-Caveat Lector-

WJPBR Email News List [EMAIL PROTECTED]
Peace at any cost is a Prelude to War!

------------------------------------------------------------------------------

--
ARTICLE 06 - Rebuilding HUMINT Is Critical to Counter-Terrorism War

------------------------------------------------------------------------------

--

By J. David Galland

Three months after the world was shocked by the horrific terrorist attacks of
Sept. 11 that sparked the ongoing war in Afghanistan, the issue of
intelligence - spanning the gamut of espionage, covert operations and
technical surveillance - has moved to the forefront not only within the U.S.
government but in news media reports and household conversations alike.
The hard questions have already been raised, if not yet adequately answered:
Why didn't the U.S. intelligence community, with its worldwide tentacles of
information and influence, discover the intended attacks and prevent them?
Were our players and agencies, and their intelligence partners in friendly
governments asleep at the switch? How can the average citizen continue to
trust and harbor faith in U.S. government and allied intelligence
organizations in the aftermath of Sept. 11?

Based on my 33 years of experience in the intelligence community, I can
answer and clarify some questions that one may ask.

It is a very tall order for the U.S. government to prove the mettle of its
current intelligence capability after the terrorist strikes that slaughtered
innocent people by the thousands.

Here is one blunt truth: The military requirement that the United States has
needed to devastate a country and unseat its sitting government, and build a
worldwide coalition to hunt down the al Qaeda terrorist network, coldly
confirms the gross strategic intelligence failure stemming from decades of
congressional inattention, neglect and political opposition to the necessary
work of intelligence.

This isn't to say that the U.S. intelligence community is a total failure.
Our worldwide intelligence mission is supported by highly efficient and
extremely complicated technical intelligence collection platforms. Most
people are generally aware of how the intelligence mission functions and
continues to evolve today.

The continuous advance of our technical intelligence capability is one
driving force. This form of intelligence has traveled light-years since the
late 1950s and 1960s when U-2 and SR-71 spy planes overflew the Soviet Union
and other hostile regimes. Today, a constellation of extremely sensitive
photo-reconnaissance and signals-intelligence satellites orbit the earth to
provide national leaders and military commanders with an incredible amount of
data.

And a major gain has been the close linkage between tactical intelligence -
seeing the enemy - and responding with targeting in real time.

We now have the ability to put a 500-lb. bomb down any chimney of any home in
the world using the global positioning satellite network for extreme
accuracy. Nearly ten years ago during our Somalia mission, I was able to view
real-time, time-on-target imagery - equivalent to looking out my office
window in its clarity and accuracy. This too has dramatically improved: Just
a couple of weeks ago photos of Taliban leader Mullah Omar and terrorist
Osama Bin Laden accompanied a satellite photo of the former's automobile
license plate in Afghanistan. They were rapidly affixed to psychological
operations informational leaflets that were then air-dropped throughout the
country.

Our intelligence capabilities are also closely linked with electronic and
computer warfare. Worldwide, the U.S. military has the technical ability to
jam radar, render inoperable all telephone communication, zero out all
television transmissions, and still operate outside the parameters of the
electronic blockage they have created. And as IT experts warn, your email can
be read with you ever knowing it and there is nothing you can do to prevent
this from happening.

But while we continue to excel in the realm of technical intelligence, the
United States is struggling to succeed in the traditional - and murky - world
of human intelligence-gathering. Human intelligence, known by its acronym
HUMINT, falls basically into two categories: overt and covert intelligence
operations. It is in the latter area where U.S. and other Western
intelligence agencies have been shown to be grossly lacking in support of the
Afghanistan campaign. If a healthy, ongoing human intelligence network had
been in place in Afghanistan or south-central Asia during in the past decade,
it would likely have prevented the terrorist attacks on America, and probably
the death of rookie CIA officer Michael Spann.

The reality of HUMINT is that in the absence of quality intelligence, the
collector must get down in the trenches with potential intelligence sources.
This is when the pursuit of human intelligence gets very dangerous - meeting
the source on his turf and on his terms. It is clear that the CIA recognized
the need for this and moved quickly to insert its own operatives down to
ground level in Afghanistan soon after the September strikes. But in doing so
the CIA confirmed its own operational and intelligence-gathering shortfall in
the region prior to Sept. 11.

Michael Spann's primary mission in Afghanistan was to screen potential human
intelligence information sources and ultimately recruit, train, and task
these sources in the pursuit of long-term strategic, and short-term tactical
intelligence initiatives. I don't know how many "clandestine intelligence
operational proposals" (CIOP) Spann wrote in the past three months, but I
would wager it was quite a few. What we may infer from the unavoidable
disclosure of his presence at the prison near Mazar-e Sharif was that Mr.
Spann was doing his best to plug the holes in our human intelligence effort
in Afghanistan.

Spann was a member of a secretive paramilitary unit of the CIA and one of
several hundred highly-trained covert commandos. Not unlike the Phoenix
program, developed and executed by former Director William Colby when he was
the CIA's Chief of Station in Saigon, the CIA has its own little army. The
cross-pollination that occurred in Vietnam between the CIA, U. S. Army
Special Forces, and Army intelligence soldiers to run the Phoenix program, is
also present today in Afghanistan.

But one of the "lessons learned" from Afghanistan is that reactive
intelligence efforts like this will not do the job. They cannot provide the
necessary intelligence information and sources that are imperative to succeed
in the campaign against terrorism - particularly in pre-empting further
attacks.

The Bush administration and Congress must provide the CIA and other
intelligence agencies the authorization and funding to conduct large-scale,
sustained human intelligence operations. The current special oversight
committees in Congress are capable of providing the necessary oversight
monitoring without disclosing or hobbling the tasks that must be done.

The CIA and other U.S. intelligence agencies must be allowed to do their job,
unless we are willing some time in the future to define freedom as a former
luxury we can no longer afford to possess.

J. David Galland, Deputy Editor of DefenseWatch, is the pen name of a career
U.S. Army senior Non-Commissioned Officer currently serving in Germany. He
can be reached at [EMAIL PROTECTED]

------------------------------------------------------------------------------

--
ARTICLE 07 - SPECIAL SERIES: Basics of Clandestine Human Intelligence
Collection

------------------------------------------------------------------------------

--

First of four installments
By J. David Galland

The issue of clandestine human intelligence-gathering (or HUMINT) has become
a hot topic in the last three months, but it remains a subject of confusion
and misunderstanding to many people. Intelligence information and holdings
are rarely quantifiable in value - until that information suddenly becomes
critically important in terms of an unfolding crisis or emergency. But it is
important to understand the collection process and the governmental pressures
that drive it in order to fully comprehend how the full process works.

Don't confuse the terms "information" and "intelligence." Information does
not - and cannot - become intelligence until it is verified, corroborated,
and validated by experienced analysts. Prior to that, potential intelligence
is nothing more than raw, un-extrapolated data.

Intelligence collectors are guided by the formal requirements levied on them
by other collectors, policymakers and analysts, ranging from the next-highest
rung in the military chain of command to a formal request by the White House
National Security Council.

These players in the intelligence cycle - the analysts - are perpetually
pursuing unanswered questions. Thus, intelligence collectors almost never
pursue targets without formal direction, and the orientation and accuracy of
these directions is vitally important. Analysts must therefore ask the right
questions and pursue their requirements initiatives with creativity,
sophistication and often, intuition.

Most outsiders to the intelligence community are surprised when they learn
how much intelligence-collecting activity stems from open sources such as a
foreign country's news media, university and think-tank research projects and
unclassified published materials. The explosive growth of the Internet and
sophisticated search engines has significantly expanded the scope and reach
of this effort.

The HUMINT effort of clandestine collection, which is defined as obtaining
valued information or material by special or clandestine means, consists of
three basic tenets or tradecraft guidelines:

The first of these tenets is that it must be determined in advance what
specific information is being sought.

Second, but no less critical, is ascertaining the nature of the target and
the characteristics of the nation, group, or individual and the environment
from which the information is to be collected.

Third, is the necessity of adequate tradecraft to marshal and employ the
resources to actually obtain the information. These necessary elements are
often defined by other components of the intelligence-gathering process,
including foreign intelligence analysis, counterintelligence, and covert
action.

Intelligence collection must be related to a country's current defense and
foreign policies. The process must also take into consideration bilateral
intelligence initiatives and collection agreements between the intelligence
agencies of friendly states.

For the field operator, there is no question that this can be a dangerous
business, with the degree of risk determined by the unique details of a
particular operation.
Intelligence collectors are highly vulnerable while conducting operations and
they rely heavily on the protection of counter-intelligence assets. This is
particularly true when operating against governments and cultures, which
employ secrecy and deception for internal security purposes. The intelligence
collector must be particularly wary of their sources and constantly
calibrating the validity of their own methods.

It is no secret that both human sources and technical intelligence-collection
methods can, indeed, be manipulated by hostile intelligence services (known
by the acronym, HOIS). As a result, counterintelligence efforts that try to
identify, neutralize, and manipulate the activities of HOIS are an essential
shield for the intelligence collector.

An intelligence collector must develop the skill to recognize and identify
"counterintelligence flags" -- events or situations that indicate HOIS
control of the agent's source - to prevent mission failure or capture by the
hostile service. This is an essential agent skill necessary so that a
clandestine intelligence operation may flourish and produce.

Next: Inherent limitations on human intelligence-collecting.

J. David Galland, Deputy Editor of DefenseWatch, is the pen name of a career
U.S. Army senior Non-Commissioned Officer currently serving in Germany. He
can be reached at [EMAIL PROTECTED]

*COPYRIGHT NOTICE** In accordance with Title 17 U. S. C. Section 107,
any copyrighted work in this message is distributed under fair use
without profit or payment to those who have expressed a prior interest
in receiving the included information for nonprofit research and educational
purposes only.[Ref. http://www.law.cornell.edu/uscode/17/107.shtml ]

Want to be on our lists?  Write at [EMAIL PROTECTED] for a menu of our lists!
Write to same address to be off lists!

<A HREF="http://www.ctrl.org/";>www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html";>Archives of
[EMAIL PROTECTED]</A>

http:[EMAIL PROTECTED]/
 <A HREF="http:[EMAIL PROTECTED]/";>ctrl</A>
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to