British Way of Intelligence

Total Page:16

File Type:pdf, Size:1020Kb

British Way of Intelligence ̸» ײ¬»´´·¹»²½»® Ö±«®²¿´ ±º ËòÍò ײ¬»´´·¹»²½» ͬ«¼·»­ From AFIO's The Intelligencer Association of Former Intelligence Officers 7700 Leesburg Pike Ste 324 Journal of U.S. Intelligence Studies Falls Church, Virginia 22043 Volume 21 • Number 2 • $15 single copy price Summer 2015 Web: www.afio.com , E-mail: [email protected] © 2015 AFIO - Association of Former Intelligence Officers, All Rights Reserved ÞÛÌÎßÇßÔÍô ØßÝÕÍ ú ÐËÞÔ×Ý Ü×ÍÌÎËÍÌ intelligence papers in the British National Archives, leading to a boom in popular and academic writing. This trend towards limited (although unprecedented) openness has continued, most notably through the Guide to Study of Intelligence publication of official histories of the Security Service (MI5), the Secret Intelligence Service (SIS/MI6), and the Joint Intelligence Committee (JIC).4 It has also been supplemented by authoritative inquiries into 1 British Intelligence the intelligence community, most notably the Butler Report into pre-war intelligence on Iraqi weapons of 5 by Dr. Huw Dylan and Dr. Michael S. Goodman mass destruction. Combined, these sources provide students and scholars with outstanding insight into the role of intelligence in British statecraft. or centuries, British kings and queens have utilised their spies and spymasters to safeguard Establishing the British Way in Intelligence Ftheir grip on power. Today’s intelligence officers As early as the Sixteenth Century, Sir Francis can trace their professional lineage to the Sixteenth Walsingham and his predecessor, Sir William Cecil, Century. They can look to a long tradition of foreign ran a network of ‘intelligencers’, gathering intelligence spying during the age of empire, and the exploits of on Catholic plots against Queen Elizabeth.6 Through- the officers who, for the defence of India, surveyed and out the Seventeenth Century Britain gathered intelli- spied in the badlands of Afghanistan – the adventures gence on restive plotters by intercepting their post, that inspired possibly the greatest spy story, Rudyard and by the Eighteenth Century there was an official Kipling’s Kim.2 And they can examine how British decipherer targeting the codes of foreign powers.7 intelligence performed, often with distinction, in These activities were funded by a national secret ser- the great wars of the Twentieth Century. They have vice fund, administered by the Secretary of State for an historic legacy. Today, in the United Kingdom, Foreign Affairs. However, before the Twentieth Cen- intelligence remains a vital component of statecraft. tury intelligence gathering was not professionalised This article introduces British intelligence and offers in the same manner as diplomacy; it was viewed as a an insight into ‘the British way’ in intelligence. distinctly ungentlemanly activity. It was the armed The rich history has been obscured by official forces who developed and formalised intelligence, secrecy until fairly recently. In 1985, the great histo- operating, as they were, on the sharp end of impe- rian of war, Professor Sir Michael Howard, lamented rial expansion. Britain boasted a naval intelligence that ‘so far as official government policy is concerned, department in 1887 and the War Office established the British security and intelligence services do not its intelligence branch in 1873.8 These organisations exist. Enemy agents are found under gooseberry pioneered modern intelligence in Britain, gathering, bushes and intelligence is brought in by the storks.’3 processing, and disseminating intelligence, based on This is no longer the case. Over the final decades of all sources. But it took many more years to develop a the Twentieth Century a small revolution occurred true British intelligence community. in official attitudes towards secrecy. Wartime intel- ligence veterans published their memoirs; official 4. C. Andrew, Defence of the Realm: The Authorised History of MI5. (London: Allen Lane, 2009); K. Jeffery, MI6: The History of the histories were published; and the 1993 Waldegrave Secret Intelligence Service, 1909-1949. (London: Bloomsbury, 2010); Open Government initiative increased the volume of M. S. Goodman, The Official History of the Joint Intelligence Com- mittee: From the Approach of the Second World War to the Suez Crisis. (London: Routledge, 2014). 1. Editor’s Note: AFIO has retained the original UK spellings 5. Butler, the Lord of Brockwell. HC898. Review of Intelligence on and punctuations of these two British scholars. Weapons of Mass Destruction (London: TSO, 2004). 2. See P. Hopkirk. The Great Game: On Secret Service in High Asia. 6. See S. Alford, The Early Elizabethan Polity: William Cecil and (London: John Murray, 2006); M.Grant (ed). The British Way in the British Succession Crisis, 1558-1569. (Cambridge: Cambridge Cold Warfare: Intelligence, Diplomacy and the Bomb, 1945-75. (Lon- University Press, 1998). don: Continuum, 2011). 7. Stephen Twigge, Edward Hampshire, Graham Macklin, 3. C. Andrew, ‘Intelligence, International Relations and Un- British intelligence: Secrets, Spies and Sources, (London: The National der-theorisation’, Intelligence and National Security 19 (2) (2004), Archives, 2008), pp.10 – 11. 71. 8. Ibid, p.11. Spring/Summer 2015 Intelligencer: Journal of U.S. Intelligence Studies Page 35 The catalyst for the creation of the modern Chiefs of Staff and the government. They created the intelligence machinery was the rise of Germany. Joint Intelligence Committee, which established itself British military organisations and the Foreign Office at the apex of Britain’s intelligence machinery, and proved unable to deliver the intelligence demanded remained there.13 This development was significant by anxious ministers, so in 1909 the Committee of for the way Britain managed its intelligence affairs. Imperial Defence created the Secret Service Bureau After some teething troubles, the JIC secured the active (SSB). Originally consisting of an army and a navy engagement of the Foreign Office, and its members branch, it was soon reorganised into a foreign and included relevant policy departments, the armed a domestic section. The domestic or ‘home’ section forces and the intelligence agencies, all of which would would eventually become the Security Service and was contribute and agree to the Committee’s proceed- headed by the Army Officer, Captain Vernon Kell. The ings. This ensured that direction and collection were foreign section, MI-1c would eventually become SIS; it more focused; that JIC reports were truly ‘national’, was headed by the redoubtable Commander Mansfield consensus reports, rather than departmental ones; Cumming, who signed his letters in green ink with a that intelligence and policy were coordinated; and single letter, ‘C’ – a tradition followed by all chiefs of that no single department could dominate. Today SIS to this day.9 these characteristics remain: the British way in intel- Establishing the SSB began the long process ligence is characterised by the committee approach that yielded a functional intelligence community. As to management, an intelligence community working befitted its imperial heritage, until the Second World jointly rather than competitively, a (general) drive for War the military largely dominated intelligence. MI5 consensus, and the view that intelligence is valuable and SIS were civilian agencies, but heavily staffed by to all facets of national business. former military men, and their concern was largely (although by no means entirely) with enemy capabil- British Intelligence Today ities. After 1923, communications intelligence was the purview of the SIS controlled Government Code The core institutions of British intelligence have and Cypher School (GC&CS), which after World War 1 proven resilient. They have survived withering criti- amalgamated the Admiralty and the Army’s wartime cism following spectacular failures and have weath- SIGINT outfits, Room 40 and MI-1b.10 The Army and ered economic boom and bust. This is due to several Navy maintained their own intelligence branches.11 factors: the legacy of intelligence support for policy But the level of coordination was questionable. The making during the Second World War; the Cold War Foreign Office remained rather aloof from the agen- and the Soviet nuclear threat; the centrality of intel- cies, considering itself the sole authority on foreign ligence to the Anglo-American relationship – valued and diplomatic developments. Duplication was rife, and nurtured by British politicians from Churchill with one commentator after the war noting how he to Tony Blair; the importance of good intelligence witnessed “junior officers in the intelligence divisions in the small wars of the end of empire; and because of the Air Ministry, War Office, and the Admiralty all of the consistent threat the UK has faced from ter- doing the same job, writing the same things, gath- rorists. Britain has fought very hard to maintain its ering the same information, most of it not secret in intelligence power, even as other aspects of its global any way.”12 influence diminished. In 1936, with war clouds once again on the hori- Two notable features differentiate the contempo- zon, the Secretary to the Cabinet and the Committee rary machinery from its Cold War incarnation. Firstly, of Imperial Defence, Sir Maurice Hankey proposed today, the services have reasonably prominent public reforms to ensure that the medley of organisations profiles. They recruit openly, (some of) their records generated useful intelligence to meet the needs of the are available,
Recommended publications
  • Dwindling Congegations Cast Pall Over City Churches
    28 NEWS Dwindling congegations cast pall over Tapping in to the secrets of GCHQ city churches Years of neglect have left Birmingham’s churches crumbling faster than any- Security expert Richard J Aldrich where else in the country, a report has tells Richard McComb about revealed. the threats to privacy posed by A sur vey of t he cit y’s holy buildings has Britain’s electronic snoops. revealed that 28 per cent are at risk of fa lling into ser ious disrepa ir – compa red with an average of nine per cent in other esearching the history of cities. GCHQ, Britain’s largest and English Heritage said dwindling con- arguably most secretive intel- gregations were the main reason that ligence organisation, can be church leaders had struggled to raise an unsettling experience. funds to meet spiralling repair bills. RJust ask security expert Richard J The conservation body has issued Aldrich, who has spent most of the past guidelines to worshippers to help teach decade looking into the super-snoop them how to preserve the buildings for agency, based at Cheltenham in a circu- generations to come. lar building known as The Doughnut. “Churches are all that some communi- Aldrich has just published GCHQ, an ties have left now that post offices and uncensored history of the Government pubs have closed,” said Tim Johnston, Communications Headquarters, a clan- English Heritage’s director for the West destine body both feared and revered for Midlands. its code-breaking exploits and covert, “There’s help out there but there’s also often highly controversial, surveillance a lot that congregations can be doing to techniques.
    [Show full text]
  • Chancellor's Speech to GCHQ on Cyber Security
    Speech Chancellor's speech to GCHQ on cyber security From: HM Treasury, Government Communications Headquarters and The Rt Hon George Osborne MP Delivered on: 17 November 2015 (Original script, may differ from delivered version) Location: GCHQ First published: 17 November 2015 Part of: Spending Review and Autumn Statement 2015 Chancellor lays out new plan for £1.9 billion cyber investment, and details seven more departments that have settled ahead of the Spending Review. Before I start my speech, I want to say a few words about the heart-breaking events that unfolded in Paris on Friday evening. This was an assault not just on the people of France, but on all of us who value freedom and democracy. We stand with the people of France. We know that we must act as one, just as our enemies see us as one. As David Cameron has said, we will do everything we possibly can to help the French at this moment of national trauma. That includes making available to them the sharpest of our own national capability, which includes the skills and capabilities of GCHQ. Before the dreadful events of the weekend we had already indicated that we would be increasing substantially the resources we dedicate to countering the terrorist threat posed by ISIL. The Prime Minister has made clear that across the agencies a further 1,900 staff will be recruited to keep Britain safe from terrorist attack. This was going to be an important outcome of the Spending Review. What has unfolded in Paris has reminded us all that it is a vital one too.
    [Show full text]
  • 'Global Intelligence Co-Operation Versus Accountability: New Facets
    This article was downloaded by: [Aldrich, Richard J.] On: 2 April 2009 Access details: Access Details: [subscription number 910154969] Publisher Routledge Informa Ltd Registered in England and Wales Registered Number: 1072954 Registered office: Mortimer House, 37-41 Mortimer Street, London W1T 3JH, UK Intelligence and National Security Publication details, including instructions for authors and subscription information: http://www.informaworld.com/smpp/title~content=t713672628 Global Intelligence Co-operation versus Accountability: New Facets to an Old Problem Richard J. Aldrich Online Publication Date: 01 February 2009 To cite this Article Aldrich, Richard J.(2009)'Global Intelligence Co-operation versus Accountability: New Facets to an Old Problem',Intelligence and National Security,24:1,26 — 56 To link to this Article: DOI: 10.1080/02684520902756812 URL: http://dx.doi.org/10.1080/02684520902756812 PLEASE SCROLL DOWN FOR ARTICLE Full terms and conditions of use: http://www.informaworld.com/terms-and-conditions-of-access.pdf This article may be used for research, teaching and private study purposes. Any substantial or systematic reproduction, re-distribution, re-selling, loan or sub-licensing, systematic supply or distribution in any form to anyone is expressly forbidden. The publisher does not give any warranty express or implied or make any representation that the contents will be complete or accurate or up to date. The accuracy of any instructions, formulae and drug doses should be independently verified with primary sources. The publisher shall not be liable for any loss, actions, claims, proceedings, demand or costs or damages whatsoever or howsoever caused arising directly or indirectly in connection with or arising out of the use of this material.
    [Show full text]
  • Malcolm Muggeridge the Infernal Grove
    e FONTANA MALCOLM MUGGERIDGE THE INFERNAL GROVE 'The wit sparkles on almost every page' BERNARD LEVIN Chronicles of Wasted Time Part 2 The Infernal Grove Malcolm Muggeridge was born in 1903 and educated at Selhurst Grammar School and Selwyn College, Cambridge. After lecturing at the Egyptian University in Cairo, he joined the editorial staff of the Man­ chester Guardian in 1930, and was Moscow Corre­ spondent for this paper from 1932-3. In the war of 1939-45 he served as an Intelligence officer in North Africa, Moz.ambique, Italy and France, being seconded to MI6, the wartime version of the Secret Service. He ended up in Paris as Liaison Officer with the French Securite Militaire, and was awarded the Legion of Hon0ur (Chevalier), the Croix de Guerre with Palm and the Medaille de la Reconnaissance Fran9aise. His career as a journalist included a spell' as Washington Correspondent of the Daily Telegraph from 1946-7, and Deputy Editorship from 1950-52. He was Editor of Punch from 1953-7 and Rector of Edinburgh University from 1967-8. He has written numerous books since the early '30s, including Some­ thing Beautiful for God, Jesus Rediscovered, Tread Softly for you Tread on my Jokes, and The Thirties. He lives in Robertsbridge, Sussex. Volume I of Chronicles of Wasted Time, The Green Stick, is abo available from Fontana, MALCOLM MUGGERIDGE Chronicles of Wasted Time Part 2 The Infernal Grove Till I tum from Female Love, And root up the Infernal Grove, I shall never worthy be To step into Eternity Blake FONTA NA/Collins First published by William Collins Sons & Co.
    [Show full text]
  • Streams of Civilization: Volume 2
    Copyright © 2017 Christian Liberty Press i Streams Two 3e TEXT.indb 1 8/7/17 1:24 PM ii Streams of Civilization Volume Two Streams of Civilization, Volume Two Original Authors: Robert G. Clouse and Richard V. Pierard Original copyright © 1980 Mott Media Copyright to the first edition transferred to Christian Liberty Press in 1995 Streams of Civilization, Volume Two, Third Edition Copyright © 2017, 1995 Christian Liberty Press All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, without written permission from the publisher. Brief quota- tions embodied in critical articles or reviews are permitted. Christian Liberty Press 502 West Euclid Avenue Arlington Heights, Illinois 60004-5402 www.christianlibertypress.com Copyright © 2017 Christian Liberty Press Revised and Updated: Garry J. Moes Editors: Eric D. Bristley, Lars R. Johnson, and Michael J. McHugh Reviewers: Dr. Marcus McArthur and Paul Kostelny Layout: Edward J. Shewan Editing: Edward J. Shewan and Eric L. Pfeiffelman Copyediting: Diane C. Olson Cover and Text Design: Bob Fine Graphics: Bob Fine, Edward J. Shewan, and Lars Johnson ISBN 978-1-629820-53-8 (print) 978-1-629820-56-9 (e-Book PDF) Printed in the United States of America Streams Two 3e TEXT.indb 2 8/7/17 1:24 PM iii Contents Foreword ................................................................................1 Introduction ...........................................................................9 Chapter 1 European Exploration and Its Motives
    [Show full text]
  • Council Decision (Cfsp)
    L 246/12 EN Offi cial Jour nal of the European Union 30.7.2020 COUNCIL DECISION (CFSP) 2020/1127 of 30 July 2020 amending Decision (CFSP) 2019/797 concerning restrictive measures against cyber-attacks threatening the Union or its Member States THE COUNCIL OF THE EUROPEAN UNION, Having regard to the Treaty on European Union, and in particular Article 29 thereof, Having regard to the proposal from the High Representative of the Union for Foreign Affairs and Security Policy, Whereas: (1) On 17 May 2019 the Council adopted Decision (CFSP) 2019/797 (1). (2) Targeted restrictive measures against cyber-attacks with a significant effect which constitute an external threat to the Union or its Member States are among the measures included in the Union’s framework for a joint diplomatic response to malicious cyber-activities (the cyber diplomacy toolbox) and are a vital instrument to deter and respond to such activities. Restrictive measures can also be applied in response to cyber-attacks with a significant effect against third States or international organisations, where deemed necessary to achieve common foreign and security policy objectives set out in the relevant provisions of Article 21 of the Treaty on European Union. (3) On 16 April 2018 the Council adopted conclusions in which it firmly condemned the malicious use of information and communications technologies, including in the cyber-attacks publicly known as ‘WannaCry’ and ‘NotPetya’, which caused significant damage and economic loss in the Union and beyond. On 4 October 2018 the Presidents of the European Council and of the European Commission and the High Representative of the Union for Foreign Affairs and Security Policy (the ‘High Representative’) expressed serious concerns in a joint statement about an attempted cyber-attack to undermine the integrity of the Organisation for the Prohibition of Chemical Weapons (OPCW) in the Netherlands, an aggressive act which demonstrated contempt for the solemn purpose of the OPCW.
    [Show full text]
  • The Forgotten Fronts the First World War Battlefield Guide: World War Battlefield First the the Forgotten Fronts Forgotten The
    Ed 1 Nov 2016 1 Nov Ed The First World War Battlefield Guide: Volume 2 The Forgotten Fronts The First Battlefield War World Guide: The Forgotten Fronts Creative Media Design ADR005472 Edition 1 November 2016 THE FORGOTTEN FRONTS | i The First World War Battlefield Guide: Volume 2 The British Army Campaign Guide to the Forgotten Fronts of the First World War 1st Edition November 2016 Acknowledgement The publisher wishes to acknowledge the assistance of the following organisations in providing text, images, multimedia links and sketch maps for this volume: Defence Geographic Centre, Imperial War Museum, Army Historical Branch, Air Historical Branch, Army Records Society,National Portrait Gallery, Tank Museum, National Army Museum, Royal Green Jackets Museum,Shepard Trust, Royal Australian Navy, Australian Defence, Royal Artillery Historical Trust, National Archive, Canadian War Museum, National Archives of Canada, The Times, RAF Museum, Wikimedia Commons, USAF, US Library of Congress. The Cover Images Front Cover: (1) Wounded soldier of the 10th Battalion, Black Watch being carried out of a communication trench on the ‘Birdcage’ Line near Salonika, February 1916 © IWM; (2) The advance through Palestine and the Battle of Megiddo: A sergeant directs orders whilst standing on one of the wooden saddles of the Camel Transport Corps © IWM (3) Soldiers of the Royal Army Service Corps outside a Field Ambulance Station. © IWM Inside Front Cover: Helles Memorial, Gallipoli © Barbara Taylor Back Cover: ‘Blood Swept Lands and Seas of Red’ at the Tower of London © Julia Gavin ii | THE FORGOTTEN FRONTS THE FORGOTTEN FRONTS | iii ISBN: 978-1-874346-46-3 First published in November 2016 by Creative Media Designs, Army Headquarters, Andover.
    [Show full text]
  • Mass Surveillance
    Mass Surveillance Mass Surveillance What are the risks for the citizens and the opportunities for the European Information Society? What are the possible mitigation strategies? Part 1 - Risks and opportunities raised by the current generation of network services and applications Study IP/G/STOA/FWC-2013-1/LOT 9/C5/SC1 January 2015 PE 527.409 STOA - Science and Technology Options Assessment The STOA project “Mass Surveillance Part 1 – Risks, Opportunities and Mitigation Strategies” was carried out by TECNALIA Research and Investigation in Spain. AUTHORS Arkaitz Gamino Garcia Concepción Cortes Velasco Eider Iturbe Zamalloa Erkuden Rios Velasco Iñaki Eguía Elejabarrieta Javier Herrera Lotero Jason Mansell (Linguistic Review) José Javier Larrañeta Ibañez Stefan Schuster (Editor) The authors acknowledge and would like to thank the following experts for their contributions to this report: Prof. Nigel Smart, University of Bristol; Matteo E. Bonfanti PhD, Research Fellow in International Law and Security, Scuola Superiore Sant’Anna Pisa; Prof. Fred Piper, University of London; Caspar Bowden, independent privacy researcher; Maria Pilar Torres Bruna, Head of Cybersecurity, Everis Aerospace, Defense and Security; Prof. Kenny Paterson, University of London; Agustín Martin and Luis Hernández Encinas, Tenured Scientists, Department of Information Processing and Cryptography (Cryptology and Information Security Group), CSIC; Alessandro Zanasi, Zanasi & Partners; Fernando Acero, Expert on Open Source Software; Luigi Coppolino,Università degli Studi di Napoli; Marcello Antonucci, EZNESS srl; Rachel Oldroyd, Managing Editor of The Bureau of Investigative Journalism; Peter Kruse, Founder of CSIS Security Group A/S; Ryan Gallagher, investigative Reporter of The Intercept; Capitán Alberto Redondo, Guardia Civil; Prof. Bart Preneel, KU Leuven; Raoul Chiesa, Security Brokers SCpA, CyberDefcon Ltd.; Prof.
    [Show full text]
  • Introduction Chapter 1
    Notes Introduction 1. Thomas S. Kuhn, The Structure of Scientific Revolutions, 2nd ed. (Chicago: Univer- sity of Chicago Press, 1970). 2. Ralph Pettman, Human Behavior and World Politics: An Introduction to International Relations (New York: St. Martin’s Press, 1975); Giandomenico Majone, Evidence, Argument, and Persuasion in the Policy Process (New Haven, CT: Yale University Press, 1989), 275– 76. 3. Bernard Lewis, “The Return of Islam,” Commentary, January 1976; Ofira Seliktar, The Politics of Intelligence and American Wars with Iraq (New York: Palgrave Mac- millan, 2008), 4. 4. Martin Kramer, Ivory Towers on Sand: The Failure of Middle Eastern Studies in Amer- ica (Washington, DC: Washington Institute for Near East Policy, 2000). 5. Bernard Lewis, “The Roots of Muslim Rage,” Atlantic Monthly, September, 1990; Samuel P. Huntington, “The Clash of Civilizations,” Foreign Affairs 72 (1993): 24– 49; Huntington, The Clash of Civilizations and the Remaking of the World Order (New York: Simon & Schuster, 1996). Chapter 1 1. Quoted in Joshua Muravchik, The Uncertain Crusade: Jimmy Carter and the Dilemma of Human Rights (Lanham, MD: Hamilton Press, 1986), 11– 12, 114– 15, 133, 138– 39; Hedley Donovan, Roosevelt to Reagan: A Reporter’s Encounter with Nine Presidents (New York: Harper & Row, 1985), 165. 2. Charles D. Ameringer, U.S. Foreign Intelligence: The Secret Side of American History (Lexington, MA: Lexington Books, 1990), 357; Peter Meyer, James Earl Carter: The Man and the Myth (New York: Simon & Schuster, 1978), 18; Michael A. Turner, “Issues in Evaluating U.S. Intelligence,” International Journal of Intelligence and Counterintelligence 5 (1991): 275– 86. 3. Abram Shulsky, Silent Warfare: Understanding the World’s Intelligence (Washington, DC: Brassey’s [US], 1993), 169; Robert M.
    [Show full text]
  • Remnants of Al-Qaeda in Saudi Arabia: Current Assessment
    Remnants of al-Qaeda in Saudi Arabia: Current Assessment Washington, DC - November 9th, 2006 Center for Strategic and International Studies Nawaf Obaid Managing Director Counter-Terrorism in the Kingdom • Since May 2003, Saudi security forces have captured ~845 individuals with direct or indirect links to al-Qaeda. • Over 400 have attended “ideological re-education programs.” • 264 al-Qaeda commanders, logisticians, theologians, financiers and fighters have been captured or killed. • Of 26 members that comprised first “most wanted” list, all but one have been killed or captured and all five initial al-Qaeda cells have been identified, infiltrated and decimated. • Of 36 second-tier operatives comprising second “most wanted” list: • 20 had already fled the Kingdom when list was published • Of remaining 16, only 4 have not been killed or captured • This group carried out recent failed attack on Abqaiq • Over 25 major terrorist attacks have been foiled since May 2003. Saudi National Security Assessment Project 2 Counter-Terrorism in the Kingdom (cont.) • Four of the main routes used by terrorists to smuggle themselves, fighters, weapons and drugs have been identified. • Close surveillance had resulted in hundreds of interceptions on the Saudi-Yemeni border. • The largest of the al-Qaeda safe houses used for logistical support has been destroyed. As have three in Riyadh, two in Qassim, two in the Eastern Province, one in Najran and three in the Western Province (Makkah, Madinah and Jeddah). • Several arrests of fighters returning from Afghanistan and Pakistan have been made over the past several months. Important Note: They had no attack plan and no clear command structure, focused exclusively on avoiding Saudi security services.
    [Show full text]
  • The War Room Managed North Sea Trap 1907-1916
    Michael H. Clemmesen 31‐12‐2012 The War Room Managed North Sea Trap 1907‐1916. The Substance, Roots and Fate of the Secret Fisher‐Wilson “War Plan”. Initial remarks In 1905, when the Royal Navy fully accepted the German High Seas Fleet as its chief opponent, it was already mastering and implementing reporting and control by wireless telegraphy. The Admiralty under its new First Sea Lord, Admiral John (‘Jacky’) Fisher, was determined to employ the new technology in support and control of operations, including those in the North Sea; now destined to become the main theatre of operations. It inspired him soon to believe that he could centralize operational control with himself in the Admiralty. The wireless telegraph communications and control system had been developed since 1899 by Captain, soon Rear‐Admiral Henry Jackson. Using the new means of communications and intelligence he would be able to orchestrate the destruction of the German High Seas Fleet. He already had the necessary basic intelligence from the planned cruiser supported destroyer patrols off the German bases, an operation based on the concept of the observational blockade developed by Captain George Alexander Ballard in the 1890s. Fisher also had the required The two officers who supplied the important basis for the plan. superiority in battleships to divide the force without the risk of one part being To the left: George Alexander Ballard, the Royal Navy’s main conceptual thinker in the two decades defeated by a larger fleet. before the First World War. He had developed the concept of the observational blockade since the 1890s.
    [Show full text]
  • Hacks, Leaks and Disruptions | Russian Cyber Strategies
    CHAILLOT PAPER Nº 148 — October 2018 Hacks, leaks and disruptions Russian cyber strategies EDITED BY Nicu Popescu and Stanislav Secrieru WITH CONTRIBUTIONS FROM Siim Alatalu, Irina Borogan, Elena Chernenko, Sven Herpig, Oscar Jonsson, Xymena Kurowska, Jarno Limnell, Patryk Pawlak, Piret Pernik, Thomas Reinhold, Anatoly Reshetnikov, Andrei Soldatov and Jean-Baptiste Jeangène Vilmer Chaillot Papers HACKS, LEAKS AND DISRUPTIONS RUSSIAN CYBER STRATEGIES Edited by Nicu Popescu and Stanislav Secrieru CHAILLOT PAPERS October 2018 148 Disclaimer The views expressed in this Chaillot Paper are solely those of the authors and do not necessarily reflect the views of the Institute or of the European Union. European Union Institute for Security Studies Paris Director: Gustav Lindstrom © EU Institute for Security Studies, 2018. Reproduction is authorised, provided prior permission is sought from the Institute and the source is acknowledged, save where otherwise stated. Contents Executive summary 5 Introduction: Russia’s cyber prowess – where, how and what for? 9 Nicu Popescu and Stanislav Secrieru Russia’s cyber posture Russia’s approach to cyber: the best defence is a good offence 15 1 Andrei Soldatov and Irina Borogan Russia’s trolling complex at home and abroad 25 2 Xymena Kurowska and Anatoly Reshetnikov Spotting the bear: credible attribution and Russian 3 operations in cyberspace 33 Sven Herpig and Thomas Reinhold Russia’s cyber diplomacy 43 4 Elena Chernenko Case studies of Russian cyberattacks The early days of cyberattacks: 5 the cases of Estonia,
    [Show full text]