12.07.2015 Views

C. Wiebes - Intelligence en de oorlog in Bosnië 1992-1995. De rol van de inlichtingen- en veiligheidsdiensten - Engels

C. Wiebes - Intelligence en de oorlog in Bosnië 1992-1995. De rol van de inlichtingen- en veiligheidsdiensten - Engels

C. Wiebes - Intelligence en de oorlog in Bosnië 1992-1995. De rol van de inlichtingen- en veiligheidsdiensten - Engels

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

200also means that the <strong>in</strong>tellig<strong>en</strong>ce of the NSA does not form a strong basis because it consists only of rawSig<strong>in</strong>t (a s<strong>in</strong>gle source product) and not of ‘f<strong>in</strong>ished <strong>in</strong>tellig<strong>en</strong>ce’ (an all source product). Theresponsibility for creat<strong>in</strong>g a f<strong>in</strong>ished <strong>in</strong>tellig<strong>en</strong>ce product lies with the consumers of the raw materialsupplied by the NSA. Consequ<strong>en</strong>tly, analysts with<strong>in</strong> the US <strong>in</strong>tellig<strong>en</strong>ce community must analysehundreds or ev<strong>en</strong> thousands of Sig<strong>in</strong>t items if they want to get a clear picture. A member of anAmerican <strong>in</strong>tellig<strong>en</strong>ce service stated with regard to this: ‘You rarely get a Sig<strong>in</strong>t smok<strong>in</strong>g gun. It’s usuallyvery fragm<strong>en</strong>tary (…) Very oft<strong>en</strong> you don’t ev<strong>en</strong> know who you’re list<strong>en</strong><strong>in</strong>g to.’ 1062 This confirms thatneither Sig<strong>in</strong>t provi<strong>de</strong>s all the answers; used alone, it is certa<strong>in</strong>ly not <strong>en</strong>ough to expose the politicalplans or <strong>in</strong>ternal political mach<strong>in</strong>ations of a foreign governm<strong>en</strong>t. For that matter, Im<strong>in</strong>t and Hum<strong>in</strong>t areseldom able to do this either.A sev<strong>en</strong>th disad<strong>van</strong>tage is that although Sig<strong>in</strong>t is fast, it can still sometimes arrive too late.Dur<strong>in</strong>g the Suez Crisis <strong>in</strong> 1956 and the <strong>in</strong>vasion of Czechoslovakia <strong>in</strong> 1968 there was <strong>en</strong>ough Sig<strong>in</strong>tavailable <strong>in</strong> the NSA for <strong>in</strong>stance, but its process<strong>in</strong>g, analysis and report<strong>in</strong>g proved to be too timeconsum<strong>in</strong>g.The Sig<strong>in</strong>t first became available days after these two <strong>in</strong>vasions. This relates to the eighthdisad<strong>van</strong>tage, which is probably the most important one: the flow of <strong>in</strong>formation is <strong>en</strong>ormous but theanalysis capability is not suffici<strong>en</strong>t. Powerful computers can carry out a rapid preselection and separatethe wheat from the chaff, but it is the analyst who must ultimately <strong>de</strong>ci<strong>de</strong> if a message is valuable. In atime of crisis Sig<strong>in</strong>t organizations are floo<strong>de</strong>d with masses of <strong>in</strong>tercepts. CIA analysts were not able topredict the war <strong>in</strong> the Middle East <strong>in</strong> 1973 because they had hundreds of Com<strong>in</strong>t reports from the NSAon their <strong>de</strong>sks and thus, to put it simply, were unable to see the wood for the trees.Admiral McConnell, the director of the NSA <strong>in</strong> 1995, stated for <strong>in</strong>stance that ‘NSA’s capabilityto <strong>in</strong>tercept far exceeds its capability to <strong>de</strong>co<strong>de</strong>, analyse and report. The goods news is the ag<strong>en</strong>cy can<strong>de</strong>co<strong>de</strong> and analyse a million messages a day; the bad news is the ag<strong>en</strong>cy must <strong>de</strong>ci<strong>de</strong> which million, ofthe billions of messages s<strong>en</strong>t globally, to <strong>de</strong>co<strong>de</strong>.’ 1063 Around 1995 the NSA did <strong>in</strong><strong>de</strong>ed process aboutjust one perc<strong>en</strong>t of the <strong>in</strong>tercepts that reached its headquarters <strong>in</strong> Fort Mea<strong>de</strong>: <strong>in</strong> the 1980s this figurehad be<strong>en</strong> tw<strong>en</strong>ty perc<strong>en</strong>t. It was typical for the relationship betwe<strong>en</strong> <strong>in</strong>com<strong>in</strong>g <strong>in</strong>tercepts and outgo<strong>in</strong>g<strong>in</strong>tellig<strong>en</strong>ce that the curr<strong>en</strong>t director of the NSA, G<strong>en</strong>eral Hayd<strong>en</strong>, had to admit that the NSA nowproduces less <strong>in</strong>tellig<strong>en</strong>ce than it did t<strong>en</strong> years ago. The <strong>in</strong>tellig<strong>en</strong>ce production of the NSA was also nothelped by the fact – revealed by an <strong>in</strong>ternal study <strong>in</strong> early 1995 – that there was constant bureaucratic<strong>in</strong>fight<strong>in</strong>g betwe<strong>en</strong> the military and civilian sections of the Operations Division of this organization.This brought a consi<strong>de</strong>rable <strong>de</strong>lay <strong>in</strong> the flow of <strong>in</strong>tellig<strong>en</strong>ce to other <strong>de</strong>partm<strong>en</strong>ts: <strong>in</strong> mid-1995 manyconsumers of the <strong>in</strong>tellig<strong>en</strong>ce products of the NSA compla<strong>in</strong>ed that the NSA was not meet<strong>in</strong>g theirneeds. 1064 A n<strong>in</strong>th disad<strong>van</strong>tage is formed by the <strong>in</strong>her<strong>en</strong>t vulnerability of Com<strong>in</strong>t. Signals are r<strong>en</strong><strong>de</strong>redsecure, co<strong>de</strong>s can sudd<strong>en</strong>ly be changed, the transmitters can frequ<strong>en</strong>cy-hop (whereby the transmitterjumps betwe<strong>en</strong> differ<strong>en</strong>t frequ<strong>en</strong>cies <strong>in</strong> a pattern known only to the legitimate recipi<strong>en</strong>t). Bursttransmissions can be conducted as well, <strong>in</strong> which <strong>en</strong>ormous amounts of <strong>in</strong>formation are s<strong>en</strong>t <strong>in</strong> a fewseconds. A spread spectrum can be used, whereby the <strong>in</strong>formation for transmission is distributed oversimultaneously transmitted frequ<strong>en</strong>cies. Another way for the ‘eavesdropped’ party to disrupt Com<strong>in</strong>t isto <strong>in</strong>t<strong>en</strong>tionally dissem<strong>in</strong>ate false messages <strong>in</strong> the hope that these will be <strong>in</strong>tercepted. Cryptography isanother excell<strong>en</strong>t method of protect<strong>in</strong>g communications traffic. Millis <strong>de</strong>scribed this as one of themajor threats to the efforts of the NSA: accord<strong>in</strong>g to him Sig<strong>in</strong>t was <strong>in</strong> a crisis due to these factors andthe world of communications traffic could no longer be called Sig<strong>in</strong>t-fri<strong>en</strong>dly. 10651062 Bob Drog<strong>in</strong>, ‘Crash Jolts US e-Spy Ag<strong>en</strong>cy’, Los Angeles Times, 21/03/00.1063 Charles Smith, ‘The <strong>in</strong>formation vacuum cleaner’, WorldNetDaily, 09/04/00.1064 Matthew M. Aid, ‘The Time of Troubles: The US NSA <strong>in</strong> the Tw<strong>en</strong>ty-First C<strong>en</strong>tury’, <strong>in</strong>: <strong>Intellig<strong>en</strong>ce</strong> and National Security,Vol. 15 (2000), 3, pp. 17-20.1065 ‘Address at the CIRA Luncheon, 5 October 1998; John Millis’ speech, <strong>in</strong>: CIRA Newsletter, Vol. XXIII (1998/1999), 4, p.4; E.A.O. On<strong>de</strong>r<strong>de</strong>l<strong>in</strong>d<strong>en</strong>, ‘sig<strong>in</strong>t. What is this actually?’, Militaire Spectator Vol. 170 (2001) 12, pp. 675-683.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!