12.07.2015 Views

C. Wiebes - Intelligence en de oorlog in Bosnië 1992-1995. De rol van de inlichtingen- en veiligheidsdiensten - Engels

C. Wiebes - Intelligence en de oorlog in Bosnië 1992-1995. De rol van de inlichtingen- en veiligheidsdiensten - Engels

C. Wiebes - Intelligence en de oorlog in Bosnië 1992-1995. De rol van de inlichtingen- en veiligheidsdiensten - Engels

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

271established <strong>in</strong> 1991, also received consi<strong>de</strong>rable American support. It was able to <strong>in</strong>tercept 40,000 GSMsat the same time and to register over 100 conversations with the aid of target words <strong>in</strong> computers. TheBerl<strong>in</strong> firm Rho<strong>de</strong> & Schwartz supplied the hardware and the CIA supplied the programs. The NSEMreportedly collected 70% of all the <strong>in</strong>tellig<strong>en</strong>ce <strong>de</strong>livered to the Croatian political and military lea<strong>de</strong>rs. 1436But not only high-level UNPROFOR communication was a key target for all the warr<strong>in</strong>gfactions; tactical military communications were important as well. A member of the UNPF <strong>in</strong>tellig<strong>en</strong>cestaff <strong>in</strong> Zagreb said that the ABiH and the VRS constantly <strong>in</strong>tercepted this traffic, us<strong>in</strong>g Moto<strong>rol</strong>asfrom captured UNPROFOR vehicles. The Chief Political Officer of UNPROFOR <strong>in</strong> Sarajevo, PhillipCorw<strong>in</strong>, said that as it was impossible to change communication co<strong>de</strong>s every time a car was hijacked.They had to assume that their mobile communications were be<strong>in</strong>g monitored by all si<strong>de</strong>s. 1437 ABiHsoldiers ev<strong>en</strong> broke regularly <strong>in</strong>to these UNPROFOR communications to, for <strong>in</strong>stance, improve targetbear<strong>in</strong>gs <strong>in</strong> observation reports. 1438 The Croatians followed suit. 1439 The British Royal Welch Fusilierspartially solved this problem by us<strong>in</strong>g Welsh-speak<strong>in</strong>g communications staff; none of the warr<strong>in</strong>gfactions could follow the conversations <strong>in</strong> Welsh. 1440 UNPROFOR traffic was regularly tapped by theVRS. Scand<strong>in</strong>avian UNPROFOR units meticulously observed the locations hit by VRS mortargr<strong>en</strong>a<strong>de</strong>s around Tuzla and passed this <strong>in</strong>formation on direct to Bosnia-Hercegov<strong>in</strong>a Command via anop<strong>en</strong> radio l<strong>in</strong>k. The VRS list<strong>en</strong>ed <strong>in</strong> to these messages and used the UNPROFOR observations tocorrect their aim. 1441 The VRS only had to ‘capitulate’ wh<strong>en</strong> the Scand<strong>in</strong>avians communicated <strong>in</strong> one oftheir national languages.Yet another target was the communications of the British SAS. It was not only the NSA thatlist<strong>en</strong>ed <strong>in</strong> to these connections;1442 the ABiH did so as well, but they never managed to break the co<strong>de</strong>.A member of a British <strong>in</strong>tellig<strong>en</strong>ce service said that the ABiH probably read ‘op<strong>en</strong> rout<strong>in</strong>e traffic’ butnot crypto traffic. This was 100% safe. 1443 The fact that the ABiH was follow<strong>in</strong>g SAS communicationwas revealed by a report s<strong>en</strong>t by the Bosnian national security services to the 28 th Division. This reportm<strong>en</strong>tioned <strong>in</strong>formation that was be<strong>in</strong>g passed on by the JCO unit <strong>in</strong> Srebr<strong>en</strong>ica to the Jo<strong>in</strong>tCommission Observer headquarters <strong>in</strong> Sarajevo on the fight<strong>in</strong>g around the <strong>en</strong>clave and the numbers of<strong>de</strong>ad and woun<strong>de</strong>d. 1444Dutchbat <strong>in</strong>terceptedThe communication traffic of Dutchbat was an equally important target for Com<strong>in</strong>t. Communicationequipm<strong>en</strong>t was regularly stol<strong>en</strong> from Dutchbat personnel. 1445 The VRS list<strong>en</strong>ed <strong>in</strong> to the traffic betwe<strong>en</strong>the various OPs and betwe<strong>en</strong> the OPs and the Dutch base <strong>in</strong> Potocari. As the OPs were situated onABiH territory, the VRS collected a lot of <strong>in</strong>formation on all sorts of military operations, because theDutchbat soldiers dutifully reported all the movem<strong>en</strong>ts of the ABiH troops. Accord<strong>in</strong>gly, the VRSsometimes fired on targets where Dutchbat had just spotted the ABiH. The connections betwe<strong>en</strong> the1436 Ivo Pukanic, ‘Echelon Spy System’ and ‘The <strong>De</strong>tails beh<strong>in</strong>d the Lepej Affair’, Nacional, Issue 291, 14/06/01; IvoPukanic, ‘The Wiretapp<strong>in</strong>g Fever has Shak<strong>en</strong> the New Governm<strong>en</strong>t’, Nacional, Issue 292, 21/06/01; Milivoj Dilas, ‘TheWiretapp<strong>in</strong>g Affair’, Nacional, Issue 293, 28/06/01 and ‘Croatia Us<strong>in</strong>g Ad<strong>van</strong>ces US-Installed <strong>Intellig<strong>en</strong>ce</strong> Technology’,Belgra<strong>de</strong> Glas Javnosti, 03/01/02.1437 Corw<strong>in</strong>, Dubious Mandate, p. 4.1438 Confid<strong>en</strong>tial <strong>in</strong>terview (45).1439 Confid<strong>en</strong>tial <strong>in</strong>terview (44).1440 Thomas Quigg<strong>in</strong>, Response to ‘No Cloak and Dagger Required: <strong>Intellig<strong>en</strong>ce</strong> Support to UN Peacekeep<strong>in</strong>g’, <strong>in</strong>: <strong>Intellig<strong>en</strong>ce</strong>and National Security, Vol. 13 (1998) 4 , p. 207.1441 A. Walter Dorn, ‘The Cloak and the Blue Beret: Limitations on <strong>Intellig<strong>en</strong>ce</strong> <strong>in</strong> UN Peacekeep<strong>in</strong>g’, <strong>in</strong>: International Journalof <strong>Intellig<strong>en</strong>ce</strong> and Counter-<strong>Intellig<strong>en</strong>ce</strong>, Vol. 12 (1998) 4 , p. 416.1442 Ed Vulliamy, ‘How the CIA <strong>in</strong>tercepted SAS signals’, The Guardian, 29/01/96.1443 Confid<strong>en</strong>tial <strong>in</strong>formation (1).1444 NIOD, Coll. CD-Roms. Section MV, 2 nd Corps to 28 th Division, No. 06-05-174/95, 27/06/95.1445 Hans <strong>van</strong> Alph<strong>en</strong>, ‘B<strong>in</strong>n<strong>en</strong> halve m<strong>in</strong>uut is Dutchbat thuis’ (Dutchbat home <strong>in</strong> thirty seconds), Haagsche Courant,13/07/95.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!