12.07.2015 Views

C. Wiebes - Intelligence en de oorlog in Bosnië 1992-1995. De rol van de inlichtingen- en veiligheidsdiensten - Engels

C. Wiebes - Intelligence en de oorlog in Bosnië 1992-1995. De rol van de inlichtingen- en veiligheidsdiensten - Engels

C. Wiebes - Intelligence en de oorlog in Bosnië 1992-1995. De rol van de inlichtingen- en veiligheidsdiensten - Engels

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

225Naturally the Serbs had tak<strong>en</strong> precautionary measures to prev<strong>en</strong>t eavesdropp<strong>in</strong>g. To give oneexample, they used – and still use – ‘one-time pads’ for their most secret and most importantcommunications. These are number or letter co<strong>de</strong>s which are used only once and are thus very difficultor impossible to crack, ev<strong>en</strong> for the NSA. This has led to other methods of break<strong>in</strong>g the co<strong>de</strong>s:<strong>in</strong>creas<strong>in</strong>gly oft<strong>en</strong>, clan<strong>de</strong>st<strong>in</strong>e operations are carried out <strong>in</strong> which specialists of the CIA (abroad) andthe FBI (<strong>in</strong> embassies and consulates <strong>in</strong> the United States) p<strong>en</strong>etrate a build<strong>in</strong>g to place monitor<strong>in</strong>gequipm<strong>en</strong>t <strong>in</strong> the co<strong>de</strong> room or to copy <strong>en</strong>cryption software. This type of special operations has se<strong>en</strong> astrong growth <strong>in</strong> rec<strong>en</strong>t years as it is an easier way to gather <strong>in</strong>tellig<strong>en</strong>ce than break<strong>in</strong>g difficult co<strong>de</strong>s.However reliable and sophisticated the <strong>en</strong>cryption equipm<strong>en</strong>t may be, vulnerable po<strong>in</strong>ts will alwaysexist. To give one example, if every night a Serb unit transmits the same s<strong>en</strong>t<strong>en</strong>ce <strong>in</strong> co<strong>de</strong> to theheadquarters <strong>in</strong> Belgra<strong>de</strong> like ‘Quiet night: noth<strong>in</strong>g to report’, th<strong>en</strong> sooner or later this will lead to theco<strong>de</strong> be<strong>in</strong>g brok<strong>en</strong>. A comparable example was that all Saudi-Arabian diplomatic co<strong>de</strong>d cables to thek<strong>in</strong>g <strong>en</strong><strong>de</strong>d with the s<strong>en</strong>t<strong>en</strong>ce: ‘May Allah p<strong>rol</strong>ong your life to eternity.’ Once this is known, th<strong>en</strong> everycrypto-analyst can break the co<strong>de</strong> quickly. A cryptography attack is always aimed at such weak spots.The Special Collection ServiceThe only resource that the NSA and CIA were sometimes able to use was the jo<strong>in</strong>t Special CollectionService (SCS) of these two organizations. This unit manned special monitor<strong>in</strong>g stations, which werebased, <strong>in</strong> the greatest secrecy, <strong>in</strong> American embassies. These monitor<strong>in</strong>g stations were set up <strong>in</strong> speciallyseparated and closed rooms. The SCS had a monitor<strong>in</strong>g station <strong>in</strong> the American embassies <strong>in</strong> Belgra<strong>de</strong>and Zagreb, 1196 and from time to time the SCS managed to achieve high-level <strong>in</strong>tercepts, such as aconversation betwe<strong>en</strong> Mladic and Perisic or Milosevic.The SCS also occasionally achieved high-level <strong>in</strong>tercepts of conversations betwe<strong>en</strong> Yugoslav1197political and military lea<strong>de</strong>rs. This happ<strong>en</strong>ed sporadically however, and not <strong>in</strong> a systematic manner.The activities of the SCS usually rema<strong>in</strong>ed unknown to the ambassador and sometimes ev<strong>en</strong> to the CIAstation chiefs <strong>in</strong> Belgra<strong>de</strong>, Zagreb and Sarajevo. These SCS stations produced extremely useful Com<strong>in</strong>tfrom the communications traffic around Belgra<strong>de</strong>, Sarajevo and Zagreb. An US <strong>in</strong>tellig<strong>en</strong>ce officialconfirmed that the most important <strong>in</strong>tellig<strong>en</strong>ce <strong>de</strong>rived from these Embassy Collection Sites at theAmerican embassies <strong>in</strong> Zagreb and Belgra<strong>de</strong>. There was also a SCS station <strong>in</strong> the US embassy <strong>in</strong>Sarajevo; this was accommodated <strong>in</strong> separate conta<strong>in</strong>ers at the headquarters of Bosnia Hercegov<strong>in</strong>aCommand. 1198Interception of Serb communications traffic: which country knew what?One th<strong>in</strong>g cannot be emphasized oft<strong>en</strong> <strong>en</strong>ough: it was not easy for the Sig<strong>in</strong>t services to <strong>in</strong>tercept Serbcommunications traffic. One-time pads, the use of secure landl<strong>in</strong>es or couriers h<strong>in</strong><strong>de</strong>red westernservices <strong>in</strong> their attempts to eavesdrop on Serb communications. The Special Collection Service post atthe US embassy <strong>in</strong> Belgra<strong>de</strong> was probably the only monitor<strong>in</strong>g station <strong>in</strong>si<strong>de</strong> the Serbian capital.Moreover, the Armed Forces operated on the ma<strong>in</strong>land, not always with<strong>in</strong> range of the USreconnaissance aircraft fly<strong>in</strong>g over the Adriatic. This ma<strong>de</strong> it hard to achieve a <strong>de</strong>tailed and ext<strong>en</strong>siveSig<strong>in</strong>t coverage of (Bosnian) Serb military activities. Only wh<strong>en</strong> the Serbian Army operated close to thebor<strong>de</strong>r of, or ev<strong>en</strong> with<strong>in</strong> Bosnia, and communications traffic <strong>in</strong>creased strongly, did the NSA manageto <strong>in</strong>tercept these activities effectively. This was the case shortly before the attack on Srebr<strong>en</strong>ica: aroundthis time much <strong>in</strong>tellig<strong>en</strong>ce was <strong>in</strong>tercepted regard<strong>in</strong>g logistical matters, such as relocation of tankertrucks, trucks and other military support. 11991196 Confid<strong>en</strong>tial <strong>in</strong>terview (6).1197 Confid<strong>en</strong>tial <strong>in</strong>terview (13).1198 Confid<strong>en</strong>tial <strong>in</strong>terview (13).1199 Confid<strong>en</strong>tial <strong>in</strong>terview (6).

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!