07.02.2015 Views

Educing Information: Interrogation - National Intelligence University

Educing Information: Interrogation - National Intelligence University

Educing Information: Interrogation - National Intelligence University

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

using SIM cards, 651 instant messaging, chat rooms, and steganography 652 — by<br />

terrorist groups in planning and staging attacks has created serious challenges for<br />

Western intelligence services. As the increasingly sophisticated face of terrorism<br />

relies ever more heavily upon the ability to communicate effectively and covertly,<br />

whether that communication involves tactical direction within an operational cell<br />

or a call to action delivered across the globe, it becomes critical for an interrogator<br />

to possess the requisite technical expertise to effectively exploit a detainee’s<br />

knowledge in this vital area.<br />

In a similar fashion, financing terrorism involves far more than simply<br />

securing money for weapons and recruits. As terrorist attacks become more<br />

complex (consider 11 September), the costs involved become substantial. 653 The<br />

ability to move large sums of money through a global system — which is now<br />

more open to scrutiny by law enforcement and intelligence agencies after decades<br />

of money laundering by international organized crime — poses challenges to<br />

the terrorist. Because terrorist organizations use both cutting-edge technology<br />

and ancient means of financing (e.g., Hawala, the underground, trust-based<br />

banking system that facilitates the movement of money without a trailing record<br />

of transactions), it is exceedingly difficult to identify the funding that supports<br />

terrorism against the complex background of global finance. An interrogator who<br />

lacks an understanding of how money moves across international boundaries,<br />

how currencies are transformed into digital equivalents, the nature of national<br />

and international reporting requirements, constantly evolving money laundering<br />

schemes, and the system of Hawala, will have little ability to leverage the potential<br />

intelligence value of a well-placed, knowledgeable source.<br />

As challenging as these examples might be, greater challenges lie in possible<br />

future conflict scenarios involving near-peer competitors (e.g., China). The<br />

technical intelligence requirements for such a conflict would be far more complex<br />

— and far more critical to the war effort — than in any previous conventional<br />

conflict. With this in mind, the need to prepare for and overcome the technical<br />

barriers to educing information becomes self-evident.<br />

The Challenge of Technical Support to <strong>Interrogation</strong><br />

Technical barriers involve far more than the nature of the intelligence<br />

gathered: of equal importance is the role of technology in how intelligence is<br />

651<br />

The Subscriber Identity Module contains a small microprocessor that stores information about<br />

the phone, including the telephone number, and identifies that phone to a given network (i.e., network<br />

permissions). Pre-paid SIM cards may be inserted into a phone and used on a one-time or limited basis,<br />

which, along with encryption technology, makes it difficult to trace a call to an individual.<br />

652<br />

Steganography involves the insertion of a hidden message within an image or text. Although<br />

a centuries-old practice, the advent of digital communications has presented enormous potential for<br />

employing steganography to support covert communications.<br />

653<br />

The 9/11 Commission Report of the <strong>National</strong> Commission on Terrorist Attacks Upon the United<br />

States notes that Al Qaeda operatives spent between $400,000 and $500,000 to plan and conduct the<br />

attacks. Questions about the source of sizable short-trade actions targeting U.S. airline companies in<br />

the days before September 11 remain unanswered. There has been speculation that Al Qaeda-related<br />

entities employed this strategy to exploit the financial windfall that was almost certain to occur after<br />

the hijackings, thereby funding the training and logistic support required to enable the attack.<br />

248

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!