Mission Impossible?

Total Page:16

File Type:pdf, Size:1020Kb

Mission Impossible? Mission Impossible? CIA, From Cl to his executive secretary [Nora Slatkinj, while he reveled in being a Cabinet member." L.- -craft, professionalism and adherence to At the same time, Lake also must be clever American values," one top agency official enough to muster enough political support from -Ls said. "Good luck. Tony." the White House, the Congress and the press to as, The agency has lost not only some of its see him through any new scandals that come ,,,.,.respect and self-confidence, but also the So- his way. Woolsey lost the confidence of the „ „yiet threat that nurtured its esprit de corps White House and eventually stopped going to and its budgets for the 50 years of its existence. meetings there. Lake has a solid relationship "Vet spying is an important as it ever was. The with the new national security adviser, Samuel :`.” threat of a global nuclear holocaust has abated, R. Berger, his former deputy, which should help "`'.'but more diverse threats abound. What are the ensure that doesn't happen again. Intentions of North Korea's leaders? What are the contents of a Kazakh nuclear physicist's he challenge for Lake will be to both em- briefcase? Who's on the guest list at a terrorist brace and discipline his battered agency, training camp in Yemen? America's electronic •T to restore its pride while stressing the intelligence network remains the envy of the important of obedience to the law and respect world, but satellites, cameras and microphones for human rights. CIA officials and administra- are not as good at ferreting out that kind of in- tion policymakers say Deutch did little to im- formation. Besides, even Third World countries prove the agency's bread-and-butter work of are becoming more adept at protecting their se- collecting human intelligence, the task that crets, using fiber optics, commercial encryption most distinguishes the CIA from other intelli- programs, digital switching and, in the cases of gence agencies and one that is likely to grow -"4ran, Iraq, Libya and North Korea, underground even most important during the next four •- bunkers. The CIA's ability to buy and steal "hu- years. ....7inan intelligence"—the kind collected by spies To accomplish this, Lake will have to attack ',,:.anstead of satellites—is inadequate and getting three major problems in the clandestine service. The first is the CIA operations directorate's Reforming and rebuilding America's cLandes- long-standing policy of promoting case offi- ....tine service will require Lake—who must first cers—spies who recruit and run foreign pass muster in Senate confirmation hearings— agents—based on how many agents they re- to be both a lion and a fox. The CIA has a long cruit, not according to the quality of their tradition of scorning outsiders. Senior CIA offi- agents or the value of the intelligence they pro- cials say Lake will have at best a month to win duce. Although the CIA's Directorate of Opera- the respect of the agency's top managers. He tions now has an "asset validation" system, must be tough enough to take on the en- some clandestine service officers estimate that -, trenched mandarins of the CIA's Directorate 'of "cheap recruitments" (a few of them downright Operations, the spy service, which chewed up fraudulent) still account for at least 75 percent hoth the current CIA director, John Deutch, and of the CIA's assets, Even worse is the CIA's iDeutch's predecessor in the Clinton administra- habit of recruiting large numbers of spies—in holt, R. James Woolsey. Cuba and East Germany, for examp`7'..- —slim Lake cannot afford to repeat the mistakes his really work for the other side. "predecessors made. Both Woolsey and Deutch The second problem is the quality cif Ameri- surrounded themselves with a handful of loyal ca's own spies, exemplified by Deutcli's claim aides and insulated themselves from the rank- that suspected RI ssian mole Harold 'Jicholson and-file at the CIA. "Woolsey never got a feel was a standout officer. The CIA is having diffi- for the place,", says a senior CIA official. culty meeting its recruiting targets, despite "Deutch delegated all his day-to-day authority lowering some of its standards, amoiag other "ea"PM.2t$17.7:4*.M15-tit.:7'. 7., 17S, same finding even a few good men and women, it is sponsible for managing day-to-day operations in asking its clandestine service officers to go after France was ordered to prepare a short paper on harder targets. Gone are the days when a case proper tradecraft techniques, (Write on the officer could get ahead by recruiting a Soviet blackboard 100 times: "I will not recruit double diplomat at a cocktail party in Ouagadougou. agents.") The Paris chief of station was given Terrorist groups, drug cartels and nuclear the Distinguished Intelligence Medal. The oper- weapons labs are tougher to penetrate than for- ations directorate's European division chief, eign embassies. hi addition, the CIA is once who had approved the ill-starred French opera- again trying to expand its Non-Official Cover tion, got a plum chief-of-station assignment. (NOC) program, moving spies out of U.S. em- bassies and hiding them behind fake companies The senior officer who presided over the and other facades. Without official cover as dip- CIA's blown operation in Iraq, in which Saddam- lomats, however, case officers can be impris- Hussein executed hundreds and probably thou- oned or even executed if they are caught, in- sands of Kurds, earlier helped run a similarly stead of simply being declared persona non bungled operation in Iran that cost at least 20 grata and sent home. Iranian CIA assets their lives. Although the offi- The CIA also has tried to improve the quality cer was dressed down in at least one meeting, of the training it provides to case officers, espe- CIA officials say Deutch has not officially repri- cially at its basic training facility at Camp Peary, manded, let alone disciplined or fired, anyone in things accepting and promoting some spies who near Williamsburg, long a drying-out stop for of- the DO's Near East Division for botching the cannot even speak a foreign language. Drug ficers with drinking problems. But the fact that Iraq operation. tests and polygraph exams are partly responsi- Nicholson was assigned there as an instructor Deutch's stiffest punishments were reserved ble, but the larger problem is the fact that few suggests that Lake may want to take a hard for mid-level officers in Guatemala who failed to top college graduates these days prefer the CIA look at how good agency training really is, both report that at least one of their assets in the to investment banking, the State Department for new officers and for mid-career spies. Guatemalan military was implicated in the mur- or even journalism. he third problem Lake must confront is der of an American citizen and that numerous When the CIA was handed the job of carrying the spy service's lack of accountability. others were probably guilty of human.rights out reconnaissance missions for the U.S. mili- TDespite their shared reputations for ex- abuses. But Deutch ignored the sloppy:inhde- tary in Bosnia (a task the Pentagon didn't want ceptional self-assurance, both Woolsey and quate reporting from the CIA station in:Guate- for fear of casualties, and one that has resulted Deutch treated the clandestine service with kid mala and focused exclusively on the 'Charges in the accidental death of one female CIA offi- gloves. Given carte blanche by the House and that had raised hackles on Capitol Hill and in the cer), the clandestine service found it had fewer Senate intelligence committees to clean house press. The message, many clandesting s;rvice than four officers who could speak even pass- after the Aldrich Ames spying scandal, Woolsey officers concluded: Deutch was more interested able Serbo-Croatian. In Iraq, the CIA routinely ignored the CIA inspector general's recommen- in political and public relations problems than deployed officers unschooled in that region's dations and declined to fire even one of the offi- the underlying rot in the operations directorate. languages, cultures and history to run and de- cers damned by the agency's Ames investiga- How will Lake handle similar situations? Will he brief its Iraqi and Kurdish agents, with predict- tion. Deutch was nearly as gentle. Senior DO seek to impose tougher punishments? able results. There has been a parade of other , officers were both amazed and relieved when Under the circumstances, it is hardy ris- botched CIA operations in recent years in Paris, he allowed the highest-ranking officer implicat- ing that young case officers are leaving•the.EIA. Rome, Athens, Istanbul and Helsinki, among ed in the scandal, clandestine service chief other places. Hugh (Ted) Price, at best a minor sinner in the An inspector general's investigation iiiio<Ahe Not all the clandestine service's "flaps," as Ames affair, to retire early. (Price's forced re- causes of the disaffection, first reported hy.The they are called, are tragedies. Some are farces. tirement at least was an exception to the CIA's Washington Post, has found that the toplalf of vi case cancers wearing dis- usual policy cif -diciplining only low- and mid- about 30 complaints cited by departingemploy- guises were conducting a counter-terrorist op- level officers and womoting their superiors.) ees are about bad management, Unless:We is eration when they accidentally locked them- After French ounterintelligence officials ex- serious about admitting.
Recommended publications
  • Cryptography
    Cryptography From Wikipedia, the free encyclopedia Jump to: navigation, search "Secret code" redirects here. For the Aya Kamiki album, see Secret Code. German Lorenz cipher machine, used in World War II to encrypt very-high-level general staff messages Cryptography (or cryptology; from Greek κρυπτός, kryptos, "hidden, secret"; and γράφ, gráph, "writing", or -λογία, -logia, respectively)[1] is the practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer science, and engineering. Applications of cryptography include ATM cards, computer passwords, and electronic commerce. Cryptology prior to the modern age was almost synonymous with encryption, the conversion of information from a readable state to nonsense. The sender retained the ability to decrypt the information and therefore avoid unwanted persons being able to read it. Since WWI and the advent of the computer, the methods used to carry out cryptology have become increasingly complex and its application more widespread. Alongside the advancement in cryptology-related technology, the practice has raised a number of legal issues, some of which remain unresolved. Contents [hide] • 1 Terminology • 2 History of cryptography and cryptanalysis o 2.1 Classic cryptography o 2.2 The computer era • 3 Modern cryptography o 3.1 Symmetric-key cryptography o 3.2 Public-key cryptography o 3.3 Cryptanalysis o 3.4 Cryptographic primitives o 3.5 Cryptosystems • 4 Legal issues o 4.1 Prohibitions o 4.2 Export controls o 4.3 NSA involvement o 4.4 Digital rights management • 5 See also • 6 References • 7 Further reading • 8 External links [edit] Terminology Until modern times cryptography referred almost exclusively to encryption, which is the process of converting ordinary information (plaintext) into unintelligible gibberish (i.e., ciphertext).[2] Decryption is the reverse, in other words, moving from the unintelligible ciphertext back to plaintext.
    [Show full text]
  • What Role for the Cia's General Counsel
    Sed Quis Custodiet Ipsos Custodes: The CIA’s Office of General Counsel? A. John Radsan* After 9/11, two officials at the Central Intelligence Agency (CIA) made decisions that led to major news. In 2002, one CIA official asked the Justice Department’s Office of Legal Counsel (OLC) to clarify how aggressive CIA interrogators could be in questioning al Qaeda operatives held overseas.1 This request led to the August 2002 memorandum, later leaked, in which John Yoo argued that an interrogator crosses the line into torture only by inflicting pain on a par with organ failure.2 Yoo further suggested that interrogators would have many defenses, justifications, and excuses if they faced possible criminal charges.3 One commentator described the advice as that of a “mob lawyer to a mafia don on how to skirt the law and stay out of prison.”4 To cool the debate about torture, the Bush administration retracted the memorandum and replaced it with another.5 The second decision was made in 2003, when another CIA official asked the Justice Department to investigate possible misconduct in the disclosure to the media of the identity of a CIA employee. The employee was Valerie Plame, a covert CIA analyst and the wife of Ambassador Joseph Wilson. * Associate Professor of Law, William Mitchell College of Law. The author was a Justice Department prosecutor from 1991 until 1997, and Assistant General Counsel at the Central Intelligence Agency from 2002 until 2004. He thanks Paul Kelbaugh, a veteran CIA lawyer in the Directorate of Operations, for thoughtful comments on an early draft, and Erin Sindberg Porter and Ryan Check for outstanding research assistance.
    [Show full text]
  • Intelligence System
    The U.S. Intelligence System https://www.youtube.com/watch?v=OFIG6k4B3zg What is Intelligence? Intelligence – information that meets needs of policy makers and has been collected and processed to meet those needs; all intelligence is information, not all information is intelligence National Intelligence – three subjects -foreign, domestic, and homeland security Intelligence is – a process, product, and a form of organization The Development of U.S. Intelligence National intelligence – didn’t exist until about 1940 CHRONOLOGY -1940-41 – COI (Coordinator of Info) -OSS (Office of Strategic Services) -1941 – Pearl Harbor –mirror imaging/lack of info sharing -1947 – National Security Act – conveyed the legal basis for the intel community; created the SECDEF & National Security Council -cold war influence- countering Soviet Union & stopping the growth of communism -1972- ABM Treaty & SALT I Accord National Technical Means- satellites & other technical collectors (used to verify adherence) Verification- to ensure treaty agreements are honored Monitoring- the means for verification 1975-1976 – created congressional oversight committees ‘cos of violations of law and intel abuses 1989-1991- failure to foresee Soviet collapse (intel failure); minimized Soviet threat 2001- 911 attacks; Patriot Act- allows greater latitude regarding domestic intel gathering Render- delivery of suspected terrorists to a 3rd country that can incarcerate & interrogate with fewer limitations Key judgments- the primary findings of an overall intel estimate that can be
    [Show full text]
  • Book Reviews
    Journal of Strategic Security Volume 3 Number 1 Volume 3, No. 1: March 2010 Article 8 Book Reviews Timothy Hsia Sheldon Greaves Donald J. Goldstein Henley-Putnam University Follow this and additional works at: https://scholarcommons.usf.edu/jss Part of the Defense and Security Studies Commons, National Security Law Commons, and the Portfolio and Security Analysis Commons pp. 71-78 Recommended Citation Hsia, Timothy; Greaves, Sheldon; and Goldstein, Donald J.. "Book Reviews." Journal of Strategic Security 3, no. 1 (2010) : 71-78. DOI: http://dx.doi.org/10.5038/1944-0472.3.1.7 Available at: https://scholarcommons.usf.edu/jss/vol3/iss1/8 This Book Review is brought to you for free and open access by the Open Access Journals at Scholar Commons. It has been accepted for inclusion in Journal of Strategic Security by an authorized editor of Scholar Commons. For more information, please contact [email protected]. Book Reviews This book review is available in Journal of Strategic Security: https://scholarcommons.usf.edu/jss/ vol3/iss1/8 Hsia et al.: Book Reviews Book Reviews The History of Camp Tracy: Japanese WWII POWs and the Future of Strategic Interrogation. By Alexander D. Corbin. Fort Belvoir, VA: Ziedon Press, 2009. ISBN: 978-0-578-02979- 5. Maps. Photographs. Notes. Bibliography. Index. Pp. 189. $15.95. The History of Camp Tracy, which received the Joint Chiefs of Staff His- tory Office's Fleet Admiral Chester W. Nimitz Archival Research Award, is an illuminating and educating read. The book is written by Alexander Corbin, an intelligence officer in the U.S.
    [Show full text]
  • Hidden Arena: Cyber Competition and Conflict in Indo-Pacific Asia James Lewis Prepared for the Lowy Institute Macarthur Asia Security Project
    Hidden Arena: Cyber Competition and Conflict in Indo-Pacific Asia James Lewis Prepared for the Lowy Institute MacArthur Asia Security Project Executive summary Cyber infrastructure is critical to the global economy. Yet it is badly secured, worse governed, and a place of interstate competition and potential conflict. There is widespread concern among states over strategic competition in cyberspace, including cyber espionage and cyber attack. Asia, with its political tensions, vigorous economies, and lack of strong multilateral institutions, is a focal point for this competition. The rise of China and its extensive cyber capabilities defines strategic competition in both Asia and in cyberspace globally. The cyber domain is better understood in terms of competition than of war. The possession of advanced cyber attack capabilities has tended to instill caution in nations. Still, because of the newness of technology, lack of agreement on norms, and potential to mistake cyber espionage for military action, cyber competition can increase risks of miscalculation, conflict and escalation during wider interstate tension. The strategic cyber challenge in Asia should be addressed in multiple ways. Cooperation in cyber defence between the United States and its allies can proceed in tandem with greater efforts at US-China dialogue and reassurance. Cooperative approaches worth pursuing include agreement on norms for responsible state behavior in cyberspace and reaching common agreement on the applicability of international laws of war in cyberspace. Overview The internet shrinks distance and make borders more porous. It is part of a set of new technologies that form a man-made environment called cyberspace. Cyberspace connects nations more closely than ever before.
    [Show full text]
  • Spy Lingo — a Secret Eye
    A Secret Eye SpyLingo A Compendium Of Terms Used In The Intelligence Trade — July 2019 — A Secret Eye . blog PUBLISHER'S NOTICE: Although the authors and publisher have made every eort to ensure that the information in this book was correct at press time, the authors and publisher do not assume and hereby disclaim any liability to any party for any loss, damage, or disruption caused by errors or omissions, whether such errors or omissions result from negligence, TEXTUAL CONTENT: Textual Content can be reproduced for all non-commercial accident, or any other cause. purposes as long as you provide attribution to the author / and original source where available. CONSUMER NOTICE: You should assume that the author of this document has an aliate relationship and/or another material connection to the providers of goods and services mentioned in this report THIRD PARTY COPYRIGHT: and may be compensated when you purchase from a To the extent that copyright subsists in a third party it provider. remains with the original owner. Content compiled and adapted by: Vincent Hardy & J-F Bouchard © Copyright 9218-0082 Qc Inc July 2019 — Spy Lingo — A Secret Eye Table Of Contents INTRODUCTION 4 ALPHA 5 Ab - Ai 5 Al - As 6 Au - Av 7 Bravo 8 Ba - Bl 8 Bl - Bre 9 Bri - Bu 10 CHARLIE 11 C3 - Can 11 Car - Chi 12 Cho - Cl 13 Cn - Com 14 Comp - Cou 15 Cov 16 Cu 17 DELTA 18 Da - De 18 De - Di 19 Di - Dru 20 Dry - Dz 21 Echo 22 Ea - Ex 22 Ey 23 FOXTROT 24 Fa - Fi 24 Fl - For 25 Fou - Fu 26 GOLF 27 Ga - Go 27 Gr - Gu 28 HOTEL 29 Ha - Hoo 29 Hou - Hv 30 INDIA 31 Ia
    [Show full text]
  • Espionage and Intelligence Gathering Other Books in the Current Controversies Series
    Espionage and Intelligence Gathering Other books in the Current Controversies series: The Abortion Controversy Issues in Adoption Alcoholism Marriage and Divorce Assisted Suicide Medical Ethics Biodiversity Mental Health Capital Punishment The Middle East Censorship Minorities Child Abuse Nationalism and Ethnic Civil Liberties Conflict Computers and Society Native American Rights Conserving the Environment Police Brutality Crime Politicians and Ethics Developing Nations Pollution The Disabled Prisons Drug Abuse Racism Drug Legalization The Rights of Animals Drug Trafficking Sexual Harassment Ethics Sexually Transmitted Diseases Family Violence Smoking Free Speech Suicide Garbage and Waste Teen Addiction Gay Rights Teen Pregnancy and Parenting Genetic Engineering Teens and Alcohol Guns and Violence The Terrorist Attack on Hate Crimes America Homosexuality Urban Terrorism Illegal Drugs Violence Against Women Illegal Immigration Violence in the Media The Information Age Women in the Military Interventionism Youth Violence Espionage and Intelligence Gathering Louise I. Gerdes, Book Editor Daniel Leone,President Bonnie Szumski, Publisher Scott Barbour, Managing Editor Helen Cothran, Senior Editor CURRENT CONTROVERSIES San Diego • Detroit • New York • San Francisco • Cleveland New Haven, Conn. • Waterville, Maine • London • Munich © 2004 by Greenhaven Press. Greenhaven Press is an imprint of The Gale Group, Inc., a division of Thomson Learning, Inc. Greenhaven® and Thomson Learning™ are trademarks used herein under license. For more information, contact Greenhaven Press 27500 Drake Rd. Farmington Hills, MI 48331-3535 Or you can visit our Internet site at http://www.gale.com ALL RIGHTS RESERVED. No part of this work covered by the copyright hereon may be reproduced or used in any form or by any means—graphic, electronic, or mechanical, including photocopying, recording, taping, Web distribution or information storage retrieval systems—without the written permission of the publisher.
    [Show full text]
  • CS Organisation CHINA 09201
    This publication is a product of the NATO Cooperative Cyber Defence Centre of Excellence (the Centre). It does not necessarily reflect the policy or the opinion of the Centre, NATO, any agency, or any government. The Centre may not be held responsible for any loss or harm arising from the use of information contained in this publication and is not responsible for the content of the external sources, including external websites referenced in this publication. Digital or hard copies of this publication may be produced for internal use within NATO and for personal or educational use when for non-profit and non-commercial purpose, provided that copies bear a full citation. www.ccdcoe.org [email protected] The NATO Cooperative Cyber Defence Centre of Excellence (NATO CCD COE) is a NATO-accredited knowledge hub, research institution, and training and exercise facility. The Tallinn-based international military organisation focuses on interdisciplinary applied research, as well as consultations, trainings and exercises in the field of cyber security. The heart of the Centre is a diverse group of international experts, including legal scholars, policy and strategy specialists who join forces with technology researchers, all from military, government and industry backgrounds. Membership of the Centre is open to all Allies. As of September 2016, the Czech Republic, Estonia, France, Germany, Greece, Hungary, Italy, Latvia, Lithuania, the Netherlands, Poland, Slovakia, Spain, Turkey, the United Kingdom and the United States have signed on as Sponsoring Nations (SNs) of the Centre. Austria and Finland have become Contributing Participants (CPs) – the status available for non-NATO nations. For more information on NATO CCD COE, visit the Centre’s website at http://www.ccdcoe.org.
    [Show full text]
  • Obama, Gay, Blackmail -- Rezko, Fitzgerald, Blagojevich
    Obama, gay, blackmail -- Rezko, Fitzgerald, Blagojevich NewsFollowUp.com Obama CIA pictorial index search sitemap home .... OBAMA TOP 10 FRAUD .... Influence, Power News for the 99% Obama Groomed for 30 years by Ford Foundation ...................................Refresh F5...archive and Trilateral Commission and CIA to become home President 50th Anniversary of JFK assassination "Event of a Lifetime" at the Fess Parker Double Tree Inn. JFKSantaBarbara. NFU MOST ACTIVE PA Go to Alphabetic list Obama Gay, Chicago Academic Freedom Conference Bush Neocon Pedophile Index Obama Death List Rothschild Timeline Rothschild Research Sources Bush / Clinton Body Count Reagan, Clinton, Bush Crime Families DeLauro / Turtin, Obama body count Ban ki Moon, Sun Myung Moon = go to other NFU pages http://www.newsfollowup.com/influence_gen.htm[5/28/2014 3:07:19 PM] Obama, gay, blackmail -- Rezko, Fitzgerald, Blagojevich WayneMadsen Report has been told that Emanuel was aware of the damaging nature of the "thousands" of FBI intercepted phone calls to him and Obama and wanted to divert Fitzgerald and the FBI away from he and the president-elect to Blagojevich and Harris. Fitzgerald, known as the man who covered up key elements of the 1993 World Trade Center bombing and saw to it that the legal ground was laid for a commutation of the prison sentence of Dick Cheney’s chief of staff Scooter Libby in the Bush administration’s cover-up of the outing by the media of CIA non-official cover agent Valerie Plame Wilson, decided to seek authorization for the early morning arrest of Blagojevich to protect Obama and Emanuel, as well as Bush.
    [Show full text]
  • Testimony Before the U.S.-China Economic and Security Review Commission: Chinese Human Intelligence Operations Against the United States
    Testimony before the U.S.-China Economic and Security Review Commission: Chinese Human Intelligence Operations against the United States Peter Mattis Fellow, The Jamestown Foundation June 9, 2016 China’s intelligence services are among the world’s most active against the United States, but the Chinese approach to human intelligence (HUMINT) remains misunderstood. Observers have conflated the operations of the intelligence services with the amateur clandestine collectors (but professional scientists/engineers/businesspeople) who collect foreign science and technology. The Chinese intelligence services have a long professional history, dating nearly to the dawn of the Chinese Communist Party, and intelligence has long been the province of professionals. The intelligence services were not immune to the political purges and the red vs. expert debates, and the Cultural Revolution destroyed much of the expertise in clandestine agent operations.1 As China’s interests abroad have grown and the blind spots created by the country’s domestic-based intelligence posture have become more acute, the Chinese intelligence services are evolving operationally and becoming more aggressive in pursuit of higher-quality intelligence. * * * The principal intelligence services conducting HUMINT operations, both clandestine and overt, against the United States are the Ministry of State Security (MSS) and Joint Staff Department’s Intelligence Bureau (JSD/IB) in the People’s Liberation Army (PLA). Prior to the military reforms announced in November 2015, the latter was known as the General Staff Department’s Second Department (commonly abbreviated 2PLA). Because the full ramifications of the PLA’s reform effort have unclear implications for intelligence, the testimony below will reflect what was known about 2PLA rather than the JSD/IB, unless specifically noted.
    [Show full text]
  • Ethics of Human Intelligence Operati'ons: ~F MICE and Men Donald A
    Ethics of Human Intelligence Operati'ons: ~f MICE and Men Donald A. Petkus . Recent debates on the ethics of espionage seem to center on questions of technical data collection and privacy rights, interrogation, covert intervention in foreign affairs (e.g., regime change), renditions, and conflicts of interest, but seldom .on the recruitment and management of agents. One issue that arises from the current espionage and ter­ rorism environment concerns standards for ethical decision making. For compelling reasons, members of the intelligence community must address the ethical issues Specific to human intelligence (HUMINT) . operatIOns. For those outside the intelligence community, the term "espionage ethics" may seem oxymoronic. With few exceptions, intelligence col­ lection overseas violates the target country's laws. Being expected to break a foreign country's laws and manipulate its citizens is part of the job for an intelligence officer, yet she or he is expected to scru­ pulously adhere to her or his own country's laws and professional standards. To some, the idea of espionage is itself distasteful. Prior to World War I, some of Great Britain's military attaches took the view that actual spying on the host country was ungentlemanly conduct for a "guest." For others, operational work with agents seemed to grate against their sensibilities, as in the case of an officer assigned to Ber­ lin just prior to World War I: With war now inevitable, Sir William Everett, the British military at­ tache in Berlin was asked by the Intelligence Branch to continue in secret service after leaving Germany. He declined, saying: "You will not have forgotten when we talked this matter over some months ago, that I mentioned how distasteful it would be to me when it no longer formed a necessary part of my duties.
    [Show full text]
  • Chapter 5. Collection and the Collection Disciplines
    CHAPTER FIVE COLLECTION AND THE COLLECTION DISCIPLINES ollection is the bedrock of intelligence. Intelligence collection has been written C about since the biblical references to spies in Numbers, chapters 13 and 14, and the Book of Joshua. Without collection, intelligence is little more than guesswork— perhaps educated guesswork, but guesswork nonetheless. The United States and sev- eral other nations use multiple means of collecting the intelligence they require. The means are driven by two factors: the nature of the intelligencedistribute being sought and the ability to acquire it in various ways. In the United States, the means of collecting intel- ligence are sometimes referred to as collection disciplinesor or INTs. This chapter discusses the overarching themes that affect all means of collection; it then addresses what the various INTs provide as well as their strengths and weaknesses. Primarily in the military, collection is sometimes spoken of as ISR: intelligence, surveillance, and reconnaissance. The term covers three different types of activities. 1. Intelligence: a general termpost, for collection 2. Surveillance: the systematic observation of a targeted area or group, usually for an extended period of time 3. Reconnaissance: a mission to acquire information about a target, sometimes meaning copy,a one-time endeavor OVERARCHINGnot THEMES Several themes or issues cut across the collection disciplines and tend to drive many of the debates and decisions on intelligence collection. These themes point out that Docollection involves more than questions such as, “What can be collected?” or “Should that be collected?” Collection is a highly complex government activity that requires numerous decisions and has many stress points.
    [Show full text]