Weekly
Intelligence Notes #27-00 |
WEEKLY INTELLIGENCE NOTES (WIN) #27-00 dated 9 July 2000
WINs are protected by copyright laws and may not be reproduced except with
the permission of producer/editor Roy Jonkers <afio@afio.com>.
Warning Notice:
Perishability of Links: WINs, sent weekly to members, often contain
numerous webpage links to fast-breaking news, documents or other items of interest; unfortunately, after four weeks many of these websites [especially newspaper and other media sites] remove items
or shift them into
fee-only archives. This underscores the benefit of receiving the WINs
as they are released.
SECTION I -
CURRENT INTELLIGENCE
BIN LADEN THREATENS TO KILL AMERICANS. The Al Qaida group led by Bin
Laden is said to have relayed a warning to President Clinton against
executing Mir Aimal Kansi, convicted of murder in the attack outside
CIA headquarters which killed two CIA employees and wounded three others on
Jan. 25, 1993, a political murder apparently in revenge for yet other
assassinations or killings blamed on US involvement. A jury in Fairfax
County, Virginia recommended the death penalty for Kansi on Nov. 13, 1997.
The sources said Bin Laden's organization threatened to retaliate for the
execution of Kansi -- by killing 100 Americans, according to Middle East
Newsline. "If our volunteers are not able to hang 100 Americans in the
United States, they would complete this number with employees of U.S.
embassies all over the world." In the old way of 'an eye for an eye,'
or better yet, 'a hundred eyes for an eye,'
a time-honored custom still enshrined today in the cultures of the Middle
East, the beat goes on. http://www.worldtribune.com/tout-2.html
(Macartney / Jonkers)
NATIONAL INTELLIGENCE ESTIMATE ON BALLISTIC MISSILE THREAT --
American intelligence chiefs will gather on 11 July at CIA to try to come to
a consensus on an overdue National Intelligence Estimate (NIE) about a
National Missile Defense (NMD). Whereas the debate previously was on how
soon a "rogue" nation might develop intercontinental missiles, the
focus now seems to be on whether or not a US missile defense deployment
would cause global instability.
Whatever the NIE says, it will be controversial, given the ongoing NMD
debate and high stakes involved. "There's a lot of pressure from the
Hill driving this process," said a longtime intelligence official
involved in preparing the new report. "You end up with reams of
possibilities, including what is least likely and what is unthinkable. We
are writing in worst-case language. Frankly, from my perspective, this is
nonsense." A senior intelligence official acknowledged that people on
all sides of the debate were "looking for something in what we say to
support their own arguments." (Macartney) (<http://www.nytimes.com/library/world/global/070500missile-defense.html>
<http://www.washingtonpost.com/wp-dyn/articles/A59882-2000Jul6.html>)
EU, FRANCE TO INVESTIGATE "ECHELON." The European
Parliament voted Wednesday to widen a probe into a U.S.-led communications
intercept network allegedly monitoring billions of phone calls, e-mails and
faxes. The EU commission will investigate whether Echelon infringes on the
rights of European citizens and industries.
The EU query is conducted in parallel with a preliminary judicial
investigation by a French state prosecutor into the workings of the Echelon
system. The French state counterintelligence agency DST has been ordered to
find out whether Echelon's activities could qualify under French law as
"harmful to the vital interests of the (French) nation." The
investigation could spark a diplomatic row with the US, but would not
necessarily lead to legal action. Washington has been accused of using the
system for economic espionage against its allies, a charge denied by the US.
<http://dailynews.yahoo.com/h/ap/20000705/wl/eu_echelon_1.html>
<http://news.excite.com/news/r/000705/17/france-usa-spying>
(Wall St J /Reuters 07/06/00) (Macartney / Jonkers)
"SAFE HARBOR" SCUTTLED - In a move that signals growing
international concern over online privacy, the European Parliament this week
voted down the proposed "Safe Harbor" agreement that would have
allowed the export of electronic data regarding European citizens to the
United States. (Levine's Newbits ) (<http://www.techweb.com/wire/story/TWB20000706S0014>)(Jonkers)
SECTION II - CONTEXT AND PRECEDENCE
INTELLIGENCE AND INTERNATIONAL LAW. The State Dept recently reported to
Congress on the implementation of the International
Convention on Combating Bribery of Foreign Public Officials. This Convention
is a principal weapon for combating a particularly damaging form of
corruption. "Bribery and other forms of corruption impede governments
in their efforts to deliver basic services to their citizens; they undermine
the confidence of people in democracy; and, they are all too often linked
with transborder criminal activity, including drug trafficking, organized
crime and money laundering," said Assistant Secretary of State E.
Anthony Wayne.
At the same time, however, Congress is preparing to pass legislation that
will *exempt* US intelligence agencies from the standards and constraints
imposed by this kind of international convention. Section 305 of the
Intelligence Authorization Act for FY 2001 states that future laws
implementing such international agreements or treaties shall not apply to
U.S. intelligence unless Congress explicitly declares otherwise. <http://www.fas.org/irp/news/2000/06/000629-bribery.htm>
<http://www.fas.org/sgp/bulletin/sec84.html>
(Macartney)
LOS ALAMOS SECURITY PROBLEM REPORTS - -
Two recent reports, one by the former chief of counterintelligence for the
CIA and consultant to the House intelligence committee (HPSCI), and one by
the director of the Brookings Center for Public Service, have examined the
recent series of Los Alamos security busts with more depth than the usual
media and political handwringing, horror and alarm.
The former counterintelligence (CI) chief ascribes the abysmal lack of
security at DoE and the three national security labs, especially Los Alamos,
to Energy's failure to convince the lab scientists of the need for tougher
security and CI measures. The new regulations "were not accompanied by
a strong effort by department officials to sell the changes to the
rank-and-file" and as a result, there was open rebellion against
publicized efforts to polygraph hundreds of employees; at the same time
counterintelligence training efforts at the labs "has
been dismal." The report to HPSCI noted that the scientists have
some legitimate concerns about whether such a large polygraph program could
be made to work fairly. The report noted, however, that a part of the
problem was that the scientists believed they were "indispensable and
thus should be exempt from such demeaning and intrusive measures as the
polygraph."
DoE was criticized in the report as being "ineffectual" in
explaining the need for polygraphs. It recommended that DoE should model its
security after the NSA example where comparably educated scientists enter a
culture where from the very beginning, security, CI and the polygraph
"are givens in their daily work."
The second interpretation of the sad Los Alamos security environment focuses
on the organization (and layering) of the bureaucracy above the Los Alamos
worker. The writer details the number of phone calls Secretary of Energy
Richardson would have to make to actually make good on clearing up his
mystification about the latest security breach by making calls asking what
happened at every link in his chain of command. It would take him 23 to 28
calls just to work through the assistant deputy administrator, associate
deputy assistant adminstrator for..., division chief, office directors,
branch chiefs, etc. levels in the headquarters alone. Another six to 10
calls would get through the University of California hierarchy which
administers the Los Alamos contract, then another five to10 would be
necessary in the Los Alamos lab itself. If he wants to check with the Inspector General
to get down to the field staff who might actually know something about the
security breach, he would need seven to 10 more calls. The writer says
"fifty calls and Richardson will still be hard pressed to point a
finger at any one person." The problem is not too few managers but too
many.
The double-hatting Richardson did when Congress forced the new security
organization down his throat comes in for criticism as well. (NYTimes 28
June '00, by James Risen; Washington Post 28 June '00, p.25 by Paul C.
Light) (Harvey)
WEN HO LEE CASE (cont'd) The case against the accused Los Alamos
nuclear scientist, Wen Ho Lee, now held in solitary confinement after years
and months of Government inaction based on the same set of facts (according
to reported stories), is proceeding. His lawyers have filed a
"selective prosecution" motion, arguing that Lee has been singled
out for prosecution (in an organization characterized by years of lax
security) because he is a Chinese American. This motion includes a sworn
declaration from Robert Vrooman, former chief of counterintelligence at Los
Alamos, which states: "I state without reservation that racial
profiling was a crucial component of the FBI's identifying Dr Lee as a
suspect."
Subsequently, in response to a judge's order, the government filed a motion
stating that Lee may have downloaded official nuclear weapons research files
in order to compile a resume to impress prospective employers in countries
as diverse as Taiwan, Australia, France, Germany, Hong Kong, Singapore and
Switzerland, and possibly China. The government may add to that list.
Placing official information on private computers is clearly a violation of
the rules and inexcusable, but other Government officials have done much
worse and get away with a slap on the wrist when discovered, if media
reporting is accurate. The context for this type of behavior has been an
environment of inadequate security-consciousness (and concomitant
invulnerability arrogance or vulnerability ignorance) coupled with pressure
to perform -- to extend the workday and do the work at home. For Wen Ho Lee,
there is, presumably, classified "other information" as a basis
for prosecution -- unless the whole affair is primarily political posturing
and Lee is the disposable "throw-away."
<http://www.washingtonpost.com/wp-dyn/articles/A47685-2000Jul4.html>
<http://www.washingtonpost.com/wp-dyn/articles/A58503-2000Jul6.html>
(Macartney / Jonkers)
MORE ON JOHN MILLIS SUICIDE. In the Washington Times "Inside the
Ring" column of July 7, Bill Gertz & Rowan Scarborough report that
the house Intelligence Committee's press spokesperson, Jennifer Millerwise,
abruptly resigned last week. It had been her job to fend off press questions
about the tragic fate of the former Staff Director, John Millis, who
committed suicide on June 4th.
Gertz & Scarborough go on to write that "senior intelligence
community officials . . . told us that the death of Millis was the result of
a 'personal tragedy' and not related in any way to [former DCI] Mr Deutch
[who Millis had publicly criticized on several occasions], the CIA,
intelligence information or US national security."
Previously, Gertz had reported that Millis was despondent because he was
under investigation by the committee. The full story will undoubtedly be
revealed in time but does not affect the tragedy of this loss.
<http://www.washtimes.com/national/default-2000628221310.htm>
<http://www.washtimes.com/national/inring-20007721163.htm>
SECTION III - CYBER INTELLIGENCE
TAIWAN TO CREATE CYBER WARFARE CENTER --
Taiwan's Ministry of National Defense will set up a cyberwarfare
center to study strategic and tactical information warfare to
threats from Beijing. According to the report by the Central News
Agency, the Ministry of National Defense will establish the center
and an emergency task force to study possible defenses against
cyberwarfare and draw up response plans in the case of emergency.<http://www.newsbytes.com/pubNews/00/151751.html>
Levine's Newsbits 07/06) (Jonkers)
FBI RAISES SECURITY ISSUES ON JAPANESE ACQUISITION OF US INTERNET SERVICE
PROVIDER -- The Federal Bureau of Investigation has raised
national-security concerns about a Japanese company's attempt to acquire a
U.S. Internet service provider, signaling the government's increasing worry
about the globalization of, and its loss of control over, telecommunications
networks. The FBI registered its concerns with the Treasury Department about
Nippon T&T corporations planned acquisition of Verio Inc, (Colo). In
recent years, the FBI and other security agencies have raised concerns about
their ability to maintain surveillance over telecommunications networks
being acquired by companies based outside the U.S. Now law-enforcement
officials appear to be moving to extend their influence to Internet deals,
which generally aren't regulated by the Federal Communications Commission
but come before an obscure Treasury panel called the Committee on Foreign
Investment in the U.S. (<http://www.msnbc.com/news/429428.asp>
Levine 06/07) (WSJrnl 07/06/00) (Jonkers)
SECTION IV - BOOKS AND OTHER SOURCES
COMMANDERS WINN AND KNOWLES: WINNING THE U-BOAT WAR WITH INTELLIGENCE,
1939-1943, by David Kohnen, Krakow, Poland, Enigma Press, 1999 (in US,
Classical Crypto Books, Londonderry NH), 168 pages. Although the public
revelation of the Allied breaking of the German U-boat cipher has become a
historical staple, Kohnen tells the real story - the fact that broken
messages do not immediately or necessarily produce usable intelligence. They
need analysis, interpretation and context.
Commanders Winn (UK) and Knowles (US), both reservists medically
disqualified from combat service, were in charge of the British and American
submarine intelligence centers that cooperated closely and served as
"all-source" analysis centers. Each center became a clearing house
where intelligence data from all sources (reconnaissance, radar, HF-DF,
HUMINT, etc.) and friendly forces data were 'fused' into a coherent picture.
Taken together these sources, when melded with the decrypted messages,
formed the basis for predictions of U-boat locations and movements.
Kohnen also examines the controversy surrounding Admiral Ernest King's
handling of the 1942 German U-boat offensive along the US east coast, and
explores the differences that arose between the British and American
organizations and approaches. On balance, even readers well versed in the
period will find substantial new information in this work. Professionals
will recognize the confirmation of the old truth -- that the best new
intelligence sources are of no use if the information is not analyzed and
sent to the operating forces in a timely manner. (reviewed by Lt Dale
Rielage, USN, Naval War College Review, p. 242) (Jonkers)
DECODING HISTORY: THE BATTLE OF THE ATLANTIC AND ULTRA, by W.J.R.
Gardner, Naval Institute Press, Annapolis, Md., 1999, ISBN 1-55750-158-0,
references and bibliography, index, 257 pages. This book by a thirty-year UK
submarine service veteran, now Historian, Naval Historical Branch, UK
Ministry of Defence, presents another view of the same battle covered by the
Kohnen book (above), also placing ULTRA in context . Gardner covers the
German attack on vulnerable allied shipping lanes across the Atlantic, an
attack which was overcome, with some difficulty,
by applying a number of means including ULTRA. Many histories have
attributed the outcome of the battle largely to ULTRA itself, sometimes
because of a lack of rigorous analysis or by a failure to set ULTRA in the
full and complex contexts in which it operated. This study rectifies that
deficiency, carefully analyzing complicated patterns of factors leading to a
more balanced understanding of code-breaking. For academics, students,
professionals and aficionados, recommended. (Jonkers)
SENATE COMMITTEE REPORTS -- Both the Senate intelligence committee
and the Senate Armed Services Committee have issued reports on the
Intelligence Authorization Act for FY 2001. Steven Aftergood commented that
the reports "illustrate the rivalry between the Senate Armed Services
Committee and the Senate Intelligence Committee -- in which the Intelligence
Committee always gets stomped -- but also reveals some incidental details of
current intelligence programming debates. The reports can be found at the
URL's below. <http://www.fas.org/irp/congress/2000_rpt/s106-325.html>
<http://www.fas.org/irp/congress/2000_rpt/s106-279.html>
<http://www.fas.org/sgp/aftergood.html>
DIA HAS UPGRADED ITS HOMEPAGE.
<http://140.47.5.4/>
INTERPOL HOMEPAGE.
<http://193.123.144.14/interpol-pr/index2.htm>
VIRTUAL TOUR OF THE PENTAGON can be found at <http://www.defenselink.mil/pubs/pentagon/>
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Commentary and opinions included are those of the WIN Producer/ Editor Roy
Jonkers or the associate editors (RADM (ret) Don Harvey or Professor (ret)
John Macartney), or the contributor listed in the tagline.
MEMBERS: We need fresh blood - new members! Talk to your friends &
colleagues.
For Membership details see our website at <https://www.afio.com>
++++++++++++++++++++++++++++++END++++++++++++++++++++++++++++
For
comments, contact the editor Roy Jonkers at afio@afio.com
For email
address changes, contact Gretchen Campbell at afionational@cs.com
For back issues of the WIN, check the AFIO
Website www.afio.com
For AFIO Website requests/comments, contact
afio@afio.com
About AFIO | Chapters & Chapter Activities | Membership | Corporate | Weekly Intelligence Notes | Event Schedule | Bulletin Board | Book Reviews | Search | AFIO Store | | Other Intel Sites | Home Page
AFIO Central Office
6723 Whittier Avenue, Suite 303A
McLean, Virginia 22101-4533
Telephone: 703 790 0320 | Facsimile: 703 991 1278
Email: afio@afio.com