Search This Blog

Saturday, September 11, 2010

47. Intelligence Sources – 5. S&T




In blog entry Number 19 I posted a brief explanation of how intelligence works and the general categories of intelligence sources. I want to significantly expand that now, to present the complexity of gathering intelligence data in the modern world.

Sources are classified into about eight categories. Finished intelligence (for dissemination) is a fitting together of pieces from overlapping sources. In the following entries I will present each of these sources. I will review the sources here.

  1. Open Sources

  2. HUMINT

  3. Signal interception – SIGINT

  4. Imagery

  5. Scientific and Technical Intelligence

  6. Measurement and Sensing


    1. MASINT

    2. UGS


  7. Other




Scientific and Technical (S& T) Intelligence. This is the product resulting from collecting, evaluating, analyzing, and interpreting foreign scientific and technical information. It covers foreign developments in basic and applied research and in applied engineering techniques; and scientific and technical characteristics, capabilities, and limitations of all foreign military systems, weapons, weapon systems, and materiel, the research and development related thereto, and the production methods employed for their manufacture. Ths wais my own analysis assignment, and something I have continued the rest of my life. My own particular specialty is nuclear weapons, missile defense, and disaster response.
Advantages

  1. The most accurate intelligence available on capabilities and characteristics of foreign weapon systems

  2. May be used to determine systems capabilities

  3. Engineers, scientists, and technical experts intimately familiar with the subject being investigated


Limitations

  1. May be extremely limited or inaccurate on new systems or systems to which there has been no hands- on access

  2. Prolonged analysis may be required

  3. Capabilities do not necessarily indicate intentions



See an excellent article by CIA Intelligence Officer, Robert M. Clark Scientific And Technical Intelligence Analysis.
The next entry will be on Measurement and Sensing.

Friday, September 10, 2010

46. Intelligence Sources – 4. Imagery



Today's entry presents Imagery as a source of intelligence.

In blog entry Number 19 I posted a brief explanation of how intelligence works and the general categories of intelligence sources. I want to significantly expand that now, to present the complexity of gathering intelligence data in the modern world.

Sources are classified into about eight categories. Finished intelligence (for dissemination) is a fitting together of pieces from overlapping sources. In the following entries I will present each of these sources. I will review the sources here.

  1. Open Sources

  2. HUMINT

  3. Signal interception – SIGINT

  4. Imagery

  5. Scientific and Technical Intelligence

  6. Measurement and Sensing


    1. MASINT

    2. UGS


  7. Other





Imaging Intelligence(IMINT),is the representation of objects reproduced optically or electronically on film, electronic display devices, or other media. Imagery comes from visual photography, usually from aerial observation. radar sensors such as sidelooking airborne radar (SLAR), infrared sensors, lasers, and electro- optics. While each sensor operates at different spectrum frequencies and each type of imagery has distinctive characteristics, the advantages and limitations of each are similar. Observation may be made from anything from blimps to satellites. The US has used high-flying, virtually undetectable aircraft, such as the SR70 Blackbird, or the infamous U-2.Countries capable of launching satellites today all have agreed to declare the orbits to the U.N.

My work in intelligence often involved photo-imaging. Fortunately there were a number of expert photointerpreters to help clarify what was in the photography. When it came to crucial sites, it might be just one person in the entire U.S. intelligence community who had the expertise to interpret imaging from that site.

Advantages

  1. A variety of platforms and media is available

  2. Capable of pinpoint target positioning

  3. Activity can be detected

  4. Order of battle can be counted

  5. Target characteristics (physical or environmental) can be studied in detail

  6. Large area collection possible

  7. Excellent resolution possible

  8. Highly credible because it can be seen by the user


Limitations:

  1. Except for radar, imagery quality normally degraded by darkness, adverse weather.

  2. Subject to deception or concealment techniques

  3. Requires extensive support facilities (such as photointerpretation centers)

  4. Can be expensive

  5. Subject to misinterpretation or misidentification

  6. Situation represented on the image may exist only for the instant it was captured



The next entry will be on Science and Technology Intelligence.

Thursday, September 9, 2010

45. Intelligence Sources – 3. SIGINT

In blog entry Number 19 I posted a brief explanation of how intelligence works and the general categories of intelligence sources. I want to significantly expand that now, to present the complexity of gathering intelligence data in the modern world.

Sources are classified into about eight categories. Finished intelligence (for dissemination) is a fitting together of pieces from overlapping sources. In the following entries I will present each of these sources. I will review the sources here.

  1. Open Sources

  2. HUMINT

  3. Signal interception – SIGINT

  4. Imagery

  5. Measurement and Sensing


    1. MASINT

    2. UGS


  6. Scientific and Technical Intelligence

  7. Other


    1. Diplomatic reports

    2. Liaison relationships

    3. Interrogation







Signals Intelligence. Known as SIGINT, this is information gathered from interception of signals. SIGINT is a category of intelligence comprising, either individually or in combination, all communications intelligence. It is derived from foreign communications and electronics signals in two principal categories, COMINT; and ELINT. It also includes foreign instrumentation signals intelligence (TELINT) and FISINT. The general categories of SIGINT are:

  1. COMINT— Communications Intelligence derived from the intercept of foreign communications. COMINT usually requires decryption and decoding. Enigma machines (Ultra, etc.) are examples of methods of denying communication information from other countries by encryption. During WW II codebreakers radically changed the war by breaking very difficult codes. The Germans used several methods, including Geheimschreiber (secret writer) – the traffic was known a Fish. For some of these machines, the Allies could read the messages almost in real time. Japan had "System 97 Printing Machine for European Characters" or Angōki Taipu-B, codenamed Purple by the Allies. The decrypted traffic was known as Magic. Decryption of Soviet traffic (after WWII) led to the Venona project and identification of several Soviet as well as British and American agents. In current times, the cell phone is an excellent device for counterintelligence. All terrorists carry cell phones. They are trackable, and provide many bits of information, even DNA if they are found abandoned.
  2. ELINT—Electronic Intelligence derived from the analysis of foreign noncommunications and electromagnetic radiation emitted from other than nuclear detonations or radio-active sources.
  3. TELINT—Telemetry Intelligence: the collection and analysis of telemetry data from the target’s missile or sometimes from aircraft tests.
  4. FISINT—Foreign Instrumentation Signals Intelligence

NSA is responsible for the US SIGINT program. Each military service has a service cryptological agency, operationally directed by NSA through the Central Security Service (CSS), to ensure missions are properly assigned and duplication of effort is avoided. In the Air Force, this mission is assigned to Air Intelligence Agency (AIA). The Army Intelligence and Security Command (INSCOM) and the Naval Security Group (NSG) make up the remaining agencies of the military NSA and CSS structure. The Director of NSA also serves as Chief of CSS.

SIGINT has many uses, but its application requires a thorough knowledge of the product. Order of battle depends heavily on correlation and analysis of COMINT and ELINT. Mission route planning requires current intelligence on enemy defensive positions and capabilities. Targets can be detected and located through airborne direction finding techniques. Intelligence concerning enemy operational plans may be obtained through signal analysis or cryptologic procedures. Confirmation of other types of intelligence can be made by targeting personnel with the aid of SIGINT reports. Finally, post strike or attack data and damage resulting from missions may also be obtained.

  1. Advantages of SIGINT


    1. Potential for almost instantaneous information

    2. Can sometimes reveal specific information on enemy units

    3. Levels of activity and significant changes in these levels can often be determined

    4. Organizational structure and order of battle may be obtained

    5. Can cue other systems

    6. Equipment capability can be learned

    7. Emitter location can be approximated or pinpointed (dependent on accuracy capability of the system)

    8. Site function can be determined


  2. Limitations of SIGINT


    1. Data may be denied by use of secure communications

    2. False information may be passed by the enemy for deception purposes

    3. Collection subject to atmospheric conditions

    4. Locations derived from SIGINT may be imprecise

    5. Specially configured collection platforms required

    6. Use of SIGINT collection platforms requires extensive coordination between collectors and users




The next entry will be on Imagery.

Wednesday, September 8, 2010

44. Intelligence Sources – 2. HUMINT

In blog entry Number 19 I posted a brief explanation of how intelligence works and the general categories of intelligence sources. I want to significantly expand that now, to present the complexity of gathering intelligence data in the modern world.

Sources are classified into about eight categories. Finished intelligence (for dissemination) is a fitting together of pieces from overlapping sources. In the following entries I will present each of these sources. I will review the sources here.

  1. Open Sources

  2. HUMINT

  3. Signal interception

  4. Measurement and sensing


    1. MASINT

    2. UGS


  5. Imagery

  6. Scientific and Technical Intelligence

  7. Other


    1. Diplomatic reports

    2. Liaison relationships

    3. Interrogation






2. HUMINT

As one would expect, HUMINT stands for human sources – gathered from a person on the ground. It is difficult to acquire (as in present-day Iran), and hard to manage. Further it is extremely difficult to verify validity and reliability of a human source.
HUMINT includes overt, sensitive, and clandestine activities and the individuals who exploit, control, supervise, or support these sources. It includes a wide range of activities from direct reconnaissance and observation to the use of informants and spies. HUMINT may provide such information as insights into adversary plans and intentions for target development, adversary deliberations and decisions for developing our own objectives, research and development goals and strategies, blueprints for weaponeering, etc. Some intelligence requirements can best be satisfied by human source exploitation.

  1. Overt activities are performed openly without concealment. While some aspects may be classified, the overall activity is generally easily detected, or the sources are exploited in an open but discrete manner. Some overt HUMINT activities are:

    1. Conventional programs for interrogating, émigrés, refugees, escapees, prisoners of war, and detainees.

    2. After-action debriefing of military operations, and legal travelers.

    3. Programs to exploit open publications.

    4. Diplomatic reports. Such reports give indications of a country’s intentions and plans

      • Some are in the open,
      • Friendly accredited diplomats
      • Military attachés and Liaison relationships. Attaches are posted by a country to their embassies abroad. They are “legal” spies, and can be helpful not only to their home country but to the country in which they are posted since they provide a direct way of revealing information they want others to know about. Usually they are declared to the host country. It is a myth that liaison operates against the host country. There is the so-called "third-party rule" – whereby the recipient of intelligence from an ally should not share it on with anyone without the originator's consent. MI5 (in the UK) and the US insisted that this is an immutable law of international security. What a U.S. attaché learns in Germany is not shared with any other country other than the US and possibly Germany.

      • Other diplomatic reports obtained by other methods.


    5. Non-governmental organizations (NGOs)
    6. Patrolling (military police, patrols, etc.)

  2. Sensitive activities fall between overt and clandestine. Because their disclosure would be detrimental to the best interests of the United States, they require special protection from disclosure, as well as concealment of the sponsor’s identity.

  3. Clandestine activities must be conducted so that both the existence of the operation itself and the identity of the sponsor are secret. They may include rendition.


    1. Espionage by agents
    2. Interrogators of POWs or captured agents use a variety of methods to get information. Most simply try to provoke conversations, and may not even use direct questioning. Steps up may include psychological pressure, bugging of cells, sleep deprivation, noise, sounds of torture, and false executions. NATO makes much of the illegal “Enhanced Interrogation Techniques.

    3. Strategic reconnaissance, as by Special Forces



Advantages of HUMINT

  1. Can be used to reveal enemy plans and intentions and uncover scientific or weapon developments before they are used or detected by other technical collection systems

  2. Can provide documentary evidence of enemy activities

  3. Relatively cost effective

  4. May provide coverage in areas beyond the capabilities of other sources, such as detailed descriptions of underground facilities or those located below jungle canopy, as well as internal facility arrangements

  5. Can reveal construction characteristics for vulnerability estimates

  6. Can determine production capabilities and impact of facilities on enemy military and industrial needs

  7. Yields information on the sources of raw materials, equipment, and necessary transportation for systems analysis

  8. May reveal direct and indirect relationships between facilities

  9. Can give near real- time target intelligence via radio transmission

  10. Can cover targets against which sensor programs are restricted by political restraints

  11. Targeter can use it to refine or revise intelligence estimates based on other sources of information; helps the analyst learn identification and functions previously unidentified, as well as give direct and indirect effects of airstrikes during hostilities


Limitations of HUMINT

  1. Time lag between collection, reporting, and verifying some information can be too long and render it useless

  2. Collection success cannot be predicted with certainty

  3. May be politically sensitive

  4. Dissemination and fusion of information into targeting channels is often inadequate and difficult to accomplish

  5. Determining reliability of the source and verifying the information is often very difficult



The next entry will be on SIGINT

43. What Are the Sources of Intelligence – 1. Open

In blog entry Number 19 I posted a brief explanation of how intelligence works and the general categories of intelligence sources. I want to significantly expand that now, to present the complexity of gathering intelligence data in the modern world.

Sources are classified into about eight categories. Finished intelligence (for dissemination) is a fitting together of pieces from overlapping sources. In the following entries I will present each of these sources. I will review the sources here.

  1. Open Sources

  2. HUMINT

  3. Signal interception

  4. Measurement and sensing


    1. MASINT

    2. UGS


  5. Imagery

  6. Scientific and Technical Intelligence

  7. Other


    1. Diplomatic reports

    2. Liaison relationships

    3. Interrogation




Recall the process of Intelligence Analysis (Entry Number 41)



This graphic shows that the process is cyclical, and really never ends.

1. Open Sources

About 85% of information is obtained from open sources, such as newspapers, journals, etc. As an example, in 1938 nuclear fission was observed and published in scientific journals. As soon as the journals reached the United States the science of fission was immediately known and understood. When it was realized that fission might be weaponized, all publication on fission ceased. That gave every nuclear physicist in the world the indication that the United States might have a nuclear weapon development program underway. Some of the types of open source material are:

  • Internet

  • General: such as newspapers, magazines, books, foreign broadcasts, telephone directories, films, maps, and charts

  • Scientific/Technical literature (also applies to Scientific and Technical Intelligence)

  • Various HUMINT specialties (e.g. trade shows, association meetings, interviews) (Overlaps with HUMINT, or Human Intelligence)



  1. Advantages:


    • Often presents an “insider’s” view.

    • Frequently provides a source of pictures and information not obtained from any other source

    • Gives insight into another’s thought processes and intentions

    • May be the most timely information available

    • Timeliness


  2. Limitations:


    • Materials (particularly military and scientific journals) often represent an idealized rather than a real picture of a capability that is aspired to rather than possessed. However, such materials can provide a window into the future, if this caution is kept in mind.

    • • Censorship or other motivations limit promulgation of military related information.
    • • Deception is possible.

    • • Translations may be needed, which often causes a delay in using the information.

    • • Significant information may be overlooked in the high volume of material to be processed.



The next entry will be on HUMINT.

Sunday, August 29, 2010

42. What is Intelligence Analysis

As discussed in Blog Entry Number 40, What is Intelligence?, Intelligence is knowledge and intelligence drives our national security policies.

The people and organizations responsible for collecting, formulating, and disseminating intelligence are known, collectively as the Intelligence Community. Recently this community has come under criticism, some severe, for its size, unwieldiness, cost, and errors. In July the Washington Post published a year-long study by an investigative reporter and staff highly critical of the Intelligence Community. In July and August a number of classified documents regarding Iraq and Afghanistan were aired publicly on the internet at the Wikileaks site. An article appeared in the Wall Street Journal”> accusing the CIA of “getting it wrong” about Iran’s nuclear program. This was also addressed in an earlier entry, 24. Did the CIA Get It Wrong In Iraq? in this blog.

Much of the criticism comes from people who do not understand the nature of intelligence, from those who have a particular ax to grind (and there I would include the writer Jay Epstein, and former New York City Mayor Ed Koch), from those frustrated with a lack of intelligence on critical issues (such as what is Osama Ben Laden’s precise location and support infrastructure), and certainly from those who disagree with intelligence findings. When intelligence reports conflict with views about “what is” on the part of policy makers, the messenger often gets blamed. I have mentioned that regarding at least two intelligence reports, I myself experienced reports shoved aside or denigrated because they conflicted with a stated policy. Certainly the reports that there were no weapons of mass destruction in Iraq conflicted with the views of President George W. Bush and his advisors, since going to war with this as the casus belli was a decided policy.

The intelligence community is responsible for providing accurate and usable information to those in charge of national security. The successful intelligence process converts acquired information into clear, comprehensible intelligence and delivers it to the president, policymakers, and military commanders in a form they can use to make educated policy decisions. Generating reliable, accurate intelligence is an active, never-ending process commonly referred to as the intelligence cycle.



The process begins with identifying the issues in which policy makers are interested and defining the answers they need to make educated decisions regarding those issues. We then lay out a plan for acquiring that information and go about collecting it. Once we have the proper intelligence, we sort through it, analyze what it means, and prepare summary reports and recommendations, which we deliver to national security policy makers. The answers our reports supply often reveal other areas of concern, which lead to more questions. In this way, the end of one cycle effectively leads to the start of the next.

Now we can give a general statement of what intelligence analysis is:
Intelligence analysis is the application of individual and collective intellectual methods to weigh data and test hypotheses within a political-cultural context.


The literature about intelligence does not make explicit what intelligence analysis is. The graphic description of the process is helpful, but still not totally explicit. What it does indicate is that the process of intelligence analysis is a highly interactive, dynamic, and social process. The key to understanding analysis is to think of it as a verb rather than a noun. It is a process. It involves a great deal of informal, yet purposeful collaboration during which individuals began to make sense of raw data by negotiating meaning among the historical record, their peers, and their supervisors.

The graphic representation of the cyclical process of producing intelligence describes the activity of analysis. It may be described also the say way one describes the process of science. Scientific advance does not usually begin with a hypothesis. In fact, it almost never does. The steps of science, and, I argue, production of intelligence are:


  1. Observation

  2. Correlation

  3. Generalization

  4. Experimentation



These four steps, in turn, generate new observations, so the cycle continues, eventually producing new scientific knowledge. The precise same four steps are precisely the same for producing useful intelligence. In following entries I will present what the elements are of each of the steps 1. – 4. above. What will turn out to be most significant is the methods of observation necessary to gather facts. Correlation will involve connecting the many facts gained through observation by a variety of methods, some of them highly complex. Only when the facts have been correlated, or connected by methods of relating them, is the analyst ready to make a generalization which, in intelligence, is the same as an intelligence finding. No analysts will be given the right to disseminate a finding on their own volition. Before an intelligence report is disseminated it must go through exhaustive testing against what is known to be true. When the community (or a significant part of it) is convinced that a finding is accurate it can be disseminated.

At many points of this cycle (another way of looking at the figure above) new questions may well be raised. That, in turn, may generate new requests for information, and the cycle continues. The four-step cyclic process listed above is scientific in nature and must meet a fundamental requirement. I believe that requirement is as follows.
I define intelligence analysis as the organization of knowledge in such a way that it commands more of the hidden potential in information.


This definition is a paraphrase of J. Bronowski in his book, Science and Human Values (New York: Harper and Row (1965), p. 7). Bronowski is defining science, and his definition has a definite parallel in intelligence analysis.

As shown in the practical cycle of intelligence analysis in the figure above, the common procedure that results in an intelligence report usually begins by a request from a consumer to answer some question. When the question becomes an intelligence task, the first step is reviewing the literature to determine what is already known. The “literature” may mean previous intelligence reports or even raw data that has not been put in a coherent form. Often (usually) there are gaps in the data. This is a reality that led Secretary of Defense Donald Rumsfeld to utter the worst statement I’ve ever read in the field of intelligence.

There are known knowns. These are things we know that we know. There are known unknowns. That is to say, there are things that we know we don't know. But there are also unknown unknowns. There are things we don't know we don't know.


As silly as this reads, it is a truism. We can do our best to find out what is already known, and what is gathered but not reported, and we may still find that neither we, nor anyone else in the intelligence community know enough to come to some consensus on the best way to answer the consumer’s question. More data may be required to convince enough people to reach consensus.

Here we have to avoid a logical trap. Too many people believe that all is needed for intelligence is data. No finished intelligence is a collection of facts. It will not do to call an intelligence report true or false in the simple sense in which every fact is either so or not so. All the data have to be woven together into a coherent picture of how “what we know” (data) is linked and built up into a logical conclusion. This is a creative act, not simply a regurgitation of facts.

All intelligence is a search for unity in hidden likenesses. (Bronowski, p. 13) The search may be on a grand scale, such as determining which nation states have the capacity for using nuclear weapons. But there are discoveries that are made by snatching small likenesses from the air, too. The intelligence discoveries may be highly significant if the analyst is bold enough and asks the right questions.

I did an analysis of loss of aircraft in Vietnam. Why were we losing so many aircraft when we had certainly achieved air superiority? The answer lay in observing the thousands of ancient antiaircraft guns that the North Vietnamese Army (NVA) had (presumably from China). By fooling US aircraft into evasive maneuvers the NVA lured aircraft to fly into a barrage of conventional antiaircraft firepower. Also, owing to the radical evasive maneuvers the planes used whenever the pilots detected a radar signal, many aircraft flew “beyond the envelope” and crashed into the ground without even being hit. This, to be sure, was not a popular finding with the Navy or the Air Force, especially when coming from a junior analyst in the U.S. Army.

Scientific reports are generally produced for the use of the scientific community. Thus, in science, there are not many institutional “positions” on scientific knowledge. If a scientific result is “sufficiently crazy” it may be shattering in scientific knowledge.

Niels Bohr and Wolfgang Pauli were two giants of physics in the twentieth century. Pauli gave a lecture and afterwards Bohr was called upon to comment. Pauli remarked, perhaps in jest, that the theory may, at first, look “somewhat crazy.” Bohr then replied that the problem was that it was not crazy enough.

“Sufficiently crazy” does not mean silly wild guess, or worse. It means a departure from what accepted knowledge. The really good analyst looks for the appearance of “likenesses” for order does not exist or display itself of itself.

[I]f it can be said to be there at all, it is not there for the mere looking. There is no way of pointing a finger or a camera at it; order must be discovered and, in a deep sense, it must be created. What we see, as we see it, is mere disorder.


When Isaac Newton set out to show that the fall of an apple must be drawn to earth by gravity, he did not have a new idea. That conception was older than Newton. What struck him was the conjecture that the same force of gravity, which

reaches to the top of the tree might go on reaching out beyond the earth and its air, endlessly into space. Gravity might reach the moon. (Bronowski, p. 14)


This was Newton’s new thought. It might be gravity that holds the moon in orbit. Newton calculated what force from the earth would hold the moon, and compared it with the known force of gravity at tree height. The forces agreed; Newton says laconically,

I found them answer pretty nearly.


They agreed only nearly; the likeness and the approximation go together, for no likeness is exact. In Newton’s sentence, both modern science and the modern nature of intelligence are full grown. The process of analysis is the discovery at each step of a new order that gives unity to what had long seemed unlike.




This doesn’t always work in intelligence for the policymakers have desired positions for which they want corroboration. Intelligence agencies also have positions, historical, organizational, and. The analyst may find that previous written products given to consumers in the past. That is, the analyst looks for the accepted organizational response before generating analytic hypotheses. This can distort the intelligence finding, and is something to be taken up in a later blog entry.

Understanding organizational-personality is critical to understanding the meaning, context, and process of intelligence analysis. Real organizational and political consequences are associated with changing official analytic findings and releasing them to consumers. The

  1. Organizational consequencesare associated with challenging other domain experts (including peers and supervisors).

  2. Political consequences arise when consumers begin to question the veracity and consistency of current or previous intelligence reporting.


These last two items are at the heart of what can go wrong with intelligence analysis. That will be investigated in a future blog entry. The next few entries will be:


  1. How intelligence observations are made and data collected.

  2. Why intelligence reports go wrong.

  3. How the intelligence community is structured for producing intelligence.



  4. Needles in a haystack: how a new analysis was produced on Iran’s cyber war.



As always, comments are welcome.

Tuesday, August 24, 2010

41. Who Controls Russia?

41. Who Controls Russia?

I met Boris Volodarsky, a former member of the Russian Spetnaz in Cambridge, England, July 16, 2010. Boris works now in London, and gives talks on the way Russia functions nowadays, as well as how it worked under the Soviet system. Volodarsky attended the most prestigious economic and language institutes in the Soviet Union. [Shown belowis member of the Spetnaz preparing for an airborne operation.]




According to Volodarsky, even though the KGB was disbanded when the Soviet system collapsed, a shadow KGB still exists, quite strong, in Russia. One needs only to look at the people in charge, especially the Premier, and former President, Vladimir Putin, who was once head of the KGB. Volodarsky said “The KGB is in total control or Russia. All aspects, every business, especially those that make money, are under control of the secret service. The leaders of businesses may make money, but cannot make any decisions without permission of the secret service.”

So recently CBS Sixty Minutes re-ran a program that aired in May, 2010 about the purchase of the New Jersey Nets' (the worst team in professional basketball) by the billionaire Russian, Mikhail Prokhorov . Prokhorov made his money with the overt permission of the Russian government by buying and then selling at a huge profit a manufacturing industry in Russia. He is well known as a playboy, even was arrested in France for allegedly bringing women in with him for the purpose of prostitution. The charges against him were dismissed and French President Nicolas Sarkozy apologized to Russian President Medvedev over the entire incident.


If Volodarsky is correct, then Prokhorov’s riches stem from his approval by the Russian Secret Service, and the decision to buy the Nets had to be one made by the shadow KGB .

No one, especially a foreigner, can buy into the NBA without approval of the league. So what did the league do? NBA commissioner David Stern, always eager to trumpet the game's global expansion, said Nets fans could feel good about Prokhorov.
"I think that any investor who stepped into the opportunity he did would be important and bring excitement, because it's the final step in ensuring that there will be a brand new building in Brooklyn and the Nets will return to New York," said Stern.

But Stern understands why Prokhorov - a playboy who used a recent "60 Minutes" profile to advertise his love of women, yachts, adventure sports and guns - is being seen as a different breed of NBA owner.

"Because he's something of a larger-than-life character, he's generated additional interest," Stern said in an interview with the Daily News. "He's a six-foot-eight basketball player, wealthiest man in Russia, with a smile and fun sense of humor."
"Because he's something of a larger-than-life character, he's generated additional interest," Stern said in an interview with the Daily News. "He's a six-foot-eight basketball player, wealthiest man in Russia, with a smile and fun sense of humor."

By swooping in late last summer to buy one of the worst teams ever (the Nets finished this season with a 12-70 record), and rescuing Bruce Ratner's embatled bid to relocate the team to the controversial Atlantic Yards site in Brooklyn, Prokhorov has managed to generate extraordinary excitement - and suspicion. One congressman is calling for greater scrutiny of Prokhorov's vast investment empire, and neighborhood opponents to the 22-acre Atlantic Yards project may now see a symbolic villian in Prokhorov, whose wealth is largely built on extracting metal from 4,000 feet deep in the Siberian earth and poisoning the environment in the process.

The congressman is not the only one concerned with Prokhorov’s buying in. Rod Thorn's, the president of the Nets, announced his decision to retire as president of the Nets. One can understand why he would like to get out of his relationship with the Nets, and his decision was no doubt hastened by the presence of what he perceived to be Russian spies inside the team's offices.

According to sources close to the team, Thorn had quickly grown tired of having to answer to associates of new Russian owner Mikhail Prokhorov, who took control of the Nets in early May, 2010. After months of dealing with Prokhorov's underlings looking over his shoulder, Thorn decided to walk away. He steps down on July 15, one week after the free agent signing period began.

Before news of his impending retirement broke, Thorn told the New York Daily News that he had no issues with either Prokhorov or his field generals."That's not right," Thorn said. "And I'm really serious, that's not right. The new ownership has been great to me. I think they're going to be the best owners in the league."
One of the most respected executives in the NBA, Thorn is known to be territorial when it comes to decisions that affect the team. He seemed to have at least some of his authority undermined when Prokhorov decided to name Irina Pavlova - the daughter of a Russian diplomat and a former Google executive - as president of the Nets' parent company.

Prokhorov has also made it clear that he will play an active role in recruiting pending free agents such as LeBron James, who was rumored to be giving the Nets the first crack at romancing him when free agency began. It must have caused tidal-wave repercussions in Prokhorov’s staff when James went to Miami and not to the Nets. Maybe James was big enough that they could not make him an offer “he could not refuse.”

So, if Boris Volodarsky is to be believed, the Russian secret service now has a fully legal operation ensconced in the head offices of the Nets. Time will tell what effect this may have.

Saturday, August 21, 2010

40. What is Intelligence?

In talking about INTELLIGENCE I mean the product produced by gathering, analyzing, and dissemination about the world around us, useful to policymakers. The word has many connotations, most prominently that of cognitive abilities, but those shades of meaning are not relevant here.

When one goes to intelligence literature, one is overwhelmed with doubletalk and bureaucratese that uses a lot of words but reveals little. In every article I write I will be using a set of definitions based on what people who produce and use intelligence. Such a definition is much better because it shuns the abstract and gobbledygook and reveals what it is that Intelligence Products actually are.

Intelligence is secret state or group activity to understand or influence foreign or domestic entities.

The above definition of intelligence is a slightly modified version of the one that appeared in Michael Warner’s work in a recent article in Studies in Intelligence. “Wanted: A Definition of "Intelligence," Michael Warner, Studies in Intelligence 46, no. 3 (2002), pp. 15–22. [https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol46no3/article02.htm ]
Warner reviews and synthesizes a number of previous attempts to define the discipline of intelligence and comes to the conclusion that

Intelligence is secret state activity to understand or influence foreign entities.


Strategic: refers to the long-term; to plans made or actions taken in an effort to help the organization fulfill its intended purpose.

Tactical: refers to an expedient for achieving a goal; a maneuver. This intelligence is often


  1. Actionable (The necessary information immediately available in order to deal with the situation at hand.


  2. Operational (Information required for planning and conducting campaigns and major operations to accomplish strategic objectives within operational areas.)



My definition of intelligence applies to both strategic and tactical, since both are designed to influence the understanding or behavior of an adversary. This synthesis captures most of the elements of actionable intelligence without being too restrictive or too open-ended. Most sources I have checked for definitions are contained within Definition 1 above. Note that this definition applies far wider than military situations. It applies as well to law enforcement intelligence and to preventing terrorism. It includes nonstate actors as well as nation states, and domestic groups within the United States about which intelligence activities are necessary and performed.

Friday, August 20, 2010

39. Chinese Military Continues Hacking Western Computers

39. Chinese Military Continues Hacking Western Government Computers
For some years the Chinese military has been hacking, or attempting to hack, Western computing facilities. In my blog No. 10 I write about C4ISR, where one of the “Cs” is computing. Modern armies, and practically all business rely on computers for multitasks, including highly sensitive transactions, such as transfer of money. When a system is under attack the entire nation’s economy and security is put at risk.

The U.S. for the first time is publicly warning about the Chinese military’s use of civilian computer experts in clandestine cyber attacks aimed at American companies and government agencies. The Pentagon laid out its concerns in the week of August 16 in a carefully worded report.
The People’s Liberation Army, the Pentagon said, is using “information warfare units” to develop viruses to attack enemy computer systems and networks, and those units include civilian computer professionals.

China is developing into an economic superpower, and that growth is allowing the Chinese government to invest more in its military. China has embarked on a massive effort to modernize its military and transform its structure, doctrine and strategy, according to the Penagon report.

The pace of the transformation effort has increased in the last 10 years, and China’s military capabilities have developed to influence events well beyond its borders. The Chinese army now can contribute to international peacekeeping efforts, humanitarian assistance and counterpiracy operations. The United States welcomes these capabilities, and wants to work with China to develop them further, the report says.

However, the report says, other capabilities are more disturbing. China is investing in anti-access technologies that would force U.S. naval and air forces farther from Chinese shores, and has fielded large numbers of short- and intermediate-range missiles and cruise missiles. The Chinese navy has a potent mix of surface ships and submarines and is working to develop naval air wings to operate off an aircraft carrier China bought from the Ukraine in 1998. The Chinese could begin work on an indigenous carrier this year, the report says.

China also is building space and cyber assets, the report says, and the Chinese are still building and launching intelligence satellites. China’s cyber attack capabilities are a mystery, the report acknowledges.

In 2009, numerous computer systems around the world, including those owned by the U.S. government, continued to be the target of intrusions that appear to have originated within the [People’s Republic of China],” the report says, noting that the intrusions seek military and commercial information.

The accesses and skills required for these intrusions are similar to those necessary to conduct computer network attack.


Because no one outside China really knows where the Chinese military buildup will end, transparency in the goals of the transformation would go far in reassuring regional countries and global partners, the report says. In addition,

The limited transparency in China’s military and security affairs enhances uncertainty and increases the potential for misunderstanding and miscalculation.


See http://www.defense.gov/news/newsarticle.aspx?id=60456 for this news and for the entire report, see

Report: Military and Security Deployments Involving the People's Republic of China (http://www.defense.gov/pubs/pdfs/2010_CMPR_Final.pdf )

06. Does Iran Need Nuclear Reactors?

06. Does Iran Need Nuclear Reactors? Environmental & Social

(This blog was written in July, but failed to post. I am reposting it now).

Iran argues it needs a nuclear program for a third reason mentioned in the last blog: (3) avoiding the severe adverse effect of burning gas and the resulting carbon emission which is the major culprit in global warming and the greenhouse effect.

Iran argues that with growing population and increased industrialization it will necessarily release a huge amount of carbon into the atmosphere as long as it must rely on oil and gas for energy production. It is probably true that its level of air pollution is significant since it is reported that schools have to closed several days owing to air pollution.

These arguments are not convincing. Reduction of air pollution is, to be sure, a necessity. I personally have experienced the ill effects of air pollution during my years living in China. But to argue that nuclear power will be remove air pollution problems is arguable.

Accidents such as occurred at Bhopal, India (not nuclear), Paducah, Kentucky, Chernobyl, and Three Mile Island are sobering. They show that regardless of the care that is given to containing radiation exposure from a nuclear reactor, accidents of monumental proportions can, and have, occurred. The more energy that is concentrated in a site, the higher the risk level of a catastrophic accident. Going nuclear is no guarantee of security from severe environmental problems. It certainly is a self-serving argument from Iran that it needs it to be a “good citizen” country.

Polluted air also severely damages soil and groundwater resources by contaminating the rain water. At the same time, Iran's industrial base, using oil and gas for energy, generates wastes that contaminate a large number of rivers and coastal waters and threaten drinking water supplies. These are separate from oil spills in the Persian Gulf and pollution in the Caspian Sea that continue to contaminate the waters. These are all caused by the fact that, Iran's renewable energy consumption, including hydropower, solar, wind, tide, and geothermal, account for only 2% of its total energy consumption, with the rest supplied by oil and gas.

Wednesday, August 18, 2010

38. Final Chapter on the Cambridge 4

(This entry is a summary of a talk given on July 16, 2010 by Nigel West in Cambridge, UK. Disclaimer: I wrote these notes while listening to Nigel West’s lecture. I tried to get it right but there may be some errors, and any errors or omissions in the following are totally my own and should not be attributed to Nigel West. The better source is by Nigel himself in his book, West, Nigel (1987). Mole Hunt. London: Wiedenfeld & Nicolson)

Burgess and Maclean defected to the Soviet Union in 1951. John Cairncross also confessed in 1951 but was not prosecuted. Philby went to Beirut, Lebanon and, in 1963, under questioning, gave a sort of confession, non-confession to an MI5 agent. In 1964 Blunt accepted immunity and admitted to being a Soviet spy.

In his statement in 1963 Philby maintained he was self-recruited. Evidence against him was so strong that SIS sacked him in 1951. Few people knew that he was under suspicion. Philby swore he hardly knew Maclean and was “shocked” by Burgess’ defection. Philby convinced nobody but there was no hard evidence that could be used in court could be brought against him. He also got a lot of sympathy from his colleagues who did not know the evidence. As Deep Throat advised in All The President’s Men (re: Richard Nixon and Watergate), “Follow the money.” Philby could not show where he got the money to support himself when in Spain.

Philby ghost wrote a book. He managed a recommendation for the Observer. Litzvy divorced him, but he still had two more wives. His third wife was a crackpot. Ilene told her psychiatrist that Kim was trying to kill (this was reported only after her death under suspicious circumstances and there was no autopsy.)

Kim Philby wrote for The Observer and for The Economist from Lebanon. There he came more under the influence of his father, who was very anti-British, and highly pro-Arab (this is clear in his dispatches), and he was highly anti-Israel.

Philby was a long-time friend with Mrs. Flora Solomon.It was she who introduced Kim to Ilene (Kim’s first wife). Phiby’s anti-Israeli writing offended Mrs. Solomon, an ardent Zionist. In 1962 she confided to Victor Rothschild in Tel Aviv that she believed Kim Philby to be a Soviet spy. Kim had even tried to recruit Mrs. Solomon in 1945 (Vienna) with the statement, “Are you prepared to commit your life in the cause of peace?”

Dealing with the defectors, the Security Service recognized it was not very good at interrogation. The Service had certainly interrogated Germans and the renegades of the St. George Corps (Himmler changed the name to something more meaningful to Germans, namely the Britische Freikorps or British Free Corps). Philby, however, was much smarter than his interrogators. His stutter was also an asset, giving him time to collect his thoughts before giving an answer.

By 1962 Philby was in Beirut and he could not be arrested by the British. If he returned to Britain, what could he be charged with? MI5 formed a new strategy. What about offering him immunity? It would taste bad but it would be valuable to get Philby to reveal Burgess and Maclean. Arthur Martin was to be sent to be Philby’s interrogator. Within SIS there was a belief that Martin should not be sent. Their plan was to appeal to Philby’s loyalty. But he had betrayed everything! How could he now become overwhelmed with remorse? They went to Nicholas Elliot (a friend of Philby.)

Elliot was an outstanding officer. On the outbreak of the Second World War he was commissioned in the Intelligence Corps, posted to Cairo in 1942, and subsequently to Istanbul; a seething hive of wartime espionage. His job was to check anti-British activity and he became an extremely effective Field Officer, obtaining the defection of an important German intelligence officer, Dr Erich Vermehren, an operation that dealt a devastating blow to the effectiveness of the Abwehr in 1944.

Eliot arrived in Beirut in December 1963 where he had previously been SIS station chief. He really liked Kim as a friend. He knocked on Kim’s door and Kim answered, and said, “I was expecting you.” Philby was offered immunity, and he accepted. He made no denial, which was a strange behavior for him.

Philby asked Elliot to come back the next day and he would give him a typed statement. Elliot tried to record Philby but made a stupid mistake. The room was hot and he opened the window to get fresh air. However traffic and street noise was so loud that nothing on the tape was understandable. Philby’s confession was three pages, and well written. Philby stated there were other spies, and he named Tim Milne, son of A. A. Milne. This was, of course, devastating news if true. What else could go wrong?

Eliot flew to London with the document. MI5 want through the document carefully. Martin was suspicious about the contents, it being far more detailed than necessary. When agents went back to Beirut to talk further with Philby, he had disappeared. He had gone to Moscow. How he went is still a mystery.

Philby’s second wife, Eleanor, was devastated. She eventually went to Moscow to say, but finally left. She wrote her own book, The Spy I Loved. Tim Milne was interviewed, and so was Tony Milne (brought home from Tokyo). Tony made a good case that Philby’s accusations were nonsense, and offered his resignation. It became clear that they both were innocent, and the confession was in large part bogus.

Why was Philby expecting Elliot? Someone must have tipped him off. In 1964 Blunt was offered immunity, and confirmed that Philby, Burgess, and Maclean were spies. Blunt wanted out of MI5 – and had stopped working for NKVD. They were quite upset with him about this, since Blunt had access to everything while in MI5. After the revelations of defections, Britain could never get a defector. They all went to the U.S. because all Soviets were sure MI5 was penetrated. In fact, MI5 did have serious penetration.

The arrest of Scripov in Australia further suggested that MI5 was penetrated. Clearly there were spies, but none arrested on the initiative of MI5. All were caught on the basis of defector information from CIA. One fellow was caught by mistake. A member of the Watcher Service happened to see Kuznetsov, and saw a meeting in the park, and an exchange of documents. He followed William Marshall who was later arrested as a Soviet Spy. This was not a case based on good counterintelligence work.

There was worse news. Every double agent activity had gone wrong, every agent identified. A defector went to the CIA and said he knew all the double agents. Clearly there was a mole in MI5 who had run agents as unwitting triple agents. Further, the defector told the CIA that all of the controls would also be identified. Some of them turned. There is nothing in the files about agents or case officers being turned.

Twenty-three cases were found that implied there was penetration of MI5. The conclusion was obvious that MI5 was penetrated, but who had the access to get the information being given up? The common denominator was someone high in MI5, perhaps Deputy Director General Graham Mitchell or Director General Roget Hollis. This posed a huge problem. How could anyone go to DG Hollis with evidence about Hollis himself?

Graham Mitchell was born in 1905. Educated at Winchester School and Oxford University, Mitchell worked as a journalist and later as a statistician in Conservative Central Office. Mitchell was recruited into MI5 in 1939 via a contact within the Conservative Party. Although he suffered from polio he became a well-respected field officer.

He was surveilled by amateur watchers for a while. Graham Mitchell knew all the watchers so the professionals could not be used. The surveillance provided a very interesting history. After three months of surveillance, and a result of the interrogation, Graham Mitchell asked for retirement. No Deputy Director General before had ever asked for early retirement.

That there were two subjects (DG Hollis was not aware he was a suspect) was kept secret for a long time. Hollis ordered the investigation into Mitchell should be brought to an end. Frustrated, Arthur Martin protested by accusing Hollis of protecting Mitchell. Hollis was furious and took his revenge by replacing Martin with Ronald Symonds as head of DI (Investigations). Eventually Hollis retired normally. Only a small group within MI5 knew all the suspects and the evidence. They soon realized that all this would be covered up.

Peter Wright headed what was left of the investigation and took the evidence to SIS. He then went to #10 Downing and tried to see the Prime Minister. The Cabinet Secretary demanded to see his evidence first, and Wright provided twenty-four pieces of evidence. A very secret review then took place, and the results were inconclusive. Imagine the Head of Intelligence being accused as a spy!

Ultimately the inquiry was inconclusive. No proof or smoking gun was found. In 1979 Margaret Thatcher became Prime Minister. Andrew Boyle, an investigative reporter, was tipped off to the situation and ferreted out a great deal, digging into the mess, and almost got it right in his book, The Climate of Treason (2d edition, London: Hodder & Stoughton, 1980). He had mistaken information about Philby and some wrong dates. The MI5 mole was identified by codename as MORRIS, and there was enough information to say that it appeared to be Blunt.

Blunt was outraged and wanted to sue. Then a magazine says it knows who MORRIS is. Thatcher had sworn an oath in court. She could not ignore that Blunt had perjured himself and she also knew he had already (secretly) confessed. MI5, fearing the information that would be made public by exposing Blunt, tried to protect him. Then in Parliament it was announced that Blunt had been a spy and had been stripped of his honors by a very angry Margaret Thatcher.

The government then announced that the penetration of MI5 was totally due to Blunt. This was, of course, untrue, as most of the penetration occurred after Blunt was out of MI5. Everyone was misled by the Security Service. Then, when they tried to go after Mitchell, he revealed the actual story to the newspapers. This was followed by the book, Spycatcher: The Candid Autobiography of a Senior Intelligence Officer by Peter Wright (1987). Toronto: Stoddart Publishers.For an excellent review of Peter Wright’s book, see http://www.mi5.com/security/mi5org/spycatcher.htm . This site also has copies of newspaper articles about MI5 penetration that shocked the entire world.

The government made a huge effort to stop the publishing of the book, and tried to invoke the Official Secrets Act, but failed.

We still do not have all the answers, and several Russian defectors have claimed that there was no penetration of MI5 at all.

Tuesday, August 17, 2010

37. Bletchley Hall

Bletchley Hall in Buckinghamshire, England, was the heart of cryptography during World War II. It is now a highly documented site, and also a preserved museum honoring the “codebreakers” of the German Enigma machine, and many other types of ciphers. I was able to visit Bletchley Park on July 15, 2010.

In 1996s Robert Harris’ book Enigma was published. [New York: Random House. ISBN-13: England 1943. Much of the infamous Nazi Enigma code has been cracked. But Shark, the impenetrable operational cipher used by Nazi U-boats, has masked the Germans' movements, allowing them to destroy a record number of Allied vessels. Feeling that the blood of Allied sailors is on their hands, a top-secret team of British cryptographers works feverishly around the clock to break Shark. And when brilliant mathematician Tom Jericho succeeds, it is the stuff of legend

Wartime codebreaking caught the public interest on both sides of the Atlantic. Hugh Whitemore wrote a play about it, Breaking the Code, produced in London’s West End, and it was soon made into a BBC TV production. A number of other books, many excellent, have been written about codebreaking and Bletchley Park. The common theme is that it was thanks to the brilliant codebreakers at Bletchley Park that Britain managed to read Nazi Germany’s most secret messages.

Perhaps the best book written about Enigma and Bletchley Park is Enigma: The Battle for the Code by Hugh Sebag-Montefiore [New York: John Wiley and Sons, Inc, 2000.] One of the compelling reasons for Sebag-Montefiore to write this book he tells in his book’s introduction.

Bletchley Park, the house in Buckinghamshire where the Enigma code was broken by Britain’s codebreakers, used to be owned by my great great grandfather, Sir Herbert Leon. … He and his second wife, Fanny, lived at Bletchley Park from the early 1880s until his death in 1926. The house and its surrounding estate was eventually sold off by the Leons, following Fanny’s death, in 1937. My father, Stephen Sebag-Montefiore has often told me about the strange Victorian time warp he entered when, as a young boy, he was taken to Bletchley Park by his parents to visit the Leons.


Bletchley Park became Britain’s best kept secret, but today the Park is open to the public as a heritage site and museum. One can explore the wide range of exhibitions and learn how its codebreaking successes helped to save countless lives by short3ening World War Two by around two years.

Bletchley Park was Churchill’s secret passion; he called its codebreakers s his “geese that laid the golden eggs but never cackled.”

The story of Bletchley Park is also the story of one of the most eccentric mathematicians of all times, Allan Turing. He was able to visualize the inner workings of the Enigma machine and design a method for decrypting German messages almost before they read them themselves. It is also the story of Tony Sale, a brilliant engineer who built the Lorentz decrypting machine, the world’s first analog computer. Tony then, years later after the Lorentz machine had been destroyed, recreated it by scrounging discarded vacuum tubes and switches from decommissioned telephone exchanges. He began his work with seven pictures of the Lorentz machine. By chance he met some NSA people at a meeting and they revealed they had the original plans for Lorentz. Today Tony can exhibit how the machine works in reality.

For exploring Bletchley Park online, see http://bletchleypark.org.uk

For further information on Tony Sale see http://www.codesandciphers.org.uk/

Monday, August 16, 2010

36. Iran's Ministry of Intelligence and Security (MOIS)

36. Iran’s Ministry of Intelligence and Security (MOIS)

Iran’s Ministry of Intelligence and Security (MOIS) is ranked by experts as one of the largest and most active intelligence agencies in the Middle East, having masterminded 450 black ops throughout the world since the 1980s. MOIS remains shrouded in so much mystery that apart from the occasional revelations by the Iranian Resistance, little has ever been made public about its operations and functions. Its secret budget and unchecked power have turned it into one of the key pillars of the Iranian theocracy.

MOIS is also one of the most secretive agencies in the world and its command structure is directly answerable to the Iranian regime’s Supreme Leader Ayatollah Ali Khamenei.

Intelligence Minister

The current Minister of Intelligence and Security, Hojatoleslam Ali Younesi, was appointed the Head of the Revolutionary Court of Tehran and later Head of the Politico-Ideological Bureau of Islamic Revolutionary Guards Corps (IRGC) soon after the 1979 revolution that toppled the Shah. In 1982 Younesi was appointed Religious Judge of the Military Revolutionary Tribunals. He was one of the founders of MOIS. In 1986 he was appointed representative of the Supreme Leader to oversee the reconstruction of the Intelligence Directorate of the army upon the order of Ayatollah Khomeini. In 1987 he became the Representative of the Acting Commander-in-Chief of the armed forces at the Intelligence Directorate of the army, and was appointed a religious judge.

The summer of 1988 marked a turning-point in Younesi’s rise within the clerical regime’s hierarchy. As one of the religious judges charged with implementing Ayatollah Khomeini’s fatwa to execute all non-repentant political prisoners, Younesi made a name for himself by presiding over one of the most ruthless tribunals, dispatching prisoners to their deaths summarily after trials that barely lasted more than five minutes.

Younesi’s performance in 1988 led to his promotion to one of the top slots in the Iranian regime’s judicial system and he became the head of the Judicial Organisation of the Armed Forces.

In 1999 another Shiite cleric, Dorri Najafabadi, needed to be replaced as Minister of Intelligence and Security in the wake of the disclosure of MOIS agents’ killing dozens of intellectuals and dissidents. Younesi was given the job.

Span of the Secret Network

MOIS is a ministry only in name, for it operates under the direct supervision of the Supreme Leader. It is not accountable to either the cabinet or the parliament, has a secret budget, and stands above the law. Over the past two decades, it has grown into a huge machinery of political repression.

The Iranian regime’s use of terrorism as an adjunct to foreign policy has developed into an organized and professional activity over the last 25 years, masterminded by MOIS. It has been used as a lever to gain advantages from Western countries or to exert more pressure on surviving opponents of the regime. Many of Iran’s diplomats have a record of previous service with MOIS, the IRGC (Pasdaran or Iranian Revolutionary Guard Corps (IRCG), and other security agencies. The MOIS works in coordination with the Foreign Ministry in operations carried out abroad, making particular use of Iranian embassies worldwide as hubs for gathering intelligence and diplomatic passes for agents involved in terrorist activities.

Internally, agents of MOIS are rigorously tested before they are given security clearance and trusted enough to take part in operations which could potentially implicate the highest levels of the regime’s leadership to state corruption should someone decide to expose the agency. Many of the members, who themselves were handpicked from other security agencies inside the country, are first required to take part in the killing and torturing of dissidents, to ensure their loyalty to the regime and its Supreme Leader. Only the most loyal cadres are inducted into the organization.

Throughout the years, on a number of occasions, MOIS has gone through internal purges, whereby agents showing weakness conveniently disappeared or committed suicide. From 1997 to 1998, after a series of gruesome murders of Iranian dissidents by MOIS liquidators became public, the then-deputy Intelligence Minister Saeed Emami was jailed on conspiracy charges, and later was reported to have committed suicide in prison. The report of suicide convinced no one, and it was widely believe he was killed to prevent a leak of sensitive information about MOIS operations. Such a leak would have compromised the entire leadership of the Islamic Republic. Such internal purges and murders within MOIS sparked a feud at the highest levels of the agency, which landed top officials from the losing side in prison.


[See http://www.iranfocus.com/ See also: http://www.globalsecurity.org/military/world/iran/pasdaran.htm]

34. The Man Who Saved British Cities, Dr. R. V. Jones

34. The Man Who Saved British Cities, R. V. Jones

I did not know [that Coventry would be bombed.] The Enigma had not [been] broken that night in time, although it had by the following morning…but that was too late. So I couldn’t tell him where the target was.

From Dr. R. V. Jones, SIS science advisor, in The Secret War, a BBC television production

Nigel West concludes that

…it is easy to see how …various authors, ignorant of the work of Air Intelligence or the full background of COLD WATER, should have concluded…that the Prime Minister [Winston Churchill] had made a deliberate decision to protect ULTRA’s future at the expense of a city in the Midlands. In the event Churchill presumed he had no need to order the evacuation of Coventry as he had good reason to believe that adequate counter-measures were available: so far as he knew, the German bombs would fall, but on empty fields.


[Nigel West (1985). A Thread of Deceit: Espionage Myths of World War II. New York: Random House. ISBN: 0-394-53941-9]

35. Comparison of World Intelligence Services

(This entry is a summary of a talk given on July 11, 2010 by Nigel West on board Queen Mary 2, headed from New York to Southhampton, UK. Disclaimer: Any errors or omissions in the following are totally my own and should not be attributed to Nigel West.)

Directors of all intelligence services claim their agencies are tops. What are the pluses and minuses of these organizations? This analysis will probably not agree with common perception.

KGB

This now defunct organization, replaced by the Russian FSV (The Federal Security Service) was an enormous Soviet organization with about 850,000 people. Two-thirds of diplomats overseas were KGB. They were answerable to the ambassador, but also to the Rezidentura. Anyone who received instructions, regardless of whether they were in the KGB or not, would respond to the task. You did not decline to take a task from the KGB. As powerful an organization as it was, it was handicapped by some negatives. First of all, the KGB had no analytical process. It never had more than 12 analysts. The Politburo wanted to see the raw data, and it was often tailored reporting for the use of political officers. This was very dangerous since the Central Committee was not sophisticated in intelligence. The KGB was further handicapped by its series of non-stop defections, including several quite senior people.

CIA

The CIA (Central Intelligence Agency) was formed in 1947 as a successor to the OSS. It is not the only intelligence service, since the U.S. has approximately 50 organizations involved in intelligence. The CIA budget is concealed within the annual government budget. On the whole, the CIA has done a pretty good job, although past performance does not predict the future. It is an impressive agency, probably overly risk fearing. The Director of Central Intelligence is often far more of a politician than an intelligence professional, and on occasions may be pushed to tailor intelligence reports. It seems pretty evident that George Tenet was pushed to say what the war-hawks wanted to hear. Certainly Colin Powell seems to have been misled.

British

The Secret Intelligence Service (SIS) contains both MI5 and MI6, although they are not the only components of SIS. It is a rather small organization that “punches above its weight.” It was fraught with problems of penetration in the past and that engendered a strong distrust from the U.S.

French

The major French agency is DGSE - General Directorate for External Security Direction, or, Generale de la Securite Exterieure. The DSGE has no qualms about using anyone as an agent. Any citizen, journalist, etc may and do report to it. It includes agents in Francophone Africa. It is under the direct control of the French President. Its major role is to protect French interests. There have been few resignations over Greenpeace.

VCA

The Viet Cong Army had about the best agency in the world for a short time.

Cuban General Directorate of Intelligence DCI (Dirección de Inteligencia de Cuba

The Cubans are very impressive. They run good actions against the CIA. One woman (Anna Montes) was in the DIA for 14 years but was a Cuban agent. The "Queen of Cuba" was what some of Ana Montez’s fellow DIA analysts called her. Fidel Castro may have agreed. Montes was one of Cuba's best agents in America during much of her 16-year DIA career. [For a pretty good introduction to the Queen of Cuba, see https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol51no2/the-intelligence-officers-bookshelf.html#pgfId-174098]

Mossad

The Israeli Intelligence Agency, Mossad, is probably the worst intelligence agency in the world, with a reputation that does not match results. The major problem Israel has is that it has no political representation in major target countries. It is small but fully willing to take credit. Many of its operations were classic debacles.

Indian Intelligence Agency

The Cabinet Secretariat Research and Analysis Wing [RAW], India's most powerful intelligence agency, is India’s external intelligence agency. Indian intelligence was formed in 1885 and is the longest operating intelligence agency in the world. It has never been penetrated. It carries out ops against Canada and U.S. as well as its major concern, Pakistan. It has full political support and cover. RAW does not hire Muslims. It is currently the best intelligence agency in the world in terms of meeting is assigned responsibilities.

Saturday, August 14, 2010

33. The Ghost Writer (2010), a Roman Polanski film

This film presents a writer who stumbles on a long-hidden secret when he agrees to help former British {Prime Minister Adam Lang (played by Pierce Brosnan) complete his memoirs on a remote island, after the politician’s assistant drowns in a mysterious accident. In this tense drama, the author realizes that his discovery threatens some very power people who will do anything to ensure that certain episodes from Lang’s past remain buried.

32. The Best Spy Novels Written by Intelligence Professionals

The following is a list I obtained from Nigel West (http://www.nigelwest.com/). The books are listed in alphabetical order of author.

Benton, Kenneth The Double Agent. A veteran MI6 officer writes about real incidents.

Fleming, Ian. From Russia with Love. )007’s creator received a classified briefing from a GRU defector before completing the best James Bond thriller.

Greene, Graham. Our Man in Havana. An amusing tale of an MI6 officer in Cuba, tormented by his mischievous, precocious daughter and the head of the local secret police.

Judd, Alan. Legacy. A still-serving MI6 officer describes an authentic double agent case in fictional terms.

Le Carrè, John. The Perfect Spy. A semi-autobiographical account of a British intelligence officer’s moral dilemma.

Mackenzie, Compton. Water on the Brain. A vicious spoof written by Mackenzie after he had been prosecuted under Britain’s Official Secrets Act in 1932

Masterman, John. The Four friends from Lisbon. Wartime double agents intrigue in Lisbon, written by the chairman of MI5’s double cross committee.

Maugham, Somerset. Ashenden. A collection of short stories based on the author’s personal experiences during the First World War.

Bingham, John. Knight's Black Agent. A veteran MI5 officer (actually Le Carrè’s mentor and model for George Smiley) reveals a case history.

Thursday, August 12, 2010

31. Recent Books on the CIA

The following is a list I obtained from Nigel West. The books are listed in alphabetical order of author.

Anonymous (2004). Imperial Hubris. New Potomac Books. A highly critical analysis of the CIA’s campaign against Al-Qaeda written by Michael Scheurer, a respected senior CIA counterterrorism analyst and expert on Osama bin Laden.

Baer, Robert (2002). See No Evil. Crown Books A CIA officer’s experiences in the Middle East with the clandestine service during the Clinton Era.

Drogin, Bob (2007). CURVEBALL. New York: Random House. A detailed account of how a single Iraqi chemical engineer in Munich misled the DIA, the CIA, and Colin Powell.

Drumheller, Tyler (2006). On the Brink. Carrol and Graf. A controversial insider’s view of the WMD debate by the former CIA operations chief for Western Europe who says he warned George Tenet not to rely on CURVEBALL.

Earley, Pete (2007). Comrade J. New York: G. P. Putnam and Sons. The former Russian SVR deputy rezident in New York, Sergei Tetyakov, defected in October 2000 and recalls his KGB career offering a fascinating insight into Putin-era corruption in the Kremlin.

Olson, Jim. (2006). Fair Play. Potomac. A thoughtful review of the ethics of intelligence operations writt3en by an experienced CIA station chief who served in Mexico City, Moscow, and Vienna.

Plame, Valerie (2007). Fair Game. New York: Simon and Schuster. A self-serving, not entirely accurate memoir by the CIA analyst married to Joe Wilson, who became controversial when he challenged publicly the White House view of Iraqi WMD.

Susskind, Ron (2008). The Way of the World. Simon and Schuster. A journalist's rather disorganized account of the intelligence community’s internal debate on Iraqi WMD prior to the 2003 invasion, with plenty of indiscreet insider gossip.

Tenet, George. (2007). At the Center of the Storm. Harper Collins. The angry memoirs of the former Director of Central Intelligence who recalls 9/11 and reveals rather too many of his own inadequacies.

Weiner, Tim (2007). Legacy of Ashes.. New York: Random House. A journalist’s history of the CIA. Comprehensive, but too reliant on newspaper reports of the Agency’s well-publicized failures and so reads as a one-sided critique.

30. Real Story of the Escape of Burgess and Maclean

(This entry is a summary of a talk given on July 12, 2010 by Nigel West on board Queen Mary 2, headed from New York to Southhampton, UK. Disclaimer: Any errors or omissions in the following are totally my own and should not be attributed to Nigel West.)

What is the real story of the Maclean and Burgess escape?

On May 25, 1951, Maclean and Burgess defected, leaving the U.K.

Maclean’s phones were bugged, and his telephone made permanently live so anything said in the house would be heard. MI5 felt he was bottle up. On his 44th birthday he received a surprise call. An old friend happened by for dinner. Twice during dinner both men went outside to get cool. At the end of the dinner Maclean said that he and “Roger Stiles” were going out. They went to a ferry, departed at midnight, and were last seen in Cherbourg. Immigration spotted Maclean and alerted MI5.

There was panic in MI5 since he was supposed to be picked up on Monday (they left on Sunday). The agent who was to follow Maclean had an expired passport and could not get out of France (Dick White). Maclean’s wife didn’t know they were fleeing and MI5 pretended they knew nothing.

Why did Burgess pretend he was Stiles? Linda was also a Soviet spy. It was not known until Petrov that all of these were spies.
[According to other sources, Linda, Maclean’s wife, decided to be a full-time wife to Maclean. Although never a spy herself, she did not reveal what she did know about her husband’s activities.]

This had an enormous impact on British intelligence. To this day we do not know how they got from Cherbourg to Moscow. Nobody had suspected Burgess, although he was a “bad boy” and was about to be sacked for his antics. It was unthinkable that significant people in the Secret Service could be traitors. Traitors were supposed to be foreigners.

Obviously the Cambridge spies were not quite what they seemed to be. Their careers had been positive in the service. Burgess got promotions in spite of his bouts of drunkenness and his flamboyant life style. Maclean had access to materials that he passed on. Burgess’ brother was an MI5 officer, thus from position and relations Burgess had access to many politicians (also because of his on-and-off again stints at BBC.) He was “plugged ion.” He was even used to operate a secret radio station to broadcast anti-Nazi propaganda. He also worked for MI5. He was not just a middle-level officer.

Anthony Blunt was a friend of Burgess. He was a talent spotter. He studied languages at Cambridge and was fluent in French. He joined MI5 in June 1940. He was very bright, and attracted the attention of the B division of MI5. He was asked to examine the efficiency of the Watcher Service. Blunt reassured the Soviets that the British had no permanent surveillance of the Soviet Embassy in London. Among the things he passed to the Soviets was the closely held operation XXX (“Triplex” This operation is detailed in the book by Nigel West and Oleg Tsarev, Triplex). Blunt was the MI5 officer tasked with retrieving documents from neutral diplomatic pouches.

When it was known that Burgess had disappeared it was Blunt who gave access to Burgess’ flat, and he helped with the search. The search turned up a letter from Philby that nobody had seen. It was under Burgess’ bed in a suitcase full of documents. It was clear some of the material had come from the Foreign Office as early as 1939. A woman in MI5 recognized the handwriting of John Cairncross, who now also became contaminated by Burgess.

Cairncross was cool, denying passing knowingly anything. While at Bletchley Park, however, he stole literally thousands of Enigma transcripts. He actually helped the Soviets to win the Battle of Kursk. Cairncross also was sent to SIS to work for Philby. At that time, Cairncross did not know Philby was a spy, or any other spies as such.

After the war Cairncross worked for the Ministry of Supply to the branch planning Britain’s nuclear power stations. This was highly important to the Soviets. In May, 1951, when the defections occurred he resigned from the Civil Service. He went to the U.S. to teach at Northwestern University. Later he was expelled from the U.S.

The book, Spycatcher (Wright, Peter. Spycatcher: The Candid Autobiography of a Senior Intelligence Officer. New York: Viking, 1987) is an accurate book. It is notorious in British circles, since it was a direct challenge to Britain’s Official Secrets Act. The government tried its best to suppress printing of the book.
Mrs. Thatcher, as Prime Minister, was horrified at the lurid details. She stripped Blunt of his honors (knighthood) and his position in 1979.

MI5 tried to find who tipped off Burgess and Maclean. Philby was brought back and questioned. He was sacked in 1951. Blunt was interviewed 13 times. MI5 could not break these people. Blunt lost his KGB protection. He finally admitted passing classified material. He was a long-term spy recruited in Cambridge.

The FBI thought it could help MI5, because they had a source in Washington who said Blunt was recrui8ted at Cambridge. This was Michael Whitney Straight. Straight was a contemporary of Blunt Cambridge and admitted that he had joined the Communist Party while there. He was also a lover of Blunt.

Straight’s background was not fully known by the FBI. He volunteered to the U.S. State Department. He was nominated by President Kennedy to be head of the National Endowment for the Arts. Fearing he would face a security test after the defections in 1951 he went to the FBI, confessed, and fingered Blunt.

In Britain, agent Arthur Martin convinced Blunt to confess. He gave immunity to Blunt to get information on recruitment at Cambridge. He let Blunt know that if he cooperated he would not be prosecuted. Blunt gave a tailored confession in April, 1964.

Philby died in 1988 in Moscow. Burgess died in 1963. He lived a miserable life after going to Moscow where he was badly treated. Soon after arrival he was beaten up by a group of thugs who knocked out half his teeth. He always wore his Eton tie and longed for England. Maclean became part of an East-West think tank and was highly regarded by the Soviets. He was given full military honors after his death in 1983. Blunt also died in 1983.

In 1990 the Soviet defector Oleg Gordievsky claimed that Cairncross was the “Fifth Man.” Cairncross was never charged with any offence. Cairncross worked as a translator for the United Nations Food and Agriculture Organization in Rome. When he retired he went to live in South France. He died in 1995.

In interviews on BBC not long before he died, he claimed it was youthful indiscretion and that he was never a traitor to his country.MI5 wrote a set of total lies about Burgess and Maclean for public consumption.

29. Defectors

(This entry is a summary of a talk given on July 11, 2010 by Nigel West on board Queen Mary 2, headed from New York to Southhampton, UK. Disclaimer: Any errors or omissions in the following are totally my own and should not be attributed to Nigel West.)

Defectors are individuals who physically switch sides in a conflict and change their allegiance to an adversary. [See West, Nigel (2002). Historical Dictionary of International Intelligence. Lantham, MD: The Scarecrow Press, p. 81] Defectors are usually self-selected.

Firstly, defectors do not usually have the motivation claimed: the sudden declared interest in democratic values is suspect. Second, agencies to which a person defects typically do not believe the defector’s claims, regardless of the “forensic evidence” the agency may claim about the motivation. Third, really good agents recruit themselves. We will sometimes turn them away

Sometimes we are overwhelmed with defectors. They are the best sources of information, and the only really good Humint comes from defectors. Most realize that going back to Russia, or their home countries, would be a disaster. Still, they may have a hard time selling themselves in the West.

Agencies frequently give serious consideration to giving defectors back, as was the case for the first defector from the USSR in December, 1945 in Ottawa. Igor Gouzenko was a cipher clerk for the Soviets. He knew the Rezident, Pavlov and he had good knowledge of the GRU. He brought with him 109 documents including a diary, telegrams, and the names of 23 Soviet spies.

The Royal Canadian Mounted Police (RCMP) recognized a gold mine, but didn’t know how to use it. One of the spies named by Gouzenko was set to go to London (code name ERIC). The Brits were interested but couldn’t move. Washington recognized ALECK was a hot case.

First, it appeared that ERIC was a nuclear physicist from Cambridge, and above suspicion. He had worked at Argonne National Laboratory near Chicago. It turned out it could only be Allan Nunn May. He was put under surveillance in London. An MI5 agent, Klop Ustinov (father of the actor Peter Ustinov) was used to meet May. May was tipped off and didn’t show. By February, however, all 23 spies in Canada were arrested. Most of the 23 were convicted, but all but 2 got got their convictions quashed.

Gouzenko alerted the West to huge Soviet espionage efforts. Up till then, nobody had a clue about what the USSR was doing covertly.

In September, 1945 Konstantin Volkov tried to defect in Istanbul. He revealed that Russia was reading the British signals to London. Even better, he offered what was a bombshell. He was a career NKVD officer and knew all NKVD in Turkey, and in virtually all the world. He said there were 9 Soviet spies in London, 3 in the Foreign Office. One, he said, was filling the role as head of the department of British counterintelligence. It was not clear whether he meant SIS or MI5. Volkov would be expensive to take care of but the information he offered was quite valuable.

The British called in Kim Philby to find who the mole could be. He determined to handle it himself. Bu the time Volkov was to meet Philby, there was no sign of Volkov. Apparently he was kidnapped and taken back to Russia. Philby blamed lax security on the British consulate in Istanbul. It is known that Volkov returned to the Soviet Consulate, from whence he quickly disappeared. The last seen of him was a heavily bandaged figure being hustled aboard a Soviet transport plane bound for Moscow.

Volkov’s revelation haunted MI5 and SIS for years. The hunt went on. In 1947 a GRU defector, and by 1954 the flood gates opened. This provided the information for the first time to really understand soviet Intelligence network. After Stalin died, Beria’s coup attempt failed. Those in NKVD who were close allies of Stalin became worried they would be purged and sought asylum.

Yuri Rastvorov defected to the British but opted to go the U.S. to the CIA. He had learned British intelligence had been penetrated. He provided a wealth of information. Then Nicolai Khokhlov, a hit man for the KGB, and a Ukranian who killed with an ingenious gas gun containing prussic acid defected. Prussic acid left no trace within 15 minutes. Khokhlov could identify people in SMERSH. He had a German girlfriend, very devout, who convinced him to quit.

Another defector, Peter S. Deriabin, described by the Central Intelligence Agency as the highest ranking Soviet intelligence officer to have defected to the West up until 1954, provided huge information. He had been a bodyguard for Stalin. He provided information on decision making in the Kremlin. He was the only defector to become a CIA officer. The so-called Penkovsky Papers were actually the material obtained from Deriabin.

There were two more crucially important defectors in Australia, this being the Petrov case. The Petrovs – Vladimir and Evodokia – came to Australia in February 1951 to work in the Soviet Embassy in Canberra. Vladimir was rezident and Evodokia was a cipher clerk. Vladimir wanted to defect and told everyone. He was concern he was about to be recalled. His dentist was glad to help him out since he was a full-time Australian agent. All Petrov really wanted, he said, was a chicken farm. Of course when he defected all hell broke loose. His wife was taken by Soviet thugs and frog-marched onto a plane bound for Moscow.

An Australian agent arranged for her to get a phone call a Darwin when the plane landed for refueling. She was separated from the thugs in the airport. She was able to talk to her husband. As a result she too defected.

The two of them supplied terrific information. Everyone concerned with the affair seems to have written a book. They were resettled on a chicken farm and never left Australia again.

MI5 interviewed them in Australia in 1954. There was concern about moles in SIS, and also the possibility of fabrication of agents to keep interest up. The Soviet defector in Canada, Igor Gouzenko, had said MI5 knew all the time about moles. MI5 had heard that there was a mole, ELLI, a leading Soviet spy that Sonia aka Ursula Hamburger, Beurton, and Ruth Kuczynski were running in Oxford until 1943. After the British defections it was clear there had been spy penetration. What would Petrov have to say? After the defections in 1951 no one knew where Burgess and Maclean were. Petrov said he knew they were in Moscow. He said they were recruited at university and that there were plenty others.

Suspicion to this point was only on Philby, Burgess, and Maclean, assuming it could never be at the top, only mid-level people of little interest. Now that it was apparent there was much more to be said was truly troubling.

Tuesday, August 10, 2010

28. The Ten Best Books Written on Intelligence

The following is a list I obtained from Nigel West. The books are listed in alphabetical order of author.

Bearden, Milton and Risen, Jim (2004). The Main Enemy: The Inside Story of the CIA’s Final Showdown with the KGB.. New York: Random House. A fascinating version of the end of the Cold War and the Soviet defeat in Afghanistan, written by a senior CIA officer.

Benson, Robert Louis and Warner, Michael (1996). VENONA: Soviet Espionage and the American Response, 1939-1957. Washington, DC: NSA/CIA. The official history of the VENONA cryptographic project declassified in 1996.

Bentley, Elizabeth, ed. by Peake, Hayden (1988). Out of Bondage. New York: Ballantine. The story of the NKVD defector in New York in 1945 who implicated numerous Communist Party agents.

Burrows, William E. (1996). Deep Black. New York: Random House. Most accurate history of the development of reconnaissance satellites, and an overview of aerial intelligence collection platforms.

Dallin, David (1955). Soviet Espionage. New Haven, CN: Yale University Press. Earliest, most reliable history of early NKVD activities, the first of a genre.

Hinsley, F. H. (1979). British Intelligence in the Second World War. London: HMSO. Comprehensive study of ULTRA and other intelligence sources and their impact on the war, in five volumes, released as an official history series.

Masterman, J. C. (1972). The Double Cross System of the War of 1930 to 1945. New Haven, CN: Yale University Press. Magisterial analysis of the development and exploitation of double agents and the genesis of strategic deception.

Schecter, Jerrold (2002). The Spy Who Saved the World. New York: Charles Scribner’s. Best account of Oleg Penkovsky’s espionage in Moscow during the Cuban missile crisis, based on CIA transcripts.

Sontag, Sherry and Drew, Christopher, with Drew, Annette Lawrence (1998). Blind Man’s Bluff. New York: Public Affairs. Detailed account of the U. S. Navy’s deployment of clandestine submarine operations during the Cold War.

Wise, David (1995). Nightmover. New York: Harper Collins. An accurate account of the investigation in Aldrich Ames’ espionage inside the CIA, with the counterintelligence background.