12.07.2015 Views

C. Wiebes - Intelligence en de oorlog in Bosnië 1992-1995. De rol van de inlichtingen- en veiligheidsdiensten - Engels

C. Wiebes - Intelligence en de oorlog in Bosnië 1992-1995. De rol van de inlichtingen- en veiligheidsdiensten - Engels

C. Wiebes - Intelligence en de oorlog in Bosnië 1992-1995. De rol van de inlichtingen- en veiligheidsdiensten - Engels

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

138Chapter 4Secret arms supplies and other covert actions1. Introduction‘Embargo! What Arms Embargo? 647Tuzla is a diplomatic can of worms.’ 648There is an elem<strong>en</strong>t that, strictly speak<strong>in</strong>g, has no connection with all the activities surround<strong>in</strong>g thegather<strong>in</strong>g of <strong>in</strong>tellig<strong>en</strong>ce, but is <strong>in</strong>tertw<strong>in</strong>ed with it: covert action (special or clan<strong>de</strong>st<strong>in</strong>e operations).Covert action <strong>in</strong>volves secret activities ori<strong>en</strong>ted to <strong>in</strong>flu<strong>en</strong>c<strong>in</strong>g foreign governm<strong>en</strong>ts, persons andorganizations, or political, economic and military <strong>de</strong>velopm<strong>en</strong>ts for the b<strong>en</strong>efit of a country’s ownnational security policy. A crucial po<strong>in</strong>t is that the country’s own <strong>in</strong>volvem<strong>en</strong>t rema<strong>in</strong>s strictly secret.There are various forms of covert action, rang<strong>in</strong>g from propaganda, paramilitary or politicalactivities ori<strong>en</strong>ted to overthrow<strong>in</strong>g or support<strong>in</strong>g a giv<strong>en</strong> regime; secret support to <strong>in</strong>dividuals ororganizations (tra<strong>de</strong> unions, newspapers and political parties); secret arms supplies; economic<strong>de</strong>stabilization operations, and lethal attacks. 649 Covert action is therefore concerned with attempts to<strong>in</strong>flu<strong>en</strong>ce or to manipulate a country’s political policy. Strictly speak<strong>in</strong>g, it is not an activity that falls with<strong>in</strong>the <strong>de</strong>f<strong>in</strong>ition of <strong>in</strong>tellig<strong>en</strong>ce, although it can contribute to <strong>in</strong>tellig<strong>en</strong>ce gather<strong>in</strong>g. 650 Covert operations tookplace throughout the world dur<strong>in</strong>g the Cold War. 651In this chapter, we will <strong>in</strong>vestigate which secret activities were carried out dur<strong>in</strong>g the war <strong>in</strong>Bosnia. Att<strong>en</strong>tion will be paid to the resources that foreign services threw <strong>in</strong>to the fray to support or toweak<strong>en</strong> one of the warr<strong>in</strong>g factions. In this, little or no att<strong>en</strong>tion will be paid to forms of covert action suchas propaganda, coup attempts and assass<strong>in</strong>ation attempts. The reason is simple: so far noth<strong>in</strong>g has be<strong>en</strong>discovered on these activities. However, there will be a compreh<strong>en</strong>sive discussion of one of the traditionalresources <strong>in</strong> secret operations, the clan<strong>de</strong>st<strong>in</strong>e arms supplies to one of the warr<strong>in</strong>g factions. Such anoperation, <strong>in</strong>volv<strong>in</strong>g foreign services, was the secret arms supplies to the Bosnian army from Iran throughwhat was known as the ‘Croatian pipel<strong>in</strong>e’, which we will return to <strong>in</strong> Section 2. We will consi<strong>de</strong>r the <strong>rol</strong>ethat the United States played <strong>in</strong> this.Section 3 will go <strong>in</strong>to further <strong>de</strong>tail on the so-called Black Flights to Tuzla. In addition to Iran,other countries were actively <strong>in</strong>volved <strong>in</strong> secret operations to supply the Armija Bosna i Hercegov<strong>in</strong>a(ABiH) with weapons and ammunition. Section 4 will <strong>de</strong>scribe what has become known about thelogistical military support to the other warr<strong>in</strong>g factions, Bosnian Serbs and Croats, and the associated<strong>rol</strong>e of Serbia and other countries. We will also pay att<strong>en</strong>tion to the ICFY Monitor<strong>in</strong>g Mission that was647 O’shea, Crisis at Bihac, p. 155.648 Ian Bruce, ‘Big stick may not work second time round’, The Herald (Glasgow), 23/02/94.649 Cf. Roy Godson, ‘Covert Action: neither exceptional tool nor magic bullet’, <strong>in</strong>: Godson, May & Schmitt, U.S. <strong>Intellig<strong>en</strong>ce</strong> at theCrossroads, p. 155 and Godson, Dirty Tricks or Trump Cards, passim.650 William J. Brands, ‘<strong>Intellig<strong>en</strong>ce</strong> and Foreign Policy: Dilemmas of A <strong>De</strong>mocracy’, Foreign Affairs, Vol. 47 (1969), 2, p. 288. Thesame is true of counter<strong>in</strong>tellig<strong>en</strong>ce (CI), which can best be <strong>de</strong>f<strong>in</strong>ed as the id<strong>en</strong>tification and neutralization of the threat com<strong>in</strong>gfrom foreign services and mak<strong>in</strong>g attempts to manipulate these services and to use them for a country’s own b<strong>en</strong>efit. CI is more aspecific form of <strong>in</strong>tellig<strong>en</strong>ce, and it also <strong>in</strong>clu<strong>de</strong>s the gather<strong>in</strong>g of <strong>in</strong>formation on foreign services, which may be either hostile orfri<strong>en</strong>dly services. CI also makes use of op<strong>en</strong> and clan<strong>de</strong>st<strong>in</strong>e sources to ga<strong>in</strong> <strong>in</strong>formation on the structure, work<strong>in</strong>g method andoperations of these services. CI can also <strong>in</strong>volve the p<strong>en</strong>etration and <strong>de</strong>stabilization of such services. See: Roy Godson,‘Counter<strong>in</strong>tellig<strong>en</strong>ce: An Introduction’, <strong>in</strong>: Godson, <strong>Intellig<strong>en</strong>ce</strong>, pp. 1-2. Further: Randall M. Fort, ‘Economic Espionage’, <strong>in</strong>:Godson, May & Schmitt, U.S. <strong>Intellig<strong>en</strong>ce</strong> at the Crossroads, p. 182. See also: Annual report of the National Security Service (BVD) 1995,pp. 29-30.651 For a historical overview of US operations: Richelson, The US <strong>Intellig<strong>en</strong>ce</strong> Community, pp. 342-364.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!