENCE ANALYSTS DO?
http://www.infowar.com/class_2/00/class2_012700a_j.shtml
NEW ON-LINE INTELLIGENCE FORUM. There is a new "forum dedicated to
the scholarly study of intelligence and national security." (free) http://www.intelforum.org/
++++++++++++++++++++++++++++++end+++++++++++++++++++++++++++
Back to Top
Back to Top
About AFIO |
Chapters & Chapter Activities |
Membership |
Corporate |
Weekly Intelligence Notes |
Event Schedule |
Bulletin Board |
Book Reviews |
Search |
AFIO Store | |
Other Intel Sites | Home Page
AFIO Central Office
6723 Whittier Avenue, Suite 303A
McLean, Virginia 22101-4533
Telephone: 703 790 0320 | Facsimile: 703 991 1278
Email: afio@afio.com
|