UK Eyes Alpha by the Same Author UK Eyes Alpha Big Boys' Rules: the SAS and the Secret Struggle Against the IRA Lnside British Lntelligence

Total Page:16

File Type:pdf, Size:1020Kb

UK Eyes Alpha by the Same Author UK Eyes Alpha Big Boys' Rules: the SAS and the Secret Struggle Against the IRA Lnside British Lntelligence UK Eyes Alpha By the same author UK Eyes Alpha Big Boys' Rules: The SAS and the secret struggle against the IRA lnside British lntelligence Mark Urban tr firhrr anr/ fulrr' ft For Ruth and Edwin Contents lntroduction Part One The First published in I996 1 Coming Earthquake 3 and Faber Limited by Faber 2 A Dark and Curious Shadow 13 3 Queen Square London vcrN JAU 3 The Charm Offensive 26 Typeset by Faber and Faber Ltd Printed in England by Clays Ltd, St Ives plc 4 Most Ridiculed Service 42 All rights reserved 5 ZIRCON 56 O Mark Urban, 1996 6 Springtime for Sceptics 70 Mark Urbar-r is hereby identified as author of 7 A Brilliant Intelligence Operation 84 this work in accordance with Section 77 of the Copyright, Designs and Patents Act 1988 8 The \7all Comes Tumbling Down 101 A CIP rccord for this book is available from the Part Two British Library 9 Supergun LL7 tsnN o-57r-r7689-5 10 Black Death on the Nevsky Prospekt L29 ll Assault on Kuwait L43 12 Desert Shield 153 13 Desert Storm 165 14 Moscow Endgame LA2 Part Three l5 An Accidcnt of History L97 l(r Irrlo thc ll:rllirrn 2LO tt),)B / (,1,1 l, I Qulgrnirc 17 Time for Revenge 22L lntroduction 18 Intelligence, Power and Economic Hegemony 232 19 Very Huge Bills 245 How good is British intelligence? What kind of a return do ministers and officials get 20 The Axe Falls 2il for the hundreds of millions of pounds spent on espionage each year? How does this secret establishment find direction and purpose 2l Irish Intrigues 269 in an age when old certainties have evaporated? Very few people, even in Conclusion 286 Whitehall, would feel confident enough to answer these questions. So the time is riSht, I think, to explore the matter publicly. Glossary 300 The aim of this book is firstlyto examine the performance of the British intelligence services during the last years of the cold war, as they finally lndex 306 came to terms with the fact that this historic clash of ideologies was over, and secondly to examine the relevance of those services in the 19gos and beyond. ln researching this book, I have had many revelations: about the effectiveness of those agencies, about their relationship with the USA, about how much government ministers knew, and many other matters. This book takes the coming to power of Mikhail Gorbachev in 1gg5 as its starting point. The publication in February 1996 of the Scott Report on the 'arms to lraq' affair marks its conclusion. lt is not a study of the broad sweep of world events during those tumultuous years, but rather an exam- ination of how well British intellisence understood them, whether its prod- uct was particularly useful to those in power or to Britain's allies, and how the agencies are now trying to remain relevant in an age where many no longer believe there is any direct threat to the security of the United King- dom. I have tried to provide just enough information about events to answer these questions, but by necessity this is not a history book. ln trying to address these questions, I have been helped by the change of climate brought about by John Major's premiership, which has allowed a freer discussion of intelligence issues. Several years ago I was tempted to start a similar book, but the idea soon ran aground because so few peo- pln wo.re prepared to talk. ln writing this one, I was able to interview key vll officials and politicians: I therefore believe it is the first account of the sub- provided prevent me from referring to them in any specific way. Although ject to draw on a truly authoritative cast of players. Another sign of the they formed part of my general background knowledge, these interviews changed climate is that access to many key people is not dependent on an did not play a major role in this study. Even when available, such inter- unquestioning or 'sympathetic' journalistic approach - so I have also sought views tend to be governed by strict briefing terms, so I sought my own inter- to scrutinize areas that people in power or those giving Whitehall briefings views with individuals who had been involved with these three organizations; often prefer not to discuss. it was something of a relief not to be bound by any deals with the agen- It might be argued that now is too early to look at such recent history. But cies. About twenty people who had worked for MlS, Ml6 or GCHQ helped there are important differences between the examination of intelligence mat- on condition that I did not use their names; for this reason they do not ters and the wider business of government. Despite changes in the proce appear in the list of interviewees below. About the same number of peo- dures for declassifying government papers, those concerning the sources of ple in the Foreign Office, other government departments, the armed forces secret intelligence are likely to remain hidden from public view for decades, and industry also provided non-attributable information. perhaps for as long as a hundred years. Given the present willingness of so I would like to thank the following people who have helped me with this many people who have been involved in this field to talk, my imperative was study: Julian Loose, my editor; Nick Menzies, for valuable research help; to interview them as soon as possible, before memories fade. Jean-Claude Racape who kindly allowed me to live in seclusion at the Many in the intelli$ence agencies would still like to cloak everything Manoir des Mauvaises Lignes while writing the book; Jonathan Lloyd, my they do in secrecy: this may be necessary to protect the life of an agent, agenu Peter Horrocks, editor of Newsnight, for putting up with a corre- or it may simply be useful to those who are guilty of overspending. Even spondent distracted by book production; and most of all, my wife Hilary for in the changed atmosphere of the mid-199os, the writer on intelligence her patience in supporting me through the project. matters must respect certain requirements of secrecy. I do not reveal the The list of source interviews uses titles or ranks current at the time of names of serving intelligence officers (unless already publicly identified)' publication. ln the interests of brevity, I have avoided mentioning knight- the identity of any current agent, the precise location of buildings where hoods or peerages in the text. ln a couple of cases, quotations in the text not previously publicized, or the specific signals intelligence techniques have come from previously unpublished sections of BBC interviews that I used against any current target. conducted during the production of reports on intelligence matters. How- ln addressing the effectiveness of British intelligence collection, I tar- ever, the great majority of the people listed below were interviewed specif- geted the two principal centres of analysis: the Cabinet Office Joint lntel- ically for this book. ligence Committee staff and the Defence lntelligence Staff. These compile the assessments sentto ministers, using publicly-available information as Morton Abramowitz Assistant Secretary for lntelligence and Research well as that produced by British and allied agencies. They usually know (lNR), US State Department, 1985-9 how good signal intelligence or agent reports were on any given subject Alr Chlef Marshal Sir Michael Armitage Chief of Defence lntelligence, and how great a role British collectors of intelligence played. ln examining 1982-5 the work of the analysts themselves, I have asked the ministers or offi- Denlck Averre University of Birmingham cials who received such reports to say whether they were useful or not. Davld Blckford Legal Adviser to DG of the Security Service, 1987-95 Despite the atmosphere of greater openness, those in the principal coF Oeneral Slr Peter de la Bllli6re Commander of British Forces lection agencies - Ml6, Ml5 and GCHQ - remain very reluctant to be Middle East, 1990-1 quoted. I have however had many briefings from intelligence officials since LlcutenantGeneral Slr Derek Boorman Chief of Defence lntelligence 1985-8 1990, although the terms of strict non;rttributability on which they were th Rodrlc Bralthwalte, Chairman Joint lntelligence Committee 1992-3 viii lx Ylgal Carmon Director of Counter Terrorism (lsrael), 1988-92 George Churchill Goleman Commander of the Metropolitan Police Anti-Terrorist Unit, 1985-92 Cafiain Jonathan Gooke Director of lntelligence for Eurasia, DlS, 19915 Sir Percy Cradock Chairman of Joint lntelligence Committee, 1985-92 Gary Crocker US State Department (lNR) Part One Sir Brian Cubbon Permanent Under Secretary, Home Office, 1979-88 Dwayne Day, George Washington University, USA Sir Anthony Duff Chairman of JlC, 1982-5, Director General of Security Service 1985-7 Robert Gates Director of the ClA, 1991-3 Mikhai! Gorbachev General Secretary of the Communist Party of the Soviet Union, 1985*91 Oleg Gordievsky KGB, 1962-85 John Gordon Head of Nuclear Energy Department, FCO, 1986-8 Michael Herman, GCHQ, 7952-87 Mark Higson lraq Desk, FCO, 1988-90 Lord Howe of Aberavon Foreign Secretary, 1-983-9 Oleg Kalugin KGB, 1957*89 Richard Kellaway Chief lnvestigating Officer, HM Customs and Excise Tom Klng MP Defence Secretary 1989-92 Owen Lewls formerly Ministry of Defence (Army) Pierre Marion, Head of DGSE (France), 1981-5 David Mellor Minister of State at Home and Foreign Offices, 1986-90 Martin Morland Chief of Assessments Staff, JlC, 1984-6 Lieutenant-General William Odom Director of US National Security Agency, 1985-8 Peter Pigden Deputy Chief lnvestigating Officer, HM Customs and Excise, 1989-95 Sir Chafles Powell Private Secretary to the Prime Minister, 7984-gL Julian Perry Robinson University of Sussex William Taylor Assistant Commissioner for Special Operations, Metropolitan Police, 1991-5 Air Marshal Sir John Walker Chief of Defence lntelligence, t99L-4 Lleutenant-General Norman Wood director of US intelligence community programmes, L99O-2 x tfr.
Recommended publications
  • 'Global Intelligence Co-Operation Versus Accountability: New Facets
    This article was downloaded by: [Aldrich, Richard J.] On: 2 April 2009 Access details: Access Details: [subscription number 910154969] Publisher Routledge Informa Ltd Registered in England and Wales Registered Number: 1072954 Registered office: Mortimer House, 37-41 Mortimer Street, London W1T 3JH, UK Intelligence and National Security Publication details, including instructions for authors and subscription information: http://www.informaworld.com/smpp/title~content=t713672628 Global Intelligence Co-operation versus Accountability: New Facets to an Old Problem Richard J. Aldrich Online Publication Date: 01 February 2009 To cite this Article Aldrich, Richard J.(2009)'Global Intelligence Co-operation versus Accountability: New Facets to an Old Problem',Intelligence and National Security,24:1,26 — 56 To link to this Article: DOI: 10.1080/02684520902756812 URL: http://dx.doi.org/10.1080/02684520902756812 PLEASE SCROLL DOWN FOR ARTICLE Full terms and conditions of use: http://www.informaworld.com/terms-and-conditions-of-access.pdf This article may be used for research, teaching and private study purposes. Any substantial or systematic reproduction, re-distribution, re-selling, loan or sub-licensing, systematic supply or distribution in any form to anyone is expressly forbidden. The publisher does not give any warranty express or implied or make any representation that the contents will be complete or accurate or up to date. The accuracy of any instructions, formulae and drug doses should be independently verified with primary sources. The publisher shall not be liable for any loss, actions, claims, proceedings, demand or costs or damages whatsoever or howsoever caused arising directly or indirectly in connection with or arising out of the use of this material.
    [Show full text]
  • Re Joinder Submitted by the Republic of Uganda
    INTERNATIONAL COURT OF JUSTICE CASE CONCERNING ARMED ACTIVITIES ON THE TERRITORY OF THE CONGO DEMOCRATIC REPUBLIC OF THE CONGO v. UGANDA REJOINDER SUBMITTED BY THE REPUBLIC OF UGANDA VOLUME 1 6 DECEMBER 2002 TABLE OF CONTENTS Page INTRODUCTION .................................................................... 1 CHAPTER 1 : THE PERSISTENT ANOMALIES IN THE REPLY CONCERNING MATTERS OF PROCEDURE AND EVIDENCE ............................................... 10 A. The Continuing Confusion Relating To Liability (Merits) And Quantum (Compensation) ...................... 10 B. Uganda Reaffirms Her Position That The Court Lacks Coinpetence To Deal With The Events In Kisangani In June 2000 ................................................ 1 1 C. The Courl:'~Finding On The Third Counter-Claim ..... 13 D. The Alleged Admissions By Uganda ........................... 15 E. The Appropriate Standard Of Proof ............................. 15 CHAPTER II: REAFFIRMATION OF UGANDA'S NECESSITY TO ACT IN SELF- DEFENCE ................................................. 2 1 A. The DRC's Admissions Regarding The Threat To Uganda's Security Posed By The ADF ........................ 27 B. The DRC's Admissions Regarding The Threat To Uganda's Security Posed By Sudan ............................. 35 C. The DRC's Admissions Regarding Her Consent To The Presetnce Of Ugandan Troops In Congolese Territory To Address The Threats To Uganda's Security.. ......................................................................4 1 D. The DRC's Failure To Establish That Uganda Intervened
    [Show full text]
  • Inside Russia's Intelligence Agencies
    EUROPEAN COUNCIL ON FOREIGN BRIEF POLICY RELATIONS ecfr.eu PUTIN’S HYDRA: INSIDE RUSSIA’S INTELLIGENCE SERVICES Mark Galeotti For his birthday in 2014, Russian President Vladimir Putin was treated to an exhibition of faux Greek friezes showing SUMMARY him in the guise of Hercules. In one, he was slaying the • Russia’s intelligence agencies are engaged in an “hydra of sanctions”.1 active and aggressive campaign in support of the Kremlin’s wider geopolitical agenda. The image of the hydra – a voracious and vicious multi- headed beast, guided by a single mind, and which grows • As well as espionage, Moscow’s “special services” new heads as soon as one is lopped off – crops up frequently conduct active measures aimed at subverting in discussions of Russia’s intelligence and security services. and destabilising European governments, Murdered dissident Alexander Litvinenko and his co-author operations in support of Russian economic Yuri Felshtinsky wrote of the way “the old KGB, like some interests, and attacks on political enemies. multi-headed hydra, split into four new structures” after 1991.2 More recently, a British counterintelligence officer • Moscow has developed an array of overlapping described Russia’s Foreign Intelligence Service (SVR) as and competitive security and spy services. The a hydra because of the way that, for every plot foiled or aim is to encourage risk-taking and multiple operative expelled, more quickly appear. sources, but it also leads to turf wars and a tendency to play to Kremlin prejudices. The West finds itself in a new “hot peace” in which many consider Russia not just as an irritant or challenge, but • While much useful intelligence is collected, as an outright threat.
    [Show full text]
  • Sub Rosa Newsletter of the Friends of the Intelligence Corps Museum E Newsletter 08 - Summer 2014 a WARM WELCOME to YOUR SUMMER SUB ROSA !
    Sub Rosa Newsletter of the Friends of The Intelligence Corps Museum E Newsletter 08 - Summer 2014 A WARM WELCOME TO YOUR SUMMER SUB ROSA ! Firstly we would like to congratulate Museum Curator – Sally Ann Reed, Archivist – Joyce MUSEUM NEWS: Hutton and all the team for presenting the much refreshed museum displays in time for Corps WWI Day (19th July). is was a truly Herculean effort all round and was much appreciated by INTERACTIVE those who were able to attend on the day and will surely impress all visitors to the museum in DISPLAY the coming months and beyond. We hope that many FICM members and their guests will take the opportunity to attend the trust’s open COMMISSIONED day and reception to be held on 11th September (Templer Day) in the museum, thus affording an excellent opportunity to appreciate the new layout and features, such as the brand new interactive WWI This important display has been made possible by the most generous display (made possible with substantial support from Julian Barnard). You are urged to register for this donations of: Mr Julian Barnard & event as soon as possible, please. We also draw your attention to the opportunity to visit the priory on Trusthouse Forte, arranged with the October 11th to attend the Priory Friends’ study day, which marks the 850th anniversary of Archbishop kind assistance of Lady Balfour of Thomas Becket’s visit to the priory! (See planned events). Burleigh. In addition to contributions from the “usual suspects” this edition features fascinating articles from Derek Hawker, Angus Southwood and museum volunteer, Andy Cole – our thanks to you all! Thankfully we are beginning to see an increasing flow of new articles of interest and anecdotes from former Corps personnel, which are truly valued by readers of Sub Rosa – so do, please keep them coming in! John Quenby, Chairman PLANNED EVENTS 12 August 2014 – Corps parade and ceremonial near Rouen in France.
    [Show full text]
  • Council Decision (Cfsp)
    L 246/12 EN Offi cial Jour nal of the European Union 30.7.2020 COUNCIL DECISION (CFSP) 2020/1127 of 30 July 2020 amending Decision (CFSP) 2019/797 concerning restrictive measures against cyber-attacks threatening the Union or its Member States THE COUNCIL OF THE EUROPEAN UNION, Having regard to the Treaty on European Union, and in particular Article 29 thereof, Having regard to the proposal from the High Representative of the Union for Foreign Affairs and Security Policy, Whereas: (1) On 17 May 2019 the Council adopted Decision (CFSP) 2019/797 (1). (2) Targeted restrictive measures against cyber-attacks with a significant effect which constitute an external threat to the Union or its Member States are among the measures included in the Union’s framework for a joint diplomatic response to malicious cyber-activities (the cyber diplomacy toolbox) and are a vital instrument to deter and respond to such activities. Restrictive measures can also be applied in response to cyber-attacks with a significant effect against third States or international organisations, where deemed necessary to achieve common foreign and security policy objectives set out in the relevant provisions of Article 21 of the Treaty on European Union. (3) On 16 April 2018 the Council adopted conclusions in which it firmly condemned the malicious use of information and communications technologies, including in the cyber-attacks publicly known as ‘WannaCry’ and ‘NotPetya’, which caused significant damage and economic loss in the Union and beyond. On 4 October 2018 the Presidents of the European Council and of the European Commission and the High Representative of the Union for Foreign Affairs and Security Policy (the ‘High Representative’) expressed serious concerns in a joint statement about an attempted cyber-attack to undermine the integrity of the Organisation for the Prohibition of Chemical Weapons (OPCW) in the Netherlands, an aggressive act which demonstrated contempt for the solemn purpose of the OPCW.
    [Show full text]
  • British Domestic Security Policy and Communist Subversion: 1945-1964
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Apollo British Domestic Security Policy and Communist Subversion: 1945-1964 William Styles Corpus Christi College, University of Cambridge September 2016 This dissertation is submitted for the degree of Doctor of Philosophy William Styles British Domestic Security Policy and Communist Subversion: 1945-1964 This thesis is concerned with an analysis of British governmental attitudes and responses to communism in the United Kingdom during the early years of the Cold War, from the election of the Attlee government in July 1945 up until the election of the Wilson government in October 1964. Until recently the topic has been difficult to assess accurately, due to the scarcity of available original source material. However, as a result of multiple declassifications of both Cabinet Office and Security Service files over the past five years it is now possible to analyse the subject in greater depth and detail than had been previously feasible. The work is predominantly concerned with four key areas: firstly, why domestic communism continued to be viewed as a significant threat by successive governments – even despite both the ideology’s relatively limited popular support amongst the general public and Whitehall’s realisation that the Communist Party of Great Britain presented little by way of a direct challenge to British political stability. Secondly, how Whitehall’s understanding of the nature and severity of the threat posed by British communism developed between the late 1940s and early ‘60s, from a problem considered mainly of importance only to civil service security practices to one which directly impacted upon the conduct of educational policy and labour relations.
    [Show full text]
  • Dziadok Mikalai 1'St Year Student
    EUROPEAN HUMANITIES UNIVERSITY Program «World Politics and economics» Dziadok Mikalai 1'st year student Essay Written assignment Course «International relations and governances» Course instructor Andrey Stiapanau Vilnius, 2016 The Troubles (Northern Ireland conflict 1969-1998) Plan Introduction 1. General outline of a conflict. 2. Approach, theory, level of analysis (providing framework). Providing the hypothesis 3. Major actors involved, definition of their priorities, preferences and interests. 4. Origins of the conflict (historical perspective), major actions timeline 5. Models of conflicts, explanations of its reasons 6. Proving the hypothesis 7. Conclusion Bibliography Introduction Northern Ireland conflict, called “the Troubles” was the most durable conflict in the Europe since WW2. Before War in Donbass (2014-present), which lead to 9,371 death up to June 3, 20161 it also can be called the bloodiest conflict, but unfortunately The Donbass War snatched from The Troubles “the victory palm” of this dreadful competition. The importance of this issue, however, is still essential and vital because of challenges Europe experience now. Both proxy war on Donbass and recent terrorist attacks had strained significantly the political atmosphere in Europe, showing that Europe is not safe anymore. In this conditions, it is necessary for us to try to assume, how far this insecurity and tensions might go and will the circumstances and the challenges of a international relations ignite the conflict in Northern Ireland again. It also makes sense for us to recognize that the Troubles was also a proxy war to a certain degree 23 Sources, used in this essay are mostly mass-media articles, human rights observers’ and international organizations reports, and surveys made by political scientists on this issue.
    [Show full text]
  • Terrorism Knows No Borders
    TERRORISM TERRORISM TERRORISM TERRORISM KNOWS KNOWS KNOWS KNOWS NO BORDERS NO BORDERS NO BORDERS NO BORDERS TERRORISM TERRORISM TERRORISM TERRORISM KNOWS KNOWS KNOWS KNOWS NO BORDERS NO BORDERS NO BORDERS NO BORDERS TERRORISM TERRORISM TERRORISM TERRORISM KNOWS KNOWS KNOWS KNOWS NO BORDERS NO BORDERS NO BORDERS NO BORDERS TERRORISM TERRORISM TERRORISM TERRORISM KNOWS KNOWS KNOWS KNOWS NO BORDERS NO BORDERS NO BORDERS NO BORDERS TERRORISM TERRORISM TERRORISM TERRORISM KNOWS KNOWS KNOWS KNOWS NO BORDERS NO BORDERS NO BORDERS NO BORDERS October 2019 his is a special initiative for SEFF to be associated with, it is one part of a three part overall Project which includes; the production of a Book and DVD Twhich captures the testimonies and experiences of well over 20 innocent victims and survivors of terrorism from across Great Britain and The Republic of Ireland. The Project title; ‘Terrorism knows NO Borders’ aptly illustrates the broader point that we are seeking to make through our involvement in this work, namely that in the context of Northern Ireland terrorism and criminal violence was not curtailed to Northern Ireland alone but rather that individuals, families and communities experienced its’ impacts across the United Kingdom, Republic of Ireland and beyond these islands. This Memorial Quilt Project does not claim to represent the totality of lives lost across Great Britain and The Republic of Ireland but rather seeks to provide some understanding of the sacrifices paid by communities, families and individuals who have been victimised by ‘Republican’ or ‘Loyalist’ terrorism. SEFF’s ethos means that we are not purely concerned with victims/survivors who live within south Fermanagh or indeed the broader County.
    [Show full text]
  • RUSSIA INTELLIGENCE Politics & Government
    N°66 - November 22 2007 Published every two weeks / International Edition CONTENTS KREMLIN P. 1-4 Politics & Government c KREMLIN The highly-orchestrated launching into orbit cThe highly-orchestrated launching into orbit of of the «national leader» the «national leader» Only a few days away from the legislative elections, the political climate in Russia grew particu- STORCHAK AFFAIR larly heavy with the announcement of the arrest of the assistant to the Finance minister Alexey Ku- c Kudrin in the line of fire of drin (read page 2). Sergey Storchak is accused of attempting to divert several dozen million dol- the Patrushev-Sechin clan lars in connection with the settlement of the Algerian debt to Russia. The clan wars in the close DUMA guard of Vladimir Putin which confront the Igor Sechin/Nikolay Patrushev duo against a compet- cUnited Russia, electoral ing «Petersburg» group based around Viktor Cherkesov, overflows the limits of the «power struc- home for Russia’s big ture» where it was contained up until now to affect the entire Russian political power complex. business WAR OF THE SERVICES The electoral campaign itself is unfolding without too much tension, involving men, parties, fac- cThe KGB old guard appeals for calm tions that support President Putin. They are no longer legislative elections but a sort of plebicite campaign, to which the Russian president lends himself without excessive good humour. The objec- PROFILE cValentina Matvienko, the tive is not even to know if the presidential party United Russia will be victorious, but if the final score “czarina” of Saint Petersburg passes the 60% threshhold.
    [Show full text]
  • Mass Surveillance
    Mass Surveillance Mass Surveillance What are the risks for the citizens and the opportunities for the European Information Society? What are the possible mitigation strategies? Part 1 - Risks and opportunities raised by the current generation of network services and applications Study IP/G/STOA/FWC-2013-1/LOT 9/C5/SC1 January 2015 PE 527.409 STOA - Science and Technology Options Assessment The STOA project “Mass Surveillance Part 1 – Risks, Opportunities and Mitigation Strategies” was carried out by TECNALIA Research and Investigation in Spain. AUTHORS Arkaitz Gamino Garcia Concepción Cortes Velasco Eider Iturbe Zamalloa Erkuden Rios Velasco Iñaki Eguía Elejabarrieta Javier Herrera Lotero Jason Mansell (Linguistic Review) José Javier Larrañeta Ibañez Stefan Schuster (Editor) The authors acknowledge and would like to thank the following experts for their contributions to this report: Prof. Nigel Smart, University of Bristol; Matteo E. Bonfanti PhD, Research Fellow in International Law and Security, Scuola Superiore Sant’Anna Pisa; Prof. Fred Piper, University of London; Caspar Bowden, independent privacy researcher; Maria Pilar Torres Bruna, Head of Cybersecurity, Everis Aerospace, Defense and Security; Prof. Kenny Paterson, University of London; Agustín Martin and Luis Hernández Encinas, Tenured Scientists, Department of Information Processing and Cryptography (Cryptology and Information Security Group), CSIC; Alessandro Zanasi, Zanasi & Partners; Fernando Acero, Expert on Open Source Software; Luigi Coppolino,Università degli Studi di Napoli; Marcello Antonucci, EZNESS srl; Rachel Oldroyd, Managing Editor of The Bureau of Investigative Journalism; Peter Kruse, Founder of CSIS Security Group A/S; Ryan Gallagher, investigative Reporter of The Intercept; Capitán Alberto Redondo, Guardia Civil; Prof. Bart Preneel, KU Leuven; Raoul Chiesa, Security Brokers SCpA, CyberDefcon Ltd.; Prof.
    [Show full text]
  • Allied Military Liaison Missions, 1946-1990
    PARALLEL HISTORY PROJECT ON NATO AND THE WARSAW PACT (PHP) Allied Military Liaison Missions, 1946-1990 Christopher Winkler, Anna Locher, and Christian Nuenlist (eds.) by courtesy of the Allied Musem, Berlin PHP Publications Series Washington, D.C. / Zurich July 2005 This publication is part of a publications series by the Parallel History Project on NATO and the Warsaw Pact (PHP). The PHP provides new scholarly perspectives on contemporary international history by collecting, analyzing, and interpreting formerly secret governmental documents. Since its establishment in 1999, the project has collected thousands of pages of material on security-related issues of the Cold War, published a large number of online documentaries on central issues such as mutual threat perceptions and alliance management, and organized several major international conferences on war planning, intelligence, and intra-bloc tensions. Further information is provided at the PHP Website: www.isn.ethz.ch/php. Table of Contents 1) Introduction, by Christopher Winkler.............................................................................1 2) The Military Liaison Missions in Germany During the Cold War: Documents and Interpretations, by Gen. William E. Odom.......................................................................12 3) Sample Document : Information on Incident with Members of the US Military Mission in Techentin (District of Schwerin) ..................................................................................14 Please note: This issue of the PHP Publication Series offers highlights from a much larger online document collection. Please consult the PHP website for all the documents in their original language and other features: http://www.isn.ethz.ch/php/collections/coll_mlm.htm. The PHP has published a number of document collections on various aspects of the security- related history of the cold war: http://www.isn.ethz.ch/php.
    [Show full text]
  • Remnants of Al-Qaeda in Saudi Arabia: Current Assessment
    Remnants of al-Qaeda in Saudi Arabia: Current Assessment Washington, DC - November 9th, 2006 Center for Strategic and International Studies Nawaf Obaid Managing Director Counter-Terrorism in the Kingdom • Since May 2003, Saudi security forces have captured ~845 individuals with direct or indirect links to al-Qaeda. • Over 400 have attended “ideological re-education programs.” • 264 al-Qaeda commanders, logisticians, theologians, financiers and fighters have been captured or killed. • Of 26 members that comprised first “most wanted” list, all but one have been killed or captured and all five initial al-Qaeda cells have been identified, infiltrated and decimated. • Of 36 second-tier operatives comprising second “most wanted” list: • 20 had already fled the Kingdom when list was published • Of remaining 16, only 4 have not been killed or captured • This group carried out recent failed attack on Abqaiq • Over 25 major terrorist attacks have been foiled since May 2003. Saudi National Security Assessment Project 2 Counter-Terrorism in the Kingdom (cont.) • Four of the main routes used by terrorists to smuggle themselves, fighters, weapons and drugs have been identified. • Close surveillance had resulted in hundreds of interceptions on the Saudi-Yemeni border. • The largest of the al-Qaeda safe houses used for logistical support has been destroyed. As have three in Riyadh, two in Qassim, two in the Eastern Province, one in Najran and three in the Western Province (Makkah, Madinah and Jeddah). • Several arrests of fighters returning from Afghanistan and Pakistan have been made over the past several months. Important Note: They had no attack plan and no clear command structure, focused exclusively on avoiding Saudi security services.
    [Show full text]