Search This Blog

Saturday, September 11, 2010

47. Intelligence Sources – 5. S&T




In blog entry Number 19 I posted a brief explanation of how intelligence works and the general categories of intelligence sources. I want to significantly expand that now, to present the complexity of gathering intelligence data in the modern world.

Sources are classified into about eight categories. Finished intelligence (for dissemination) is a fitting together of pieces from overlapping sources. In the following entries I will present each of these sources. I will review the sources here.

  1. Open Sources

  2. HUMINT

  3. Signal interception – SIGINT

  4. Imagery

  5. Scientific and Technical Intelligence

  6. Measurement and Sensing


    1. MASINT

    2. UGS


  7. Other




Scientific and Technical (S& T) Intelligence. This is the product resulting from collecting, evaluating, analyzing, and interpreting foreign scientific and technical information. It covers foreign developments in basic and applied research and in applied engineering techniques; and scientific and technical characteristics, capabilities, and limitations of all foreign military systems, weapons, weapon systems, and materiel, the research and development related thereto, and the production methods employed for their manufacture. Ths wais my own analysis assignment, and something I have continued the rest of my life. My own particular specialty is nuclear weapons, missile defense, and disaster response.
Advantages

  1. The most accurate intelligence available on capabilities and characteristics of foreign weapon systems

  2. May be used to determine systems capabilities

  3. Engineers, scientists, and technical experts intimately familiar with the subject being investigated


Limitations

  1. May be extremely limited or inaccurate on new systems or systems to which there has been no hands- on access

  2. Prolonged analysis may be required

  3. Capabilities do not necessarily indicate intentions



See an excellent article by CIA Intelligence Officer, Robert M. Clark Scientific And Technical Intelligence Analysis.
The next entry will be on Measurement and Sensing.

Friday, September 10, 2010

46. Intelligence Sources – 4. Imagery



Today's entry presents Imagery as a source of intelligence.

In blog entry Number 19 I posted a brief explanation of how intelligence works and the general categories of intelligence sources. I want to significantly expand that now, to present the complexity of gathering intelligence data in the modern world.

Sources are classified into about eight categories. Finished intelligence (for dissemination) is a fitting together of pieces from overlapping sources. In the following entries I will present each of these sources. I will review the sources here.

  1. Open Sources

  2. HUMINT

  3. Signal interception – SIGINT

  4. Imagery

  5. Scientific and Technical Intelligence

  6. Measurement and Sensing


    1. MASINT

    2. UGS


  7. Other





Imaging Intelligence(IMINT),is the representation of objects reproduced optically or electronically on film, electronic display devices, or other media. Imagery comes from visual photography, usually from aerial observation. radar sensors such as sidelooking airborne radar (SLAR), infrared sensors, lasers, and electro- optics. While each sensor operates at different spectrum frequencies and each type of imagery has distinctive characteristics, the advantages and limitations of each are similar. Observation may be made from anything from blimps to satellites. The US has used high-flying, virtually undetectable aircraft, such as the SR70 Blackbird, or the infamous U-2.Countries capable of launching satellites today all have agreed to declare the orbits to the U.N.

My work in intelligence often involved photo-imaging. Fortunately there were a number of expert photointerpreters to help clarify what was in the photography. When it came to crucial sites, it might be just one person in the entire U.S. intelligence community who had the expertise to interpret imaging from that site.

Advantages

  1. A variety of platforms and media is available

  2. Capable of pinpoint target positioning

  3. Activity can be detected

  4. Order of battle can be counted

  5. Target characteristics (physical or environmental) can be studied in detail

  6. Large area collection possible

  7. Excellent resolution possible

  8. Highly credible because it can be seen by the user


Limitations:

  1. Except for radar, imagery quality normally degraded by darkness, adverse weather.

  2. Subject to deception or concealment techniques

  3. Requires extensive support facilities (such as photointerpretation centers)

  4. Can be expensive

  5. Subject to misinterpretation or misidentification

  6. Situation represented on the image may exist only for the instant it was captured



The next entry will be on Science and Technology Intelligence.

Thursday, September 9, 2010

45. Intelligence Sources – 3. SIGINT

In blog entry Number 19 I posted a brief explanation of how intelligence works and the general categories of intelligence sources. I want to significantly expand that now, to present the complexity of gathering intelligence data in the modern world.

Sources are classified into about eight categories. Finished intelligence (for dissemination) is a fitting together of pieces from overlapping sources. In the following entries I will present each of these sources. I will review the sources here.

  1. Open Sources

  2. HUMINT

  3. Signal interception – SIGINT

  4. Imagery

  5. Measurement and Sensing


    1. MASINT

    2. UGS


  6. Scientific and Technical Intelligence

  7. Other


    1. Diplomatic reports

    2. Liaison relationships

    3. Interrogation







Signals Intelligence. Known as SIGINT, this is information gathered from interception of signals. SIGINT is a category of intelligence comprising, either individually or in combination, all communications intelligence. It is derived from foreign communications and electronics signals in two principal categories, COMINT; and ELINT. It also includes foreign instrumentation signals intelligence (TELINT) and FISINT. The general categories of SIGINT are:

  1. COMINT— Communications Intelligence derived from the intercept of foreign communications. COMINT usually requires decryption and decoding. Enigma machines (Ultra, etc.) are examples of methods of denying communication information from other countries by encryption. During WW II codebreakers radically changed the war by breaking very difficult codes. The Germans used several methods, including Geheimschreiber (secret writer) – the traffic was known a Fish. For some of these machines, the Allies could read the messages almost in real time. Japan had "System 97 Printing Machine for European Characters" or Angōki Taipu-B, codenamed Purple by the Allies. The decrypted traffic was known as Magic. Decryption of Soviet traffic (after WWII) led to the Venona project and identification of several Soviet as well as British and American agents. In current times, the cell phone is an excellent device for counterintelligence. All terrorists carry cell phones. They are trackable, and provide many bits of information, even DNA if they are found abandoned.
  2. ELINT—Electronic Intelligence derived from the analysis of foreign noncommunications and electromagnetic radiation emitted from other than nuclear detonations or radio-active sources.
  3. TELINT—Telemetry Intelligence: the collection and analysis of telemetry data from the target’s missile or sometimes from aircraft tests.
  4. FISINT—Foreign Instrumentation Signals Intelligence

NSA is responsible for the US SIGINT program. Each military service has a service cryptological agency, operationally directed by NSA through the Central Security Service (CSS), to ensure missions are properly assigned and duplication of effort is avoided. In the Air Force, this mission is assigned to Air Intelligence Agency (AIA). The Army Intelligence and Security Command (INSCOM) and the Naval Security Group (NSG) make up the remaining agencies of the military NSA and CSS structure. The Director of NSA also serves as Chief of CSS.

SIGINT has many uses, but its application requires a thorough knowledge of the product. Order of battle depends heavily on correlation and analysis of COMINT and ELINT. Mission route planning requires current intelligence on enemy defensive positions and capabilities. Targets can be detected and located through airborne direction finding techniques. Intelligence concerning enemy operational plans may be obtained through signal analysis or cryptologic procedures. Confirmation of other types of intelligence can be made by targeting personnel with the aid of SIGINT reports. Finally, post strike or attack data and damage resulting from missions may also be obtained.

  1. Advantages of SIGINT


    1. Potential for almost instantaneous information

    2. Can sometimes reveal specific information on enemy units

    3. Levels of activity and significant changes in these levels can often be determined

    4. Organizational structure and order of battle may be obtained

    5. Can cue other systems

    6. Equipment capability can be learned

    7. Emitter location can be approximated or pinpointed (dependent on accuracy capability of the system)

    8. Site function can be determined


  2. Limitations of SIGINT


    1. Data may be denied by use of secure communications

    2. False information may be passed by the enemy for deception purposes

    3. Collection subject to atmospheric conditions

    4. Locations derived from SIGINT may be imprecise

    5. Specially configured collection platforms required

    6. Use of SIGINT collection platforms requires extensive coordination between collectors and users




The next entry will be on Imagery.

Wednesday, September 8, 2010

44. Intelligence Sources – 2. HUMINT

In blog entry Number 19 I posted a brief explanation of how intelligence works and the general categories of intelligence sources. I want to significantly expand that now, to present the complexity of gathering intelligence data in the modern world.

Sources are classified into about eight categories. Finished intelligence (for dissemination) is a fitting together of pieces from overlapping sources. In the following entries I will present each of these sources. I will review the sources here.

  1. Open Sources

  2. HUMINT

  3. Signal interception

  4. Measurement and sensing


    1. MASINT

    2. UGS


  5. Imagery

  6. Scientific and Technical Intelligence

  7. Other


    1. Diplomatic reports

    2. Liaison relationships

    3. Interrogation






2. HUMINT

As one would expect, HUMINT stands for human sources – gathered from a person on the ground. It is difficult to acquire (as in present-day Iran), and hard to manage. Further it is extremely difficult to verify validity and reliability of a human source.
HUMINT includes overt, sensitive, and clandestine activities and the individuals who exploit, control, supervise, or support these sources. It includes a wide range of activities from direct reconnaissance and observation to the use of informants and spies. HUMINT may provide such information as insights into adversary plans and intentions for target development, adversary deliberations and decisions for developing our own objectives, research and development goals and strategies, blueprints for weaponeering, etc. Some intelligence requirements can best be satisfied by human source exploitation.

  1. Overt activities are performed openly without concealment. While some aspects may be classified, the overall activity is generally easily detected, or the sources are exploited in an open but discrete manner. Some overt HUMINT activities are:

    1. Conventional programs for interrogating, émigrés, refugees, escapees, prisoners of war, and detainees.

    2. After-action debriefing of military operations, and legal travelers.

    3. Programs to exploit open publications.

    4. Diplomatic reports. Such reports give indications of a country’s intentions and plans

      • Some are in the open,
      • Friendly accredited diplomats
      • Military attachés and Liaison relationships. Attaches are posted by a country to their embassies abroad. They are “legal” spies, and can be helpful not only to their home country but to the country in which they are posted since they provide a direct way of revealing information they want others to know about. Usually they are declared to the host country. It is a myth that liaison operates against the host country. There is the so-called "third-party rule" – whereby the recipient of intelligence from an ally should not share it on with anyone without the originator's consent. MI5 (in the UK) and the US insisted that this is an immutable law of international security. What a U.S. attaché learns in Germany is not shared with any other country other than the US and possibly Germany.

      • Other diplomatic reports obtained by other methods.


    5. Non-governmental organizations (NGOs)
    6. Patrolling (military police, patrols, etc.)

  2. Sensitive activities fall between overt and clandestine. Because their disclosure would be detrimental to the best interests of the United States, they require special protection from disclosure, as well as concealment of the sponsor’s identity.

  3. Clandestine activities must be conducted so that both the existence of the operation itself and the identity of the sponsor are secret. They may include rendition.


    1. Espionage by agents
    2. Interrogators of POWs or captured agents use a variety of methods to get information. Most simply try to provoke conversations, and may not even use direct questioning. Steps up may include psychological pressure, bugging of cells, sleep deprivation, noise, sounds of torture, and false executions. NATO makes much of the illegal “Enhanced Interrogation Techniques.

    3. Strategic reconnaissance, as by Special Forces



Advantages of HUMINT

  1. Can be used to reveal enemy plans and intentions and uncover scientific or weapon developments before they are used or detected by other technical collection systems

  2. Can provide documentary evidence of enemy activities

  3. Relatively cost effective

  4. May provide coverage in areas beyond the capabilities of other sources, such as detailed descriptions of underground facilities or those located below jungle canopy, as well as internal facility arrangements

  5. Can reveal construction characteristics for vulnerability estimates

  6. Can determine production capabilities and impact of facilities on enemy military and industrial needs

  7. Yields information on the sources of raw materials, equipment, and necessary transportation for systems analysis

  8. May reveal direct and indirect relationships between facilities

  9. Can give near real- time target intelligence via radio transmission

  10. Can cover targets against which sensor programs are restricted by political restraints

  11. Targeter can use it to refine or revise intelligence estimates based on other sources of information; helps the analyst learn identification and functions previously unidentified, as well as give direct and indirect effects of airstrikes during hostilities


Limitations of HUMINT

  1. Time lag between collection, reporting, and verifying some information can be too long and render it useless

  2. Collection success cannot be predicted with certainty

  3. May be politically sensitive

  4. Dissemination and fusion of information into targeting channels is often inadequate and difficult to accomplish

  5. Determining reliability of the source and verifying the information is often very difficult



The next entry will be on SIGINT

43. What Are the Sources of Intelligence – 1. Open

In blog entry Number 19 I posted a brief explanation of how intelligence works and the general categories of intelligence sources. I want to significantly expand that now, to present the complexity of gathering intelligence data in the modern world.

Sources are classified into about eight categories. Finished intelligence (for dissemination) is a fitting together of pieces from overlapping sources. In the following entries I will present each of these sources. I will review the sources here.

  1. Open Sources

  2. HUMINT

  3. Signal interception

  4. Measurement and sensing


    1. MASINT

    2. UGS


  5. Imagery

  6. Scientific and Technical Intelligence

  7. Other


    1. Diplomatic reports

    2. Liaison relationships

    3. Interrogation




Recall the process of Intelligence Analysis (Entry Number 41)



This graphic shows that the process is cyclical, and really never ends.

1. Open Sources

About 85% of information is obtained from open sources, such as newspapers, journals, etc. As an example, in 1938 nuclear fission was observed and published in scientific journals. As soon as the journals reached the United States the science of fission was immediately known and understood. When it was realized that fission might be weaponized, all publication on fission ceased. That gave every nuclear physicist in the world the indication that the United States might have a nuclear weapon development program underway. Some of the types of open source material are:

  • Internet

  • General: such as newspapers, magazines, books, foreign broadcasts, telephone directories, films, maps, and charts

  • Scientific/Technical literature (also applies to Scientific and Technical Intelligence)

  • Various HUMINT specialties (e.g. trade shows, association meetings, interviews) (Overlaps with HUMINT, or Human Intelligence)



  1. Advantages:


    • Often presents an “insider’s” view.

    • Frequently provides a source of pictures and information not obtained from any other source

    • Gives insight into another’s thought processes and intentions

    • May be the most timely information available

    • Timeliness


  2. Limitations:


    • Materials (particularly military and scientific journals) often represent an idealized rather than a real picture of a capability that is aspired to rather than possessed. However, such materials can provide a window into the future, if this caution is kept in mind.

    • • Censorship or other motivations limit promulgation of military related information.
    • • Deception is possible.

    • • Translations may be needed, which often causes a delay in using the information.

    • • Significant information may be overlooked in the high volume of material to be processed.



The next entry will be on HUMINT.

Sunday, August 29, 2010

42. What is Intelligence Analysis

As discussed in Blog Entry Number 40, What is Intelligence?, Intelligence is knowledge and intelligence drives our national security policies.

The people and organizations responsible for collecting, formulating, and disseminating intelligence are known, collectively as the Intelligence Community. Recently this community has come under criticism, some severe, for its size, unwieldiness, cost, and errors. In July the Washington Post published a year-long study by an investigative reporter and staff highly critical of the Intelligence Community. In July and August a number of classified documents regarding Iraq and Afghanistan were aired publicly on the internet at the Wikileaks site. An article appeared in the Wall Street Journal”> accusing the CIA of “getting it wrong” about Iran’s nuclear program. This was also addressed in an earlier entry, 24. Did the CIA Get It Wrong In Iraq? in this blog.

Much of the criticism comes from people who do not understand the nature of intelligence, from those who have a particular ax to grind (and there I would include the writer Jay Epstein, and former New York City Mayor Ed Koch), from those frustrated with a lack of intelligence on critical issues (such as what is Osama Ben Laden’s precise location and support infrastructure), and certainly from those who disagree with intelligence findings. When intelligence reports conflict with views about “what is” on the part of policy makers, the messenger often gets blamed. I have mentioned that regarding at least two intelligence reports, I myself experienced reports shoved aside or denigrated because they conflicted with a stated policy. Certainly the reports that there were no weapons of mass destruction in Iraq conflicted with the views of President George W. Bush and his advisors, since going to war with this as the casus belli was a decided policy.

The intelligence community is responsible for providing accurate and usable information to those in charge of national security. The successful intelligence process converts acquired information into clear, comprehensible intelligence and delivers it to the president, policymakers, and military commanders in a form they can use to make educated policy decisions. Generating reliable, accurate intelligence is an active, never-ending process commonly referred to as the intelligence cycle.



The process begins with identifying the issues in which policy makers are interested and defining the answers they need to make educated decisions regarding those issues. We then lay out a plan for acquiring that information and go about collecting it. Once we have the proper intelligence, we sort through it, analyze what it means, and prepare summary reports and recommendations, which we deliver to national security policy makers. The answers our reports supply often reveal other areas of concern, which lead to more questions. In this way, the end of one cycle effectively leads to the start of the next.

Now we can give a general statement of what intelligence analysis is:
Intelligence analysis is the application of individual and collective intellectual methods to weigh data and test hypotheses within a political-cultural context.


The literature about intelligence does not make explicit what intelligence analysis is. The graphic description of the process is helpful, but still not totally explicit. What it does indicate is that the process of intelligence analysis is a highly interactive, dynamic, and social process. The key to understanding analysis is to think of it as a verb rather than a noun. It is a process. It involves a great deal of informal, yet purposeful collaboration during which individuals began to make sense of raw data by negotiating meaning among the historical record, their peers, and their supervisors.

The graphic representation of the cyclical process of producing intelligence describes the activity of analysis. It may be described also the say way one describes the process of science. Scientific advance does not usually begin with a hypothesis. In fact, it almost never does. The steps of science, and, I argue, production of intelligence are:


  1. Observation

  2. Correlation

  3. Generalization

  4. Experimentation



These four steps, in turn, generate new observations, so the cycle continues, eventually producing new scientific knowledge. The precise same four steps are precisely the same for producing useful intelligence. In following entries I will present what the elements are of each of the steps 1. – 4. above. What will turn out to be most significant is the methods of observation necessary to gather facts. Correlation will involve connecting the many facts gained through observation by a variety of methods, some of them highly complex. Only when the facts have been correlated, or connected by methods of relating them, is the analyst ready to make a generalization which, in intelligence, is the same as an intelligence finding. No analysts will be given the right to disseminate a finding on their own volition. Before an intelligence report is disseminated it must go through exhaustive testing against what is known to be true. When the community (or a significant part of it) is convinced that a finding is accurate it can be disseminated.

At many points of this cycle (another way of looking at the figure above) new questions may well be raised. That, in turn, may generate new requests for information, and the cycle continues. The four-step cyclic process listed above is scientific in nature and must meet a fundamental requirement. I believe that requirement is as follows.
I define intelligence analysis as the organization of knowledge in such a way that it commands more of the hidden potential in information.


This definition is a paraphrase of J. Bronowski in his book, Science and Human Values (New York: Harper and Row (1965), p. 7). Bronowski is defining science, and his definition has a definite parallel in intelligence analysis.

As shown in the practical cycle of intelligence analysis in the figure above, the common procedure that results in an intelligence report usually begins by a request from a consumer to answer some question. When the question becomes an intelligence task, the first step is reviewing the literature to determine what is already known. The “literature” may mean previous intelligence reports or even raw data that has not been put in a coherent form. Often (usually) there are gaps in the data. This is a reality that led Secretary of Defense Donald Rumsfeld to utter the worst statement I’ve ever read in the field of intelligence.

There are known knowns. These are things we know that we know. There are known unknowns. That is to say, there are things that we know we don't know. But there are also unknown unknowns. There are things we don't know we don't know.


As silly as this reads, it is a truism. We can do our best to find out what is already known, and what is gathered but not reported, and we may still find that neither we, nor anyone else in the intelligence community know enough to come to some consensus on the best way to answer the consumer’s question. More data may be required to convince enough people to reach consensus.

Here we have to avoid a logical trap. Too many people believe that all is needed for intelligence is data. No finished intelligence is a collection of facts. It will not do to call an intelligence report true or false in the simple sense in which every fact is either so or not so. All the data have to be woven together into a coherent picture of how “what we know” (data) is linked and built up into a logical conclusion. This is a creative act, not simply a regurgitation of facts.

All intelligence is a search for unity in hidden likenesses. (Bronowski, p. 13) The search may be on a grand scale, such as determining which nation states have the capacity for using nuclear weapons. But there are discoveries that are made by snatching small likenesses from the air, too. The intelligence discoveries may be highly significant if the analyst is bold enough and asks the right questions.

I did an analysis of loss of aircraft in Vietnam. Why were we losing so many aircraft when we had certainly achieved air superiority? The answer lay in observing the thousands of ancient antiaircraft guns that the North Vietnamese Army (NVA) had (presumably from China). By fooling US aircraft into evasive maneuvers the NVA lured aircraft to fly into a barrage of conventional antiaircraft firepower. Also, owing to the radical evasive maneuvers the planes used whenever the pilots detected a radar signal, many aircraft flew “beyond the envelope” and crashed into the ground without even being hit. This, to be sure, was not a popular finding with the Navy or the Air Force, especially when coming from a junior analyst in the U.S. Army.

Scientific reports are generally produced for the use of the scientific community. Thus, in science, there are not many institutional “positions” on scientific knowledge. If a scientific result is “sufficiently crazy” it may be shattering in scientific knowledge.

Niels Bohr and Wolfgang Pauli were two giants of physics in the twentieth century. Pauli gave a lecture and afterwards Bohr was called upon to comment. Pauli remarked, perhaps in jest, that the theory may, at first, look “somewhat crazy.” Bohr then replied that the problem was that it was not crazy enough.

“Sufficiently crazy” does not mean silly wild guess, or worse. It means a departure from what accepted knowledge. The really good analyst looks for the appearance of “likenesses” for order does not exist or display itself of itself.

[I]f it can be said to be there at all, it is not there for the mere looking. There is no way of pointing a finger or a camera at it; order must be discovered and, in a deep sense, it must be created. What we see, as we see it, is mere disorder.


When Isaac Newton set out to show that the fall of an apple must be drawn to earth by gravity, he did not have a new idea. That conception was older than Newton. What struck him was the conjecture that the same force of gravity, which

reaches to the top of the tree might go on reaching out beyond the earth and its air, endlessly into space. Gravity might reach the moon. (Bronowski, p. 14)


This was Newton’s new thought. It might be gravity that holds the moon in orbit. Newton calculated what force from the earth would hold the moon, and compared it with the known force of gravity at tree height. The forces agreed; Newton says laconically,

I found them answer pretty nearly.


They agreed only nearly; the likeness and the approximation go together, for no likeness is exact. In Newton’s sentence, both modern science and the modern nature of intelligence are full grown. The process of analysis is the discovery at each step of a new order that gives unity to what had long seemed unlike.




This doesn’t always work in intelligence for the policymakers have desired positions for which they want corroboration. Intelligence agencies also have positions, historical, organizational, and. The analyst may find that previous written products given to consumers in the past. That is, the analyst looks for the accepted organizational response before generating analytic hypotheses. This can distort the intelligence finding, and is something to be taken up in a later blog entry.

Understanding organizational-personality is critical to understanding the meaning, context, and process of intelligence analysis. Real organizational and political consequences are associated with changing official analytic findings and releasing them to consumers. The

  1. Organizational consequencesare associated with challenging other domain experts (including peers and supervisors).

  2. Political consequences arise when consumers begin to question the veracity and consistency of current or previous intelligence reporting.


These last two items are at the heart of what can go wrong with intelligence analysis. That will be investigated in a future blog entry. The next few entries will be:


  1. How intelligence observations are made and data collected.

  2. Why intelligence reports go wrong.

  3. How the intelligence community is structured for producing intelligence.



  4. Needles in a haystack: how a new analysis was produced on Iran’s cyber war.



As always, comments are welcome.

Tuesday, August 24, 2010

41. Who Controls Russia?

41. Who Controls Russia?

I met Boris Volodarsky, a former member of the Russian Spetnaz in Cambridge, England, July 16, 2010. Boris works now in London, and gives talks on the way Russia functions nowadays, as well as how it worked under the Soviet system. Volodarsky attended the most prestigious economic and language institutes in the Soviet Union. [Shown belowis member of the Spetnaz preparing for an airborne operation.]




According to Volodarsky, even though the KGB was disbanded when the Soviet system collapsed, a shadow KGB still exists, quite strong, in Russia. One needs only to look at the people in charge, especially the Premier, and former President, Vladimir Putin, who was once head of the KGB. Volodarsky said “The KGB is in total control or Russia. All aspects, every business, especially those that make money, are under control of the secret service. The leaders of businesses may make money, but cannot make any decisions without permission of the secret service.”

So recently CBS Sixty Minutes re-ran a program that aired in May, 2010 about the purchase of the New Jersey Nets' (the worst team in professional basketball) by the billionaire Russian, Mikhail Prokhorov . Prokhorov made his money with the overt permission of the Russian government by buying and then selling at a huge profit a manufacturing industry in Russia. He is well known as a playboy, even was arrested in France for allegedly bringing women in with him for the purpose of prostitution. The charges against him were dismissed and French President Nicolas Sarkozy apologized to Russian President Medvedev over the entire incident.


If Volodarsky is correct, then Prokhorov’s riches stem from his approval by the Russian Secret Service, and the decision to buy the Nets had to be one made by the shadow KGB .

No one, especially a foreigner, can buy into the NBA without approval of the league. So what did the league do? NBA commissioner David Stern, always eager to trumpet the game's global expansion, said Nets fans could feel good about Prokhorov.
"I think that any investor who stepped into the opportunity he did would be important and bring excitement, because it's the final step in ensuring that there will be a brand new building in Brooklyn and the Nets will return to New York," said Stern.

But Stern understands why Prokhorov - a playboy who used a recent "60 Minutes" profile to advertise his love of women, yachts, adventure sports and guns - is being seen as a different breed of NBA owner.

"Because he's something of a larger-than-life character, he's generated additional interest," Stern said in an interview with the Daily News. "He's a six-foot-eight basketball player, wealthiest man in Russia, with a smile and fun sense of humor."
"Because he's something of a larger-than-life character, he's generated additional interest," Stern said in an interview with the Daily News. "He's a six-foot-eight basketball player, wealthiest man in Russia, with a smile and fun sense of humor."

By swooping in late last summer to buy one of the worst teams ever (the Nets finished this season with a 12-70 record), and rescuing Bruce Ratner's embatled bid to relocate the team to the controversial Atlantic Yards site in Brooklyn, Prokhorov has managed to generate extraordinary excitement - and suspicion. One congressman is calling for greater scrutiny of Prokhorov's vast investment empire, and neighborhood opponents to the 22-acre Atlantic Yards project may now see a symbolic villian in Prokhorov, whose wealth is largely built on extracting metal from 4,000 feet deep in the Siberian earth and poisoning the environment in the process.

The congressman is not the only one concerned with Prokhorov’s buying in. Rod Thorn's, the president of the Nets, announced his decision to retire as president of the Nets. One can understand why he would like to get out of his relationship with the Nets, and his decision was no doubt hastened by the presence of what he perceived to be Russian spies inside the team's offices.

According to sources close to the team, Thorn had quickly grown tired of having to answer to associates of new Russian owner Mikhail Prokhorov, who took control of the Nets in early May, 2010. After months of dealing with Prokhorov's underlings looking over his shoulder, Thorn decided to walk away. He steps down on July 15, one week after the free agent signing period began.

Before news of his impending retirement broke, Thorn told the New York Daily News that he had no issues with either Prokhorov or his field generals."That's not right," Thorn said. "And I'm really serious, that's not right. The new ownership has been great to me. I think they're going to be the best owners in the league."
One of the most respected executives in the NBA, Thorn is known to be territorial when it comes to decisions that affect the team. He seemed to have at least some of his authority undermined when Prokhorov decided to name Irina Pavlova - the daughter of a Russian diplomat and a former Google executive - as president of the Nets' parent company.

Prokhorov has also made it clear that he will play an active role in recruiting pending free agents such as LeBron James, who was rumored to be giving the Nets the first crack at romancing him when free agency began. It must have caused tidal-wave repercussions in Prokhorov’s staff when James went to Miami and not to the Nets. Maybe James was big enough that they could not make him an offer “he could not refuse.”

So, if Boris Volodarsky is to be believed, the Russian secret service now has a fully legal operation ensconced in the head offices of the Nets. Time will tell what effect this may have.