-Caveat Lector- WJPBR Email News List [EMAIL PROTECTED] Peace at any cost is a Prelude to War!
------------------------------------------------------------------------------ -- ARTICLE 06 - Rebuilding HUMINT Is Critical to Counter-Terrorism War ------------------------------------------------------------------------------ -- By J. David Galland Three months after the world was shocked by the horrific terrorist attacks of Sept. 11 that sparked the ongoing war in Afghanistan, the issue of intelligence - spanning the gamut of espionage, covert operations and technical surveillance - has moved to the forefront not only within the U.S. government but in news media reports and household conversations alike. The hard questions have already been raised, if not yet adequately answered: Why didn't the U.S. intelligence community, with its worldwide tentacles of information and influence, discover the intended attacks and prevent them? Were our players and agencies, and their intelligence partners in friendly governments asleep at the switch? How can the average citizen continue to trust and harbor faith in U.S. government and allied intelligence organizations in the aftermath of Sept. 11? Based on my 33 years of experience in the intelligence community, I can answer and clarify some questions that one may ask. It is a very tall order for the U.S. government to prove the mettle of its current intelligence capability after the terrorist strikes that slaughtered innocent people by the thousands. Here is one blunt truth: The military requirement that the United States has needed to devastate a country and unseat its sitting government, and build a worldwide coalition to hunt down the al Qaeda terrorist network, coldly confirms the gross strategic intelligence failure stemming from decades of congressional inattention, neglect and political opposition to the necessary work of intelligence. This isn't to say that the U.S. intelligence community is a total failure. Our worldwide intelligence mission is supported by highly efficient and extremely complicated technical intelligence collection platforms. Most people are generally aware of how the intelligence mission functions and continues to evolve today. The continuous advance of our technical intelligence capability is one driving force. This form of intelligence has traveled light-years since the late 1950s and 1960s when U-2 and SR-71 spy planes overflew the Soviet Union and other hostile regimes. Today, a constellation of extremely sensitive photo-reconnaissance and signals-intelligence satellites orbit the earth to provide national leaders and military commanders with an incredible amount of data. And a major gain has been the close linkage between tactical intelligence - seeing the enemy - and responding with targeting in real time. We now have the ability to put a 500-lb. bomb down any chimney of any home in the world using the global positioning satellite network for extreme accuracy. Nearly ten years ago during our Somalia mission, I was able to view real-time, time-on-target imagery - equivalent to looking out my office window in its clarity and accuracy. This too has dramatically improved: Just a couple of weeks ago photos of Taliban leader Mullah Omar and terrorist Osama Bin Laden accompanied a satellite photo of the former's automobile license plate in Afghanistan. They were rapidly affixed to psychological operations informational leaflets that were then air-dropped throughout the country. Our intelligence capabilities are also closely linked with electronic and computer warfare. Worldwide, the U.S. military has the technical ability to jam radar, render inoperable all telephone communication, zero out all television transmissions, and still operate outside the parameters of the electronic blockage they have created. And as IT experts warn, your email can be read with you ever knowing it and there is nothing you can do to prevent this from happening. But while we continue to excel in the realm of technical intelligence, the United States is struggling to succeed in the traditional - and murky - world of human intelligence-gathering. Human intelligence, known by its acronym HUMINT, falls basically into two categories: overt and covert intelligence operations. It is in the latter area where U.S. and other Western intelligence agencies have been shown to be grossly lacking in support of the Afghanistan campaign. If a healthy, ongoing human intelligence network had been in place in Afghanistan or south-central Asia during in the past decade, it would likely have prevented the terrorist attacks on America, and probably the death of rookie CIA officer Michael Spann. The reality of HUMINT is that in the absence of quality intelligence, the collector must get down in the trenches with potential intelligence sources. This is when the pursuit of human intelligence gets very dangerous - meeting the source on his turf and on his terms. It is clear that the CIA recognized the need for this and moved quickly to insert its own operatives down to ground level in Afghanistan soon after the September strikes. But in doing so the CIA confirmed its own operational and intelligence-gathering shortfall in the region prior to Sept. 11. Michael Spann's primary mission in Afghanistan was to screen potential human intelligence information sources and ultimately recruit, train, and task these sources in the pursuit of long-term strategic, and short-term tactical intelligence initiatives. I don't know how many "clandestine intelligence operational proposals" (CIOP) Spann wrote in the past three months, but I would wager it was quite a few. What we may infer from the unavoidable disclosure of his presence at the prison near Mazar-e Sharif was that Mr. Spann was doing his best to plug the holes in our human intelligence effort in Afghanistan. Spann was a member of a secretive paramilitary unit of the CIA and one of several hundred highly-trained covert commandos. Not unlike the Phoenix program, developed and executed by former Director William Colby when he was the CIA's Chief of Station in Saigon, the CIA has its own little army. The cross-pollination that occurred in Vietnam between the CIA, U. S. Army Special Forces, and Army intelligence soldiers to run the Phoenix program, is also present today in Afghanistan. But one of the "lessons learned" from Afghanistan is that reactive intelligence efforts like this will not do the job. They cannot provide the necessary intelligence information and sources that are imperative to succeed in the campaign against terrorism - particularly in pre-empting further attacks. The Bush administration and Congress must provide the CIA and other intelligence agencies the authorization and funding to conduct large-scale, sustained human intelligence operations. The current special oversight committees in Congress are capable of providing the necessary oversight monitoring without disclosing or hobbling the tasks that must be done. The CIA and other U.S. intelligence agencies must be allowed to do their job, unless we are willing some time in the future to define freedom as a former luxury we can no longer afford to possess. J. David Galland, Deputy Editor of DefenseWatch, is the pen name of a career U.S. Army senior Non-Commissioned Officer currently serving in Germany. He can be reached at [EMAIL PROTECTED] ------------------------------------------------------------------------------ -- ARTICLE 07 - SPECIAL SERIES: Basics of Clandestine Human Intelligence Collection ------------------------------------------------------------------------------ -- First of four installments By J. David Galland The issue of clandestine human intelligence-gathering (or HUMINT) has become a hot topic in the last three months, but it remains a subject of confusion and misunderstanding to many people. Intelligence information and holdings are rarely quantifiable in value - until that information suddenly becomes critically important in terms of an unfolding crisis or emergency. But it is important to understand the collection process and the governmental pressures that drive it in order to fully comprehend how the full process works. Don't confuse the terms "information" and "intelligence." Information does not - and cannot - become intelligence until it is verified, corroborated, and validated by experienced analysts. Prior to that, potential intelligence is nothing more than raw, un-extrapolated data. Intelligence collectors are guided by the formal requirements levied on them by other collectors, policymakers and analysts, ranging from the next-highest rung in the military chain of command to a formal request by the White House National Security Council. These players in the intelligence cycle - the analysts - are perpetually pursuing unanswered questions. Thus, intelligence collectors almost never pursue targets without formal direction, and the orientation and accuracy of these directions is vitally important. Analysts must therefore ask the right questions and pursue their requirements initiatives with creativity, sophistication and often, intuition. Most outsiders to the intelligence community are surprised when they learn how much intelligence-collecting activity stems from open sources such as a foreign country's news media, university and think-tank research projects and unclassified published materials. The explosive growth of the Internet and sophisticated search engines has significantly expanded the scope and reach of this effort. The HUMINT effort of clandestine collection, which is defined as obtaining valued information or material by special or clandestine means, consists of three basic tenets or tradecraft guidelines: The first of these tenets is that it must be determined in advance what specific information is being sought. Second, but no less critical, is ascertaining the nature of the target and the characteristics of the nation, group, or individual and the environment from which the information is to be collected. Third, is the necessity of adequate tradecraft to marshal and employ the resources to actually obtain the information. These necessary elements are often defined by other components of the intelligence-gathering process, including foreign intelligence analysis, counterintelligence, and covert action. Intelligence collection must be related to a country's current defense and foreign policies. The process must also take into consideration bilateral intelligence initiatives and collection agreements between the intelligence agencies of friendly states. For the field operator, there is no question that this can be a dangerous business, with the degree of risk determined by the unique details of a particular operation. Intelligence collectors are highly vulnerable while conducting operations and they rely heavily on the protection of counter-intelligence assets. This is particularly true when operating against governments and cultures, which employ secrecy and deception for internal security purposes. The intelligence collector must be particularly wary of their sources and constantly calibrating the validity of their own methods. It is no secret that both human sources and technical intelligence-collection methods can, indeed, be manipulated by hostile intelligence services (known by the acronym, HOIS). As a result, counterintelligence efforts that try to identify, neutralize, and manipulate the activities of HOIS are an essential shield for the intelligence collector. An intelligence collector must develop the skill to recognize and identify "counterintelligence flags" -- events or situations that indicate HOIS control of the agent's source - to prevent mission failure or capture by the hostile service. This is an essential agent skill necessary so that a clandestine intelligence operation may flourish and produce. Next: Inherent limitations on human intelligence-collecting. J. David Galland, Deputy Editor of DefenseWatch, is the pen name of a career U.S. Army senior Non-Commissioned Officer currently serving in Germany. He can be reached at [EMAIL PROTECTED] *COPYRIGHT NOTICE** In accordance with Title 17 U. S. C. Section 107, any copyrighted work in this message is distributed under fair use without profit or payment to those who have expressed a prior interest in receiving the included information for nonprofit research and educational purposes only.[Ref. http://www.law.cornell.edu/uscode/17/107.shtml ] Want to be on our lists? Write at [EMAIL PROTECTED] for a menu of our lists! Write to same address to be off lists! <A HREF="http://www.ctrl.org/">www.ctrl.org</A> DECLARATION & DISCLAIMER ========== CTRL is a discussion & informational exchange list. Proselytizing propagandic screeds are unwelcomed. Substance—not soap-boxing—please! These are sordid matters and 'conspiracy theory'—with its many half-truths, mis- directions and outright frauds—is used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRLgives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. ======================================================================== Archives Available at: http://peach.ease.lsoft.com/archives/ctrl.html <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html">Archives of [EMAIL PROTECTED]</A> http:[EMAIL PROTECTED]/ <A HREF="http:[EMAIL PROTECTED]/">ctrl</A> ======================================================================== To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om