12.07.2015 Views

C. Wiebes - Intelligence en de oorlog in Bosnië 1992-1995. De rol van de inlichtingen- en veiligheidsdiensten - Engels

C. Wiebes - Intelligence en de oorlog in Bosnië 1992-1995. De rol van de inlichtingen- en veiligheidsdiensten - Engels

C. Wiebes - Intelligence en de oorlog in Bosnië 1992-1995. De rol van de inlichtingen- en veiligheidsdiensten - Engels

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

198the value of the close co-ord<strong>in</strong>ation un<strong>de</strong>r the UKUSA agreem<strong>en</strong>t.’ 1051 This refers to a treaty signed byLondon and Wash<strong>in</strong>gton <strong>in</strong> June 1948, known as the UKUSA Com<strong>in</strong>t Agreem<strong>en</strong>t. This set out thedivision of the Com<strong>in</strong>t efforts that at that time were directed aga<strong>in</strong>st Moscow and its allies. At a laterstage Canada, Australia and New Zealand also jo<strong>in</strong>ed this agreem<strong>en</strong>t. 1052Sig<strong>in</strong>t was of great importance to other countries too, such as Canada, a major supplier oftroops to UNPROFOR. The national Sig<strong>in</strong>t ag<strong>en</strong>cy, the Communications Security Establishm<strong>en</strong>t(CSE), was the most important supplier of <strong>in</strong>tellig<strong>en</strong>ce <strong>in</strong> Ottawa. 1053 And <strong>in</strong> the Netherlands tooCom<strong>in</strong>t has played an important <strong>rol</strong>e <strong>in</strong> the past, for <strong>in</strong>stance dur<strong>in</strong>g the oil crisis. In later years too theAf<strong>de</strong>l<strong>in</strong>g Verb<strong>in</strong>d<strong>in</strong>gs<strong>in</strong>licht<strong>in</strong>g<strong>en</strong> (Signals <strong>Intellig<strong>en</strong>ce</strong> <strong>De</strong>partm<strong>en</strong>t/AVI) of the MIS supplied important<strong>in</strong>tellig<strong>en</strong>ce. 1054Disad<strong>van</strong>tages of Sig<strong>in</strong>t<strong>De</strong>spite its ad<strong>van</strong>tages, Sig<strong>in</strong>t also has a number of disad<strong>van</strong>tages. These weak aspects and limitationsare however sometimes also applicable to other <strong>in</strong>tellig<strong>en</strong>ce discipl<strong>in</strong>es. Twelve disad<strong>van</strong>tages are listedbelow. Firstly, <strong>in</strong>tercepts are always a matter of the greatest secrecy. The distribution of the Sig<strong>in</strong>tproduct is thus always very limited. Only a very small circle of the highest political and militarypolicymakers have access to Sig<strong>in</strong>t. This secrecy is also important <strong>in</strong> the context of <strong>in</strong>tellig<strong>en</strong>ce-shar<strong>in</strong>gbetwe<strong>en</strong> the United States and its allies. Sig<strong>in</strong>t is oft<strong>en</strong> <strong>in</strong>corporated <strong>in</strong>to <strong>in</strong>tellig<strong>en</strong>ce reports, but Sig<strong>in</strong>tis oft<strong>en</strong> available to just a few people and th<strong>en</strong> mostly only on a need-to-know basis. The ma<strong>in</strong> reasonfor this is that leaked Sig<strong>in</strong>t can cause consi<strong>de</strong>rable damage. If the person or organization be<strong>in</strong>gmonitored, the ‘target’ <strong>in</strong> <strong>in</strong>tellig<strong>en</strong>ce jargon, discovers this, th<strong>en</strong> he or it can quickly change co<strong>de</strong>s orciphers, thus at a stroke r<strong>en</strong><strong>de</strong>r<strong>in</strong>g useless all the previous effort exp<strong>en</strong><strong>de</strong>d <strong>in</strong> break<strong>in</strong>g this co<strong>de</strong> orcipher.The disad<strong>van</strong>tage of this extreme secrecy is that Sig<strong>in</strong>t oft<strong>en</strong> fails to reach the right people at thelower levels. Sometimes Sig<strong>in</strong>t does not reach the comman<strong>de</strong>r on the ground, because it has be<strong>en</strong><strong>de</strong>ci<strong>de</strong>d that this Sig<strong>in</strong>t has a need-to-know classification and h<strong>en</strong>ce the <strong>in</strong>tellig<strong>en</strong>ce is not distributedany further. This was the case, for <strong>in</strong>stance, dur<strong>in</strong>g the war <strong>in</strong> Korea. The Com<strong>in</strong>t not only failed toreach the US troops on the ground, but also failed to reach the US Navy and Air Force. As a resulthighly valuable tactical and strategic <strong>in</strong>tellig<strong>en</strong>ce rema<strong>in</strong>ed unused. Little was learned from the KoreanWar, because virtually the same th<strong>in</strong>g happ<strong>en</strong>ed <strong>in</strong> the Vietnam War. Important Sig<strong>in</strong>t about thelocations of North Vietnamese <strong>de</strong>f<strong>en</strong>ce systems and MIG fighter aircraft rema<strong>in</strong>ed ‘hung up’ at theNSA and never reached the US Air Force and Navy. The consequ<strong>en</strong>ces were far-reach<strong>in</strong>g: more USaircraft were shot down and more pilots were killed needlessly.In the mid-1980s, un<strong>de</strong>r the Reagan adm<strong>in</strong>istration, the NSA <strong>in</strong>itially ev<strong>en</strong> refused to pass on tothe CIA <strong>in</strong>tercepts about support provi<strong>de</strong>d by Cuba and Nicaragua for the armed resistance <strong>in</strong> ElSalvador. Such limitations also apply to other countries than the United States. In Moscow the KGBand the Military <strong>Intellig<strong>en</strong>ce</strong> Service (GRU) supplied their Sig<strong>in</strong>t only to a small group with<strong>in</strong> thePolitburo. Shar<strong>in</strong>g Sig<strong>in</strong>t with members of the Warsaw Pact was ev<strong>en</strong> officially forbidd<strong>en</strong>. In Europeancountries too, such as the United K<strong>in</strong>gdom, Germany, France and the Netherlands, access to Sig<strong>in</strong>t isconf<strong>in</strong>ed to a select group of policymakers and military comman<strong>de</strong>rs. 10551051 CM 4897, <strong>Intellig<strong>en</strong>ce</strong> and Security Committee, Annual Report 1999-2000, 02/11/00. For this see: http://www.officialdocum<strong>en</strong>ts.co.uk/docum<strong>en</strong>t/cm48/4897/4897-02.htm.1052 Andrew, Eyes Only, p. 163 and Hager, Secret Power, pp. 61-62.1053 For the importance of CSE: Mart<strong>in</strong> Rudner, ‘Canada’s Communications Security Establishm<strong>en</strong>t from Cold War toGlobalization’, <strong>in</strong>: Aid & <strong>Wiebes</strong> (eds.), Signals, pp. 97-128.1054 Cees <strong>Wiebes</strong>, ‘Dutch Sig<strong>in</strong>t dur<strong>in</strong>g the Cold War, 1945-1994’, <strong>in</strong>: Aid & <strong>Wiebes</strong> (eds.), Secrets, pp. 243-284.1055 Matthew Aid & Cees <strong>Wiebes</strong>, ‘Introduction on the importance of SIGINT <strong>in</strong> the Cold War’, <strong>in</strong>: Aid & <strong>Wiebes</strong> (eds.),Secrets, pp. 12-14.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!