AMERICAN INTELLIGENCE
JOURNAL THE MAGAZINE FOR INTELLIGENCE PROFESSIONALS
Denial and Deception
__NMIA______Vol. 32, No. 2, 2015
American THE MAGAZINE FOR INTELLIGENCE PROFESSIONALS Intelligence
Journal Vol. 32, No. 2 2015 ISSN 0883-072X NMIA Board of Directors LTG (USA, Ret) James A. Williams, Chairman Col (USAF, Ret) Joseph Keefe, President
Mr. Louis Andre, Director Mr. Terrance Ford, Director Col (USAF, Ret) William Arnold, Secretary Ms. Jane Flowers, Director Brig Gen (USAF, Ret) Scott Bethel, Director Col (USAFR, Ret) Michael Grebb, Treasurer Mr. Don Bolser, Director COL (USA, Ret) David Hale, Director CDR (USNR, Ret) Calland Carnes, Chapters Director Ms. Tracy Iseler, Director Col (USAF, Ret) John Clark, Director Ms. Stephanie Leung, Director Lt Gen (USAF, Ret) David Deptula, Director Brad Moss, Esq., Director LtCol James Eden, Director Capt (USNR) Rick Myllenbeck, Director COL (USA, Ret) Jim Edwards, Awards Director Ms. Marcy Steinke, Director Mr. Roland Fabia, Director COL (USA, Ret) Napolean Stewart, Director COL (USA, Ret) Michael Ferguson, Director CDR (USNR) Louis Tucker, Director COL (USA, Ret) Gerald York, Director
Editor - COL (USA, Ret) William C. Spracher, Ed.D. Production Manager - Ms. Debra Hamby-Davis
LTG (USA, Ret) Harry E. Soyster, Director Emeritus COL (USA, Ret) William Halpin, Director Emeritus LTG (USA, Ret) Patrick M. Hughes, Director Emeritus Dr. Forrest R. Frank, Director Emeritus RADM (USN, Ret) Rose LeVitre, Director Emeritus Mr. Antonio Delgado, Jr., Director Emeritus MG (USA, Ret) Barbara Fast, Director Emeritus
The American Intelligence Journal (AIJ) is published by the National Military Intelligence Association (NMIA), a non-profit, non-political, professional association supporting American intelligence professionals and the U.S. Intelligence Community, primarily through educational means. The Board of Directors is headed by Lieutenant General James A. Williams (USA, Ret), and the president of NMIA is Colonel William Arnold (USAF, Ret). NMIA membership includes active duty, retired, former military, and civil service intelligence personnel and U.S. citizens in industry, academia, or other civil pursuits who are interested in being informed on aspects of intelligence. For a membership application, see the back page of this Journal.
Authors interested in submitting an article to the Journal are encouraged to send an inquiry – with a short abstract of the text – to the Editor by e-mail at
The American Intelligence Journal is published semi-annually. Each issue runs 100-250 pages and is distributed to key govern- ment officials, members of Congress and their staffs, and university professors and libraries, as well as to NMIA members, Journal subscribers, and contributors. Contributors include Intelligence Community leaders and professionals as well as academicians and others with interesting and informative perspectives.
Copyright NMIA. Reprint and copying by permission only.
American Intelligence Journal Page i Vol 32, No 1 N Accenture M Allied Associates International, Inc. I American Military University A ANSER, Analytic Services, Inc. CACI CGI C Daniel Morgan Academy O Digital Globe R DynCorp International P General Dynamics Advanced Information Systems O General Dynamics Information Technology R Johns Hopkins University Advanced Academic Programs A Kiernan Group Holdings T Leidos E MDA Information Systems, LLC Northrop Grumman Information Systems M PARSONS E Pluribus International Corporation M Riverside Research Institute SOS International, Ltd. B SYTERA, LLC E NMIA gratefully acknowledges the generous support of Daniel R Morgan Academy in Washington, DC. DMA has sponsored the publication of this Journal, including distribution assistance for S its delivery into the IC.
Vol 32, No 1 Page ii American Intelligence Journal AMERICAN INTELLIGENCE JOURNAL Table of Contents
Editor's Desk ...... 1
A Short Primer on Deception and What to Do about It by David T. Moore...... 3
Leaks and Their Consequences: A Guide to the Controversy over Secrecy vs. Open Government by Dr. Warren E. Snyder ...... 13
Countering Denial and Deception in the Early 21st Century: An Adaptation Strategy When All Else Fails by Dr. James B. Bruce ...... 17
The Ponzi Scheme as a Deception Operation: The Bernie Madoff Case Study by Michael R. Heydenburg ...... 27
Deceived to Intervene: Non-State Actors’ Use of Deception to Elicit Western Intervention in Libya in 2011 by MAJ (USA) William S. Riley ...... 35
Interwar Germany vs. Nuclear Iran: Applying Lessons Learned by Lisa M. Lopez ...... 47
So Many Ways to Lie: The Complexity of Denial and Deception by David T. Moore and William N. Reynolds ...... 61
Hiding in Plain Sight by R. Kent Tiernan ...... 71
Toward a Counterdeception Tradecraft by Michael Bennett and Edward Waltz ...... 77
The Assassination Attempt on Pope John Paul II: Foreign Denial and Deception by LTC (USAR) Raymond J. Faunt ...... 87
Fact and Fiction: Assessing Denial and Deception in South Africa’s Nuclear Weapons Program by Brian Gordon ...... 94
Intelligence Support to Humanitarian Assistance/Disaster Relief Operations: A Case Study in Ebola Response by LTC (USA) David Conkle ...... 102
Fallacies in the Face of Freedom: Cognitive Errors from the Benghazi Attack by Capt (USAF) George H. Van Dyke III...... 107
Theory and Practice: Developing CCIRs through Alternative Analysis by Maj (USAF) Will Atkins ...... 115
From Core Concern to Valued Partner: The Role of Counterintelligence in Effective Foreign Liaison by LCDR Todd C. Moe ...... 117
Pakistan, Militants, and the Bomb by Erik D. Jens ...... 131
Binary Terror: The Reality of Terrorism in a Virtual World by Troy E. Smith ...... 137
American Intelligence Journal Page iii Vol 32, No 1 AMERICAN INTELLIGENCE JOURNAL Table of Contents (Continued)
The Strategic Implications of Chinese Conduct by Col (USAF, Ret) Eric S. Gartner ...... 145
Turkey and Belarus as Antidotes to Russian Aggression by Amb (Ret) David H. Swartz and Dr. James A. Sheppard...... 151
Cyber Vigilance: The Human Factor by Dr. Ben D. Sawyer, Dr. Victor S. Finomore, Dr. Gregory J. Funke, Dr. Gerald Matthews, Dr. Vincent Mancuso, Dr. Matthew Funke, Dr. Joel S. Warm, and Dr. Peter A. Hancock...... 157
In My View...
Communications Intelligence, C4I, and U.S. National Leadership by Timothy C. Lawson ...... 166
Profiles in Intelligence series...
Gabriele Gast: A Long Journey by Dr. Kenneth J. Campbell ...... 168
NMIA Bookshelf
Peter Hancock’s Hoax Springs Eternal: The Psychology of Cognitive Deception reviewed by James Plotts ...... 173
James Webb’s I Heard My Country Calling: A Memoir reviewed by Lt Col (USAF) Carly R. Speranza ...... 174
Michelle Louise Atkin’s Balancing Liberty and Security: An Ethical Study of U.S. Foreign Surveillance, 2001-2009 reviewed by Dr. William E. Kelly ...... 175
William J. Rust’s Before the Quagmire: American Intervention in Laos, 1954-1961 reviewed by LTC (USAR, Ret) Christopher E. Bailey...... 176
Daniel P. Bolger’s Why We Lost: A General’s Inside Account of the Iraq and Afghanistan Wars reviewed by LTC(P) (USA) Todd J. Hanlon ...... 177
Review essay regarding two books on national security and intelligence, one of which was reviewed individually in previous issue: Richard H. Immerman’s The Hidden Hand: A Brief History of the CIA and Michael Warner’s The Rise and Fall of Intelligence: An International Security History by Dr. Robert J. Kodosky ...... 179
The opinions expressed in these articles are those of the authors alone. They do not reflect the official position of the U.S. government, nor that of the National Military Intelligence Association, nor that of the organizations where the authors are employed.
Vol 32, No 1 Page iv American Intelligence Journal THE EDITOR'S DESK
The Editor's Desk
elcome to this longer than planned edition of November 2014, a symposium titled “Foreign Denial and American Intelligence Journal, which delves into Deception in the 21st Century: An Evolution of Technology Wthe always complex, sometimes convoluted, and Surprise” was held at DIA sponsored by the National occasionally mystical world of “Denial and Deception.” This Intelligence Manager-National Intelligence Officer for Space one has been in the works for some time, delayed in part and Technical Intelligence (NIM-NIO/S&T) in concert with while waiting for release authority for a couple of items and the FDDC. Not solely for D&D practitioners, this one-day in part by looking for the best possible sampling of articles symposium was a forum for all analysts, collectors, and covering the multifaceted terrain of this subject, which managers involved in providing timely and accurate resulted in reprinting/updating a few pieces from a special intelligence and interested in how D&D analysis can edition of the now-defunct Defense Intelligence Journal contribute. It also highlighted post-9/11 D&D (later renamed National Intelligence Journal) a decade ago. advancements and associated challenges along with the We thought it was high time to take a fresh look at D&D; criticality of D&D as part of an integrative analytic approach little did we know when we started this journey that some (“New Paradigms in Intelligence Analysis” was the theme of decisions would be taken in the interim by senior the last volume of AIJ published earlier this year). More government officials which would alter the educational recently, in January 2016, a workshop titled “Strategic underpinnings of D&D, and not necessarily for the better in Messaging and National Policy in a Hyper-Connected this editor’s humble opinion. There will be more on that World” was sponsored by the FDDC under the NIC. The later, especially in the article by Dr. Jim Bruce of the RAND event offered insights into the challenges of running Corporation and formerly of the Foreign Denial and successful strategic messaging campaigns in the 21st century Deception Committee (FDDC) under the Director of National and laid a foundation for how U.S. competitors—state and Intelligence and the National Intelligence Council (NIC). non-state—are approaching this challenge.
Regular citizens are affected by deception and often don’t even realize it. Commercial advertising and messaging take advantage of such mind games. An avid football fan, I was struck by a column recently penned by sports journalist Sally Jenkins in The Washington Post about legendary Denver Broncos quarterback Peyton Manning; the title was “Manning’s mind, not his arm, is what will matter.” Sally astutely observes, “He’s got everybody as confused as a defensive line trying to read his gestures at the line of scrimmage. Don’t be distracted by it. Manning’s real status is this: He’s capable. After four surgeries on his zipper- scarred neck atop those slack shoulders, he may not drive the ball the way he used to, no. But he’s got timing, and recognition, and disguise… Manning is the lord of Interested in publishing an article deception, whatever else he was or is. He will endure as the most guileful and cerebral man ever to play the position.” In in the other words, Manning defeated his opponents not with his American Intelligence Journal? physical attributes but with his mental and psychological ones. D&D does much the same for military operations; it’s a combat multiplier. It’s brain over brawn that wins most Submit a manuscript for battles, and sometimes entire wars. consideration Some of you AIJ readers may have taken D&D courses during your careers in the military or in the Intelligence to the Editor
American Intelligence Journal Page 1 Vol 32, No 2 THE EDITOR'S DESK
Because D&D is not exactly my area of expertise, I enlisted Vol. 33, No. 2, 2016 – “Intelligence in Peace and War” the assistance of the erudite David Moore to serve as my (submissions due by end of October 2016) co-editor for this special edition of AIJ. David is a longtime contributor to the Journal, a training specialist at NSA with Vol. 34, No. 1, 2017 – “The Cyber Threat: The Future of a handful of rotational assignments to other IC agencies Intelligence in a Wired World” under his belt, and the author of a couple of the D&D pieces (submissions due by end of April 2017) in these pages. I am delighted to have David as a major contributor to this issue. He worked very hard in reviewing Please contact me at [email protected] or call me at (202) all the articles to ensure they were up to his high standards 231-8462 and share your ideas for a possible article, book of fastidious research and academic rigor. I also want to review, or how to improve this publication. It belongs to all salute William Parquette of ODNI. Bill was the longtime of you, the members of NMIA, and I’m delighted that many head of the NIU D&D team and it was his idea to produce non-members submit articles too. I also have a stack of new this special edition of AIJ in the first place. books awaiting worthy reviewers. Send me a query along with your area of interest and I’ll tell you what’s available. If Other than the feature articles, and one book review, that you produce an acceptable review of one of the books, you deal specifically with D&D, as usual this issue offers several may keep it as a token of our gratitude. Reviews of books other outstanding articles and reviews that do not follow you bring to the table are welcomed too. Just let me know in that theme (in an effort to “deceive” you, the reader!). Due advance which work you would like to assess; if it has been to an already hefty volume, not to mention this column recently published and is related to intelligence or national itself, I will not detail them here but instead let the reader security it will likely make the cut. For those who prefer to leaf through the pages at his or her leisure. I will, however, critique 2-3 related books at the same time, we have the announce the themes of our next three iterations of AIJ and “review essay” option, which allows you to pen a longer solicit contributions: piece. We are totally flexible in adopting your ideas and suggestions; please just inform me far enough in advance Vol. 33, No. 1, 2016 – “Intelligence Ethics and Leadership” that we can make it fit our format and layout. Hope you’re (already closed out and undergoing final copy- having a healthy and productive 2016! editing unless someone has a theme- related piece that can be submitted “camera-ready” immediately) Bill Spracher, Editor
IN MEMORIAM
NMIA is saddened by the loss of a longtime distinguished member of its Board of Directors. Lt Gen (USAF) Lincoln D. Faurer passed away on November 7, 2014, at the age of 86. “Linc” will be remembered by many as the Director of NSA from 1981 until his retirement in 1985. He also held leadership positions in DIA, to include Deputy Director for Intelligence and Vice Director for Production. His joint intelligence credentials featured tours as Director J2 for both SOUTHCOM and EUCOM. He was commissioned in the Air Force in 1950 with a bachelor’s degree from West Point, earned master’s degrees from Rensselaer Polytechnic Institute and George Washington University, and was a graduate of the National War College. In addition to his service to NMIA, Lt Gen Faurer was a former Chairman of both the Association of Former Intelligence Officers (AFIO) and the National Cryptologic Museum Foundation. He will be sorely missed.
Vol 32, No 2 Page 2 American Intelligence Journal A Short Primer on Deception and What to Do About It
by David T. Moore
Little Red Riding Hood and the Wolf by English artist and book illustrator Walter Crane (1845-1915). The story of the same name is a classic tale of deception dating back to (at least) the 10th century. In most tellings a young woman – sometimes also known as Red Cap – is deceived by a wolf disguised as her grandmother. The tale generally ends badly for the young woman. Sources: Wikimedia, URL:
hy are people deceived? What is it about the lie Deception remains a popular trope in stories and movies that makes it more attractive than the truth? Why where we are often enticed to solve the wrong mystery. We Wdo we often willingly allow ourselves to be are deceived by others and we are also self-deceived – as fooled? many fairy tales remind – often with deleterious consequences. In this article we consider first what Acts of fooling people cut across cultures and levels of deception is, how it works, and how it may be countered.1 human activities ranging from children spellbound by stage We then briefly review a case of deception and, using it as a magicians, couples cheating on each other, flim-flam men guide, consider countering deception in more detail. (and women) parting people from their livelihoods, to nations misleading other nations in peace and war.
American Intelligence Journal Page 3 Vol 32, No 2 CONSIDERING DECEPTION of deception is that the odds of success favor the deceiver.6 What Is Deception? While it is true that “all deception plans are subject to failure,” it seems that – according to Whaley – “such failures are rare in practice.”7
How Are Deceptions Conducted?
If we would counter our adversaries’ deceptions we must first understand how deceptions are created and conducted. Deceivers use four general means to influence victims’ actions and beliefs. They are:
1. Fabrication – The creation of totally false or fictitious evidence or information. 2. Manipulation – The mixing of factual and fictitious, or exaggerated, evidence. 3. Conditioning – The repeated presentation or transmission of signals, information, or activities to a foreign or target intelligence service with the objective of desensitizing its analytical elements to the point where they no longer view them with concern or alarm. Whaley’s Self-Explanatory Taxonomy of Perception. 4. Diversion – The act of drawing an adversary’s Deception is a form of other-induced misperception. Source: attention away from an area, event, or activity of Barton Whaley, Bibliography of Deception, 2nd edition importance to the perpetrator toward one(s) of lesser (Washington, DC: Foreign Denial and Deception Committee, Office of the Director of National Intelligence, National importance. Intelligence Council, 2012), 2. Successful deceptions often rely on multiple means. The n expert on deception and stage magic, Barton richer the deception story the more information the victim Whaley, may have said it best: “Deception is any must peruse and the more likely he/she will do so consistent Aattempt – by words or actions – intended to distort with the desires of the deceiver. For example, the repetitive another person’s or group’s perception of reality. The ideal fabrication of false information and the manipulation of true deception makes the victim ‘certain but wrong’.”2 There are information along with diversionary tactics (repeatedly) many forms of deception which at its root is a form of prevented the Germans from successfully taking advantage misperception as Whaley’s taxonomy reveals. Successful of plans “lost” by the Allies during World War II. deception is, according to Evan Ackerman, “dependent on understanding how someone else (or something else) is Successful deceptions also rely on feedback channels thinking. In other words, if you’re going to fool someone, because it is necessary for the deceiver to see how the you have to be able to imagine how they’re going to victim is reacting to the deceptive information. Additionally, interpret and react to your actions.”3 One type, military feedback reveals when the deception is complete. As with deception, aims to affect the thinking of the enemy any lie, deception cannot be maintained forever and commander.4 therefore termination is necessary. Otherwise, the victim will discover that she or he is being deceived and thus all the Why Is Deception Used? deceiver’s current efforts (and other deceptive efforts) are for naught. Deception is used because it succeeds. Turning to the historical record we see this clearly: The effects of CONSIDERING DECEPTION DETECTION successful deception are devastating to the victims even as they are of benefit to the perpetrators. From the successful What Is Deception Detection? deception of the Trojan horse to the continuing successful deceptions of criminals to obscure their activities, there exist he first step in changing the odds of a successful over five thousand years of recorded successful instances deception occurring is to determine whether or not it of adversarial deception leading to losses of virtue, fortunes, Tis occurring in the first place. Essentially, deception lives, and wars.5 One lesson that emerges from this history detection facilitates this through the identification of incongruities in the evidence for an activity, or in the signals to leaders to influence their actions. While the evidence that
Vol 32, No 2 Page 4 American Intelligence Journal a deception is occurring can be quite strong when viewed in o Does the adversary have a reason for deceiving foresight, it also may be quite subtle.8 Once a deception is (Motive)? In this case, does the wolf have a reason suspected, Structured Analytic Techniques (SATs) may be for deceiving Red Riding Hood? In the story, the employed. wolf is hungry – a reasonable motive. o Does the adversary have a chance to deceive WHY IS DECEPTION DETECTION USED? (Opportunity)? Yes, the wolf first ate, and now can pose as, Red’s grandmother. etecting and countering deception are of critical o Can the adversary successfully pull off a importance because deception is such an effective deception (Means)? Given the disparities in size, Dtactic. Detection is the primary weapon in preventing strength, etc. between the child and the wolf it is the success of adversarial deception and subsequent losses likely the wolf will succeed. arising from those successes. o That Red allows herself to believe that the creature in the bed is her grandmother (Self-Deception) also As has been noted, there are many more cases of successful contributes to the deception’s success. deceptions occurring than successful deception detection. From magic tricks, Ponzi schemes, and other fraud to the Motive, Opportunity, and Means are sometimes referred to misdirection of troops facing an invasion, the odds seem to by the acronym “MOM.”12 Self-Deception is an integral favor the deceiver. However, observations of students in factor in their successful employment. the National Intelligence University Denial and Deception Advanced Study Program (DDASP) seemed to suggest that • Has the adversary conducted or attempted to people could become skilled at successfully detecting and conduct deceptions in the past? If so, what were their countering deceptions.9 Past Operational Practices (“POP”)? Does what appears to be a deception fit with their past deceptive CONSIDERING HOW DECEPTION IS practices or activities? In the case of Red Riding Hood DETECTED and the wolf this is unknown.13
How Does Seeking Incongruities Facilitate Deception However, if the answers to any of these questions are “yes,” Detection? then further analysis is needed as a deception is probable.
“ ut Granny! Why have you such a terribly large Caveat: mouth?”10 As the quote suggests, one means of One shortfall of deception detection is that Bdetecting a deception – here a wolf is posing as Red it may be possible to interpret any evidence Riding Hood’s grandmother – is to recognize incongruities in the evidence about an activity, situation, or action that as being deceptive and therefore find may suggest a deception is occurring. In this case, such a deception where such does not actually “terribly large mouth” (and teeth) are incongruous with exist. Caution, therefore, must be one’s grandmother.11 Something is not as it should be. exercised: conclusions that deception is Unfortunately for Red, this realization comes too late: She occurring must be challenged. gets eaten by the wolf. The next steps often take place within a framework that looks The teeth are indicators of something larger. It seems that more deeply at how likely it is that the adversary will for every activity not directly observed there nevertheless conduct the deception and, should it do so, how it will go are indicators that it is occurring, if only we can perceive about doing it. It also considers the vulnerability of the them. In a case where a deception is occurring there are target of the deception.14 Thus, one examines all the indicators of the actual activity and also indicators of the information associated with the activity and searches for deception. In order to succeed, the deceiver attempts to incongruities. If they are found, this is further evidence that make the deceptive indicators appear stronger, more a deception may be occurring. This step may not be easy as appealing, likely, or otherwise explain away the true a clever deceiver will play on the target’s preferences, indicators so the false ones are believed. Therefore, in order desires, or fears. to detect a deception we first must consider the deceiver and ask two sets of questions: One now clusters the evidence for as many outcomes as are identifiable without considering which are true and which are Does the adversary possess the capability to • deceptive. Content analysis of the evidence typically is deceive? needed here. Assessing the quality of evidence also can be
American Intelligence Journal Page 5 Vol 32, No 2 an aid to detecting which evidence is deceptive and which is possible that explanatory clusters may instead be not. Looking at each piece of evidence in order to determine alternative explanations of the phenomena; hence, possible Manipulability of Sources (MOSES), one considers: further considerations could be necessary.17 • Argument Mapping identifies the variables and • Is the source reliable? key assumptions, and how they combine to support • Does the source have access? the analytic conclusions toward which the analysts 18 • How good are the source’s bona fides? are moving. • Is the source vulnerable to control or • Bayesian Analysis has been used by deception manipulation by the deceiver (or being detection experts as a means of calculating the 19 controlled or manipulated)? likelihood of a deception occurring. • A Key Assumptions Check identifies factors Additionally, one may ask: analysts and policymakers are taking for granted about the issue and that therefore are vulnerable to 20 • How accurate are the sources’ reporting? deception. • Is the whole chain of evidence available? • A Quality of Information Check assesses the relevant evidence and may aid in identifying • Does critical evidence check out? incongruities.21 • Does evidence from one source conflict with • Scenarios Analyses model how a deception others? campaign being waged by an adversary could play • Do other sources of information provide itself out. One of the axes used is “deception” and “no corroborating evidence? deception.” The other would be tied to the issue • Is any absence of evidence unusual? itself.22 • Signposts and Indicators are a logical follow-on Answers to these questions establish the levels of trust the to a Scenarios Analysis to identify what would be analyst can reasonably hold with regard to the mass of seen if a particular scenario actually began to occur.23 evidence surrounding the issue being considered. • Team A/Team B develops cases for and against the evidence under consideration being deceptive. Next, we must analyze the clusters and determine the stories Similarly, the use of a Devil’s Advocate approach they tell. One is the ground truth. Generally, all others are challenges the conclusion that a deception is (or is 15 deceptions. Determining which are which requires not) occurring.24 knowledge of the goals, preferences, and beliefs of the • A What-If or High Impact-Low Probability deceiver and the victim with regard to the issue. could be conducted to prioritize the possible How Do Structured Analytic Techniques Support Deception consequences of a deception. “It may never happen, Detection? but if it did it would be disastrous” is the starting point for these techniques. The What-If specifically targets 25 Structured Analytic Techniques (SATs) are critical thinking- the implications were the deception successful. based repeatable procedures that help ensure issues are thoroughly examined. As we shall see, a number of SATs A CASE STUDY: OPERATION MINCEMEAT are very useful in sorting out whether or not a deception is – HOW MIGHT A SUCCESSFUL DECEPTION occurring.16 By forcing rigorous consideration of the HAVE BEEN COUNTERED? evidence and how each piece relates to the others, as well as the analyst’s assumptions about the issue and the evidence, areful after-the-fact examinations of successful SATs provide a deeper analysis that may identify deceptions provide lessons learned that may identify incongruities and point to an associated deception. How Ctechniques applicable in detecting and countering much rigorous scrutiny is employed depends on the issue future deceptions. A quintessential study of deception itself and its significance. involves the World War II case of Operation MINCEMEAT.
SATs useful in detecting deception include: The Context for Operation MINCEMEAT
• Analysis of Competing Hypotheses facilitates In September 1942 a corpse floated ashore in Spain with the diagnosis and clustering of available evidence. information about the planned Allied landings in North One of the clusters will be the “ground truth” while the Africa (Operation TORCH). The papers were retrieved and others likely will point to deceptions. Note it is turned over to the Germans, who discounted their
Vol 32, No 2 Page 6 American Intelligence Journal importance.26 That the documents might have been part of a FUSAG positioned opposite Calais in 1944 as a precursor to deception sometimes known as the “Lost Dispatch” or “Lost invasion (manipulation and conditioning). Haversack” was considered.27 The Germans presumed the body was planted in an attempt to deceive them.28 However, The actual MINCEMEAT deception itself occurred far to the the Germans erred and their suspicions were misplaced. The west in Spain where once again a body floated ashore with a papers were legitimate and revealed the actual landing sites. dispatch case containing seemingly authentic documents. The Allied landings into North Africa subsequently These misdirected the Germans to Greece, the Peloponnese, succeeded in part because the Germans failed to position Sardinia, and Corsica instead of Sicily and Italy, which were their troops to counter them. the true targets of the Allied invasion. Further aiding the Allied efforts in the Mediterranean was the fact that as the By late 1942 the Allies largely controlled North Africa and MINCEMEAT deception progressed Adolf Hitler came to were preparing to invade Europe from the south. The route favor the Greek invasion premise – something known to the obvious to both the Germans and the Allies was to make the Allies through ULTRA decrypts (feedback). short crossing from North Africa to Sicily and then into the heel of Italy. To counter this, the Germans deployed a MINCEMEAT was a success, as was the larger plan, strong military presence in Sicily and Italy. The challenge for BARCLAY. The Germans decided the corpse was who it the Allies was to get the Germans to divert their troops away was purported to be and therefore the accompanying from Sicily and the Italian peninsula (see map). documents by virtue of their association also were deemed authentic. The documents added credence to the other The British determined the best means to accomplish this indicators of Allied intentions the Germans were seeing. was through deception (codenamed BARCLAY). German troops relocated from Sicily and Italy into the MINCEMEAT was a component of this deception. The Peloponnese, Greece, Corsica, and Sardinia. The Allies did British presumed that if the Germans believed the Allied meet resistance from the Germans as they invaded Sicily but landings would bypass Sicily and Italy they would relocate it was far weaker than the levels of opposition they would their troops away from Sicily and Italy to counter them. To have faced had MINCEMEAT and BARCLAY failed. this end, a Greek “invasion” by (what was really the notional) British Twelfth Army was planned for “the early The Germans’ Faulty Analyses summer of 1943” (a fabrication).29 In the case of MINCEMEAT the British deceivers attempted to make the false signals appear stronger than the signals of the true activity. Whaley notes it was in fact “a very high risk proposition that invited failure and even backfire.”31 Indeed, had the MINCEMEAT deception failed it would have led the Germans to strongly suspect “other interlocking deceptions.”32 The entire Allied invasion of Southern Europe might have failed. Consequently, what led the Germans to arrive at the wrong conclusions about the Allies' efforts? Why did they fail to see through the MINCEMEAT deception?
First, the German intelligence service – also known as the Map of Europe Showing Possible Invasion Routes. The 1943 Abwehr – faced a dilemma: What to make of this latest corpse came ashore at Huelva, Spain. corpse? Compounding the situation was – as noted above – the fact that the plans on the corpse that floated ashore the The Allies also wanted to convince the Germans that previous year were authentic. In that case, the Abwehr had additional troops would go into southern France from incorrectly presumed the orders to be false. But what about Corsica and Sardinia, dividing the German forces further. To the latest plans as referenced in the letters accompanying this end it was revealed that “General Patton would attack the corpse? In this case the Germans presumed the Sardinia and Corsica.” In addition, “heavy air bombardment documents were authentic. A desire to avoid their previous [would]…be put down to neutralise the Sicilian airfields” mistaken conclusions may have contributed to this (fabrication and manipulation).30 This deceptive conclusion.33 The Abwehr also made a contributing manipulation of the truth explained Patton’s presence. In strategic error when it assumed that Alexandria – where the reality he was one of the commanders of the actual invasion Allied troops were massing – was too far away to be a of Sicily. Subsequently the Allies conducted a similar starting point for an invasion of Sicily (see map). Ultimately strategy when Patton was assigned command of the notional both conclusions proved false.
American Intelligence Journal Page 7 Vol 32, No 2 The Abwehr correctly assumed that the British would never As has been noted, the documents in the dispatch case kill a man merely to plant false documents. But what if the pointed to an invasion into Europe through Greece, Corsica, person was already dead prior to being dropped in the water and Sardinia. The corroborating documents included high- to float ashore? This is what the British did and they hoped level correspondence. They added credence as their the Germans would conclude the death was due to signatories were seen as unlikely to engage in deception. drowning. However, the British made a significant error. Therefore, one explanation of what happened might be that The real cause of death (of the corpse passed off as a Major the Germans considered that, as the correspondence was Martin) was actually rat poison-induced suicide.34 This “real,” therefore the body – despite its incongruities – must introduced a significant incongruity as phosphorous also be authentic. By accepting the bona fides of the body poisoning is symptomatically different from drowning.35 and concluding its accompanying documents were Whaley argues this should have been easily provable during authentic, the Germans erred. the autopsy.36 Additionally, the body apparently was “in a stage of advanced decomposition grossly inconsistent with What Could the Germans Have Done Differently? its alleged recent death” – also observable.37 Compounding the acceptance of the condition of the body by the Germans We now counterfactually consider what the Germans might was the fact that the inquest was done by a Spanish have done to discover the deception in the case of pathologist of questionable competence. There was, in fact, Operation MINCEMEAT. Some means of detecting a “top German forensic surgeon” on hand but he was never deception were available at the time. Indeed, some called to actually examine the body.38 questioning of evidentiary discrepancies did occur. Other means – such as the structured analytic techniques cited Other questions arise about the events in Spain. First, what above and referenced below – were not available until was the role of the top German intelligence service agent in decades later.41 Listing their possible use here provides Spain, Major Karl-Erich Kuhlenthal, in the failure to discover potential applications for contemporary analysts faced with the deception? Did Kuhlenthal, who also was Jewish, discovering and detecting deception. We apply them to the contribute to the failure by the Germans to adequately four means of deceiving someone and a means of examine the corpse and make correct sense of the incident? determining if the deception is working: McIntyre considers Kuhlenthal the “ideal target for Operation Mincemeat: deeply gullible and trusted by his 1. Fabrication – The British meticulously fabricated bosses, including Himmler and Canaris… He would believe a false identity for the corpse. In addition to the anything he was fed, and would do whatever he could to identification card, the wallet of the dead man contained suck up to the boss and preserve his own skin.”39 In other a letter and photo from his fiancée as well as two (real) words, he was predisposed to uncritically accept and pass ticket stubs. The tickets “established” the maximum on the anomalous evidence surrounding the body and its amount of time the corpse could have been in the possessions. Or, as McIntyre concludes, “Kuhlenthal was water. Yet there were discrepancies here too. The the ideal spy to pass the information on because he was corpse was badly deteriorated but showed little worse than useless.”40 But was he complicit? evidence of having been in the water a long time. Further, as Whaley points out, “the theater-ticket Essential Considerations stubs were dated a day later than would have been consistent with the corpse’s travel orders.”42 The essential consideration for the Germans was that if the corpse was determined to be a “plant” then the documents The discrepancies between the corpse and its identity accompanying it were also plants. On the other hand, if the card as well as the condition of the body based upon identity of the corpse was who it was purported to be then the amount of time it was believed to have been in the the documents were likely authentic. water should have raised suspicions. The theater stubs should have led to further questions. This The Germans, however, apparently missed or ignored a might have occurred had a German pathologist number of incongruities that could have led them to rethink examined the corpse. their conclusions about the body and, relatedly, where the Allies would invade. Aside from the condition of the corpse, 2. Manipulation – The British created documents at a very basic level it simply did not match its actually signed by senior British officials whose accompanying identification. For example, the photo on the signatures were known to the Germans. The “legitimate identification card accompanying the corpse had hair on its nature” of the documents provided credence to the head while the corpse itself was bald. deception.
Vol 32, No 2 Page 8 American Intelligence Journal There may have been no way for the Germans to have from Sicily and Italy to those countries or areas. The overcome this factor of the deception. The documents Germans’ initial prevailing view was that the invasion were plausible and their signatures authentic – would be through Sicily. Once Hitler came to accept something the Germans could (and likely did) the Peloponnese option his viewpoint prevailed determine.43 The question of whether such high- despite the fact that an invasion through Sicily level British and Allied officials would be wittingly probably was the easiest to justify logistically and complicit in such a deception plan apparently was perhaps militarily.44 never raised. This might have been a case of mirror- imaging by the Germans: Since the Germans would A scenarios exercise or what-if analysis could have never do this, it was unthinkable (they assumed) that modeled the end states: German troops relocate to the Allies would do it. Greece/the Peloponnese and Sardinia/Corsica, or stay in Sicily/Italy versus deception or no deception. 3. Conditioning – The repetition of two corpses Consideration of how one would further know which conveniently floating ashore where the cost of being outcome was occurring (e.g. Signposts and wrong was very high may have desensitized the Indicators) could have followed. Germans to the idea that they both were deceptive. Contributing to this was the fact that (in hindsight) the first corpse was determined to be authentic (no deception). Even so, the evidence that this one was authentic was less than clear.
By linking the two events the Germans erred; had they been considered independently and critically, different conclusions might have been reached. Had the autopsy results between the two corpses been compared, the analysis might have pointed to the incongruities with the second corpse as being more important.
Alternative Scenarios of Relocating German Forces versus Where the Actual Allied Invasion Occurs. Source: Author
Notional ACH of Autopsy Evidence Highlighting Feedback – The Allies benefited from ULTRA and other Incongruities. Source: Author decrypts of enciphered German communications. These indicated how the deception was proceeding as well as what To check whether or not conditioning (as well as the German High Command was thinking.45 Since the fabrication) was at work an Analysis of Competing Germans apparently were unwilling to consider that their Hypotheses, or ACH, conducted on the autopsy, communications had been compromised – in part because evidence might have highlighted the incongruities the Allies went to considerable lengths to reassure their such that they would not have been discounted. The beliefs in their invulnerability – it is unlikely that there was evidence for the authenticity of the corpse’s identity anything the Germans could have done to minimize the simply was not supported by the evidence. One information received through feedback. obvious conclusion therefore should have been that the body was most likely a “plant,” and the validity Feedback via ENIGMA messages (and other sources) was of the accompanying documents was therefore crucial for the success of Operation MINCEMEAT. Yet, the suspect. Germans believed their ENIGMA encryption to be secure despite repeated losses by forces employing it.46 4. Diversion – The goal of the deception was to Admittedly, the Allies employed measures to convince the draw the German High Command’s attention away Germans of its invincibility.47 Nevertheless, had a low from Sicily to Greece and the Peloponnese, Sardinia, probability, high impact, or even a key assumptions check and Corsica leading to the redeployment of troops been performed it might have pointed to the possibility of
American Intelligence Journal Page 9 Vol 32, No 2 vulnerabilities in the encryption system. Here self- multidisciplinary approaches to facilitate all aspects of deception on the part of the Germans contributed to the intelligence sensemaking. He earned a Master of Science success of an adversarial deception. of Strategic Intelligence degree from the National Intelligence University (then-JMIC) in 2002. As has been noted, the deception to divert the Germans from Sicily and Italy succeeded. Against a broad mass of Notes information the Germans failed to separate the true signals 1 As the Little Red Riding Hood example shown in the figure from the false signals and the noise.48 It also was fortunate suggests, there are many dimensions to deception. A discussion of for the British and the Allies that the analytic techniques them is beyond the scope of this article. For more information see used above had not yet been developed for intelligence Michael Bennett and Edward Waltz, Counterdeception Principles and Applications for National Security (Norwood, MA: Artech work. Even so, some critical questioning of the evidence House, 2010), 71-112; Bruno Betelheim, The Uses of could have led to a failure of the deception. And such Enchantment: The Meaning and Importance of Fairy Tales (New critical questioning was – at least theoretically – possible. York: Alfred A. Knopf, 1976), 166-182; and Alan Dundes, Little The German General Staff organization tasked with Red Riding Hood: A Casebook (Madison: The University of establishing the authenticity of the documents was “staffed Wisconsin Press, 1989). Such tales of enchantment inform both by reserve personnel, journalists, businessmen, and bankers deceivers and counter-deceivers about why people are eager and with the ability to think beyond structured military ideas.”49 willing to be deceived. One can only wonder what would have occurred had the 2 Barton Whaley, Textbook of Political-Military Counter- Germans detected the deception and thwarted the Allied Deception: Basic Principles and Methods (Washington, DC: National Defense Intelligence College Press, 2007), vii. invasion into the “soft underbelly of Europe.”50 3 Ackerman’s context is a successful effort to use squirrels to teach robots to be deceptive. See Evan Ackerman, “Georgia Tech There were other apparent “lost haversack ruses” during the Robots Learn Deceptive Behaviors from Squirrels,” IEEE remainder of the Second World War. One occurred shortly Spectrum, online edition, 3 December 2012. URL: < http:// after D-Day and a second occurred during the MARKET spectrum.ieee.org/automaton/robotics/artificial-intelligence/robots- GARDEN operations when a glider crashed near Vught learn-deceptive-behaviors-from-squirrels>, last accessed 31 July (Netherlands).51 Both involved the loss of authentic plans. 2014. However, the Germans discounted the finds, perhaps (in 4 Joint Forces Staff College, Military Deception, Joint Pub 3-13.4, part) a result of already having been burned twice.52 26 January 2012. URL:
Vol 32, No 2 Page 10 American Intelligence Journal 10 A.H. Wratislaw, Sixty Folk-Tales from Exclusively Slavonic 27 The alleged deception was an example of the “haversack ruse.” Sources (London: Elliot Stock, 1889), 99. For 90 years it was believed to be the invention of British officer 11 Especially if the grandmother is a 19th century (or earlier) one. Richard Meinertzhagen, who claimed to have ridden out to the Asking “Granny, where are your teeth?” might be more congruous British/Turkish front lines during World War I with a false set of with the state of one’s grandmother’s mouth. documents in a dispatch case (the haversack). Meinertzhagen said 12 As opposed to “Mom,” who in the story of Red Cap was he escaped after tangling with the enemy. He “left” the documents missing from the tale. behind for the enemy to find. The enemy, believing the documents 13 However, common wisdom informs that wolves are predators to be valid, acted accordingly. General Richard Allenby and a child wandering alone in the woods is prey. The predation subsequently credited the ruse as one of the keys to success of the of the wolf occurs also in the tale of “Peter and the Wolf,” which British forces in the battle of Gaza. However, Brian Garfield deals with deceptions gone awry. revealed in 2007 that the haversack ruse was the actual invention 14 The elements of the framework are Recognition, Evaluation, of Colonel J.D. Belgrave. It was actually perpetrated by Arthur Emulation, Selection, Implementation, Collection, Integration, and Neate on 12 September 1917. For more information see Nicholas Resolution. They provide another structured means of conducting Rankin, A Genius for Deception: How Cunning Helped the British the counter-deception analysis. The framework was developed by Win Two World Wars (Oxford, UK: Oxford University Press, a former FDDC Vice Chair with assistance from Barton Whaley. 2009), 113-114; and Brian Garfield, The Meinertzhagen Mystery See Barton Whaley’s unclassified Textbook of Political-Military (Dulles, VA: Potomac Books, 2007). Both the Germans and the Counter Deception: Basic Principles and Methods (Washington, British knew of the tactic. See also Roger Morgan, “Operation DC: Foreign Denial and Deception Committee, Office of the Mincemeat,” After the Battle, Vol. 54 (May 1988), 4. Director of National Intelligence, National Intelligence Council, 28 Jimmy Burns, Papa Spy: Love, Faith and Betrayal in Wartime 2007), 124-125. Spain (New York: Walker and Company, 2010), 233. Cited 15 It should be noted that multiple interpretations are often hereafter as Jimmy Burns, Papa Spy. possible from the same evidence. Jurisprudence, for example, 29 Letter from General Sir Archibald Nye to General Sir Harold relies on this: both sides argue to opposite conclusions (innocent Alexander, 23 April 1943, British National Archives, URL:
American Intelligence Journal Page 11 Vol 32, No 2 coastal sector south of Cape Araxos…” – both places in the 52 Cornelius Ryan, “Interview of Obersturmbannführer Walther Peloponnese. In Denis Smyth, Deathly Deception: The Real Story Harzer” (n.d.), reproduced in The Pegasus Archive, British of Operation Mincemeat (Oxford, UK: Oxford University Press, Airborne Forces, 1940-1945, entry under “Battle of Arnhem, 2010). Biographies,” URL: , accessed 11 September 2014. See also Cornelius operating in the Atlantic. See R.A. Ratcliff, Delusions of Ryan, A Bridge Too Far (New York: Simon and Schuster, 1974). Intelligence: Enigma, Ultra and the End of Secure Ciphers These latter cases illustrate the deception dilemma: the victim is at (Cambridge, UK: Cambridge University Press, 2006), 148. Cited a distinct disadvantage. hereafter as Ratcliff, Delusions of Intelligence. The attack by the 53 Ewen Montagu, The Man Who Never Was: World War II’s Allies on the U-Boat ciphers is dramatically told in Robert Harris' Boldest Counterintelligence Operation (Annapolis, MD: Naval novel Enigma (New York: Random House, 1995) and the film by Institute Press, 2013). the same name. The film also shows some of the technology used 54 McIntyre, Operation Mincemeat, 302. by the British in their decryption efforts (such as the Bombe). 55 McIntyre, Operation Mincemeat, 307. 47 Ratcliff, Delusions of Intelligence, 114. She reports the Allies 56 Ultra was declassified by the British in 1974. See F.W. pushed the notion of a Nazi “turncoat” into 1942 (another Winterbotham, The Ultra Secret (New York: Dell, 1975). deception). 48 Roberta Wohlstetter defines signals as “signs indicating David T. Moore is a senior intelligence professional and particular dangers.” She observes that, while they are “clearly educator at the National Security Agency. He teaches audible after an event, [they] will be partially obscured before the critical thinking and structured techniques for intelligence event by surrounding noise.” Roberta Wohlstetter, Pearl Harbor: sensemaking, and his research focuses on developing Warning and Decision (Stanford, CA: Stanford University Press, 1962), 3, 397. multidisciplinary approaches to facilitate all aspects of 49 McIntyre, Operation Mincemeat, 227. intelligence sensemaking. He earned a Master of Science 50 McIntyre argues that Baron Alexis von Roenne, “Hitler’s of Strategic Intelligence degree from the National favorite intelligence analyst,” did see through the deception but Intelligence University (then-JMIC) in 2002. because he “loathed Hitler [and] wanted to undermine the Nazi war effort” he intentionally passed the information as valid to the German High Command (p. 232). Von Roenne ultimately was tried, convicted, and executed for his role in the July 1944 (failed) attempt to assassinate Hitler. See McIntyre, Operation Mincemeat, 232-238. 51 Robert Kershaw, It Never Snows in September: The German View of Market-Garden and Arnhem, September 1944 (Jackson, TN: Da Capo Press, 1996), 71.
Kiernan Group Holdings
Exceptional Intelligence Tradecraft and Law Enforcement Streetcraft + Extensive Operational Experience = Game-Changing Solutions
Crafty Bastards® Strategies – Active Threat Workshops – Global Fusion – Emerging Technology Innovation Center©
www.kiernan.co – 571-290-0260
Vol 32, No 2 Page 12 American Intelligence Journal Leaks and Their Consequences: A Guide to the Controversy Over Secrecy vs. Open Government
by Dr. Warren E. Snyder
Whoever . . . publishes . . . classified information . . . Every day intelligence analysts face unauthorized concerning the communication intelligence activities disclosures in print and broadcast media. This environment of the United States . . . shall be fined under this title includes blogs, electronic publications, and other forms for or imprisoned not more than ten years, or both. putting information “out there.” WikiLeaks, the German- based Internet site, has invited anonymous individuals to -18 USC 798 (1982) share classified documents with the world. James Bruce, in his article “Laws and Leaks of Classified Intelligence: The fundamental conflict exists in an open society Consequences of Permissive Neglect,” states that between the rights of the citizens to know about their “intelligence requires secrets.” Leaks undermine the Agovernment’s activities and the government’s need intelligence analyst to whom policymakers look for to maintain secrecy in order to protect its citizens from professional and unbiased insights. Imagine working on a various adversaries. Retired CIA senior executive James B. project for six months in a closed, classified setting, only to Bruce, former Vice Chairman of the U.S. Intelligence have your work compromised by an unauthorized disclosure, Community’s Foreign Denial and Deception Committee and which gets to the nation’s adversaries before it gets to your Deputy National Intelligence Officer for Science and boss in the next office or to a customer. The analyst has Technology, characterized this fundamental conflict as a become the victim of an unauthorized disclosure by “democratic dilemma” person(s) in a “breach of secrecy.”
…that characterizes the relationship between secrecy THE DAMAGE and democracy. Unquestionably, democracies require openness to establish and sustain accountability. n July 2009 then-Director of National Intelligence Dennis Anyone seriously interested in government Blair noted that unauthorized disclosures “allow our accountability understands the democratic risks Iadversaries to learn about, deny, counteract, and deceive inherent in secrecy. Yet the greater openness that can our intelligence collection methods, leading to the loss of facilitate US democracy also serves its foreign critical capabilities.”5 Some unauthorized disclosures have adversaries.1 broad ramifications, resulting in direct and serious damage to U.S. intelligence effectiveness, national security, and foreign This conflict often is manifested in leaks2 of classified relations.6 Jack Anderson’s 1971 disclosure that the U.S. information, which are then widely disseminated. The was monitoring the unencrypted radio telephones in the consequences of such leaks are often severe and Kremlin’s leaders’ cars ended the value of that collection unappreciated. effort.7 The Washington Times revelation in 1998 that the U.S. could monitor Usama Bin Laden’s location via his In 2010 two events occurred that stirred up plenty of interest in satellite telephone compromised that source of intelligence the Intelligence Community. In July The New York Times with the consequence that Bin Laden continued to operate reported that the FBI rounded up the biggest peacetime his Al-Qaida network for many years.8 espionage ring in history.3 This case had the cloak-and-dagger fascination of seductive women, “brush passes,” and Russian Compromises of U.S. sources and methods in the press do spies right out of the Cold War. Then WikiLeaks hit the world not occur in a vacuum. Rather, they add to existing in a big way, leaking 92,000 U.S. documents related to the knowledge—complementing, confirming, clarifying, or Afghanistan War and another 400,000 related to the war in correcting present understandings, and adding new Iraq.4 These two headline stories demonstrate that foreign information for adversaries of the United States. Very few adversaries may not be able to field and maintain costly classified facts stand alone. Instead, they are all collection suites anymore, but they can still train, equip, and interconnected with other information that allows others to sustain agents of influence in order to damage the United States.
American Intelligence Journal Page 13 Vol 32, No 2 make sense of the information they have already obtained or I know that the members of the committee share my surmised from their partial intelligence collecting. conviction that timely, accurate intelligence is a critical component of preserving our national security. As George Tenet, former Director of Central Intelligence, Without good intelligence, we will be unable to defeat said in 1999: “I’m appalled by the sheer number of leaks and the terrorists who began their assault on us long the number of government officials who apparently have no before September 11, 2001. We will fall short in our concern whatsoever for the harm their disclosures cause, nor efforts to counter the proliferation of weapons of any feeling that they may get caught. It is indefensible, mass destruction; we will lack the insight we need to inexcusable, and highly damaging. The damage caused by deal with hostile regimes that practice artful schemes leakers can be every bit as great as damage caused by of denial and deception to conceal their dangerous espionage. . . It is impossible to measure the total damage intentions; and we will possess insufficient done to US intelligence through these leaks, but understanding of an array of global phenomena that knowledgeable specialists assess the cumulative impact as could have consequences for our economy, our health truly significant.”9 and environment, our allies, and our freedom [emphasis added].11
When leaks degrade our human, signals, Denial and deception (D&D) is undertaken by state and non- imagery, or other technical collection state actors alike to influence or deceive what intelligence capabilities, they jeopardize our critical collectors observe in order to manipulate perceptions. Denial refers specifically to activities and programs designed to intelligence advantage and prompt eliminate, impair, degrade, or “neutralize” the effectiveness adversaries the world over to devise new of human or technical collection. Deception refers to ways of defeating that advantage. manipulation of intelligence collection, analysis, or public opinion by introducing false, misleading, or even true but tailored, information into intelligence channels with the America’s intelligence advantage is critically dependent intent of influencing judgments made by intelligence upon our ability to collect secrets and piece together an analysts and subsequently the consumers of their enormous mosaic of information from many disparate products.12 D&D activities can impede, impair, degrade, fool, sources. Only then can we comprehend the complete picture or otherwise mislead U.S. intelligence. D&D deprives U.S. because, without this essential mosaic, the picture could policymakers of some of the timely and accurate intelligence only be dimly understood, or even completely required for strategic warning, military planning, critical misunderstood. When leaks degrade our human, signals, foreign negotiations, and other national-level issues imagery, or other technical collection capabilities, they essential to U.S. security. For example, when a hostile jeopardize our critical intelligence advantage and prompt country or terrorist learns how the United States gets adversaries the world over to devise new ways of defeating sensitive information about its WMD programs, that that advantage. adversary can take countermeasures to close off U.S. access to that information. Leaks come from a variety of sources and are initiated for a variety of reasons—generally to influence a political debate. INTELLIGENCE FAILURES Individuals who leak classified intelligence information operate as if the information will somehow be read only by couple of examples illustrate the impact of denial American citizens. The reality, however, is that the and deception: Information Age makes it possible for our most vital secrets A to be in the hands of U.S. adversaries around the world within minutes of publication.10 Many do not appreciate this Indian Nuclear Tests central fact and its significance. Retired ADM (USN) David Jeremiah, former Vice Chairman In some cases, foreign knowledge of our intelligence of the Joint Chiefs of Staff, evaluated why U.S. intelligence capabilities—often aided by previous disclosures—may be missed or did not anticipate India’s May 11, 1998, surprise sophisticated enough to permit effective actions that nuclear test. Indian officials, aware of U.S. satellite imagery degrade or deny our collection disciplines. Collectively, such capabilities, disguised their field preparations for an countermeasures are referred to as denial and deception underground test. His investigation concluded that (D&D) activities, about which Ambassador Negroponte, the “satellites and analysts alike failed to focus on the nuclear first Directory of National Intelligence, spoke during his test site, despite clear clues that a nuclear test was coming.” confirmation hearings: The lack of specific evidence of a planned test led senior
Vol 32, No 2 Page 14 American Intelligence Journal intelligence officials, who had an “underlying mind-set” contained information related to Iran’s nuclear program. The that India would not test its nuclear weapons, to discount article also reported that NSA had intercepted a other clues, Jeremiah stated. That fixed idea was conversation between Iranian officials in 2007, including one unaffected by the fact that India’s newly elected Hindu military officer whose name had appeared on the laptop nationalist leaders openly and repeatedly vowed to computer. deploy the bomb. The United States never understood that they were driven by “national pride and psyche” to Whether the disclosures occurred in a pre- or post-Cold War go nuclear, Jeremiah said. As a result, he stated, its $27 environment, the harm to Intelligence Community billion-a-year intelligence eyes and ears were blind and capabilities is considered significant. In a September 2007 deaf to the test. Through their denial actions the Indians speech to the Council on Foreign Relations, Michael pulled the wool over the U.S.’s eyes and contributed to a Hayden, former Director of the Central Intelligence Agency kind of intellectual laziness at the intelligence services. and the National Security Agency, remarked: “Publishing “You fall into a pattern; you start to expect things to information on our sources and methods can be just as happen,” Jeremiah said. “You need to have a contrarian damaging as revelations of troop or ship movements were in view.”13 The Indian test ignited nuclear tensions and an the past.”19 arms race between India and Pakistan. AN EDUCATIONAL INITIATIVE
This is not a new problem. Richard K. Willard, Deputy n interesting initiative at the National Defense Assistant Attorney General, in a March 31, 1982, report of Intelligence College (now the National Intelligence the Interdepartmental Group on Unauthorized Disclosures AUniversity, or NIU) is aimed directly at the of Classified Information states: “Unauthorized disclosure fundamental conflict between open government and of classified information is a longstanding problem that necessary intelligence secrecy. The Denial and Deception has increased in severity over the past decade. This Advanced Studies Program (DDASP) conducts media panels problem has resisted efforts at solution under a number of with one question in mind: “How do we reconcile the conflict Administrations.”14 The current environment seems to be between the First Amendment, freedom of the press, and improving. According to Michael Isikoff, in his June 11, national security?” Nationally recognized media leaders are 2010, Newsweek article “Classified-Info Crackdown, “the in a room with thirty military and civilian students from the Obama administration is quietly ratcheting up its Intelligence Community. The tension in the room is campaign against national-security leaks with a series of unpleasant at first, but in time it thaws and some moves that are surprising intelligence-community understanding and compromise are agreed upon. Is this the veterans.”15 Yet the protection of national security solution?20 information remains a fundamental constitutional duty of the President. The continuing large number of unauthorized disclosures has damaged the national The future effectiveness of U.S. intelligence security interests of the United States and has raised depends heavily on preserving the secrecy serious questions about the government’s ability to protect its most sensitive secrets from disclosure in the of sensitive and critical collection sources media. As the 2005 WMD Commission concluded: “We and methods and analytical techniques. must significantly reduce our vulnerability to intelligence surprises, mistakes, and commissions caused by the effects of denial and deception on collection and In Who Watches the Watchmen?The Conflict Between analysis.”16 At the same time, we must recognize that this National Security and Freedom of the Press, Gary Ross complex problem is unlikely to be solved easily or quickly. discusses “SIGINT 101,” an initiative by the National Security Agency in 2002 to engage members of the media National Intelligence Estimate – Iran proactively in off-the-record seminars regarding the mission and the sensitivities of the Intelligence Community. The In December 2007 the Bush Administration declassified belief was that, through education, journalists could be findings from a National Intelligence Estimate (NIE) related discouraged from publishing classified information harmful to Iran. The NIE concluded that Iran had halted its nuclear to NSA’s fragile signals intelligence programs. The course weapons program in 2003.17 Beyond the declassified finding, outline reportedly included sessions with high-ranking NSA several unauthorized disclosures concerning the intelligence officials, including then-Director Michael Hayden. These underlying the NIE conclusions were also leaked. The sessions were intended to discuss how past articles could Washington Post reported that the CIA had obtained a have been edited to remove the most objectionable portions laptop computer from an Iranian who had contacted a without significantly altering the intent of the article.21 German intelligence officer in Turkey.18 The laptop reportedly
American Intelligence Journal Page 15 Vol 32, No 2 OBSERVATIONS 13 Tim Weiner, “Report Finds Basic Flaws in U.S. Intelligence Operations,” The New York Times, June 3, 1998. 14 Richard K. Willard, Deputy Assistant Attorney General, Report he future effectiveness of U.S. intelligence depends of the Interdepartmental Group on Unauthorized Disclosures of heavily on preserving the secrecy of sensitive and Classified Information, March 31, 1982. Tcritical collection sources and methods and analytical 15 Michael Isikoff, “Classified-Info Crackdown,” Newsweek, June techniques. When this secrecy is breached, foreign targets 11, 2010, accessed July 6, 2010, http://www.newsweek.com/blogs/ of U.S. intelligence learn about our intelligence and declassified/2010/06/11/classified-info-crackdown.html. intelligence capabilities and strategies. They then often 16 Report of the Commission on the Intelligence Capabilities of the develop countermeasures to U.S. intelligence techniques United States Regarding Weapons of Mass Destruction, March 31, and operations. As a result, the effectiveness of intelligence 2005. 17 declines, to the detriment of the national security Howard Kurtz, “After reporter’s subpoena, critics call Obama’s leak-plugging efforts Bush-like,” The Washington Post, April 30, policymakers and the citizenry they intend to serve. 2010, http://www.washingtonpost.com/wp-dyn/content/article/ 2010/04/29/AR2010042904656.html. Notes 18 Peter Baker and Dafna Linzer, “Diving Deep, Unearthing a 1 James B. Bruce, “How Foreign Adversaries Learn to Degrade Surprise,” The Washington Post, December 8, 2007, http:// U.S. Intelligence, and the Steps that Can Be Take to Counter It.” www.washingtonpost.com/wp-dyn/content/article/2007/12/07/ Based on a shorter article appearing in Strategic Denial and AR2007120702418.html. Deception: The Twenty-First Century Challenge, Roy Godson and 19 Michael V. Hayden, “Remarks of Central Intelligence Agency James Wirtz, eds. (New Brunswick, NJ: Transaction Books, Director at the Council on Foreign Relations,” September 7, 2007. 2002). Also see Gary Ross, “Who Watches the Watchmen: The Conflict 2 Merriam-Webster’s Collegiate Dictionary defines a leak this way: Between the Responsibility of a Free Press and the Necessity for “To become publicly known through a breach of secrecy” and National Security,” master’s thesis for a Master of Science of disclosure as “not having official authority or sanction.” Strategic Intelligence degree at the National Defense Intelligence 3 “Times Topics: Russian Spy Ring,” The New York Times, College. Subsequently published by the National Intelligence available at http://topics.nytimes.com/top/reference/timestopics/ Press in 2012 under the title Who Watches the Watchmen? The subjects/r/russian_spy_ring_2010/index.html. Conflict Between National Security and Freedom of the Press. 4 “Times Topics: Wikileaks” The New York Times, available at: Available at http://www.ni-u.edu/ni_press/press.html. http://topics.nytimes.com/top/reference/timestopics/organizations/ 20 The Denial and Deception Advanced Studies Program (DDASP) w/wikileaks/index.html?scp=1-spot&sq=wikileaks&st=cse. was conceived, developed, and eventually integrated into the 5 Dennis Blair, “Unauthorized Disclosures of Classified National Defense Intelligence College’s (NDIC) master’s degree Information,” July 1, 2009. curriculum in the fall of 2002. Since that time, the DDASP’s 6 Michael Hurt, “Leaking National Security Secrets: Effects to graduates have steadily grown from 12 students in 2003 to over 65 Security and Measures to Mitigate,” National Security Studies students in 2011. All in all, over 250 NDIC graduates with unique Quarterly, Volume VII, Issue 4, Autumn 2001. insights and counter-deception analysis skills are currently 7 The Washington Post, September 16, 1971, p. F7. providing an intelligence advantage against key foreign D&D 8 U.S. Senate, Committee on Foreign Relations, “Tora Bora practitioners. Revisited: How We Failed to Get Bin Ladin and Why It Matters 21 Ross, op. cit. Today,” A Report to Members, 111th Congress, November 30, 2009. Dr. Warren E. Snyder was a full-time faculty member in the 9 George Tenet, former Director of Central Intelligence, testimony College of Strategic Intelligence, National Intelligence to the House Select Committee on Intelligence on The Impact of Unauthorized Disclosures on Intelligence, November 3, 1999. University, from 2008 to 2015, providing intelligence- Since its passage in 1947, the National Security Act has charged related subject matter expertise as an instructor in the the DCI (and now the Director of National Intelligence, or DNI) Denial and Deception Advanced Studies Program with protecting intelligence sources and methods. No other (DDASP). Now retired, he served in numerous senior government official has this legal mandate. intelligence, counterintelligence, and strategic analysis 10 The implications of today’s interconnected world contrasts with assignments during his 21 years of service with the U.S. the June 1942 leak in The Chicago Tribune that the U.S. had Army. Dr. Snyder holds a PhD from Virginia Polytechnic broken the Japanese codes. Had the Japanese appreciated this fact Institute and State University, and an MBA and BA from the U.S.’s greatest advantage in the Pacific war would have been Gannon University. lost. Fortuitously, the Japanese did not read the Tribune. 11 Ambassador John D. Negroponte, April 12, 2005, Senate Confirmation Hearing before the Senate Select Committee on Intelligence. 12 James B. Bruce, “How Leaks of Classified Intelligence Help US Adversaries: Implications for Laws and Secrecy.” This paper is a slightly revised version of an article entitled “Laws and Leaks of Classified Intelligence: The Consequences of Permissive Neglect,” in Studies in Intelligence, Vol. 47, No 1 (March 2003), pp. 39-49.
Vol 32, No 2 Page 16 American Intelligence Journal Countering Denial and Deception in the Early 21st Century: An Adaptation Strategy When All Else Fails
by Dr. James B. Bruce
[Author’s Note: This article is a revised and updated failures in the future.2 A more recent U.S. intelligence failure version of one published in The Defense Intelligence than 9/11, the erroneous intelligence on Iraq’s weapons of Journal, Vol. 15, No. 2, 2006. It is republished here in its mass destruction (WMD), provides another illustration of updated form with permission. Formally declassified in the Community’s inability to adapt. And there should be February 2006 (EO-2006-00108) by the Central Intelligence little satisfaction that faulty assessments of Iraq WMD were Agency, both original and revised versions were reviewed equally flawed by other Western nations whose intelligence for public release by the Agency’s Publications Review did not much differ from that of the United States on the key Board. The views expressed here are those of the author attributes of Saddam Hussein’s programs.3 If the and not necessarily those of the CIA or the National impairments in U.S. intelligence that prevented adaptive Intelligence Council where the author served when the change resulted in these erroneous assessments, as is original article was written, nor of the RAND Corporation argued here,4 that design flaw may have been equally where the author is currently employed.] present among the erring Western intelligence services as surely as their faulty assessments. Nevertheless, the United he 2004 Intelligence Reform and Terrorism States cannot await adaptive reforms elsewhere in allied and Prevention Act (IRTPA) has propelled structural liaison services. Indeed, it should be leading them. Tchange in U.S. intelligence at a faster rate than at any time since the enactment of the National Security Act of INTELLIGENCE AND ADAPTATION 1947. Despite the pace of change in the past dozen years, however, it may not be fast enough or even properly he purpose of intelligence is to provide vital prioritized on issues that matter most. This comprehensive information—the enemy’s secrets—to national reform law, inspired by the failure of the Intelligence Tsecurity policymakers and to military commanders that Community to warn of the surprise terrorist attacks on will enable their decision advantage. Of course, intelligence September 11, 2001, has mandated change upon a lumbering should also provide decision-makers with information that Intelligence Community that Senator Richard Shelby (R-AL) they cannot get from anywhere else. Because successful described a year after the attacks as still “hard wired” to intelligence is the collection of secret information by secret fight the Cold War that ended with the Soviet collapse a means, success is easier against ignorant or unwitting decade earlier.1 Now 15 years after the 9/11 attacks, with adversaries. However, facing smart adversaries makes the poor results in Iraq where the 2002 estimates of WMD failed job a lot harder. Today, the hardest targets for U.S. and spectacularly, and with more recent controversies Western intelligence5 are smart—and getting smarter—about surrounding intelligence performance in the Middle East and evading or fooling the intelligence capabilities that target against global terrorism, the inability of U.S. intelligence to them. We should ask how they got that way, and what it adapt to rapidly changing security requirements has means for how we conduct business—especially if we aim to revealed a mixed record of accomplishments and shortfalls. improve our performance in the future. Notwithstanding some intelligence successes—the signal achievement being the takedown of Osama bin Laden in Adaptation is a key idea in modern biology. In his classic 2011—the Intelligence Community (IC) and the 16 agencies Origin of Species (1859), Charles Darwin showed how and elements that comprise it still seem to be playing catch- species that survived the longest are not necessarily the up. Improvements notwithstanding, no segment of the IC toughest or the strongest, but rather the most adaptable to seems more in decline than its counter-denial and deception changing conditions. Survival of the fittest is really survival (D&D) capabilities. of the most adaptive. Modern biology recognizes adaptation as the critical survival trait of species. This Perhaps the central issue facing U.S. intelligence in the first theoretical insight is both simple and profound. Unlike decades of the 21st century is whether it can develop the biology, the discipline of intelligence seems to have no needed capacity for adaptation to avert show-stopping theoretical giant equivalent to Darwin. Still, success or
American Intelligence Journal Page 17 Vol 32, No 2 failure in adaptation presents a similar dynamic for intelligence can demonstrate greater adaptability than it has intelligence. As Darwin spoke of “the extinction of less- shown in recent years, it may not be good enough to improved forms,” intelligence methods that do not adapt to address the mounting denial and deception challenges that it the changing conditions imposed by smart adversaries also faces now, and will surely be facing even more concertedly may join the ranks of failed species. This principle applies in the years ahead. to collection sensors, platforms, systems, and architectures, and the research and development that produces them. And DENIAL AND DECEPTION it applies equally to analytic methods and assorted types of finished intelligence as well. If adversaries do better at &D is highly relevant to, yet significantly adaptation than the intelligence capabilities that target them, underappreciated by, national-level policymakers they will outsmart intelligence—and defeat it. Dand warfighters. It is defined as any activity or program by adversaries—state and non-state actors Unlike biology, where species must adapt to changing alike—to influence or deceive policymaking and conditions—and not the other way around—in intelligence, intelligence communities by reducing collection the adaptation process is a street that runs both ways: As effectiveness, manipulating information, or otherwise intelligence improves its capabilities to find and characterize attempting to manage perceptions of intelligence targets, hunted targets then adapt to evade intelligence producers and consumers (e.g., policymakers and detection. If this interactive cycle stops because of warfighters). Those who practice D&D—perhaps a form of successful target adaptation—as seems to have been mostly asymmetrical warfare that provides advantages to the the case in recent years—then, lacking a corresponding weak—seek to control what intelligence collectors observe response, intelligence effectiveness declines. To succeed, and acquire in order to manipulate their perceptions and the intelligence techniques must be adaptable to exploit a content of their products, in an effort to shape the decisions target’s vulnerabilities. However, targets reciprocate in this and actions of policymakers and those who can influence interactive process: they also adapt in order to survive them. More specifically: adjusted intelligence threats. When targets so adapt to evade or confuse the intelligence threat, the techniques they • Denial refers to activities and programs designed use that characterize this behavior are referred to as “denial to eliminate, impair, degrade, or neutralize the and deception.” effectiveness of intelligence collection within and across any or all collection disciplines, human and Successful adaptation means survival. To illustrate, technical. organizations that can adapt to momentous change, like species, may even outlive the environments that gave them • Deception refers to manipulation of intelligence birth. NATO, for example, founded in 1949 to counter the Soviet threat to Western Europe, is a tribute to adaptation. collection, analysis, or public opinion by introducing In the next five-and-a-half decades, its members witnessed false, misleading, or even true but tailored information the collapse of the Soviet Union—a stunning example of the into intelligence channels with the intent of influencing failure of adaptation—along with its communist allies in judgments made by intelligence producers, and the Eastern Europe. Yet NATO’s adaptation continued apace consumers of their products. with its interventions in Bosnia and Kosovo after the Soviet threat had dissolved; with the deployment of forces far from Just as intelligence is not a static process, neither is denial its European theater in distant Afghanistan; and with its and deception. Both are dynamic. Yet, intelligence often more than doubled membership, including new members seems slower to adapt to needed change—perhaps too slow. from its former organizational foe, the Warsaw Pact, and Those who practice D&D sometimes react faster. If a foreign even some former Soviet republics. This is nothing if not adversary’s D&D is more adaptable to the intelligence adaptation. Darwin would no doubt be pleased. threats it faces, then it will more often succeed in neutralizing intelligence and even misleading it. Significantly, U.S. and Western intelligence would be wise to demonstrate adaptation is crucial for both—but easier for the targets some of the adaptability that NATO has shown. The that want to evade the intelligence spotlight. Can we affect dynamic nature of the modern intelligence challenge may be this imbalanced adaptation? Can we turn Darwin’s brilliant changing even faster and in more unexpected ways than was principle to our advantage? This article argues that U.S. the case during the Cold War. A principal challenge facing intelligence can do much more to make it harder—not Western intelligence today is the growing capabilities of its easier—for our adversaries to adapt to intelligence that adversaries, both state and non-state actors, to deny targets them. If we adapt smartly, we can regain the intelligence collection and to deceive intelligence advantage. collection and analysis. Unless U.S. and Western
Vol 32, No 2 Page 18 American Intelligence Journal debate between the FBI and the Apple Corporation has The history of intelligence can to some amply illustrated, commercial technologies available on the degree be characterized as a cyclical struggle popular i-phones can keep government investigators from learning the secrets of even dead terrorists who have killed between the “hiders” and the “finders.” Americans such as in the San Bernardino attacks.9
In imagery and GEOINT, while the hand-held camera in The history of intelligence can to some degree be denied areas still has its role, its intelligence utility was characterized as a cyclical struggle between the “hiders” and greatly enhanced through airborne photography—perhaps the “finders.” When hiders deploy more and better tools to most notably in the American U-2 and SR-71 aircraft—and outwit the finders (i.e., intelligence), hiders will prevail. again, not much later in its adaptation to spacecraft such as Alternatively, when finders develop and adapt their methods the CORONA system which was first launched in 1960.10 In to foil the hiders, they regain the advantage. This cycle can due course, though, as hiders learned of this new be seen in modern technical intelligence where the intelligence capability, they began to counter with their own development of newer techniques has provided the finders adaptive techniques such as camouflage and concealment, with appreciable advantages over hiders. Such advantages moving sensitive activities into buildings or underground, in new sensors or collection systems exploited methods and and averting predictable satellite overflights by scheduling techniques that hiders did not know about or understand. exposed movements or activities when imagery sensors are Ignorance of intelligence is the hiders’ vulnerability—and not in range to observe the activity. Such D&D the finders’ advantage. The finders’ new techniques work countermeasures to this revolutionary collection concept well only as long as they are not known or understood by were enabled by whatever they could learn about this new the hiders. When hiders comprehend how certain collection kind of collection capability through espionage and open techniques really work against them, they can—and almost disclosures, both authorized and unauthorized, and thus always do—adapt their behavior in ways to counter the how to defeat it. finders’ newfound advantages. It is precisely this capacity for adaptation that lies at the root of cyclical intelligence successes and failures—when failures are the result of D&D, Fragility of collection sources and methods 6 as some important ones are. is a key concept to specialists in D&D. For two thousand years, codemakers have fought to preserve secrets while codebreakers have tried their best to reveal them. It has always been a neck-and-neck race, with When the Soviets first secretly deployed nuclear-capable codebreakers battling back when codemakers seemed to be SS-4 and SS-5 offensive ballistic missiles in Cuba, they in command, and codemakers inventing new and stronger probably did not give much thought to what these systems forms of encryption when previous methods had been might look like to a high-altitude camera. The U-2 compromised.7 photographs that facilitated their discovery became world famous after their international debut in UN discussions Some simple examples from technical collection illustrate the during the 1962 Cuban Missile Crisis. Even after the missiles point. In signals intelligence (SIGINT), communicators try were publicly revealed on October 22 in overhead all kinds of methods to protect their communications, with photography, the Soviets tried—too late—to camouflage varying degrees of success—often temporary. When them with tarpaulins, nets, and painted or mud-spattered 11 encryption techniques such as the ENIGMA machine used canvas. Today, adversary nations that build and deploy by the Nazis in World War II were developed by hiders to medium- and long-range missile systems, such as Russia and conceal their sensitive communications, Allied intelligence China, are not so careless. Many nations, and even some was stymied—but only for a while. Then it countered with terrorist groups, have come to appreciate how activity that is successful decryption techniques, in this case, aided by effectively concealed at ground level can be detected by espionage and pioneered by Polish and later British airborne or satellite photography—unless D&D measures mathematicians of extraordinary talents. And because are taken. A simple adaptation to finders’ new techniques Hitler’s counterintelligence was kept unaware of the Allies’ can mitigate their value if just the right kind of knowledge new capability, the new techniques succeeded. This is carefully applied as countermeasures to the new encryption-decryption cycle has spiraled to unimagined techniques. heights and, today, the commercial availability of newer encryption systems on the Internet has availed additional Fragility of collection sources and methods is a key concept methods to communications hiders in the latest round of this to specialists in D&D. This is so because smart adversaries key D&D adaptation technique.8 Worse, as the recent make it their business—and for some, a very high-priority business—to learn how U.S. intelligence works. We know
American Intelligence Journal Page 19 Vol 32, No 2 this from many sources: human and technical, open and President to examine the reasons for the intelligence failures clandestine. Even terrorists understand the value of open on the missing weapons, concluded that Iraq’s D&D source information about U.S. intelligence that helps them to programs had successfully hampered U.S. intelligence in counter it. There can no longer be any doubt that publicly both human and technical collection and in analysis.14 available information about U.S. intelligence is highly prized by adversaries who are targets of U.S. intelligence collection operations. And the more detailed such information is, the Iraq’s far-ranging D&D capabilities were better it is for the hiders. As the General Counsel to the aimed squarely at neutralizing human and Office of the Director of National Intelligence recently told technical intelligence, and succeeded in the Senate Select Committee on Intelligence: “The unauthorized disclosure of our nation’s secrets to the media blunting both UN inspection and the causes genuine damage to our national security . . . where effectiveness of U.S. and liaison intelligence we have been able to identify actions by our adversaries that services as well. have apparently been stimulated by leaked information.”12 The value to adversaries of open source information found in media leaks that disclose how U.S. intelligence works, as The effectiveness of Iraqi D&D had been pretty well indicated in this SSCI testimony, is that it can facilitate understood in the West for a long time. Former Iraq nuclear countermeasures to classified sources and methods whose weapons inspector and first DCI Special Advisor to the very effectiveness depends on secrecy and success in post-war Iraq Survey Group, David Kay, for example, wrote protecting them. of the importance of Iraq’s D&D programs in the mid- 1990s.15 As late as 1999, UNSCOM Senior Advisor Tim WMD SHELL GAME Trevan also highlighted the Saddam Hussein regime’s extensive program and capabilities to conceal evidence of ith the perspective of hindsight, it is clear that WMD from UN inspectors.16 Moreover, during the run-up to Iraq’s D&D programs which preceded Operation Operation IRAQI FREEDOM, Director of Central Intelligence WIRAQI FREEDOM (OIF) wreaked major distortions George Tenet, in a post-OIF speech at Georgetown on U.S. and Western intelligence assessments about Iraq’s University, specifically cited reporting from a sensitive Iraqi weapons of mass destruction. The D&D distortions resulted source who had direct access to Saddam Hussein and his in poor collection and faulty analysis on the U.S. side, and inner circle. The source explained that Iraq knew the the death of the Saddam Hussein regime and its wily dictator inspectors’ weak points and how to take advantage of them. who played a dangerous game. He further explained that Iraq had an elaborate plan to deceive the inspectors and ensure that prohibited items Collection. Iraq’s countermeasures to intelligence would never be found.17 Iraq’s far-ranging D&D capabilities collection operations greatly reduced their effectiveness. were aimed squarely at neutralizing human and technical When the flawed National Intelligence Estimate on Iraqi intelligence, and succeeded in blunting both UN inspection WMD was published in October 2002, one of its first and and the effectiveness of U.S. and liaison intelligence most important Key Judgments said: services as well.
We judge that we are seeing only a portion of Iraq’s WMD Analysis. The Iraqi D&D effects on analysis were every bit efforts, owing to Baghdad’s vigorous denial and deception as corrupting as they were on collection. In the absence of efforts. Revelations after the Gulf war starkly demonstrate information, analysts can draw different conclusions from the extensive efforts undertaken by Iraq to deny information. missing, contradictory, and fragmentary data. In this case, We lack specific information on many key aspects of Iraq’s while acknowledging, as the Key Judgment cited above WMD programs.13 does, that collection was poor and key information was missing, it remains for analysts to interpret what that means. This key point is often lost on readers who do not work in U.S. analysts concluded that the dearth of collection on intelligence, and especially those who do not fully grasp the WMD meant that Iraq must have had the weapons even if implications of successful D&D. When the NIE stipulates we were not seeing them. In fact, not seeing them seemed to “we lack specific information on many key aspects of Iraq’s provide evidence that Iraq had them! The logic seemed WMD programs,” it means that the lack of intelligence did persuasive: We know that Saddam Hussein had them in the not happen by accident, but rather on purpose. It past; he is a lying and evil-intentioned dictator; and his specifically acknowledges Iraqi D&D—in this case, denial— D&D efforts in all WMD-related areas are pervasive. Iraq’s as one of the important causes of poor and incomplete effective D&D, therefore, is evidence for a weapons program, intelligence on this significant international security issue. not against it.18 However persuasive, the logic was wrong. The Silberman-Robb WMD Commission, established by the
Vol 32, No 2 Page 20 American Intelligence Journal With the benefit of hindsight, it is clear that Saddam Hussein’s extensive D&D program did not conceal weapons Perhaps even more important than of mass destruction after the early 1990s as none was there espionage today, intelligence disclosures to hide. Yet, neither was it intended—even if it had these effects—to fool the West into thinking that he had them also reveal information that facilitates when he did not. Rather, continuing the major D&D effort D&D. after the weapons had been destroyed seems to have been a policy of calculated ambiguity designed (perhaps poorly conceived, given its ultimate failure) to purvey contradictory Today, unfortunately, many nations and non-state actors messages to multiple audiences. In fact, he had told the UN such as terrorists have also developed impressive D&D and the West repeatedly that he had destroyed all his capabilities to blunt secret intelligence collection which may weapons. We now know that was true.19 However, he also be based on information that did not come from spies. Key wanted to sow doubt among his internal threats the Kurds adversaries increasingly exploit a whole range of information and the Shiites, and his external threats Israel and Iran, by sources that provide them with assorted facts, clues, and nourishing their suspicions that he still retained WMD. The insights about how secret intelligence works. Perhaps even D&D program that had successfully enfeebled UN more important than espionage today, intelligence inspections and Western intelligence was a necessary pillar disclosures also reveal information that facilitates D&D. for his edifice of calculated ambiguity that helped sustain his Such disclosures can be grouped into two broad categories: power against enemies at home and abroad for the turbulent those that are authorized and those that are not.22 decade that followed his abortive invasion of Kuwait. He implied the continuing existence of WMD through a D&D • Unauthorized disclosures typically refer to program that in actuality had successfully concealed their “leaks” of intelligence information that frequently destruction.20 This profound irony that came at the West’s appear in the open media—now globally available expense also undid the dictator who fooled them, as he through the Internet. The stunning Internet fooled himself: His sophisticated D&D capabilities first disclosures by Bradley (now Chelsea) Manning and delayed—then hastened—his demise with the launching of Edward Snowden—together totaling well over two OIF largely under a WMD justification. million classified files, most of it Top Secret Codeword—have multiplied the availability and DEFEATING D&D damage of such “leaks” by some orders of magnitude. The most damaging leaks are those that compromise he U.S. and Western intelligence failures in Iraq drive intelligence sources and methods or specific collection home the point that the effectiveness of intelligence operations. We know that key adversaries treat the Tdepends heavily on its ability to defeat an open media as a potentially vital source of information adversary’s denial and deception. If Iraq’s D&D programs about intelligence, including how intelligence works ranked among the world’s best in 2003, as they surely did, (or does not work) against them. Such information is then the D&D challenges posed today by such countries as often sufficiently detailed to be of actionable D&D Russia, China, North Korea, and Iran are at least as difficult, value to adversaries.23 or more so. These countries have shown in varying degrees an adaptive capacity to counter a range of intelligence • ·Authorized disclosures encompass information collection techniques and activities that they should not that has been officially declassified for releases through even know about—and to some that require a fairly programmatic declassification processes, responses sophisticated level of understanding to counter. Improved to the Freedom of Information Act (FOIA) requests, intelligence effectiveness against such adversaries will foreign intelligence sharing, and diplomatic require a new level of adaptation to defeat their evolving demarches. These also sometimes result in D&D capabilities. unanticipated leakage of classified information from analytical studies and briefings for a variety of Where do adversaries acquire information about Western domestic and foreign audiences that may expose intelligence? One important source, of course, is espionage. sensitive sources and methods to intelligence targets Major spies have passed sensitive and classified information not authorized to have such information, sometimes to hostile countries such as Russia that have certainly purposefully and sometimes inadvertently. This helped facilitate development of countermeasures to results from sloppy handling of sources and methods intelligence collection activities. 21 This emphasizes the information or from poor understanding of just how point that effective intelligence is highly dependent on fragile or sensitive some sources and methods really effective counterintelligence (CI), and that good CI is a vital are. If we want better intelligence—namely, weapon in the counter-D&D arsenal. intelligence techniques that will work as intended,
American Intelligence Journal Page 21 Vol 32, No 2 and also defeat an adversary’s D&D capabilities—we staffed them with analysts who had either received some will need to do a better job of stemming harmful training in D&D or were willing to be schooled in this new disclosures. Both authorized and unauthorized and arcane specialty. disclosures can damage the sensitive sources and methods intended to produce unique intelligence not Key to such beneficial changes was concerted IC leadership, otherwise available through alternative means. both at the top and selectively at middle-management ranks in the agencies, advocating such improvements. DCI IMPLICATIONS Woolsey, like his 1980s predecessor William Casey, helped ensure that understanding and countering foreign denial and ow can U.S. intelligence do better in responding to deception of U.S. intelligence enjoyed DCI support. In the substantial and more adaptive denial and practice, this meant attaining the standing of a worthy Hdeception capabilities of its adversaries? A short endeavor that justified at least some minimal level of historical perspective can be instructive: dedicated resources. Since the bar was so low, and with growing Congressional interest, it did not seem At this writing, counter-D&D resources in the IC—notably, unreasonable for most agencies to assign a few billets to this dedicated components with foreign denial and deception as emerging field. their principal analytic mission, and trained subject matter experts to staff them—are in decline. When I left Another key to D&D success during that period was government roughly a decade ago, I felt cautiously satisfied constructive oversight. Just as the Senate Select Committee that the 10-year period starting with the mid-1990s had seen on Intelligence (SSCI) in the mid-1980s under Senator some real accomplishments in elevating the importance and Malcolm Wallop had championed the importance of D&D— priority of D&D capabilities in the IC. Initially driven by aided by key support in the National Security Council and National Intelligence Council Vice Chairman Lynn Hansen, the President’s Foreign Intelligence Advisory Board—the and with the support of NIC Chairman Joe Nye, DCI James House Permanent Select Committee on Intelligence (HPSCI) Woolsey directed a reinvigorated IC-wide effort to counter served the same powerful advocacy function in the mid- foreign D&D. The outcome of these important initiatives 1990s. Driven by new Speaker of the House Newt Gingrich, was replacing the moribund Denial and Deception Analysis who requested briefings on foreign D&D, the HPSCI Committee (DDAC) with a freshly-established Foreign Denial leadership fully grasped the importance of the issue. and Deception Committee under NIC auspices. Senior Supported by knowledgeable staffers, Congress kept a D&D National Intelligence Officer Lawrence Gershwin was named focus front and center in letters to the DCI and Secretary of FDDC Chairman, thus launching a newly invigorated Defense, issued questions for the record, and scheduled counter-D&D era. staff visits or committee hearings to monitor progress against D&D. These actions unmistakably conveyed the Under NIO Gershwin’s leadership, the NIC produced a importance of the issue to top IC management. This kind of comprehensive and first-ever interagency study of foreign constructive oversight was vital to the political atmospherics denial and deception capabilities. Then the new FDDC showing that foreign denial and deception of U.S. organized its work agenda to address some of the key issues intelligence remained a topic of national importance. identified by that study. The interagency committee, staffed with a few assigned officers including detailees from several agencies, crafted a comprehensive counter-D&D strategy requiring Community engagement and implementation.24 A The current ODNI leadership in D&D, roadmap for action, it focused IC energies on intelligence recently downsized from an NIO-level collection, analysis, training, research and development, and position, swims against the tide to stay security and counterintelligence. With participation and abreast of needed requirements as resources support from all major IC agencies, notable achievements in these five areas identified and sought to correct resource have dwindled far below any reasonable shortfalls and to prioritize counter-D&D work throughout definition of critical mass. the IC.
A signal accomplishment of the period was “mainstreaming” As fledgling D&D analysts set about developing their new D&D analysis and building expertise as a fully legitimate portfolios, the main question for D&D leadership was sub-discipline of an emerging intelligence profession. Much identifying a critical mass threshold: What amount of upgraded D&D training was essential to that aim. In time, resources—chiefly, billets—would it take to ensure the nearly all the major agencies and some of the smaller ones viability and sustainability of the nascent counter-D&D had stood up dedicated counter-D&D components and capabilities in the IC? Whatever the right answer, I believe
Vol 32, No 2 Page 22 American Intelligence Journal we never quite met that goal. In retrospect, IC counter-D&D AN ADAPTATION STRATEGY WHEN ALL capabilities had probably peaked around 2000 and the ELSE FAILS several years that followed. he picture is not good. With shrinking resource Whatever the D&D resource snapshot revealed five years into availability, diminished leadership clout, deflated the new century, a decade later (2015 at this writing), it would priorities, gutted analysis, and reduced training, show far less. Precious few dedicated counter-D&D T counter-D&D efforts in the IC will not likely regenerate components remain in the major IC agencies, and none in the without a renewed strategic approach. When all else fails, three all-source agencies. The current ODNI leadership in an effective Intelligence Community will require a successful D&D, recently downsized from an NIO-level position, swims counter-D&D adaptation strategy. Such a strategy will set against the tide to stay abreast of needed requirements as goals, identify means to achieve them, rank-order priorities, resources have dwindled far below any reasonable definition of and connect goals to resources and milestones. A counter- critical mass. Moreover, a signal-level FDDC achievement—in- D&D adaptation strategy is one that will answer the depth masters-level D&D training at the National Defense question: What must we do to in order to adapt IC Intelligence College (now the National Intelligence capabilities to most effectively counter our adversaries’ University)—has disappeared. Today, with the demise of the denial and deception programs that impair our Denial and Deception Advanced Studies Program (DDASP), intelligence effectiveness and thus compromise U.S. 25 there is no graduate-level D&D training program in the IC. decision advantage? What follows is a brief discussion of [Editor's Note: NIU still teaches D&D subjects, but it is now a proposed elements of such a strategy: concentration within the School of S&T Intelligence rather than a full-fledged certificate program accompanying the awarding of 1. A rigorous zero-based review of counter-D&D NIU's two master's degrees.] Further, only short 101-level requirements, and specification of needed capabilities courses remain today in a small handful of IC agencies and, and resources to correct imbalances and shortfalls. regrettably, none can be found in the all-source agencies. The Such a study was conducted in the mid-1900s for the few agencies that still offer them struggle to sustain D&D National Intelligence Council (NIC), and it is doubtful literacy in shrunken numbers in a profession that should not that a reinvigorated IC commitment to elevate D&D to tolerate such deficiencies in any discipline that so markedly the priority it received, including the establishment of impacts the effectiveness of intelligence itself. the interagency Foreign Denial and Deception Committee that drove the needed changes, would While IC capabilities to counter foreign denial and deception have ever been established without one. Although seem to have withered to a disturbing state, foreign adversary such a review was performed again in 2008-2009, capabilities to deny and deceive U.S. intelligence—greatly another is much needed today. The currently depressed aided by the Snowden massive classified theft and other state of counter-D&D capabilities in the IC could be damaging disclosures—have almost certainly expanded. Said assessed through a JCIDS (Joint Capabilities differently, priority targets of U.S. intelligence have Integration and Development System)-type demonstrated D&D adaptation, while U.S. intelligence Capabilities Based Assessment. A CBA designs the capabilities to counter them have demonstrated exactly the analytic approach to identify capability needs and opposite. gaps, and recommends approaches to address the gaps.26 Whatever methodology is used, no rational The current state of counter-D&D capabilities in the IC is well decisions about staffing and resources can be reliably below critical mass. Worse, it demonstrates a clear demise in made without this type of rigorous study. priorities that accurately reflect the currently diminished standing of D&D, and a notable failure of its adaptation. The 2. A new Intelligence Community assessment of implications of adaptive foreign D&D capabilities and U.S. the denial and deception capabilities of key targets of inabilities to successfully counter them are distressingly U.S. intelligence. No effective program to counter insidious. They represent nothing less than a diminution in adversary D&D capabilities can be built without an American power. If intelligence performance is appreciably evidence-based understanding of the foreign D&D impaired in classified collection against the hardest targets, then efforts we aim to counter. To accomplish this analytic analysis of national security threats and opportunities is thus goal, a comprehensive and authoritative study of poorer for the degraded ability to collect and exploit valuable these capabilities is required. Such a study was information. In turn, both national security policy officials and conducted in the late 1990s by the NIC, and its research military customers suffer impaired decision advantage for the depth and findings were instrumental in forging lack of needed intelligence they would otherwise have if foreign analytic and management consensus in the Community D&D were not so successful, and if it could be successfully about the nature and seriousness of the D&D threat to countered. U.S. intelligence effectiveness. It also helped to
American Intelligence Journal Page 23 Vol 32, No 2 prioritize collection requirements, analytic production, 5. A professional certification process for D&D and enhanced D&D training, and provided rationale subject matter experts in both collection and analysis for exotic R&D to address novel collection sensors disciplines.31 Expertise in understanding and and platforms to defeat high-priority enemy D&D. countering foreign denial and deception constitutes a Notwithstanding a single agency study that was done specialized area beyond the routine practices of more about six years ago, an authoritative interagency conventional “accounts.” It requires in-depth examination is most needed. Now nearly two decades understanding of both human and technical collection dated, such a study is long overdue to update our disciplines, demonstrated skill in the use of powerful understanding of the evolving D&D threat, including analytic methods, and deep understanding of adversary for recent non-state actors such as ISIS. capabilities to defeat U.S. intelligence. Practitioners who develop such knowledge, skills, and abilities 3. A new DNI-level counter-D&D roadmap, or plan, through training and job experience are as uncommon to re-posture U.S. intelligence for much improved as they are specialized. The IC needs a certification effectiveness against foreign D&D programs. An program—and high-quality training to support it— earlier DCI (now DNI)-level roadmap established an that will develop and recognize these highly capable architecture for IC-wide efforts to counter adversary professionals for the unique talents and foreign denial and deception as “a top priority.”27 This accomplishments they bring to the job. Certification roadmap addressed needed IC actions in collection, should require meeting specific standards in advanced analysis, research and development, training, and training, experience, production, and counter-D&D security and counterintelligence. An important achievements. Such certified professionals should be recommendation of the President’s WMD Commission developed in all agencies, and assigned to the hardest in 2005—apparently heeded the following year—was targets that confound U.S. intelligence. to undertake a mid-course review of that IC roadmap, examine its accomplishments and shortfalls, update 6. Broader client engagement with both the the principal actions that specific Intelligence executive branch and the Congressional intelligence Community entities have taken and should take, and oversight committees. When counter-D&D begin a renewed effort to solicit the full backing and capabilities were resurgent in U.S. intelligence in the resources of relevant planning and acquisition 1980s under DCI William Casey, and again after a professionals across the Community.28 Now, 10 years faltering period in the early 1990s preceding DCI James later, another such review and current plan are much Woolsey, DCI leadership alone was not enough to heeded. Only through such concerted efforts can a right the listing ship. Casey enjoyed the support of the coherent and comprehensive program to counter White House, NSC, and PFIAB in the executive branch, foreign D&D succeed. and the support of the SSCI in Congress. While this uniquely powerful coalition of counter-D&D advocacy 4. Significantly upgraded counter-D&D training. was not matched during the 1990s, Woolsey was able With the demise of the DDASP and other more to rebuild on some of the Casey-period achievements, rudimentary training in deception analysis, the IC and he also enjoyed unflagging and indispensable needs to grasp the consequences of an ill-trained support of the HPSCI. The unmistakable lesson of workforce in a subject so vital to intelligence these earlier periods is that without powerful external effectiveness. Few areas can be more central to adaptive advocacy—from senior clients in high places and intelligence than understanding how your priority demanding oversight bodies—no matter the strength collection targets are beating you. Only significant or compelling rationale of counter-D&D equities within training that reaches large numbers and also offers the IC, and notwithstanding DCI (now DNI)-level advanced levels can ensure this key capability in U.S. sponsorship, even the most passionate advocacy intelligence. Effective counter-D&D training will internal to the IC alone is insufficient to restore or emphasize rigorous analytic tradecraft specifically sustain needed counter-D&D capabilities. This may designed to evaluate the impact of denial and to detect seem odd, but the field is intrinsically arcane, and the deception.29 Indeed, one of the earliest structured competition for limited resources so fierce in stubborn analytic techniques (SATs), Analysis of Competing bureaucracies with conflicting equities, that successful Hypotheses (ACH), was originally developed as a championing of the D&D cause requires an effective counter-deception methodology. With a few others,30 coalition of external “pull” as well as IC leaders’ “push” ACH is a proven technique for the detection of to prevail. Lacking that, continued demise of IC deception. Rigorous application of these and other counter-D&D capabilities is assured—and with it, a SATs—an essential element of upgraded training— failure of adaptation much needed to keep the IC can maximize the effectiveness of analysis against finders ahead of the adversary hiders. potential D&D problems.
Vol 32, No 2 Page 24 American Intelligence Journal 7. Re-examination of the broken secrecy paradigm own changing environment. As targets of U.S. intelligence to significantly improve protection for sensitive use D&D to assist their own survival, they necessarily alter intelligence sources and methods, and a hedging our own operating environment. We must, in turn, adapt our collection R&D strategy until better secrecy can be intelligence strategies to better confront the new challenges assured. The sine qua non for countering adversary posed by the more adaptive denial and deception D&D is sound protection of sources and methods. For capabilities of these targets. In this age-old cycle of myriad reasons, the U.S. government does not do well competition between hiders and finders, U.S. finders will at protecting its secrets.32 The cost to national security much improve their prospects for success against such of thus enabling foreign adversaries with sensitive perennial hiders and adversary states as Russia, China, Iran, information they should not have is to degrade and North Korea, international terrorists such as ISIL and al- intelligence performance in classified collection against Qaida, and proliferators of weapons of mass destruction the hardest targets. Analysis of threats and through superior intelligence adaptation strategies. opportunities is thus poorer for the reduced ability to collect valuable and otherwise unavailable information. Notes National security policy officials and military customers 1 “Hard wired” for the Cold War, “but nowhere near as agile and suffer impaired decision advantage for the lack of responsive to vague, shifting transitional threats as we have needed needed intelligence resulting from significant to be.” Shelby’s remarks in Additional Views of Members, Report th disclosures that compromise sensitive sources and of the Joint Inquiry into the Terrorist Attacks of September 11 , 2001, Report of the House Permanent Select Committee on methods. In a word, fragile collection techniques that Intelligence and the Senate Select Committee on Intelligence, 107th are also perishable, if exposed, will perish. Congress, 2nd Session, H. Report No. 107-792, S. Report No. 107- 351, December 2002. Short of a major review and restructuring of the U.S. secrecy 2 For a comprehensive approach to redesigning U.S. intelligence for paradigm—sorely needed and long overdue—an adaptive maximum adaptive capacity to reduce the probability of failure, response to poor secret-keeping is to design and deploy see James B. Bruce, “Dynamic Adaptation: A Twenty-First collection capabilities that demonstrate better resiliency and Century Intelligence Paradigm,” a 2004 DCI Galileo Award- nimbleness against damaging disclosures. Adversary denial winning paper, available for readers with Intelink access at http:// and deception programs feed on such disclosures, whether www.dni.ic.gov/GalileoAwards/galileo2005.nsf/Details?OpenPage. 3 “All intelligence services believed that Iraq had active WMD authorized or unauthorized, that reveal sensitive sources and programs, even those of countries that opposed the war.” They methods. Secret intelligence techniques that suffer exposure seemed to have reached the same conclusions “despite their are put at risk to become useless, at least against those different national cultures, biases, and ways of proceeding.” adversaries that have learned how to counter them. Building Robert Jervis, “Reports, Politics, and Intelligence Failures: The new sensors, platforms, systems and architectures that rely Case of Iraq,” The Journal of Strategic Studies, Vol. 29, No. 1 on compromised concepts or technologies can no longer (February 2006), quotes from pp. 35, 19. succeed. As a hedge against fielding impaired capabilities, 4 The epistemological, collection, and analytic roots of this failed and to mitigate future damage as new systems are WMD estimate are examined in James B. Bruce, “Making compromised through future disclosures, proposed Analysis More Reliable: Why Epistemology Matters to Intelligence,” in Roger Z. George and James B. Bruce (eds.), collection methods that cannot survive some level of Analyzing Intelligence: National Security Practitioners’ unwanted exposure must demonstrate a capacity for agility Perspectives, 2nd ed. (Washington, DC: Georgetown University and recovery. A senior U.S. defense official has emphasized Press, 2014), pp. 144-150; and James B. Bruce, “The Missing the necessity of pursuing technological breakthroughs in Link: The Analyst-Collector Relationship,” in George and Bruce, sensor and platform development.33 Such techniques should 167-169. also demonstrate an ability to recover from future exposure 5 The shorthand expression “Western intelligence” is meant to since we can safely assume that they will not be afforded the include the two dozen-plus intelligence services of NATO member strict protection required for their future effectiveness. countries and other allies and democracies that share similar security interests. 6 A recent study of eight major cases of intelligence failure, from CONCLUSIONS Pearl Harbor through Iraq WMD and six more between them, found deception in five cases and major denial in all of them. e should ask whether a feasible adaptation Along with faulty assumptions and poor imagination, only D&D strategy for improved counter-D&D is even a among nine factors was present in every failure case. See James B. Wreasonable or achievable goal. It should be both. Bruce, “The Missing Link: The Analyst-Collector Relationship,” Charles Darwin’s fundamental insight about how species in George and Bruce, Analyzing Intelligence, p. 170. 7 survive or become extinct applies well to modern Simon Singh, The Codebook: The Secret History of Codes and Code-Breaking (London: Ted Smart, 2000), p. 317. intelligence. Like species that learn to survive climate 8 Singh, The Codebook, Chapters 4 and 8. variation and other changes that threaten their extinction, U.S. intelligence will also require adaptation to succeed in its
American Intelligence Journal Page 25 Vol 32, No 2 9 See David E. Sanger and Brian X. Chen, “Signaling Post-Snowden 23 James B. Bruce, “”Laws and Leaks of Classified Intelligence: Era, New I-Phone Locks Out NSA,” The New York Times, The Consequences of Permissive Neglect,” Studies in Intelligence, September 26, 2014. Vol. 47, No. 1 (March 2003), pp. 39-49; Bruce, “Keeping U.S. 10 See Robert A. McDonald (ed.), CORONA: Between the Sun and National Security Secrets: Why Is This So Hard?” See also Litt, Earth — The First NRO Reconnaissance Eye in Space (Bethesda, cited above (note 12). MD: American Society for Photogrammetry and Remote Sensing, 24 See WMD Commission Report, p. 374, and note 23. 1997). 25 In the 13 years that DDASP ran, it graduated students from all 11 James H. Hansen, “Soviet Deception in the Cuban Missile IC agencies and organizations, producing not only more than 750 Crisis,” Studies in Intelligence, Vol. 46, No. 1 (2002). certified alumni but also 13 years of D&D research available online 12 ODNI General Counsel Robert S. Litt, Statement for the Record to government users. The DDASP offered certification programs on the Unauthorized Disclosures of Classified Information, Senate in the Washington, DC, area, another one for liaison services Select Committee on Intelligence, February 9, 2012, declassified abroad, and a third at the combatant commands SOCOM, April 28, 2016, p. 1. CENTCOM, and SOUTHCOM. All are now gone. 13 National Intelligence Council, Iraq’s Continuing Programs for 26 See JCS Manual for the Operation of the Joint Capabilities Weapons of Mass Destruction, NIE 2002-16HC (October 2002); Integration and Development System, July 2009; and JCS the estimate has been declassified. Capabilities Based Assessment User’s Guide, March 2009. 14 The Commission on the Intelligence Capabilities of the United 27 Discussed in WMD Commission Report, p. 374. States Regarding Weapons of Mass Destruction, Report to the 28 Ibid., pp. 374-375. President of the United States, March 31, 2005 (Washington, DC: 29 Richards J. Heuer, Jr., and Randolph H. Pherson, Structured Government Printing Office, 2005), Chapters 1, 7, and 8; Analytic Techniques for Intelligence Analysis. 2nd ed. (Washington, especially pp. 161-62, 169, 352, and 374-75. Hereafter, WMD DC: CQ Press, 2014), pp. 181-192; and Bruce and Bennett (note Commission Report. Cleared government readers should refer to 20), pp. 202-208. more in-depth D&D coverage in the classified volume. 30 Such as Motive, Opportunity, and Means (MOM), Past 15 David Kay, “Denial and Deception: The Lessons of Iraq,” in Opposition Practices (POP), Manipulability of Sources (MOSES), Roy Godson, Ernest R. May, and Gary Schmidt (eds.), U.S. and Evaluation of Evidence (EVE). See Heuer and Pherson, pp. Intelligence at the Crossroads (Washington, DC: Brassey’s, 198-204. 1995), Chapter 9; and “Denial and Deception Practices of WMD 31 A case for certification of intelligence analysts is offered by Proliferators: Iraq and Beyond,” The Washington Quarterly, Vol. James B. Bruce and Roger George, “Professionalizing Intelligence 18, No. 1 (Winter 1995), p. 85ff. Analysis,” Journal of Strategic Security, Vol 8, No. 3 (Fall 2015), 16 Tim Trevan, Saddam’s Secrets: The Hunt for Iraq’s Hidden pp. 19-21. Weapons (London: HarperCollins, 1999). 32 James B. Bruce and W. George Jameson, Fixing Leaks: 17 DCI George J. Tenet, Speech at Georgetown University, Assessing the Department of Defense’s Approach to Preventing February 5, 2004. He added, in reply to a student’s question, that and Deterring Unauthorized Disclosures (Santa Monica, CA: The “one of the greatest problems we face as intelligence professionals RAND Corporation, 2013), pp. 11-16. [is] working against a problem of deception and denial.” 33 U.S. Undersecretary of Defense for Intelligence, Stephen 18 As the WMD Commission noted, because analysts appreciated Cambone, in Congressional testimony, April 8, 2004. Iraq’s sophisticated D&D program, they began, understandably, “to view the absence of evidence of WMD as evidence of Iraq’s James B. Bruce is a Senior Political Scientist at the RAND ability to deceive the United States about its existence.” Indeed, Corporation where he has led studies of deception for discrepancies in evidence suggesting that weapons may not be intelligence and military clients. Previously he served ten there after all were “attributable to Iraq’s denial and deception years with the DCI (now DNI) Foreign Denial and Deception capabilities.” WMD Commission Report, pp. 169-170. Committee as Executive Secretary and as Vice Chairman. In 19 A principal conclusion of the Iraq Survey Group (ISG) is that the WMD programs were effectively shut down in the early his nearly 24 years at CIA before retiring in 2005, he also 1990s. ISG, Comprehensive Report of the Special Advisor to the served as Deputy National Intelligence Officer for Science and DCI on Iraqi WMD, September 30, 2004; sometimes referred to as Technology in the National Intelligence Council, and held the Duelfer Report after the name of the Group’s chairman, management positions in the Directorates of Analysis and Charles Duelfer, who replaced David Kay after the ISG issued its Operations. He was a senior staff member for the Commission interim report. on the Intelligence Capabilities of the United States Regarding 20 James B. Bruce and Michael Bennett, “Foreign Denial and Weapons of Mass Destruction (the Silberman-Robb WMD Deception, Analytic Imperatives,” in George and Bruce, Analyzing Commission). A Navy veteran, Dr. Bruce was formerly Professor Intelligence, pp. 204-205. of National Security Policy at the National War College, and 21 In a survey of 16 major spy cases, 8 of them caused significant compromises in HUMINT, 9 in SIGINT, 8 in imagery, and 3 in is an Adjunct Professor at Georgetown University where he MASINT. Three major spies—Robert Hanssen, Aldrich Ames, teaches intelligence. and Ana Montes—were responsible for compromises in all four collection disciplines, and three others made compromises in two disciplines. James B. Bruce, “Keeping U.S. National Security Secrets: Why Is This So Hard?” The Intelligencer, Vol. 22, No. 3 (Winter 2016), forthcoming, Table 1. 22 For discussion, see WMD Commission Report, pp. 380-384.
Vol 32, No 2 Page 26 American Intelligence Journal The Ponzi Scheme as a Deception Operation: The Bernie Madoff Case Study
by Michael R. Heydenburg
…’tis strange, average returns from the financial market. This is why a And oftentimes to win us to our harm Ponzi Scheme is properly understood as a form of The instruments of darkness tell us truths, investment fraud. Win us with honest trifles to betray’s In deepest consequence. The basic concept of the fraud is straightforward. Whatever -Macbeth, Act 1.4, ll 120-124 story the fraudster tells the investors, the Ponzi Scheme is From Rumour’s tongues deceptive because no actual income is generated. In fact, each new investor is used to pay off previous investors. They bring smooth comforts false, worse than true Consequently, the Ponzi Scheme is so structured that over wrongs. time it will ultimately fail. The fraudster is compelled to find -2 Henry IV, Act 1.1, ll 19-20 new investors to pay off earlier investors. The moment the fraudster cannot find new investors the stream of payoffs MR. PONZI HAS A DEAL FOR YOU stops. Also, since there is no real source of revenue, once enough investors demand the return of their investments the he ancient wisdom contained in the saying “A fool scheme collapses and the hapless investors discover that and his money are soon parted” testifies to the their principal has disappeared. Of course, the fraudster Tpersistence of fraud and deceit in business affairs. could forestall these two possibilities by absconding with One example from the myriad schemes that have parted many his profits before the investors notice that anything is amiss. a fool from his money would be a persuasive fraudster’s But rare is the disciplined fraudster who can stop the claim to own a Peruvian silver mine that needs investment in seemingly endless flow of profits before the scheme order to create vast wealth for those smart enough to get in collapses. No matter how sophisticated, complex, and early. Given the difficulties the average American investor in artfully designed and executed a particular Ponzi Scheme earlier times would have had in confirming the existence, might be, it will inherently fail. much less the productivity, of a Peruvian silver mine, it is no surprise that gullible individuals fell for the Peruvian silver This article uses the biggest Ponzi Scheme in history, the mine scheme. An even sadder example of human gullibility is Bernie Madoff scandal, as a case study to explore some that of those unfortunate souls who fell for one of the most characteristics of intelligence and military deception spectacular frauds in the 19th century. In the 1820s a certain operations. The similarities between the technical aspects, Sir Gregor MacGregor sold so-called “Poyais bonds” that the “nuts and bolts,” of Madoff’s scheme and intelligence were supposedly issued by the country of Poyais, which and military operations will be highlighted. The Madoff case MacGregor claimed lay between Honduras and Nicaragua. study will be used to suggest some areas of future research So persuasive was MacGregor that he even convinced a for intelligence and military Denial and Deception (D&D) group of immigrants to set sail and seek their fortunes in a professionals. Finally, questions will be posed as to how the nation that was literally a figment of his creative imagination. Bernie Madoff case study can motivate D&D professionals Naturally, this scheme ended in disaster for all concerned. to think deeply about more than the operational “nuts and Interesting enough, some of the miserable survivors of the bolts” and thereby gain a more profound, strategic expedition to Poyais were so bewitched by MacGregor that understanding of the potential role of deception operations they blamed everyone but him for their misfortune.1 against our modern enemies.
Of all the business frauds the Ponzi Scheme, or pyramid BERNIE MADOFF scheme, is one of the more notorious. Although it derived its name from Charles Ponzi (1889-1949)2 in the 1920s, this ernard L. Madoff was a respected Wall Street kind of fraud has been around for a long time. In the modern financial figure. Active since the 1960s, Madoff world a Ponzi Scheme is usually based on the claim that the Beventually rose to become Chairman of the fraudster has an investment method that will achieve above NASDAQ. In December 2008 the news broke that Madoff
American Intelligence Journal Page 27 Vol 32, No 2 had run the largest Ponzi Scheme in history with over $60 promise above-average returns but his promises were not billion in losses. Among his almost 5,000 clients were extravagant. His clients were smart enough not to have prominent names in the investment world and well-known believed promises that were beyond the realm of the Jewish charities. Lives were ruined, savings were lost, and possible. some charities were destroyed.3 How was Madoff able to deceive so many people for so long and with such The other great saying in business is that “you can’t cheat devastating consequences? an honest man.” The implication is that Madoff’s gullible clients invested with him because they were greedy. “WE TRUST BERNIE. HE IS ONE OF US.” Although greed is a common vice in human affairs, greed does not appear to be the primary reason Madoff’s victims key stage in any deception or fraud is the did business with him. Madoff’s clients invested in him establishment of trust. Bernie Madoff built up his because they trusted him and the U.S. financial markets that Areputation as an honest businessman over decades Bernie, almost literally, incorporated. The trust Madoff’s to reach the top of the U.S. financial industry. Madoff was clients had in him and the “system” were mutually no small-time hustler in River City. Madoff was able to trade reinforcing factors that over time convinced thousands of on his good reputation to convince sophisticated and otherwise smart, well-informed investors to give up their knowledgeable financial professionals to invest in his fortunes to fraud. fraudulent scheme. It seems that Madoff did not start out to defraud his clients. He fell into that all-too-easy trap of RUBE GOLDBERG IS THE FRAUDSTER’S money managers in shuffling his clients’ money among FRIEND various accounts to cover some momentary losses. Unfortunately, Madoff continued his illegitimate actions he core of the Ponzi Scheme is very simple: new after the immediate crisis was over. Because he could not, or investors pay off earlier investors. A good way to would not, stop he was inevitably pulled into long-term Tmask the simple deception at the heart of a Ponzi fraud. Because of his reputation and the fact that his fraud Scheme is to make the execution of the fraud as complicated started long after he had established his various financial as possible. This is counter-intuitive and certainly goes businesses, Madoff was a kind of “insider threat” with against a guiding philosophy in military planning, namely which the U.S. Intelligence Community has had to contend “keep it simple.” As every good police investigator knows, in this age of Bradley Manning and Edward Snowden. the more lies a criminal tells the harder it is for the criminal to Indeed, it is precisely because Bernie Madoff was “one of keep the lies straight. However, in a long-term financial us” that major individual and institutional actors in the fraud, excessive complexity can mask the simplicity of the financial industry were taken in by his scheme.4 deception. Modern finance is so complex that even professionals can lose their way in the thicket of new and One aspect of the scandal which was the source of particular extravagantly designed products. There are very good revulsion was that Bernie Madoff is Jewish, and many of his reasons why these financial products are referred to as the victims were fellow Jews and Jewish charities. How could he results of “financial engineering.”6 So long as the story is exploit his own people? This is actually not unusual in the reasonably plausible, the sophisticated financial world of fraud. Madoff is a typical example of the “affinity professional will trust the fraudster to take care of the fraudster.” The best targets of the affinity fraudster are the details. people closest to him.5 Jews would naturally tend to trust Madoff as a fellow Jew. He was literally, “one of us.” THE RUMSFELD RULE
“SO TELL ME BERNIE, WHAT IS YOUR ne aspect of the Madoff scandal that is particularly PLAN?” hard for the public to accept is how he was able to Oget away with his fraud for so long in an industry nce trust is established, a deception or fraud with considerable statutory and regulatory oversight. It is depends on a good story. The particulars are not as if Madoff was running the CIA, where he could keep Oincidental so long as the story is creditable. It is his actions secret. Did not Madoff and his companies have possible to earn, say, 10% returns—not probable or likely, to file reports with the SEC, the New York Stock Exchange, but possible. Bernie Madoff’s investment scheme sounded etc.? What about audits by his accountants? Is not this plausible and was backed by his personal reputation and the immense paper trail part of the public record? True, but reputations of the firms with which he did business. He did Madoff used this very transparency to his advantage.
Vol 32, No 2 Page 28 American Intelligence Journal THE ROPER, THE INSIDE MAN, THE Rumsfeld allegedly made the comment that FIXER, THE CONVINCER 9 when he wanted to stymie an opponent he would “bury him in paper.” Bernie Madoff he roles and duties of each individual in an organized applied this “Rumsfeld Rule” to mask his band of grifters (fraudsters) are detailed and well- Tthought-out. As the respected financial professional fraud. and “affinity fraudster,” Madoff was the “Inside Man.” Madoff was also the “Fixer” since he conceived, controlled, and managed the fraud. For our study it is important to note Donald Rumsfeld is known as one of the most skilled Madoff’s use of many individuals and financial institutions, bureaucratic infighters in contemporary American political some witting but most unwitting, as his “Ropers”10 and history. Rumsfeld allegedly made the comment that when he “Convincers.” In a classic grift, the “Roper” identifies the wanted to stymie an opponent he would “bury him in mark and brings him to the “Convincer,” who then paper.” Bernie Madoff applied this “Rumsfeld Rule” to mask persuades the mark that the proposed scheme will in fact be his fraud. Madoff met the requisite statutory and regulatory profitable, even if might appear to be questionable or even reporting obligations. Even better, this reporting came not illegitimate. Madoff used his many friends and associates in just from Madoff and his companies but also from the banks, the financial industry to send him prospective clients for his investment firms, and accountants with whom he did investment firms. He then used his clients to refer further business. His reporting was, in the main, not fraudulent, nor clients. The banks and other financial institutions which was the documentation necessarily bogus. If Bernie had managed the vast amount of paper generated by Madoff’s tried to keep secrets or failed to submit timely reports that scheme were exploited as the “Convincers,” or the channels would have raised the proverbial red flag. through which his clients were fed a coherent story about the legitimacy, soundness, and profitability of the entire The most important piece of paper for Bernie’s clients was scheme. the simplest. At the end of every month Madoff’s clients got a statement indicating that they earned the amount as The psychology behind this process is very simple. If a promised. So long as the reams of paper moving between client sees on his monthly account statements the names of, all these firms looked to be authentic, more or less, for example, J.P. Morgan or Bank of America, the client will nothing else mattered to the clients as long as their assume these institutions did their due diligence in verifying accounts indicated a profit. No matter how sophisticated these accounts. In reality, these institutions were mere an individual may be in financial matters, not many people conduits through which Madoff’s money flowed. The banks spend all that much time poring over details of a bank and other financial entities were used for their good names statement as long as the money keeps coming in at the to convince Madoff’s clients that their investments were end of the month. To a large extent we trust the banks, sound. Naturally, this led to much litigation as Madoff’s the accountants, etc., to take care of the details. victims claimed that the banks failed in their fiduciary duties and should make good the losses. The banks just as Madoff’s mountain of paper, which appeared to meet all naturally argued they were mere channels transferring statutory and regulatory requirements, is an excellent money between accounts and providing the necessary example of Barton Whaley’s key concept of his Theory of documentation. The victims were Madoff’s clients, not the Deception known as the Principle of Naturalness.7 The bank’s clients. Consequently, there was no fiduciary very size and complexity of the reporting that Madoff obligation on the part of the banks to Madoff’s clients. provided were part of the environment in which his clients Whatever the legal merits of these arguments, there is no lived and thus were accepted by them as completely doubt that Madoff used his “Ropers” and “Convincers” natural in the sense as understood by Whaley. brilliantly. Consequently, Madoff was able to perform two critical tasks essential for every deception, namely dissimulation “WHO WAS WATCHING THE STORE?”11 and simulation. Madoff’s simulation of honestly meeting his statutory and regulatory reporting requirements fter the Madoff scandal broke, the public’s ire was showed his clients a false world in which they were directed against state and federal regulatory making actual profits while at the same time his agencies, in particular the Securities and Exchange dissimulation hid the real deceit of his scheme in which A Commission (SEC), for failing to uncover Madoff early on. 8 the only person profiting was Bernie Madoff. The exculpatory argument that Madoff’s scheme was very complex and encompassed immense numbers of documents was rejected with the counterargument: “Well, isn’t that
American Intelligence Journal Page 29 Vol 32, No 2 what the government is supposed to know how to do?”12 than “no.” No ambitious banker ever made managing Without delving into the intricately complex legal and partner by saying “no” to prospective clients. An overly technical details of financial regulation, the Madoff scandal strict regulator will eventually have to answer to Congress. illustrates some interesting aspects of large, modern Consequently, compliance can often lapse into a paperwork bureaucracies. drill in which success is measured in the fact that all the appropriate boxes are checked. The result of these The justifiable rage against the incompetence of government competing pressures is the elevation of “process over regulators notwithstanding, even sophisticated outcome.”15 bureaucracies are limited in their ability to identify frauds like Madoff’s.13 The SEC oversees financial markets valued in the trillions of dollars and involving billions of transactions The corporate culture on Wall Street holds each business day. Add the foreign markets with their to the strong belief that, if a person, interconnections to the U.S. financial markets and the department, or company is making money, magnitude of these challenges quickly becomes apparent. Consider also that there are other federal and state let it. regulators whose work must be considered and coordinated with the SEC. Any bureaucracy charged with significant responsibilities but constrained by limited resources will Strong leadership sustained over time is required to ensure naturally react by prioritizing tasks and responsibilities. Just that organizations regard compliance not as a cost to be how these priorities are ordered and the vigor with which satisfied by “box checking” but as a significant objective in they are pursued can determine if a Bernie Madoff is caught its own right. Good leaders know that the outcome of before he can do too much damage. preventing fraud is more important than merely ensuring the proper process was followed. Ultimately, it is the senior The SEC—indeed all regulators—must balance the political leadership at the highest level of government that unresolvable tension between being vigilant regulators determines resources, priorities, and the perseverance with constantly on the lookout for bad actors like Bernie Madoff which regulatory agencies pursue their statutory mandates. while ensuring that the markets function as effortlessly as The New York Times noted that a recent report about the possible. Act too strictly and markets seize up; become too lack of federal criminal cases related to the extensive lax and Bernie Madoff flourishes. The limitations of even the mortgage fraud revealed during the financial crisis most sophisticated bureaucracies have been well-known “…indicates that the Justice Department, our nation’s top since the rise of the modern regulatory state roughly 100 law enforcement agency, is simply unequipped – or years ago. These limitations are not restricted to agencies unwilling – to combat complex financial fraud.”16 [emphasis regulating financial markets. added]
“YOU DON’T SAY NO TO THE OF NUTS AND BOLTS RAINMAKER.” othing in the mechanics of the Bernie Madoff fraud he corporate culture on Wall Street holds to the should come as a surprise to denial and deception strong belief that, if a person, department, or company Nprofessionals. Establishing trust with the target and Tis making money, let it. As understandable as this telling a plausible story to mask the deception are parts of mentality is in the corporate world, it is also found in the the essential tool kit of every successful deception. regulatory agencies. Government agencies are charged with Knowing the weaknesses and vulnerabilities of the ensuring compliance with the law and regulations. Most regulatory authorities or, for D&D operations the large companies have entire departments tasked similarly. counterintelligence and counterdeception agencies, is An overly strict compliance regime by both government and essential. Nevertheless, the Madoff case study highlights business would greatly reduce business activity; deals several points that bear special consideration. As in any would not get done, transactions would not be made, and “long con,” fraud, or deception operation, it is important to clients would not be taken on.14 In essence, strict compliance take care to identify the best “inside man.” As a classic leads to someone saying “no” too often to far too many “affinity fraudster,” Madoff demonstrates why creative rainmakers, i.e., those individuals who are the people thinking in spotting the important characteristics of one’s bringing in the clients, business, and profits. Compliance is targets is crucial. Identifying the best “inside man” should tiresome, unglamorous and, above all, not profitable. be more than simply finding the individual who holds an Compliance departments are “cost centers” and not “profit important spot on the organizational chart of one’s target. centers.” Hence, there is understandable pressure on The Madoff case study is a good example of a deception compliance departments to find ways to say “yes” rather that inverts Churchill’s classic phrase that the truth should
Vol 32, No 2 Page 30 American Intelligence Journal be protected by a “Bodyguard of Lies.” For Madoff’s of dollars over many years? How could so many good, scheme to have worked for so long and to have deceived so intelligent people fall for a fraud as transparently illegitimate many sophisticated financial professionals it needed to as a Ponzi Scheme? The simple-minded response is that men create a huge, complex mountain of mostly true reporting like Bernie Madoff are evil and their victims are merely that masked his lie. This “Bodyguard of Truth” was needed stupid, gullible, and greedy. Of course, the world of fraud to prevent just one of his clients from asking the simple but and deception is far too complex for this to be a satisfactory devastating question, “Bernie, where exactly is my money response. right now?” A deeper understanding of the psychologies of both THE MADOFF CASE STUDY AS AN perpetrators and victims of fraud is worth the effort. One INDICATOR OF FUTURE D&D RESEARCH does not need to be a medical professional or dive deeply into the psychopathology of individuals to note some he Bernie Madoff case study should be of interest to personal characteristics of fraudsters and their victims. As students of D&D operations above and beyond illustrated by the Madoff case, greed and stupidity are not Tmerely presenting an example of how to organize and enough to explain the gullibility of the victims. Very often manage a long-term deception. The Madoff study should be the victims are simply people who want something. Their seen as an example of what the Intelligence Community and misfortune is that they meet a charismatic, talented, and military D&D professionals can learn from deceptions in seemingly trustworthy man who promises merely to give fields far removed from their often narrowly focused them what they want.19 interests. Indeed, the Madoff case is a good argument that D&D professionals should greatly expand their range of In Bernie Madoff we see a man of great charisma and study. Of course, deception has long been a part of human theatricality. Madoff was a master of “impression life. The psychology of deception, deception in magic, and management.”20 As with Charles Ponzi, it is remarkable just the use of deception in the natural world are all studied how public the Madoff scheme was. The entire point of intensively by D&D researchers. However, the majority of Madoff’s scheme was to get a significant portion of the the historical case studies used to illustrate and explain investing public to put money into his fraudulent deception operations appear to be by and large limited to the investments. Herein lies the contrast with deception world of intelligence and the military. The D&D community operations that are normally run by the Intelligence should look to examples of deception in business, finance, Community and the military. Aside from deceptions that are science, and indeed the whole range of human endeavor.17 expressly designed to influence public opinion or political activities, IC and military deceptions normally remain This new research program cannot be limited to examining concealed. The activities of spies and traitors must by how case studies from other fields can illustrate the details definition be hidden. of a successful deception. Beyond the “nuts and bolts,” the research program advocated here should try to determine Whatever the differences and similarities between Bernie how case studies from the wider field of human experience Madoff and Aldrich Ames, the key point for D&D students is might provide better insight into the nature of both that fraud and deception are relationships among people; i.e., mounting and detecting deceptions. Quite simply, the the most important “nuts and bolts” of any fraud and deception fraudulent financier, the scientist who falsifies his data, and are the establishment by guile of trust between the deceiver and all the grifters who convince their greedy marks to part with his mark(s). Given that the intelligence and counterintelligence their money can teach us much about the deceptions of Kim services have invested great effort in understanding the Philby, Aldrich Ames, Robert Hanssen, and Edward psychological makeup of spies and traitors, it would be an Snowden. Let us take a brief look at two fields of research in intriguing research project to compare and contrast the which case studies such as the Madoff one can expand and psychological workings of a Bernie Madoff with that of a Kim illuminate D&D research. Philby or an Aldrich Ames. How different, or similar, is a fraudster like Madoff compared to a spy or a traitor?21 “THE DOCTOR WILL SEE YOU NOW.” DON’T JUST ATTACK THE NETWORK; iven the enduring nature of fraud in all areas of DRIVE IT MAD human affairs and the concomitant damage caused Gby deceivers like Bernie Madoff, it is no surprise that he conflicts since 9/11 have given the U.S. there is substantial research in understanding not only how Intelligence Community and the military extensive frauds are organized (the nuts and bolts) but also the experience in attacking complex, worldwide terrorist 18 T psychology of the perpetrators and their victims. What networks. In fact, the strategic concept is known as “Attack- kind of mind could defraud thousands of people of billions
American Intelligence Journal Page 31 Vol 32, No 2 the-Network.” Simply put, an “Attack-the-Network” organization driven mad by mistrust, a strategy of attacking strategy conceives of our enemies not simply as individuals the network by frustrating its operations, destroying its to be killed or forces to be defeated but as networks to be material resources, and killing or arresting its members will broken up. A classic example of this concept would be to have a greater chance of success. regard the financing of terrorism as a critical sub-system of the larger terror network; disrupt the financing networks and D&D planners aiming to drive their targets mad can use the you disrupt the larger terror network. It is not surprising that rich and complex scientific literature that has developed over there is a significant effort to defeat and disrupt the financial the years to understand and explain large organizations. To networks supporting terrorist organizations. Likewise, that end, business, economics, sociology, and political globalization of criminal networks has compelled U.S. law science have all developed complex theoretical models. One enforcement to target what have become truly transnational of the best known of these theoretical models is “game criminal organizations. theory.”25 These complex theoretical models are now sophisticated enough to take into account the fallibility and John Keegan noted in his masterpiece The Face of Battle ignorance of humans under stress making decisions with that the study of battle is “…always a study of solidarity imperfect information. The most famous theoretical example and usually also of disintegration – for it is toward the of game theory is the “prisoner’s dilemma” in which two disintegration of human groups that battle is directed.”22 actors are confronted with making decisions in a situation of Keegan’s insight points to the conceptual danger that the ignorance. The Cuban Missile Crisis was a classic case “Attack-the-Network” strategy could lead to a mechanistic study in real-world application of game theory. mindset influenced by our understanding of modern computer networks, i.e., to regard the “network” as a What these models apparently do not account for with machine to be broken. For Keegan, our enemy is a human sufficient thoroughness is the component of deliberate group that we aim to disintegrate, not a thing to be deception. For all its complexity and sophistication, destroyed. As noted above, fraud and deception depend on Madoff’s fraud, like all Ponzi Schemes, was remarkably the establishment of trust between people. A D&D simple and very fragile. Madoff’s lie had to come to light perspective to the battle between human groups would be to someday. How can a theoretical model of collective human look at the enemy network as a corporate mind to be action be built that takes into account not mere ignorance confused.23 Of course, D&D planners are taught to regard but active deception and, most important, a deception in the mind of the enemy as the target of a deception operation. which the actors may assume, but do not know for certain, However, deception planning should expand its vision how and what manner they are or might be deceived? The beyond supporting the commander’s goals for a particular argument advanced here is that D&D professionals should military operation. Deception planners should aim not raise their view above the technical problems of designing or merely to confuse the mind of the enemy but also to drive defeating deception operations and work to incorporate the enemy literally to a form of madness. To achieve that deception into a larger, more theoretical understanding of end, our mindset must not only move away from the how the modern world works. For example, what if Prisoner mechanical view of organizations as networks but also away A could find a way to deceive Prisoner B into making a from the hierarchical view in which all that is needed is the decision to the advantage of Prisoner A? targeting of a few key leaders (“kingpin strategy”) in order to defeat an enemy. As law enforcement has discovered, the CONCLUSION elimination of even a large number of “kingpins” is not enough to roll up the most powerful criminal organizations. &D operations are methods we use to blind our enemies. While deception is used to prevent our If the key to any fraud and deception is the establishment of Denemies from seeing us, at the same time we must trust between people, then the key to driving an organization know the mind of our enemies so that our deceptions will mad is to destroy any sense of trust among the people who make them see what we want them to see, think what we make up that organization.24 Even the most vicious and want them to think, and do what we want them to do. Yet, depraved of criminal organizations must depend upon a for all the similarities in technique, a major difference minimal level of trust among the members in order to between deception operations normally run by the function. A deception operation should aim to achieve the intelligence services and the military and the frauds “death of trust” within the target organization. With trust perpetrated by criminals such as Bernie Madoff is the gone an organization would tend to start destroying itself number of targets. A complex strategic deception such as through internal fighting and purges of suspected traitors. A the Allied operations against the Germans prior to the 1944 good historical example would be how Stalin’s insane invasion of France involved many individuals and paranoia in the 1930s led to the self-destruction of the Soviet organizations. However, the ultimate target of a strategic military and intelligence services. With the target intelligence and military deception is, in general, limited to
Vol 32, No 2 Page 32 American Intelligence Journal the very senior leadership of the enemy. Indeed, in the case old rules, mindsets, and understanding are being of the Allied deception in World War II, the case can be transformed. Our existing practical and theoretical made that there was a single target which mattered, namely knowledge of D&D operations should be combined with the the mind of Adolf Hitler. theoretical understanding of large, complex organizations used in the disciplines of business, economics, and political The contrast between the number of strategic intelligence science. Denial & Deception needs more than a Napoleon and military deception targets and the Madoff case study is who can design a strategy and lead an operation against truly remarkable. The Allies had to deceive Hitler for only several enemies. D&D should synthesize our knowledge of about three years. Bernie Madoff had to deceive thousands modern organizations and ideologies into a theoretical and continue this deception for decades. Nevertheless, the understanding of our 21st century enemies, the nature of the Madoff case study is important for the argument presented war are they are waging against us, and the role of deception in this article because Madoff demonstrates the importance in the long campaign to defeat them. D&D needs its own of regarding the target not as the mind of a single individual Clausewitz. or organization but rather as a system. Of course, Madoff betrayed the personal relationship of trust that he built with [Authors Note: The views expressed in this article are the his individual clients. He damaged trust in “the system,” author’s alone and do not necessarily represent the views of specifically, the U.S. financial markets and the government the Drug Enforcement Administration, the United States regulatory agencies that were supposed to guarantee the Department of Justice, or an officer or entity of the United honesty of that system. This loss of trust was ultimately States.] worse than the serious losses he inflicted on his victims. After the Madoff scandal broke, the entire investing public—the millions of people who trusted the U.S. financial Notes 1 David Sinclair, The Land That Never Was: Sir Gregor markets with their savings, wealth, and investments—had to MacGregor and the Most Audacious Fraud in History (Cambridge. ask themselves these critical questions: “Can I trust the MA: Da Capo Press, 2004). markets? Can I trust the government to keep the markets 2 Charles Ponzi’s name became attached to this old type of honest?” These questions are more deadly than questions financial fraud because the schemes he ran were so spectacular and about the competence of the SEC or the honesty of the widely reported in the media that he became a public figure. See banks. Markets are built on trust and, if that trust is Mitchell Zuckoff, Ponzi’s Scheme: The True Story of a Financial questioned, it can cause lasting damage. The U.S. is lucky Legend (New York: Random House Trade Paperbacks, 2006). that its markets, regulators, and society are robust enough to 3 For a brief description of the Madoff scheme, the victims, and regain the trust damaged by even the most spectacular the aftermath see Daniel E.Y. Sarna, History of Greed: Financial Fraud from Tulip Mania to Bernie Madoff (Hoboken, NJ: John scandals like the one perpetrated by Bernie Madoff. The Wiley & Sons, 2010): 146-224. One of Madoff’s more prominent Madoff scandal did not cause the destruction of the U.S. victims was the Holocaust survivor, writer, and Nobel Prize 26 economy. recipient Elie Wiesel. 4 It is interesting to note that some fraudsters try to use the Following the example of Bernie Madoff, D&D professionals financial sophistication of their clients as a defense at trial. If the should design their operations not merely to target the mind victims were so smart and they were taken in by the fraud, then it of a single leader or organization but rather the mindset, the is their own fault. culture, “the system” of our enemies. Of course, the United 5 Sarna, 121-131. 6 States does have strategies to attack not only the material, For a stunning exposé of how modern communications and computer technologies have made the financial markets not just but also ideological, foundation of our enemies.27 The complex and opaque but literally incomprehensible for even strategic concept of a “war of ideas” is not new. Our sophisticated market participants, see Michael Lewis, “The Wolf contemporary world of nation-state challenges, international Hunters of Wall Street,” The New York Times Magazine, April 6, terrorism, and Transnational Criminal Organizations is made 2014, 26-51. Lewis’s recently published book has caused quite a up of enemies of far greater complexity and essential fluidity stir in the public, on Wall Street, and among market regulators. than we saw in the recent past of the Cold War era. As 7 Barton Whaley, editor Susan Stratton Aykroyd, Textbook of Moises Naim points out, “Global criminal activities are Political-Military Counterdeception: Basic Principles & Methods transforming the international system, upending the rules, (Foreign Denial & Deception Committee, National Intelligence creating new players, and reconfiguring power in Council, Office of the Director of National Intelligence, August 2007): 6. international politics and economics.”28 [emphasis in the 8 Whaley, Textbook: 8. original] Thus, it is incumbent upon D&D professionals to 9 The BBC TV series “Hustle” aired from 2004 to 2012 and work out a comprehensive theoretical understanding not just showed the adventures of a skilled group of London grifters. Light of how deception operations work as part of a larger entertainment to be sure, yet careful viewing of this well-done strategic operational plan but how deception moves, alters, series could teach D&D professionals something about how to put and deforms human affairs in the modern world in which the together a long con.
American Intelligence Journal Page 33 Vol 32, No 2 10 For a discussion of the role of the “Roper” in the Madoff St. Martin’s Griffin, 2011). When trust dies, so does the scheme, with details about the specific firms and individuals who organization. played that role, see Lionel S. Lewis, Con Game: Bernard Madoff 25 The literature on game theory is immense and the author does and His Victims (New Brunswick, NJ: Transaction Publishers, not pretend to know this literature or understand the richness of 2012): 191-205. the theories. For a foundational text see John von Neumann and 11 The following discussion is based on the author’s personal Oskar Morgenstern, Theory of Games and Economic Behavior, experience working in the compliance departments of large Sixtieth-Anniversary Edition (Princeton, NJ: Princeton University corporate law firms. Press, 2004). For the classic papers of John Nash, see John Nash, 12 The conceptual relationship between the SEC as the government Essays on Game Theory (Cheltenham, UK: Edward Elgar, 1996). agency tasked with preventing fraud in the financial markets and See also Thomas C. Schelling, The Strategy of Conflict (Cambridge, the mission of counterintelligence agencies in protecting the United MA: Harvard University Press, 1980). It is striking how States against the espionage activities of foreign governments and mathematical the models of game theory are. These models account other threats is obvious and intended. The discussion about the for error and irrational actors but apparently not for active SEC as an illustration of the pathologies of large bureaucracies is deception on the part of the actors playing these games. Even relevant to similar problems in the intelligence and Schelling, who discusses real-world examples in international counterintelligence agencies. affairs, does not seem to account for deception. This is a 13 One has to wonder whether, if the SEC had been aware of the theoretical gap that can be filled by existing theoretical basic counterdeception techniques that are the common knowledge understanding of D&D to the benefit of both disciplines. of every intelligence service or military, it might have been able to 26 Recall the historical experience of the 1930s when the economic identify Madoff sooner. See Whaley, Textbook of Political-Military crisis was so severe and the trust in democratic capitalism so Counterdeception. gravely damaged that, in large parts of the West, fascism and 14 A favorite labor union tactic used in lieu of a strike is the “work- Stalinism appeared to be reasonable alternatives. If the next Bernie to-rule” action in which the workers follow every single factory Madoff comes along at some future period of great economic rule to the letter. This inflexibility can soon cripple production. distress, that scandal might be enough for the American people to 15 Jeremy Senderowicz, “Volcker Vagaries,” National Review, look for radical solutions. February 24, 2014, 24. 27 Napoleon’s reputed comment on the relationship between 16 Gretchen Morgenson, “A Fraud War That’s Short on Combat,” material and ideological forces is appropriate: “The moral is to the The New York Times, March 16, 2014. See also Jesse Eisinger, material as three is to one.” “The Fall Guy,” The New York Times Magazine, May 4, 2014, 28 Moses Naim, 5. Naim’s argument with regard to international 34-62. criminal networks holds true for terrorism and ideological enemies. 17 Barton Whaley, The Prevalence of Guile: Deception through Naim argues that our predominant mindset in the West has Time and across Disciplines (Foreign Denial and Deception misunderstood our worldwide opponents as enemies, criminals, or Committee, National Intelligence Council, Office of the Director of terrorists. Instead, we are engaged in a form of warfare not National Intelligence, 2007). Even though Whaley’s sub-title between cultures in the sense of Samuel Huntington’s “Clash of endorsed an admirably wide viewpoint, the examples examined in Civilizations” but rather a war between mutually incomprehensible his study were largely confined to war, politics, and diplomacy. moralities. The religiously infused “death cults” in Mexico (e.g., 18 For a brief, non-technical, and interesting discussion of the “Jesus Malverde”) are a classic example. How can a deception psychopathology of the con man and his victims see Tamar operation disrupt a cult? Frankel, The Ponzi Scheme Puzzle: A History and Analysis of Con Artists and Victims (Oxford, UK: Oxford University Press, 2012), 110-159. Michael R. Heydenburg is an Intelligence Research 19 A recurring theme of the BBC series “Hustle” mentioned in note Specialist assigned to the New York Division of the Drug 9 above is that the art of the grifter is to find out what the mark Enforcement Administration. He earned a BA degree from wants most in life and then give it to him. 20 Lewis, 183. “Impression management is the social process, Wesleyan University, an MA from the University of sometimes conscious and sometimes unconscious, by which Goettingen in Germany, and an MSSI from the National individuals wish to control how others see and react to them. The Intelligence University. He worked in corporate law firms attempt to influence the perceptions of others in social interaction in New York City prior to entering government service. is affected by regulating and controlling information.” 21 It is interesting to note that the fraud of Bernie Madoff and the treason of Aldrich Ames et al. were direct betrayals of personal trust of clients or colleagues (“face-to-face”) while the Bodyguard/ Fortitude deceptions were indirect and institutional (“faceless”). 22 John Keegan, The Face of Battle (New York: The Viking Press, 1976): 298. 23 For a discussion of what he calls the “Network Transformation” in light of globalized crime, see Moises Naim, Illicit (New York: Doubleday, 2005): 224-228. 24 In this connection note the subtitle. Diana B. Henriques, The Wizard of Lies: Bernie Madoff and the Death of Trust (New York:
Vol 32, No 2 Page 34 American Intelligence Journal Deceived to Intervene: Non-State Actors' Use of Deception to Elicit Western Intervention in Libya in 2011
by MAJ (USA) William S. Riley, Jr.
OVERVIEW INTRODUCTION
arge-scale atrocities in Somalia, Bosnia, and Rwanda in “ laughter,” “Massacre,” “Genocide,” “Ethnic the 1990s prompted the international community to Cleansing.” These words evoke images of Ldevelop prescriptive policies for intervention to avert S catastrophic events like those which took place in humanitarian crises. These policies, including the Somalia (1993), Rwanda (1994), Srebrenica, Bosnia (1995), “Responsibility to Protect,” also codified normative and Kosovo (1999). Since the end of the Cold War, the West vulnerabilities suitable for use as a basis to deceive and has felt increasing pressure to intervene militarily on behalf manipulate the international community into militarily of unarmed civilians caught in humanitarian crises. After intervening in support of the goals of belligerents in civil NATO intervened in Kosovo, U.S. President Bill Clinton wars. declared, “If the world community has the power to stop it, we ought to stop genocide and ethnic cleansing.”1 In 2005 This article seeks to answer the question: Did Libyan rebels United Nations (UN) Secretary General Kofi Annan made his deceive the international community into intervening on their position clear when he stated, “The sovereignty of states behalf in 2011 in order to overthrow the Qaddafi regime? The must no longer be used as a shield for gross violations of article identifies incongruities between the conventional human rights.”2 UN members and Western leaders began to narrative of the Libyan conflict and the available evidence, codify their strong aversion to deaths of civilian non- suggesting that the rebellion was planned, or at least co- combatants, otherwise known as civilian casualties, which opted, by Islamist groups who sought to overthrow the led to the concept of “Responsibility to Protect” (R2P) that Qaddafi regime and install a Sharia-based government. The became an internationally acknowledged norm upon rebels’ deception story consisted of two major themes: the recognition by the UN General Assembly in 2005.3 The only rebellion centered on peaceful protests by the Libyan people thing lacking for R2P to be fully established in the in support of their aspirations for democratic reform, and international lexicon was a signature case of intervention promotion of “evidence” that the regime’s response was based on R2P principles. That came in 2011, when UN brutal enough to warrant third-party military intervention. Security Council Resolutions (UNSCR) 1970 and 1973 The rebels triggered intervention by manipulating sanctioned intervention in Libya.4 Gareth Evans, who is communications channels including the media to make widely considered the co-father of R2P, lauded the purposefully inaccurate accusations of atrocities against the intervention as a “textbook case for the R2P norm working regime. The international community responded to the threat exactly as it was supposed to.”5 of atrocities and intervened militarily, inadvertently supporting the goals of the rebel leaders and Islamists PROBLEM operating within the rebellion. iven that the primary goal of materially weaker rebel This article documents specific practices that elicit military groups is often to defeat their materially stronger intervention for humanitarian reasons, highlights Gadversaries in order to achieve their political and vulnerabilities inherent to humanitarian policies, and military goals, one of the most effective strategies available identifies indications and warning signs useful for detecting to them is to enlist the aid of a sympathetic group that is deception in future cases. Lessons noted herein bring to light materially stronger than the weaker party’s adversaries. potential efforts to manipulate U.S. leaders, thereby helping Sympathy may be manufactured through the accusation of to reduce casualties and costs associated with unnecessary atrocities against an enemy, often falsely, in ways that are future U.S. interventions, and limiting destabilization within designed to induce external intervention against the enemy. states or regions by thwarting a strategy used by non-state Humanitarian policies, especially R2P, have made this task actors to overthrow regimes they oppose. easier by providing prescriptive criteria for what types and magnitudes of civilian casualties may legitimately trigger
American Intelligence Journal Page 35 Vol 32, No 2 international intervention.6 These policies suggest that, if LIBYA 2011 a state fails to protect its population from genocide, war crimes, crimes against humanity, and ethnic cleansing or ibya’s 2011 civil war is widely described as a nation of is, in fact, the perpetrator of these crimes, the non-violent protesters who rose up against their cruel international community must be prepared to take strong Land ruthless dictator, Muammar Qaddafi, in measures, including the collective use of force authorized continuance of the “Arab Spring” democratic revolutions by a UN Security Council resolution.7 Research by Alan then sweeping the Islamic Maghreb.18 In the conventional Kuperman and John Gentry, both noted scholars of narrative, instead of following the lead of Egypt’s Mubarak intervention policies and norms, suggests that and Tunisia’s Ben-Ali and acquiesce to the will of the accusations of atrocities highlighting civilian casualties people, Qaddafi responded by ordering his military and have been commonly used by non-state actors to spur security services to put down the rebellion by force, military intervention.8 Kuperman found that the Bosnian shooting peaceful protesters and killing thousands of Muslims’ strategy to gain outside intervention in 1992- innocent civilians in the first three days of protest, especially 1995 included actively lobbying the West to recognize in Benghazi.19 The regime’s brutality forced the otherwise Bosnia’s independence, and portraying their civilians as peaceful protesters to take up arms in self-defense and victims of Serbian aggression.9 Similarly, the Kosovo launch a rebellion.20 The rebels formed an interim Liberation Army (KLA), a militant arm of the ethnic government named the National Transitional Council (NTC) Albanian rebellion, openly acknowledged its strategy to and had remarkable success in their resistance efforts, which enlist third-party aid by provoking Serbian aggression led Qaddafi to retaliate in a criminally disproportionate against civilians.10 Gentry suggests that unconfirmed manner. The regime favored several tactics to quell the atrocity accusations, coupled with Western biases resistance: utilizing African mercenaries, employing tanks against the Serbian government, pushed the U.S. and and firing artillery against unarmed civilians, using the NATO toward military intervention in 1999.11 Libyan Air Force to bomb civilian areas indiscriminately, and systematically employing rape as a weapon.21 The Historical analysis shows that the speed of genocidal humanitarian consequences of these tactics were so actions in past events, the ambiguity of reports of atrocious that they met internationally recognized standards genocide due to limited credible information of of “crimes against humanity.”22 perpetrators’ intentions, and uncertainties about genocidal acts themselves present an environment ripe for In fact, once Qaddafi launched a counteroffensive, regime disinformation and deception campaigns aimed at the forces regained and then retained offensive momentum and government leaders of potentially intervening third marched on Benghazi, telling the people to surrender or parties.12 These leaders make decisions based on available suffer a blood bath.23 In order to avert a Rwanda-like information; if their information is distorted or false, or genocide, the UN invoked the “Responsibility to Protect” otherwise deceptively manipulated, intervention decisions principle in UNSCR 1973 on March 17, 2011, which will be more beneficial to the deceiver and less consistent authorized use of “all necessary means” to protect Libya’s with the leaders’ strategic interests.13 civilians from their brutal dictator.24 Two days later, France and the United States, on behalf of NATO, established a no- Many experts now cite Libya as a model for implementing fly zone designed to protect civilians. Soon thereafter, the R2P principles.14 UN Secretary General Ban Ki-Moon NATO became an active belligerent by conducting air strikes summed up the international mood concerning R2P: “By on Libyan government forces. now it should be clear to all that Responsibility to Protect has arrived.”15 However, factual incongruities point to a Qaddafi was captured and killed within seven months of less politically palatable story suggesting that the NATO’s direct military intervention, and a more international community was deceived into conducting an representative government was then brought to power. As unnecessary intervention.16 Moreover, actual events promised in the NTC’s “vision,” the spread of democracy suggest that Libyan rebels exploited R2P to deceive continued via the Arab Spring in Libya.25 NATO’s Supreme Western leaders into conducting direct military Allied Commander, Admiral James G. Stavridis, trumpeted intervention in support of the rebels’ strategic political/ R2P’s success when he stated: military goals, including the overthrow of Muammar Qaddafi’s internationally recognized sovereign NATO’s operation in Libya has rightly been hailed as government. For the purposes of this article, deception is a model intervention. The alliance responded rapidly defined as measures designed to mislead a target’s to a deteriorating situation that threatened hundreds decision- makers by manipulation, distortion, or of thousands of civilians rebelling against an falsification of evidence in order to induce them to act in a oppressive regime. It succeeded in protecting those manner beneficial to the deceiver.17 civilians.26
Vol 32, No 2 Page 36 American Intelligence Journal To most observers, R2P was triumphant because it averted they seized 250 weapons, killed four soldiers, and wounded the slaughter of civilians and non-combatants, the very 16 other soldiers.33 That same day, protesters set fire to the people for which the humanitarian principle was designed to security headquarters and a police station in Zentan protect. However, available evidence highlights (northwestern Libya).34 The rebels sacked the Benghazi incongruities which suggest that Western leaders based police barracks no later than February 20, just three days their decisions to intervene on faulty premises of genocidal after the “day of rage,” using “Molotov cocktails,” actions that met the intervention thresholds as prescribed by bulldozers, and vehicle-borne improvised explosive devices R2P. (VBIED), subsequently killing over 20 police and INCONGRUITIES administration officials.35 A BBC article dated February 24, 2014, notes that Benghazi residents had lined up to be esearch by Kuperman and others suggests that there issued weapons looted from army and police installations.36 are five categories of evidence which are These reports are consistent with statements made by Ali Rincongruous with the conventional narrative: (1) the Hashem, the Al-Jazeera reporter who covered the 2011 protests were not spontaneous and had heavy Islamist rebellion: influence; (2) the protests were initially violent; (3) actual casualty rates were significantly lower than those initially The beginning of the revolution and the real start of reported; (4) a high ratio of male to female/child casualties the revolution is when the rebels, or, let’s say, the suggests that most casualties were caused by fighting, not activists, at that time, occupied the barracks in Benghazi regime-committed atrocities; and (5) the regime used less- and they went inside and took all of the weapons. And than-lethal riot control measures, even after the revolt turned then it started. Then everyone had weapons and violent. everyone was kind of, you know, fighting from that time.37 First, there is considerable evidence indicating that the spontaneous and supposedly peaceful “day of rage” Many rebels were once regime police and military personnel protests on February 17, 2011, were orchestrated to coincide who were sympathetic to the rebels’ goals of regime change. with historically significant extremist actions. On Friday, They retained their weapons and ammunition and turned February 17, 2006, a mob of Islamist sympathizers in them on Qaddafi loyalists at the outset of the fighting.38 The Benghazi sacked the Italian consulate, set it ablaze, and Sydney Morning Herald quoted sources as saying, “Army threatened to kill Italian diplomats in response to the Italian Colonel Adnan al-Nwisri joined [the already armed rebels] Prime Minister’s wearing of a t-shirt with a cartoon of the and provided them with a rocket-propelled grenade launcher, prophet Mohammed. Libyan police responded to the three pieces of anti-aircraft artillery and 70 Kalashnikov incident and ultimately opened fire on the protesters, killing assault rifles ... and on Friday (February 18), they attacked several.27 These actions by Islamists in Benghazi were the port in Derna and seized an assortment of 70 military captured on video via cell phone and posted to an al Qaeda- vehicles.”39 By February 23, less than a week after the “day linked website calling for death to the infidels. According to of rage,” heavily armed, masked insurgents manned John Rosenthal, this website also “celebrated Benghazi as checkpoints, and rebels used tanks and anti-aircraft guns one of the Libyan cities most famous for jihad.”28 against government forces.40 These actions indicate that the rebel forces were familiar with the equipment’s use, whether As further evidence of premeditation, the International Crisis from military service, from outside training advisors, or from Group (ICG) reported in June 2011 that the Libyan uprising fighting in Afghanistan and/or Iraq. Additionally, one of the was “organized in the east [outside of Libya].”29 The ICG protesters early on states that “we lost seven but killed reported, “In fact, the online protest calls originated from twenty,” further suggesting that the violence was between Libyans abroad, in Switzerland and the United Kingdom.”30 trained and armed groups, not one-sided aggression against The ICG’s information is consistent with early reporting peaceful civilians.41 from The New York Times suggesting that “anti-government demonstrations were organized via Internet social Third, numerous sources including BBC and Amnesty networks.”31 The protesters in 2011 called for a “day of rage” International suggest that initially reported rates of civilian on February 17, the very same day as the previous Islamist casualties were not consistent with the actual casualty rates protest, which strongly suggests that the ostensibly before and after NATO’s intervention. According to the spontaneous and peaceful protests in 2011 were, in fact, rebels’ post-Qaddafi regime, the final death toll of premeditated with outside influence. “revolutionaries,” a category which included rebels and non- combatants for the entirety of the conflict, was estimated at Second, the protests were violent from the beginning.32 4,700 people.42 This is a tremendous reduction from the Militant groups attacked an army weapons depot in Derna 6,000 casualties initially reported to the UN within the first on February 16, the day prior to the “day of rage,” where week of the uprising, or the estimated tens of thousands of
American Intelligence Journal Page 37 Vol 32, No 2 casualties cited by the NTC to gain UN intervention, or the NTC’s Chairman, reached out to the UN via letter on March hundreds of thousands of deaths referenced by Admiral 5, 2011, asking the international community to “fulfill its Stavridis.43 The revised totals are, however, consistent with obligations to protect the Libyan people from any further reports from the Qaddafi regime, which were generally genocide and crimes against humanity…”51 The Arab disregarded at the time. League, which first rebuffed international intervention, lobbied as early as March 12 for the UN to implement a no- The fourth category is the disproportionate ratio of male to fly zone in Libya.52 This policy shift indicates that, despite female/child casualties in towns retaken from rebels by its early protests to the contrary, battlefield reverses led the government forces. Kuperman conducted a detailed NTC to seek military support from the international analysis of the casualty rates of women and children, who community. are typically non-combatants, in Libya versus those confirmed in other internationally recognized humanitarian THINK: What would the West need to think in order to crises. He concludes that the casualty rates were not elicit the intervention? consistent with past instances of genocide, which show an even distribution among fighting-age males, women, According to R2P doctrine, the most important principle for children, and elderly people. He discovered that in the implementing military intervention is the Just Cause Libyan town of Misrata, for example, women and children threshold, which states that in order for military intervention made up only 3% of the overall casualties, suggesting that to be warranted there must be serious and irreparable harm most fatalities were lawful combatants.44 These non- occurring, or likely to occur, in one of two ways: large-scale combatant mortality rates are consistent with collateral loss of life or large-scale ethnic cleansing.53 The language of damage, not the intentional targeting of civilians. atrocities meeting the Just Cause threshold often includes the words genocide, massacre, rape, and ethnic cleansing.54 Finally, Kuperman cites reports that government forces initially responded to the uprising with non-lethal means Evidence suggests that the NTC leadership was aware of such as rubber bullets, tear gas, and water cannons, which Western aversion to civilian casualties, as well as the R2P they were still using for riot control in late March, long after doctrine. In his CNN interview on March 10, 2011, Jalil the supposed acts of genocide and massacre were pleaded for the international community to impose a no-fly reported.45 Kuperman’s analysis is supported by numerous zone in Libya, saying that any delay would cause additional media outlet reports.46 civilian casualties:
As noted, many experts now cite Libya as a model for It has to be immediate action. The longer the situation implementing the R2P principle.47 However, incongruities carries on, the more blood is shed. That is the message between the established narrative and evidence produced by that we want to send to the international community. reputable investigators like Kuperman indicate a less They have to live up to their responsibility with politically palatable story suggesting that the international regards to this [emphasis added].55 community was deceived into conducting an unnecessary intervention that was ultimately intended for regime Jalil’s word choice here is not accidental; his separate use of change.48 “genocide” and “crimes against humanity” when describing Qaddafi’s atrocious actions indicates his awareness of the To further explore the possibility of deception to incite international community’s avowed responsibility to Western intervention, the author will ask and answer protect.56 questions using a basic deception design methodology known as “Do,” “Think,” “See.”49 SEE: What evidence would need to be seen in order to elicit Western military intervention? DO: What did the rebels want the West to do? Western leaders’ needed to observe evidence of two major The rebels experienced rapid success within the first few themes: peaceful protests by the Libyan people in support weeks of the rebellion, and some members of their leadership of their legitimate aspirations for democratic reform, and expressed the desire that outside forces not intervene in evidence that the regime’s actions in response are brutal Libya’s affairs.50 However, as Qaddafi’s counter-offensive in enough to meet the prerequisites of the Just Cause late February began to retake rebel towns and expel rebel threshold.57 Large-scale loss of life would need to be forces, spokesmen for the resistance began to seek outside perceived as a product of deliberate state action perpetrated military intervention. For example, the senior rebel by the Libyan regime. The West would need to see evidence commander, Abdel Fatah Younis, spoke by telephone on of large-scale ethnic cleansing such as “killing, forced March 2 with Britain’s foreign secretary about “planning for expulsion, acts of terror or rape.”58 a no-fly zone,” and shortly thereafter, Mustafa Jalil, the
Vol 32, No 2 Page 38 American Intelligence Journal DECEPTION? Qaddafi-era restrictions on the practice of polygamy.63 These statements are consistent with Islamists’ desires to estern leaders did cite large-scale loss of life and implement Islamic Sharia law in Libya, and they created ethnic cleansing as justification for intervening, concerns among Western democracies. In response to his clearly indicating their acceptance of the evidence Sharia law proclamation, U.S. Secretary of State Hillary W 59 as purported. The “see, think, do” methodology shows Clinton stated to Jalil that she hoped “women would be clear linkage between the rebels’ goal of gaining Western allowed to play a role in new Libya.”64 Secretary Clinton military intervention and the outcome of events. A large recounted that “Jalil smiled” and the matter was dropped.65 body of evidence suggests that the rebels manufactured evidence supporting the conventional narrative of events in In another example, amid the international community’s an effort to achieve their political/military goals. The concerns about rebels conducting human rights violations, question remains: How did the rebels manufacture and Jalil stated “the NTC is firmly committed to upholding human promote the necessary evidence? The answer is that the rights and the rule of law…the violation of rights no longer NTC and the rebels controlled several communication has a place in Libya.”66 Jalil also stated in response to channels targeting Western leaders and had the capability to Amnesty International’s detailed report of rebel offenses, manufacture and disseminate two themes of evidence “The NTC is putting its efforts to bring any armed groups necessary to generate Just Cause for Western intervention. under official authorities and will fully investigate any incidents brought to its attention.”67 Yet, even when The first deception theme was convincing the West that the informed of specific instances of rebel-committed atrocities, revolution was peaceful and for the purposes of democratic the NTC granted immunity to all former rebels because their reforms in Libya. The peaceful protest message was “military, security, or civilian acts ensured the revolution’s primarily propagated by the media, although there were very success.”68 These mixed messages engender doubt as to the few reporters on the ground during that time. The evidence democratic nature of Libya’s revolution, and the NTC’s of peaceful protests mainly consisted of public statements actions convey its actual intent of regime change and the by NTC and sympathetic spokespersons, “eyewitness” implementation of Sharia law. reports, and a few videos posted to online forums and YouTube. The biggest proponent of the democratic The second deception theme consisted of narratives that the message was the NTC and its leadership. Both Jalil and Qaddafi regime committed atrocious “crimes against Mahmoud Jabril, the NTC’s prime minister, consistently humanity” that met the Just Cause threshold. This was touted the peaceful nature of the revolution, as well as accomplished by presenting repeated messages of genocide Qaddafi’s conduct of atrocities, in press releases, political and massacre, as well as communicating specific atrocious speeches, and direct engagements with international leaders. actions such as the Libyan Air Force bombing defenseless civilians, indiscriminate use of artillery and tanks on non- In addition, the NTC published an 8-point plan for building a combatants, use of African mercenaries, and the practice of democratic state of Libya.60 The NTC’s plan called for: systematic rape as a weapon. Many of the press statements released after the NTC changed its strategy to rely on Political democracy and the values of social justice…a foreign intervention used the words “genocide,” constitutional civil state which respects the sanctity “massacre,” and “blood bath,” clearly targeting the Just of religious doctrine and condemns intolerance, Cause threshold. extremism, and violence…every individual will enjoy the full rights of citizenship, regardless of color, Members of the global media, especially traditional news gender, ethnicity or social status.61 outlets, showed considerable bias toward the rebel cause in their reporting, especially during the early months of the These NTC statements of aspiration for democratic reform, uprising. Al-Jazeera, like many other news organizations, did using terms popular in Western liberal democracies, not initially have reporters on the ground collecting conflicted with Jalil’s pronouncement after Libya’s information firsthand. Al-Jazeera’s lead reporter did not liberation: arrive in Libya until March 8, 2011, almost 20 days after the “day of rage.”69 He stated that his colleagues were there by …as a Muslim country, we have adopted the Islamic the first of March, thirteen days after the rebellion began in Sharia as the main source of law. Accordingly, any earnest.70 CNN also admitted that, due to a lack of access, law that contradicts Islamic principles with the Islamic much of its initial reporting came from “witnesses” in the Sharia is ineffective legally.62 rebel-held areas, not firsthand observations by independent reporters.71 In order to gain information from on-the-ground Jalil also suggested that new Islamic rules should be sources, BBC included an Internet link at the bottom of its implemented to limit how banks charge interest and to “halt” news reports that said “Are you in Libya? Are you taking
American Intelligence Journal Page 39 Vol 32, No 2 part in demonstrations? Are you trying to leave? Send us crushing innocent bystanders…mercenaries shooting your comments.”72 Al-Jazeera’s reporting on February 27, indiscriminately from helicopters and from the top of 2011, states that “much of the information about the Libyan roofs…”81 The letter also cited the international uprising that reached the West came from Libyan expatriates community’s responsibility to protect civilians and who were phoning, emailing, or instant messaging with recommended that the UN Human Rights Council (UNHRC) family and friends inside the country.”73 The sources told suspend Libya’s Council membership, which it subsequently Al-Jazeera that “often the Libyans abroad would relay did, and asked the UN Security Council to “send a clear incomplete or exaggerated news…but if it helped the message that the international community will not be uprising’s cause, it was an acceptable distortion. It put more bystanders to these atrocities.”82 While reiterating the pressure on the international people; it made it even more letter’s contents before the UNHRC a few days later, horrific.”74 These accounts suggest that much of the early Bouchuiguir claimed that Qaddafi had already massacred reporting of atrocities leading to international condemnation 6,000 of his own people and planned to slaughter many of the Qaddafi regime was gathered from second-hand more.83 Bouchuiguir was also responsible for the sources sympathetic to the rebels’ cause. “bloodbath” and “genocide” narrative. Kuperman found that on March 14, 2011, as the rebels faced imminent defeat, The media’s bias toward the rebel cause was furthered by Bouchuiguir warned reporters in Geneva that “if Qaddafi’s the rebels’ hospitality to foreign journalists. The rebels forces were permitted to attack Benghazi, then there would often provided free room and board and imbedded reporters be a real bloodbath, a massacre like we saw in Rwanda.”84 in their units in order to influence the media’s messages.75 Kuperman’s analysis of media reports using LexisNexis One reporter, lamenting the state of Libya after the ouster of showed that there were only 19 news articles in English Qaddafi, admitted bias when she stated, “Perhaps, following containing the words “bloodbath” and “Benghazi” during the rebels’ lead, we were too easily inclined to hope that the the period March 7-13. However, the two weeks after problems lay exclusively in the dictator…”76 Biases such as Bouchuiguir’s comments (March 15-31) saw a jump of such these helped the rebels spread their two major themes of articles to 171. Kuperman also notes that Bouchuiguir deception to potential Western interventionists. became Libya’s ambassador to Switzerland after the NTC came to power.85 Talking points consistent with the deception themes were communicated repeatedly through all communications Independent journalist and documentary film maker Julien channels by Jalil and Jabril, as well as by Libyan and foreign Tiel interviewed Bouchuiguir in mid-2011, asked some diplomats who were sympathetic to the rebels’ cause. The difficult and direct questions, and gained some startling former regime’s, and then the NTC’s, deputy ambassador to answers in response. When asked if it was difficult to gather the UN demanded the implementation of a no-fly zone, citing all of the NGOs together behind his petition, he said, “To tell the prevention of mercenaries, weapons, and other supplies the truth, not difficult at all because all NGOs are from reaching Qaddafi’s security forces, and he also raised acquainted…the UN brought us all together.”86 Tiel then concerns about bombing of civilians.77 Centrally-controlled asked how his accusations against the Qaddafi regime could messages such as these further indicate the presence of be substantiated. Bouchuiguir answered, “There is no way,” deception to elicit military intervention. indicating that his accusations were made without proof or verification.87 Tiel then asked, if the claims could not be he most effective channel for the rebels’ deception verified, from where did he get his information? Bouchuiguir themes was Soliman Bouchuiguir, the president of the answered that he got it from Mahmoud Jabril, the NTC’s TLibyan League for Human Rights.78 On February 21, prime minister. Bouchuiguir also admitted that Jabril and 2011, he initiated a petition that was signed and submitted to other key NTC leaders were also members of the Libyan the U.S., European Union (EU), and UN by 70 non- League for Human Rights. When pressed one more time governmental organizations (NGOs) and human rights about validating his claims, Bouchuiguir finally stated, organizations, demanding that the international community “There is no evidence.”88 Bouchuiguir’s confessions show take immediate action to “halt the mass atrocities perpetrated that he served as the NTC’s conduit to convey atrocity by the Libyan government against its own people.”79 accusations to the UNHRC and UNSC, and he bears According to freelance writer Daniel McAdams, significant responsibility for the NTC’s generation of Bouchuiguir’s petition “was designed to tick all the international military intervention. necessary boxes of the R2P [Just Cause threshold] criteria.”80 This letter presented specific charges such as Accusations of atrocities leveled against the Qaddafi regime “foreign mercenaries attacking demonstrators with knives, by Bouchuiguir and the NTC were reported consistently in assault weapons, and heavy caliber weapons…snipers the media. The title of a CNN report, “Witness: Peaceful shooting peaceful protesters…artillery and helicopter Protesters Mowed Down in Libya,” provides an example of gunships used against crowds of demonstrators…tanks the peaceful protest narrative.89 The ICG reported in
Vol 32, No 2 Page 40 American Intelligence Journal February and March that “largely uncorroborated reports, Activist philosopher Bernard-Henri Levy (BHL) is often especially on Al-Jazeera television, indicated that the regime cited (including by himself) as the person responsible for attacked hospitals, destroyed blood banks, raped women, getting French President Nicolas Sarkozy to meet with NTC and executed the injured.90 leaders and recognize them as Libya’s legitimate representative government.97 His documentary, Oath of The ICG was one of the first humanitarian organizations to Tobruk, suggests that he was also influential in persuading condemn the Libyan regime on the basis of “credible reports U.S. Secretary of State Hillary Clinton to support the NTC.98 of concerted deadly attacks against civilians” by numerous In a March 30, 2011, interview with Der Spiegel, Levy was means including “the use of military aircraft to quoted as saying: indiscriminately attack demonstrators.”91 However, the ICG painted a less biased and more moderate picture in its June 6 I am satisfied with the fact that a bloodbath was analysis on the situation in Libya: prevented in Benghazi. When French aircraft destroyed four tanks just outside the city, I thought Much Western media coverage has from the outset of the soldiers who died as a result. It’s horrible. But presented a very one-sided view of the logic of I also thought of the 700,000 residents of Benghazi, events, portraying the protest movement as entirely whom Gadhafi had threatened with merciless peaceful and repeatedly suggesting that the regime’s vengeance, and who were spared a horrific massacre, security forces were unaccountably massacring at least so far… Gadhafi has positioned his tanks in unarmed demonstrators who presented no real the downtown area, targeting the hospital and security challenge. This version would appear to shooting the wounded. People are staying in their ignore evidence that the protest movement exhibited houses to hide from snipers. Benghazi was saved, but a violent aspect from very early on. While there is no now there is bloodshed in Misrata instead… Libya doubt that many and quite probably a large majority was an occupied country. An army of mercenaries of the people mobilized in the early demonstrations was at war with a civilian population that had no were indeed intent on demonstrating peacefully, there weapons but was full of hope.99 is also evidence that, as the regime claimed, the demonstrations were infiltrated by violent elements. In this one interview, BHL was able to communicate the Likewise, there are grounds for questioning the more NTC’s talking points, clearly espousing, wittingly or sensational reports that the regime was using its air unwittingly, the NTC’s deception narrative. force to slaughter demonstrators, let alone engaging in anything remotely warranting use of the term Remarks by the Libyan diaspora also communicated the “genocide.”92 message of atrocity accusations. For example, Muhammad al-Senussi, an exiled crown prince, issued a statement from Amnesty International indicated that, while rebel forces London that he believed that a no-fly zone would resolve the repeatedly charged that African mercenaries had been used crisis: against them, it could find “no evidence for this.” Several reports suggest that these mercenaries were actually sub- There are people dying every day. The purpose of the no- Saharan migrant workers who were either quietly released or fly zone is to help preserve the lives of the Libyan people. executed by rebel forces.93 There are people being slaughtered while I am talking to you.100 The prosecutor for the International Criminal Court (ICC), Luis Moreno-Ocampo, stated at a press conference that “we Finally, the Arab League’s endorsement of international have information that there was a policy to rape in Libya military intervention met one of NATO’s necessary criteria those who were against the government. Apparently, prior to military action, and was cited in UNSCR 1973, as well [Qaddafi] used it to punish people.”94 However, Donatella as by foreign leaders, as legitimizing Western intervention. Rovera, a senior crisis response advisor for Amnesty The deception messages aimed at the UN were received by International, discovered little proof of these allegations, both the UNHRC and the UNSC, evidenced by the language stating that “we have not found any evidence of a single used in press statements, as well as in Security Council victim of rape or a doctor who knew about somebody being Resolutions 1970 and 1973. raped.” Liesel Gerntholtz, the head of women’s rights for Human Rights Watch, stated that “we have not been able to The deputy UN High Commissioner for Human Rights, find evidence” to substantiate rape allegations.95 In sum, Kyung-wha Kang, said “the government of Colonel eyewitness accounts and evidence provided by rebels did Gaddafi...has chosen to attack civilians with massive, not hold up under scrutiny.96 indiscriminate force. The responsibility to protect them now falls on the international community,” thereby invoking the
American Intelligence Journal Page 41 Vol 32, No 2 R2P norm to justify military intervention in response to feedback to the NTC.106 The international community regime-committed atrocities.101 The first resolution, S/RES/ responded to the threat of atrocities conducted by the 1970, was issued on February 26, 2011, and imposed Qaddafi regime and intervened militarily, and in so doing sanctions on Libya and the Qaddafi regime because of the supported the espoused goals of the NTC, as well as Security Council’s “deep concern at the deaths of Islamist organizations operating within the rebellion. civilians…considering that the widespread and systematic attacks against the civilian populations may amount to CONCLUSION crimes against humanity.”102 The Security Council’s resolution, S/RES/1973, issued on March 17, 2011, authorized he facts discussed herein meet the definition of military intervention based on “grave concern of heavy deception as presented at the beginning of this article. civilian casualties…widespread and systematic attacks TWhile there is no outright admission of deception against the civilian population… deploring the continued (other than Bouchuiguir’s admission of there being “no use of mercenaries by the Libyan authorities.”103 It should evidence”), it is highly likely that a deception campaign also be noted that Resolution 1973 referenced the League of enabled the NTC and Libyan rebels, including Islamists, to Arab States’ condemnation of atrocities as further incite Western military intervention and, in so doing, justification for military intervention. enabled them to achieve their strategic goal of regime change.107 It is inconceivable that the NTC’s talking points Leaders within the international community, especially those of genocide, massacre, and bloodbath were chosen by of Western countries, took notice of the rebels’ deception accident. It clearly and consistently maintained a strategy of narrative, as evidenced by the joint press release on April 14, targeting Western casualty aversion and the R2P principle of 2011, signed by France, the United Kingdom, and the United Just Cause. States. This letter reiterated acceptance of the deception narrative, including Qaddafi’s “massacre of his own people,” Critics of the deception hypothesis may suggest and it touted the efficacy of the NATO-implemented no-fly coincidence in the incongruities between the actual events zone to “prevent the bloodbath that [Qaddafi] had promised and the conventional narrative. Opponents may also to inflict upon the citizens of the besieged city of suggest that, even if deception was present, intervention in Benghazi.”104 Separate statements by these leaders and their Libya was still necessary because the very real threat of administrations, both before and after the intervention, Qaddafi’s retaliation was beyond the international suggest that the deception narrative persuaded a wide community’s tolerance of risk. These views are mistaken for audience. two reasons. First, incongruities between the observed, substantiated evidence and the largely unsubstantiated U.S. acceptance of the deception message was complete, atrocity accusations suggest a low likelihood of coincidence. culminating in acceptance of the generally accepted Second, Kuperman’s observation that Qaddafi did not narrative, as evidenced by testimony from Deputy Secretary commit genocidal retribution in towns reclaimed by regime of State James Steinberg: forces constitutes strong evidence the regime did not plan future atrocities in these locations.108 These views further This crisis began when the Libyan people took to the suggest that the NTC and Jabril studied the Western streets in peaceful protest to demand their universal normative perceptions of R2P, and built a new “reality” human rights. Colonel Qaddafi’s security forces designed to trigger Western military intervention. responded with extreme violence. Military jets and helicopter gunships attacked people who had no The rebels’ deceptive behavior to elicit humanitarian means to defend themselves against assaults from the intervention has serious consequences for intelligence and air. There were reports of government agents raiding policy analysis, for policymakers’ decision-making homes and even hospitals to round up or kill wounded processes, and ultimately for U.S. interests. First, protesters, of indiscriminate killings, arbitrary arrests, intelligence analysts must include the possibility of and torture as Qaddafi’s forces began a full-scale deception in their analyses of events encompassing assault on cities that were standing up against his humanitarian crises. Pointed efforts to report or exaggerate dictatorial rule.105 civilian casualties in order to generate Western sympathies and incite direct military intervention suggest a new The media served as the primary feedback mechanism to the technique not traditionally considered in intelligence rebels’ deception planners, helping them gauge the efficacy analyses. Increased analyst awareness of the potential for of the deception themes on Western leaders to incite deception and surprise, apart from evidence being viewed, external military intervention. It is also probable that public comes from an understanding of an adversary’s past relations and lobbying firms retained by the NTC, as well as practices of deception as shown in this article, as well as sympathetic NGOs and diaspora groups, provided additional potential motives, opportunities, and means to carry out
Vol 32, No 2 Page 42 American Intelligence Journal future deceptions. Analysts should understand Western unnecessary interventions, thereby saving lives, resources, psychological, analytical, and organizational vulnerabilities, and national treasure. holes in information collection capabilities, and stated or implied humanitarian policy vulnerabilities in order to Notes improve indications and warnings of future deception and 1 Bill Clinton, interview by Wolf Blitzer, Late Edition, Cable News manipulation efforts targeting U.S. and other Western Network (CNN), June 20, 1999, Http://www.cnn.com/ policymakers. John Gentry’s generic indicators of ALLPOLiTICS/stories/1999/06/20/clinton.transcript/. 2 vulnerability-enabled manipulation serve as a great starting Gareth Evans, “The Responsibility to Protect [R2P]: Rethinking Humanitarian Intervention,” Proceedings of the Annual Meeting point for analysts to further study deception indicators to 109 (American Society of International Law), March 31-April 3, 2004, improve analysis and warning. 79. 3 UN General Assembly, sixth session, World Summit Outcome, A second benefit is recognition of the need for increased 2005, resolution adopted by the General Assembly, October 24, policymaker awareness of their potential vulnerability to 2005. manipulation because of civilian casualty aversion, as well 4 Aidan Hehir, “The Permanence of Inconsistency: Libya, the as improved awareness of deceptive practices used to Security Council, and the Responsibility to Protect,” International induce military intervention by the U.S. and its allies. Security, Vol. 38, No. 1 (Summer 2013): 137. 5 Intelligence analysis and warning are normally difficult under Gareth Evans, “Interview: The RtoP Balance Sheet after Libya,” The Responsibility to Protect: Challenges and Opportunities in the best of circumstances; they become more so when Light of the Libyan Intervention, November 2011, 40. considering deception efforts targeting individual senior 6 Gareth Evans and Mohamed Sahnoun, “Responsibility to policymakers who are intelligence consumers. Analysts Protect,” International Commission on Intervention and State supporting policymakers must consider that deceivers have Sovereignty (Ontario, Canada: International Development Research studied R2P intervention norms, as well as U.S. leaders’ Centre, 2001), 1-87. policy and statement records, and have gained the 7 United Nations General Assembly, A/60/L.1 2005 World Summit necessary information to influence senior leaders’ decision- Outcome (September 15, 2005), 31-32; Ramesh Thakur, “A House making processes. Policymakers do not rely solely on the Divided,” Courier, No.80 (Spring 2014), 5. 8 Intelligence Community for their sources of information Kuperman, “The Moral Hazard of Humanitarian Intervention,” 49-80; John A. Gentry, “Norms and Military Power,” 187-224; when making decisions. Their biases and perspectives are John A. Gentry, “Warning Analysis: Focusing on Perceptions of influenced by information sources such as the media and Vulnerability,” International Journal of Intelligence and intermediaries, including foreign diplomats, lobbyists, and CounterIntelligence, Vol. 28, No. 1 (Spring 2015): 64-88. public relations firms, NGOs, other special interest groups, 9 Kuperman, “The Moral Hazard of Humanitarian Intervention,” and individuals and groups whom they view as trustworthy. 60. When informing a senior leader of their vulnerability to 10 Ibid., 69. being duped by a “friend,” analysts will most likely 11 Gentry, “Norms and Military Power,” 212. experience the senior leader’s resentment and a lack of 12 Kuperman, “The Moral Hazard of Humanitarian Intervention,” receptivity to their warning message; however, they should 50-52. 13 Scot Macdonald, Propaganda and Information Warfare in the not be deterred from informing policymakers of their Twenty-First Century: Altered Images and Deception Operations potential to be deceived. Increasing policymakers’ (New York: Routledge, 2007), 70. understanding of deceptive practices should help to improve 14 Kuperman, “A Model Humanitarian Intervention?” 105-136. their receptivity to a deception hypothesis when presented 15 Ban Ki-Moon, “Remarks at Breakfast Roundtable with Foreign in policy analyses and intelligence warning messages. Ministers on The Responsibility to Protect: Responding to Imminent Threat of Mass Atrocities,” United Nations, September Further inaction or delayed international response to real 23, 2011, accessed May 11, 2014, http://www.un.org/apps/news/ atrocities because of fear of deception also creates a moral infocus/sgspeeches/search_full.asp?statID=1325. 16 dilemma for policymakers. Leaders do not want to commit Hugh Roberts, “Who Said Gaddafi Had to Go?” London Review of Books, Vol. 33, No. 22 (November 2011): 8-18; Kuperman, “A their countries’ resources to an illegitimate intervention, but Model Humanitarian Intervention?” 109. they also do not want to be on the wrong side of history by 17 Barton Whaley, Textbook of Political-Military Counterdeception failing to act if atrocities against civilians are actually (Washington, DC: NDIC Press, 2007), 5. committed, as in the case of the Rwandan genocide in 1994. 18 Interim National Council, “A Vision of a Democratic Libya,” U.S. policymakers’ hesitance can potentially be overcome if Guardian (UK), March 29, 2011, accessed May 1, 2014, http:// intelligence managers allocate sufficient analytical resources www.theguardian.com/commentisfree/2011/mar/29/vision- to explore fully a particular humanitarian crisis, looking at democratic-libya-interim-national-council. both current events and historical context for possible 19 Cable News Network (CNN), “Witness: Peaceful Protesters incongruities. Better awareness and analysis of a deception Mowed Down in Libya,” CNN, March, 4, 2011, accessed on May 1, 2014, http://edition.cnn.com/2011/WORLD/africa/03/04/ hypothesis may lead to its detection and subsequently limit libya.conflict/index.html; British Broadcasting Corporation (BBC), “Libya Protests: Gaddafi Embattled by Opposition Gains,” BBC,
American Intelligence Journal Page 43 Vol 32, No 2 February 24, 2011, accessed on May 1, 2014, http:// 13, 2014, http://therealnews.com/t2/ www.bbc.co.uk/news/world-africa-12564104. index.php?option=com_content&task=view&id=767&Itemid=74&jumival=8107. 20 Reuters, “Libyan Minister Quits Over Crackdown,” Reuters, 38 Clare M. Gillis, “Benghazi: After the Revolution,” The February 21, 2011, accessed May 1, 2014, http://af.reuters.com/ American Scholar (Winter 2014): 6-9. article/commoditiesNews/idAFLDE71K1PJ20110221. 39 Agence France-Presse (AFP), “Libyan Islamists Seize Arms,” 21 Barack Obama, “Statement of President Barack Obama on Sydney Morning Herald. Libya,” Office of the Press Secretary, August 22, 2011, accessed 40 Lourdes Garcia-Navarro, “Provisional Government,” NPR, June 6, 2014, http://www.whitehouse.gov/the-press-office/2011/ February 23, 2011, accessed April 30, 2014, http://www.npr.org/ 08/22/statement-president-barack-obama-libya.html; British 2011/02/23/134003954/New-Government-Forms-In-Eastern- Broadcasting Corporation (BBC), “Libya Protests: Ghaddafi Libya; Cable News Network (CNN), “Rebel Leader Calls,” CNN. Embattled,” BBC. 41 Cable News Network (CNN), “Rebel Leader Calls for 22 International Criminal Court (ICC), “Warrant of Arrest for Immediate No-Fly Zone,” CNN. Muammar Mohammed Abu Minyar Gaddafi,” ICC, June 27, 42 Umar Kahn, “Casualty Figures Exaggerated, Says Ministry,” 2011, 3-6. Libya Herald, January 7, 2013, accessed May 22, 2014, http:// 23 Ishaan Tharoor, “Ghaddafi Warns Benghazi Rebels: We Are www.libyaherald.com/2013/01/07/casualty-figures-exaggerated- Coming, and There’ll Be No Mercy,” TIME, March 17, 2011, says-ministry/#axzz2imr4HOG2. accessed May 2, 2014, http://world.time.com/2011/03/17/gaddafi- 43 Julien Tiel, “Humanitarian War in Libya: There is No Evidence,” warns-benghazi-rebel-city-we-are-coming-and-therell-be-no-mercy/ YouTube, uploaded November 28, 2011, accessed May 20, 2014, 24 United Nations Security Council, “Protection of Civilians,” S/ http://www.youtube.com/watch?v=pU9IzXsALwo; British RES/1973(2011) (New York: UN, 2011), 3. Broadcasting Corporation (BBC), “Libya Protests,” BBC; Daalder 25 Kuperman, “A Model Humanitarian Intervention?” 107-108; and Stavridis, “NATO’s Victory in Libya,” 2. Interim National Council, “A Vision of a Democratic Libya,” 44 Kuperman, “A Model Humanitarian Intervention?” 111. Guardian (UK). 45 Ibid. 26 Ivo H. Daalder and James G. Stavridis, “NATO’s Victory: The 46 Cable News Network (CNN), “Witness: Peaceful Protesters Right Way to Run an Intervention,” Foreign Affairs, Vol. 91, No. 2 Mowed Down in Libya,” CNN, March 4, 2011, accessed April 10, (March/April 2012), 2-7. 2014, http://www.cnn.com/2011/WORLD/africa/03/04/ 27 John Rosenthal, The Jihadist Plot: The Untold Story of Al-Qaeda libya.conflict/; Black, “Libya Cracks Down,” Guardian (UK); and the Libyan Rebellion (New York: Encounter Books, 2013), 14. British Broadcasting Corporation (BBC), “Libya Protests: Second 28 Ibid., 13. City Benghazi Hit By Violence,” BBC, February 16, 2011, 29 International Crisis Group (ICG), “Popular Protest in North accessed May 13, 2014, http://www.bbc.co.uk/news/world-africa- Africa and the Middle East (V): Making Sense of Libya,” ICG, 12477275. Middle East/North Africa Report, No. 107 (June 6, 2011), 3. 47 Kuperman, “A Model Humanitarian Intervention?” 105-136. 30 Ibid., 3. 48 Hugh Roberts, “Who Said Gaddafi Had to Go?” London Review 31 Alan Cowell, “Protests Take Aim at Leader of Libya,” The New of Books, Vol. 33, No. 22 (November 2011): 8-18; Kuperman, “A York Times, February 16, 2011, accessed May 17, 2014, http:// Model Humanitarian Intervention?” 109. www.nytimes.com/2011/02/17/world/middleeast/17libya.html. 49 U.S. Department of Defense, Joint Publication 3-13.4, Military 32 British Broadcasting Corporation (BBC), “Libya Protest: Deception (Washington, DC: CJCS, 2006), I-6. Second City Benghazi Hit by Violence,” BBC, February 16, 2011, 50 Mohammed Abbas, “Libya Rebels Form Council, Oppose accessed May 22, 2014, http://www.bbc.co.uk/news/world-africa- Foreign Intervention,” Reuters, February 27, 2011, accessed May 12477275; Ian Black, “Libya Cracks Down on Protesters After 2, 2014, http://www.reuters.com/article/2011/02/27/us-libya- Violent Clashes in Benghazi,” Guardian (UK), February 16, 2011, council-revolution-idUSTRE71Q1CT20110227. accessed May 13, 2014, http://www.theguardian.com/world/2011/ 51 United Kingdom, “Foreign Secretary Speaks to General Abdul feb/16/libya-clashes-benghazi. Fattah Younis al Obidi,” Foreign and Commonwealth Office, 33 Agence France-Presse (AFP), “Libyan Islamists Seize Arms, London, United Kingdom, March 2, 2011, accessed May 22, 2014, Take Hostages,” Sydney Morning Herald, February 21, 2011, http://www.fco.gov.uk/en/news/latest-news/ accessed May 15, 2014, http://news.smh.com.au/breaking-news- ?view=News&id=559394982 ; Cable News Network (CNN), world/libyan-islamists-seize-arms-take-hostages-20110221- “Witness: Peaceful Protesters Mowed Down in Libya,” CNN; 1b19c.html. Cable News Network (CNN), “Rebel Leader Calls for Immediate 34 Cowell, “Protests Take Aim at Leader of Libya,” The New York Action on No-fly Zone,” CNN, March 10, 2011, accessed on May Times. 2, 2014, http://www.cnn.com/2011/WORLD/africa/03/09/ 35Alison Pargeter, “Qadhafi and Political Islam in Libya,” in Libya libya.civil.war/index.html. Since 1969: Qadhafi’s Revolution Revisited, ed. Dirk Vanderwalle 52 Diaa Hadid, “Arab League Asks UN For Libya No-Fly Zone,” (New York: Palgrave Macmillan, 2008), 87; Kuperman, “A Model The Huffington Post, March 12, 2011, accessed May 2, 2014, Humanitarian Intervention?” 109; Amnesty International, The http://www.huffingtonpost.com/2011/03/12/arab-league-asks-un- Battle for Libya: Killings, Disappearances, and Torture (London: for-libya-no-fly-zone_n_834975.html. Amnesty International, September 8, 2011), 37. 53 Cable News Network (CNN), “Witness: Peaceful Protesters 36 British Broadcasting Corporation (BBC), “Libya Protests: Mowed Down in Libya,” CNN. Ghaddafi Embattled,” BBC. 54 Evans and Sahnoun, “Responsibility to Protect,” 100. 37 Paul Jay, “Former Al-Jazeera Reporter On The Libyan 55 Cable News Network (CNN), “Rebel Leader Calls for Coverage,” The Real News.com, March 21, 2012, accessed May Immediate Action on no-fly zone,” CNN. 56 Ibid.
Vol 32, No 2 Page 44 American Intelligence Journal 57 Evans, “R2P: Rethinking Humanitarian Intervention,” 85; Cable YouTube; 70 NGOs, “Urgent Appeal to Stop Atrocities in Libya,” News Network (CNN), “Witness: Peaceful Protesters Mowed UN Watch, February 21, 2011, accessed May 20, 2014, http:// Down in Libya,” CNN. www.unwatch.org/site/apps/nlnet/ 58 ICISS, R2P, XII. content2.aspx?c=bdKKISNqEmG&b=1330815&ct=9135143. 59 Susan E. Rice, “Interview With Ambassador Susan E. Rice, US 80 McAdams, “Humanitarian Wars and Their NGO Foot Soldiers,” Permanent Representative to the United Nations, on Meet the Ludwig Von Mises Institute. Press,” United States Mission to the United Nations, February 20, 81 Tiel, “Humanitarian War in Libya,” YouTube; 70 NGOs, 2011, accessed June 6, 2014, http://usun.state.gov/briefing/ “Urgent Appeal to Stop Atrocities in Libya,” UN Watch. statements/2011/156832.htm; Rosemary A. DiCarlo, “ Remarks 82 Ibid. on Libya At a Security Council Stakeout,” U.S. Department of 83 Ibid. State, February 22, 2011, accessed June 6, 2014, http:// 84 Kuperman, “A Model Humanitarian Intervention?” 111. usun.state.gov/briefing/statements/2011/157195.htm; Michael 85 Ibid., 111. Warren, “Foreign Policy Initiative to Obama: US, Allies Must Act 86 Tiel, “Humanitarian War in Libya,” YouTube. On Libya,” Weekly Standard, February 25, 2011, accessed May 2, 87 Ibid. 2014, http://www.weeklystandard.com/blogs/foreign-policy- 88 Ibid. initiative-obama-us-allies-must-act-libya_552509.html. 89 Cable News Network (CNN), “Witness: Peaceful Protests,” 60 Interim National Council, “A Vision of a Democratic Libya,” CNN. Guardian (UK). 90 International Crisis Group (ICG), “Popular Protest in North 61 Ibid. Africa and the Middle East (V),” 4; Amnesty International, 62 Dugald McConnell and Brian Todd, “Libyan Leader’s Embrace “Libya: Colonel Al-Gaddafi Must End Spiraling Killings,” of Sharia Raises Eyebrows,” CNN, October 26, 2011, accessed Amnesty International, February 20, 2011, accessed June 20, May 14, 2014, http://www.cnn.com/2011/10/26/world/africa/ 2014, http://www.amnesty.org/en/news-and-updates/libyan- libya-sharia/index.html. leader-must-end-spiralling-killings-2011-02-20. 63 Ibid. 91 International Crisis Group (ICG), “Immediate International 64 Leela Jacinto, “The Libyan War, Brought to You by Bernard Steps Needed to Stop Atrocities in Libya,” ICG, February 22, Henri-Levy,” France 24, June 7, 2012, accessed May 5, 2014, 2011, accessed May 13, 2014, http://www.crisisgroup.org/en/ http://www.france24.com/en/20120606-libyan-war-brought-you- publication-type/media-releases/2011/immediate-international- bernard-henri-levy-sarkozy-clinton-obama/#./ steps-needed-to-stop-atrocities-in-libya.aspx. ?&_suid=13992999084850522539669851672. 92 “Popular Protest in North Africa and the Middle East (V),” 65 Ibid. International Crisis Group, 4-5. 66 Scott Peterson, “Libyan Rebels Tarnished by Human Rights 93 Jason Koutsoukis, “African’s Targeted as Rebels Hunt Reports,” Christian Science Monitor, September 13, 2011, Mercenaries,” WAToday (AU), March 5, 2011, accessed May 19, accessed May 19, 2014, http://www.csmonitor.com/layout/set/ 2011, http://www.watoday.com.au/world/africans-targeted-as- r14/layout/set/r14/World/Middle-East/2011/0913/Libyan-rebels- rebels-hunt-mercenaries-20110305-1bivv.html. This article cites tarnished-by-human-rights-report. Human Rights Watch emergencies director, Peter Bouchaert, who 67 Ibid. states that he has not found one mercenary in eastern Libya. 68 Agence France-Presse (AFP), “Libya Grants Immunity to According to the article, Bouchaert condemned some media outlets ‘Revolutionaries’,” Al Arabiya News, May 3, 2012, accessed May for purporting to identify alleged mercenaries, saying the reports 19, 2014, http://www.alarabiya.net/articles/2012/05/03/ were untrue. “There have been several cases of journalists sneaking 211978.html. into detention areas, taking photographs of people and then 69 Jay, “Former Al-Jazeera Reporter” The Real News.com. turning around and describing them as mercenaries, but those 70 Ibid. reports were untrue...rumours surrounding the alleged use of 71 Cable News Network (CNN), “Witness: Peaceful Protests,” mercenaries had incited a level of hysteria that had led to cases of CNN. some [men] being lynched,” he said. 72 British Broadcasting Corporation (BBC), “Libya Protests,” 94 Cockburn, “Amnesty Questions Claim,” Independent (UK). BBC. 95 Ibid. 73 Hill, “Libya’s Revolution Headquarters,” Al-Jazeera. 96 Eyewitness accounts were later recanted when questioned 74 Ibid. individually. Viagra packets shown by rebels to journalists were 75 Ibid. unharmed and showed no evidence of damage or burns, although 76 Gillis, “After the Revolution,” 9. they were supposedly found in tanks destroyed by NATO. 77 Nicholas Watt and Patrick Wintour, “Libya No-Fly Zone Call Cockburn, “Amnesty Questions Claim,” Independent (UK). by France Fails to Get David Cameron’s Backing,” Guardian 97 Jacinto, “The Libyan War, Brought To You By Bernard-Henri (UK), February 23, 2011, accessed May 14, 2014, http:// Levy,” France 24. www.theguardian.com/world/2011/feb/23/libya-nofly-zone-david- 98 Jacinto, “The Libyan War, Brought To You By Bernard-Henri cameron. Levy,” France 24; Karin Badt, “Bernard-Henri Levy Urges 78 Daniel McAdams, “Humanitarian Wars and Their NGO Foot Intervention in Syria: His Role in Libya as Example,” The Soldiers,” Ludwig Von Mises Institute, October 4, 2013, accessed Huffington Post. May 20, 2014, http://mises.org/daily/6549/Humanitarian-Wars- 99 Georg Diez and Britta Sandberg, “Spiegel Interview With and-Their-NGO-FootSoldiers. Bernard-Henri Levy: We Lost a Great Deal of Time in Libya 79 McAdams, “Humanitarian Wars and Their NGO Foot Soldiers,” Because of the Germans,” Der Spiegel, March 30, 2011, accessed Ludwig Von Mises Institute; Tiel, “Humanitarian War in Libya,” May 17, 2014, http://www.spiegel.de/international/world/spiegel-
American Intelligence Journal Page 45 Vol 32, No 2 interview-with-bernard-henri-levy-we-lost-a-great-deal-of-time-in- With Libyan Rebels Is Rewarded With Contract,” The Hill, April libya-because-of-the-germans-a-753797.html. 4, 2014, accessed May 2, 2014, http://thehill.com/business-a- 100 Al Jazeera, “Libya’s ‘Crown Prince’ Makes Appeal – lobbying/219821-first-dc-firm-to-sign-with-libyan-rebels-is- Muhammad El Senussi Calls for the International Community To rewarded-with-contract; Kevin Bogardus, “PR Firm Helps Libyan Help Remove Muammar Gaddafi from Power, “ Al Jazeera, Rebels to Campaign for Support from US,” The Hill, April 12, February 24, 2011, accessed March 17, 2014, http:// 2011, accessed May 2, 2014, http://thehill.com/business-a- www.aljazeera.com/video/africa/2011/02/ lobbying/155379-pr-firm-helps-libyan-rebels-to-campaign-for-us- 201122416028655869.html. Al-Sanusi is a tribe historically support. opposed to Qaddafi’s regime, and is also the same tribe to which 107 Bennett and Waltz, Counterdeception Principles and Jalil belongs. Applications, 24. 101 Reuters, “U.N. Rights Office Urges World Protect Libya 108 Kuperman, “A Model Humanitarian Intervention?” 109-113. Civilians,” Reuters, March 14, 2011, accessed May 14, 2014, 109 Gentry, “Warning Analysis,” 80-81. http://www.reuters.com/article/2011/03/14/us-libya-un-rights- idUSTRE72D5WD20110314. MAJ (USA) William S. Riley, Jr., is a graduate of the 102 United Nations Security Council (UNSC), S/RES/1970, National Intelligence University with a Master of Science February 26, 2011. of Strategic Intelligence degree, and also holds a BA 103 United Nations Security Council (UNSC), S/RES/1973, March 17, 2011. degree in Marketing from North Georgia College. He is a 104 Barack Obama, David Cameron, and Nicolas Sarkozy, “Libya’s graduate of the U.S. Army Command and General Staff Pathway to Peace,” The New York Times, April 14, 2011, accessed College and the Military Intelligence Officer Basic and May 4, 2014, http://www.nytimes.com/2011/04/15/opinion/15iht- Advanced courses. He is currently assigned as the chief of edlibya15.html?_r=0. collective training and mobilizations for the Military 105 James B. Steinberg, “Assessing the Situation in Libya: Intelligence Readiness Command (MIRC) at Fort Belvoir, Statement Before the Senate Foreign Relations Committee,” U.S. VA. Will has served in military intelligence leadership and Department of State, March 31, 2011, accessed June 6, 2014, staff positions at every level, both in garrison and during http://www.state.gov/s/d/former/steinberg/remarks/2011/ four operational deployments to CENTCOM and EUCOM 169300.htm. 106 John Pollock, “People Power 2.0: How Civilians Helped Win theaters of operations. the Libyan Information War,” Technology Review, May/June 2012, 62-71; Kevin Bogardus, “First DC Lobbying Firm to Sign
Exxcellence with Integrity
Pluribus International Corporation provides high quality, best-value, intelligence analysis and programmatic support services to U.S. Defense, Homeland Security, and Intelligence Community customers that directly support the fulfillment of National Security objectives. Honesty and integrity in our actions and dealingss with customers, employees, and industry partners will never be compromised.
For informaation contact , ) 2 7- !
www.pluribusinternaational.com
Vol 32, No 2 Page 46 American Intelligence Journal Interwar Germany vs. Nuclear Iran: Applying Lessons Learned
by Special Agent Lisa M. Lopez
terrorism and repeated violations against NPT provisions The past does not repeat itself but it rhymes. which convinced the international community that Iran’s primary motivation for pursuing this technology was to -Mark Twain acquire nuclear arms. As a signatory to the NPT under Shah Pahlavi, Iran claims that it holds a right equal to that of any he threat of nuclear proliferation is an issue that other signatory to thetechnology as a means to access permeates the national interests of all states peaceful nuclear energy. Despite countermeasures enacted regardless of nuclear status. In a post-Cold War era T by the U.S. and its international partners to deter this when signatories in good standing with the nuclear Non- endeavor, Iran has succeeded in the covert reestablishment Proliferation Treaty (NPT) strive to deescalate the threat of its nuclear program. President Barack Obama expressed through cooperative disarmament, material and technology his concern over Iran’s nuclear progress in a press controls, and the promotion of peaceful nuclear energy; conference on March 14, 2013. His statements reflect U.S. there are others who seek to subvert these efforts and military and IC assessments that, if it so chooses, Tehran is advance their grand strategies through means of strategic only a year or more away from weaponizing its illicit denial and deception (D&D).1 No state presents a greater technology.2 threat in this capacity than the Islamic Republic of Iran [for convenience hereafter referred to as merely Iran].
This case study comparison examined the relationship Iran incrementally achieved its nuclear between D&D in the national objectives and grand objective by utilizing D&D methods to strategies of interwar Germany from 1918 until 1939 and conceal its progress and deceive the nuclear Iran from 1979 until 2013. The purpose of this international community. comparison was to assess the U.S. Intelligence Community’s (IC) ability to identify and counter Iranian deception in efforts to deter nuclear proliferation through the application Iran incrementally achieved its nuclear objective by utilizing of lessons learned from the German rearmament. This study D&D methods to conceal its progress and deceive the relied on analogical reasoning to compare and contrast links international community. Despite statements to the between covert procurement networks, dual-use ruses, and contrary, intelligence reporting demonstrates that Iran diplomatic deception and delay used by Germany and Iran to continues to employ these methods as it develops nuclear achieve their national objectives. This information was then weapons capabilities under the cover of its nuclear program. evaluated using Analysis of Competing Hypotheses (ACH) Numerous cases throughout history have used this strategy against those lessons learned and translated into analytic of deception; however, few rival the level of international and decision-making standards, to address the extent to threat that a nuclear-armed Iran would pose. The most which they can impact the Iranian issue. The analysis comparable historic analogy is that of the Germans in their concluded that the consistent application of these standards successful interwar rearmament. can significantly aid the IC’s ability to identify and counter Iranian deception and therefore result in an indefinite delay From 1918 until 1920, Germany was forcibly disarmed by the of nuclear proliferation. Allied powers following its defeat in World War I. The preliminary armistice initiating the disarmament went into Since the fall of Shah Reza Pahlavi in 1979, the Khomeinist effect on November 11, 1918, and was superseded by the regime terminated and then reinstated Iran’s nuclear Treaty of Versailles which finalized the conditions of program. This revival, which coincided with the onset of the surrender on January 10, 1920. Despite the diplomatic and Iran-Iraq War, sparked opposition by the U.S. and other military pressure to concede to these agreements, German members of the international community. This was due to Chancellor Joseph Wirth had no intention of following countless demonstrations of Iranian state-sponsored through with his pledge to “…carry out without reservation
American Intelligence Journal Page 47 Vol 32, No 2 or delay the measures relative to …disarmament…” At the D&D FRAMEWORK AND APPLICATION time of his signature, he was already conspiring with politicians, military leaders, and industrialists to “…lay new Active Methods foundations for the development of the German armament technique.”3 These foundations employed covert he D&D framework is comprised of two primary rearmament measures in support of Germany’s grand factors: active methods and passive facilitators. strategy to subvert the provisions of the Versailles Treaty, TActive methods are those denial, deception, and and regain its regional dominance and status as a world adaptation activities executed by a deceiver to induce power through military force. German strategic deception is misperception by a target. Though denial, deception, and echoed throughout Iranian statecraft, though it is nowhere adaptation are distinct concepts, they are complementary as notable as in its national objective to acquire nuclear components necessary for a successful deception. One arms. This objective would allow Iran to advance its grand method cannot secure an effective deception without strategy to assert its regional dominance and status as a supplementation from the other methods. A deception world power through nuclear intimidation. cannot proceed without denying the target knowledge of the components and motivation behind a deception design. THE WHALEY ANALYSIS Conversely, the deception provides cover for those corresponding elements of denial. It is therefore essential to arton Whaley, a pioneering intelligence analyst in the understand the dynamics of these methods in the D&D field of foreign D&D, presented his assessment of structure and process. Bthe German rearmament in his book, Covert German Rearmament. His findings resulted in seven lessons learned Active methods are those denial, deception, from the success of Germany’s D&D strategy: and adaptation activities executed by a deceiver to induce misperception by a target. 1. Political leaders were unwilling to heed intelligence with awkward political implications; 2. Negotiators placed unwarranted faith in agreements and lost skepticism of Germany’s Denial, or “hiding the real,” as characterized by Whaley, is rearmament intentions; considered those measures taken by the deceiver to conceal 3. Arms limitation agreements omitted automatic the truth about a given operation, situation, object, person, sanctions that would have deterred evasion or location with the objective of influencing the target to capabilities; react in a means contradictory to its self-interests. Whaley 4. Intelligence analysis was conducted by technical further describes denial as “dissimulation” which takes experts who misjudged Germany’s intentions place in three forms: masking, repackaging, and dazzling. and achievements in intelligence reporting; Masking conceals all distinctive characteristics available to 5. Intelligence services succumbed to pressure to the target’s sensors, or matching them to surrounding report data in line with the biases and needs of the characteristics in an attempt to make them visible. clientele; Repackaging disguises in that it adds to or subtracts from 6. Economic collection and analysis did not take characteristics to transform them into a new pattern that precedence in monitoring and deterring resembles something else to the target. Dazzling confuses Germany’s rearmament progress; the target by randomizing or partially obscuring the 7. Preconceptions and bias took precedence over characteristics of an object or event in order to blur its 5 evidence in the analysis and decision-making distinctive pattern. process.4 Deception, or “showing the false,” presents a visible Whaley examined the efficacy of this evasion strategy in alternative reality to provide cover for the truth. Whaley subsequent works intended to identify D&D enablers in characterizes deception as “simulation” which also takes other and historical analogies. His insights revealed place in three forms: mimicking, inventing, and decoying. significant D&D trends among various case studies; Mimicking is the imitation of an element known to the target however, they are substantially evident in the German and to the extent that it could pass as a replica. It is done by Iranian comparison. copying one or more of the distinctive characteristics of that element to reflect its distinctive pattern. Inventing displays an alternative reality by creating one or more new characteristics to invent an entirely new pattern. Decoying diverts attention by misdirecting with feints or diversions. This is done by creating false characteristics that demonstrate a more convincing secondary pattern.6
Vol 32, No 2 Page 48 American Intelligence Journal D&D STRUCTURE MODEL circumvent every aspect of the agreement. This endeavor signaled a national conspiracy among key politicians,
military leaders, and industrialists to restore the glory of the STRUCTURE OF DENIAL AND DECEPTION ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ former imperial empire. Deception: Distorting Reality
Dissimulation: Hiding the Real Simulation: Showing the False To counter this effort, the Allies established the Inter-Allied
Control Commission charged with on-site enforcement and Masking: Concealing all distinctive characteristics Mimicking: Imitating one or more of the distinctive available to the targets sensors, or matching them to characteristics of an element to reflect its distinctive inspections. A failure from its inception, this body surrounding characteristics in an attempt to make them pattern invisible. mandated that Germany assemble a liaison committee to
assist in facilitating the disarmament process. Known as the Repackaging: Disguising through the addition or Inventing: Displaying an alternative reality by creating subtraction of characteristics to transform them into a on or more new characteristics to invent an entirely Army Peace Commission, this Reichswehr (Army) entity new pattern. new pattern initiated power games, evasion maneuvers, and obstruction
Dazzling: Confusing the target by randomizing or Decoying: Creating alternative false characteristics that techniques to undermine cooperation and fully deceive the partially obscuring the characteristics of an object or demonstrate a more convincing secondary pattern. Control Commission.9 event in order to blur its distinctive pattern.
Source: Whaley’s Structure of Deception The key to German rearmament was the arms industry, and the industrial giant of the time was Gustav Krupp. Krupp Adaptation of these methods modifies the activity to extend maintained Germany’s heavy arms production lines until the the deception according to the target’s response to the Allies ordered them destroyed under supervision of the deceiver’s stimuli. Whaley’s structural model demonstrates Control Commission. Despite this setback, Krupp never the options available to a deceiver in this framework.7 closed these production lines but rather diversified his products under the new company slogan, “We make Passive Facilitators everything (Wir machen alles)!” This peacetime division became active within weeks of the initial armistice and The execution of active methods alone does not in and of included products such as baby carriages, typewriters, itself support an effective deception. Exploiting the right motor scooters, heavy agriculture machinery, and target vulnerabilities at the right time is as important as locomotives. The government placed significant orders for employing the active methods selected to conduct the these products to keep Krupp in business, cover deficits, deception. It is therefore incumbent on the deceiver to retain skilled labor, and maintain production as cover for identify, monitor, and adapt to the target’s greatest future dual-use manufacturing. This effort supported the weaknesses, and then properly apply a corresponding active deception conspiracy to evade disarmament through method. Vulnerabilities include mindsets, mirror-imaging, industrial cooperation.10 and cognitive biases as analytical weaknesses that render a target susceptible to D&D. These weaknesses are self- Securing the German aviation industry was also a key factor induced and coincide to create an environment conducive to in the rearmament effort. As with the arms industry, the affect successful D&D.8 initial objective was to salvage and safeguard German inventories from confiscation by the Control Commission. In D&D APPLICATION IN INTERWAR every attempt to avert financial ruin, industrialists such as GERMANY (1918-1939) Tony Fokker were more than willing to contribute to this cause. ermany’s covert rearmament objective traversed four distinct phases of deception: Disarmament, 1918- While feigning treaty compliance, Fokker coordinated a G1920; Covert Arms Evasion, 1921-1926; Covert Arms smuggling network to conceal and transport his remaining Evasion, 1921-1926; and Overt Rearmament and Bluff, 1935- aviation inventory into Holland.11 This was accomplished 1939. by strategically placing aero components in his factory while concealing the bulk of his stock in secret locations Disarmament, 1918-1920 throughout Germany. He then bribed trade ministry officials to issue export permits and customs agents to evade Control The disarmament provisions imposed on Germany following Commission inspections at rail stations. Through these its loss of World War I devastated the nation. The means, he successfully smuggled 220 aircraft, 40 engines, Versailles Treaty virtually dismantled all German defenses, and $8 million of aviation inventory into Holland in less than seized territory, and subjected the nation to insurmountable seven weeks. This accomplishment allowed Fokker to war reparations to ensure that Germany could never again reestablish his business under Nederlandische instigate such destruction on the world. The Allies went to Vliegtuigenfabriek NV, one of many front companies that exhaustive lengths to enforce treaty compliance and, in supported Germany’s rearmament mission.12 response, the Germans instituted an evasion strategy to
American Intelligence Journal Page 49 Vol 32, No 2 Covert Arms Evasion, 1921-1926 with approval from his French and British counterparts who welcomed what they considered an end to wasted resources From 1921 until 1926, General Hans von Seeckt, Chairman of and effort. Despite this achievement, Stressmann dragged the Commission for the Peacetime Army Organization and out negotiations to avoid as many concessions as possible. Chief of the Reichswehr, sought to circumvent the Versailles His strategy succeeded as the Control Commission withdrew Treaty in every way possible. Two of his priorities were to on January 31, 1927. The closing report concluded that evade Reichswehr troop limitations by covertly funding “Germany had never disarmed, had never the intention of private paramilitary organizations and resurrecting the Flying disarming, and for seven years had done everything in her Corps. These issues were all but nonnegotiable with Allied power to deceive and ‘counter-control’ the Commission leadership. With limited exceptions, aircraft were strictly appointed to control her disarmament.” The report was prohibited. To compensate, General von Seeckt maintained a consequently disregarded and censored by Allied hidden reserve of trained pilots, air crews, and ground staff leadership.17 concealed in billets throughout the Reichswehr until provisions could be made to facilitate their aviation Clandestine Rearmament, 1927-1934 services.13 Withdrawal of the Control Commission left the inheritance of As in the Fokker example, there were many industrialists treaty compliance oversight to the ill-prepared League of willing to contribute and reap the financial benefits of Nations Council.18 This departure enabled the reactivation General von Seeckt’s covert objectives. Aircraft of the Koch and Kienzle (E) Secret Weapons Design Office manufacturers such as Junkers, Heinkel, Albatross, and under Krupp Works. This launched Krupp into a period of Dornier took orders from the Reichswehr to rebuild the Air “black production” which signified enhanced manufacturing Force inventory with the latest in aviation technology.14 of self-propelled guns, torpedo launching tubes, periscopes, Authorization of a limited commercial airline, Deutsch armored plate, primitive rocket designs, and other Lufthansa, provided an ideal opportunity for General von unauthorized controlled items. General von Seeckt’s early Seeckt to exploit dual-use technology by blending the Air 1920s strategy to postpone serial production and focus on Force into the state-controlled airline. Commercial aviation research and development was paying off. Krupp now had restrictions were lifted under the 1926 Pact of Paris and made the time, space, and security to put his innovations into evasion easier to mask the design, testing, and stockpiling of mass production.19 the Air Force inventory. This loophole opened the doors for the Defense Ministry to pad the numbers and push over 40 By 1933 Adolf Hitler was appointed Chancellor by President officers per year through the approved training. The von Hindenburg, whose death the following year allowed relaxation of these restrictions also authorized the creation of Hitler to declare the Office of the President permanently civilian glider clubs and flying schools which served as vacant thus uniting it with the Office of the Chancellor under cover for six additional Reichswehr training facilities. These the title “Der Führer.”20 This political revolution did not organizations and subsequent advertising squadrons signify a change in national direction with regard to disguised as commercial skywriting and advertising rearmament; however, it did signal a change of pace in the companies became the first operational units of the militarization process. In anticipation of these Luftwaffe.15 developments, industrialists and manufacturers raced to produce, import, and stockpile strategic metals for the mass General von Seeckt also sought political alliances to advance production of munitions, weapons, and equipment. Aviation this objective. He made a secret agreement between the capabilities were enhanced as a political alliance made under Reichswehr and Soviet forces under the 1922 Rapallo Treaty. the Rome-Berlin Axis compensated for the closure of training This treaty permitted the construction of a pilot school and facilities in Russia. Under this covert agreement, Italian aircraft testing center in Lipetsk, Russia. This collection dictator Benito Mussolini allowed select German pilots to brought millions of reichsmarks into the creation of this train in Italy with the Regia Aeronautica, the world’s most modern complex which was comprised of runways, hangars, advanced air force at the time. Upon completion of this repair shops, and other installation necessities. This combat aviation training, these newly qualified fighter pilots mutually beneficial agreement provided the facilities and returned to their cover positions as Lufthansa commercial space for German pilots to openly test and train in their pilots.21 combat aircraft, while providing simultaneous instruction to their Red Air Force counterparts.16 Restrictions were further eased under the 1926 Paris Air Pact to permit Germany to maintain “air police” units and aerial In addition to these efforts, Foreign Minister Gustav defense. Under his cover as Transport Minister, Hermann Stressmann pressed hard for the complete withdrawal of the Goering advanced the Reichwehr’s secret aviation Control Commission. His persistence was ultimately met component by creating the German Air Defense Union,
Vol 32, No 2 Page 50 American Intelligence Journal which gave him control of antiaircraft artillery and civil air that of the British Royal Air Force (RAF). Seeking raid defense.22 To enhance these provisions, Propaganda clarification of the “aviation equivalence,” the British Minister Joseph Goebbels ran a headline across the official Foreign Office questioned the German Air Ministry, which Nazi newspaper Voelkischer Beobackter reading “Foreign reported that Germany had procured 900 combat aircraft. Aircraft Over Berlin!” The story detailed the invasion of This was interpreted to mean that the Germans achieved German airspace by foreign bombers which circled the 30% airpower superiority over the RAF. To enhance this capital and dropped offensive leaflets. Goebbels insinuated perception, Goering coordinated a public demonstration that the aircraft were Russian and made it a point to state exhibiting 400 Luftwaffe aircraft, many of which were that Germany was powerless to intercept them because it decoys, to circle Berlin. This demonstration concluded was not authorized the appropriate aircraft. Feigning with a fly-by of fighter biplanes painted to mask their lack outrage over Germany’s lack of self-defense during this of munitions capabilities and stun the Allies with their incident, Goering petitioned the British Embassy to grant numerous combat aviation decoys.25 export licenses for engines to equip sufficient police planes. His petition was approved and 85 engines were shipped from Hitler continued to use this strategy to recover England.23 This means of deception brought Germany’s borderlands surrendered in the Versailles Treaty and, by clandestine air force closer to fruition and, by 1934, 44 air 1936, under the guise of highly-inflated troop numbers, units were operating from 42 airfields throughout Germany. the Wehrmacht had reoccupied the Rhineland. Analysis by British intelligence overestimated these numbers at This phase enabled the Germans to operate in a more open, 35,000 and the French even more at 265,000. This though still clandestine, environment. This freedom of discrepancy prompted a refusal on behalf of the French to movement did not negate their need for operational security counter the reoccupation unless the British marched with as the Allies continued to monitor and investigate them. The British also refused, resulting in a bloodless suspicious activity. Despite the outcome, these inquiries victory and recovery of the Rhineland for the Germans. seldom resulted in sanctions as verification of collected This accomplishment astonished Wehrmacht intelligence remained inconsistent at best. As a result, commanders, who anticipated a devastating defeat. This Germany maintained its course toward full rearmament. action was followed by additional annexations of territory that went continually unchallenged by the Allies, who Overt Rearmament and Bluff, 1935-1939 were paralyzed by their inability to verify Nazi propaganda.26 In 1935 Hitler openly defied the Versailles Treaty by publicly professing Germany’s successful rearmament. On the morning of September 1, 1939, the Wehrmacht Hitler considered this act a demonstration of self- invaded Poland under the assumption that, despite a determination, the timing of which launched Germany’s defense treaty, Great Britain and France would continue national power to a new level with little fear of Allied to refrain from military intervention. To bolster this reprisal. The transition in this phase did not end the assumption, Hitler proclaimed: rearmament deception, but rather adapted its active methods to execute a bluff, the intent of which was to For more than six years now, I have been engaged exaggerate the military might of the Wehrmacht (Armed in the building up of the German armed forces. Forces). This bluff was accomplished through the During this period more than 90 billion reichsmarks strategic release of disinformation by Nazi leadership into were spent building up the Wehrmacht. Today diplomatic and media channels. In one instance, Goering ours are the best equipped forces in the world, and stated that Germany possessed approximately 300 mostly they are superior to those of 1924. My confidence obsolete non-military aircraft and approximated that it in them can never be shaken.27 would take at least two years before it could develop a defensive air force. Thirteen months later, he rescinded The overt phase of this strategic deception enacted the this statement and declared the existence of the Luftwaffe final means necessary for Germany to achieve its national (Air Force) in a press release. This declaration coincided objective of complete rearmament; however, it failed to with his official notification to the British and French air secure a successful long-term battle strategy. The attaches.24 political, military, and industrial infrastructure that once served the interwar agenda could no longer fulfill In another example, Hitler assured Britain’s Lord Privy Germany’s grand strategy to assert its military dominance Seal, Anthony Eden, that Germany was defenseless in and status as a world power through its anticipated terms of aviation and had no desire for aerial aggression. victory in World War II. Thirteen months later, he renounced this assurance and informed Eden of the Luftwaffe’s aviation equivalence to
American Intelligence Journal Page 51 Vol 32, No 2 D&D APPLICATION IN NUCLEAR IRAN denial such as transshipment, coded communications, (1979-2013) record destruction, and money laundering were used as means of repackaging and masking the controlled items. ran’s post-revolution nuclear objectives have traversed Deception methods such as over-procurement, partial three distinct phases of deception in response to procurement, continuity of contracts, and falsified deterrence measures enacted against it by the U.S. and documents were also used to mimic acquisition patterns I and provide cover for the illicit material through decoys.32 the UN Security Council: Termination and Reinstatement of the Nuclear Program, 1979-1988; Covert Nuclear Evasion, When adaptation of these methods was required, Khan 1989-2002; and Overt Enrichment and Clandestine Pursuit for modified his practices to hinder the IC’s ability to 33 Nuclear Weapons, 2003-2013. recognize D&D in his nuclear operation.
Termination and Reinstatement of the Nuclear Program, These exchanges took place between 1984 and 1999 and 1979-1988 were worth tens of millions of dollars. Although they were not the only brokered transactions used to advance The first phase of Iran’s strategic deception encompassed Iran’s nuclear program, it is highly unlikely that it would Ayatollah Ruhollah Khomeini’s suspension of the nuclear have progressed to its current capacity without the 34 program in 1979 through its declared reinstatement in 1985 services of A.Q. Khan. as a nuclear deterrence against the U.S. and Iraq. Despite its limited means at the time, Iran reestablished its nuclear Covert Nuclear Evasion, 1989-2002 foundation beginning in 1984 through the assistance of covert proliferation networks and state-sponsored Iran increased its covert research and development contracts.28 exponentially following the death of Ayatollah Khomeini in 1989. This was accomplished by using active methods to Following the Iranian Revolution, Khomeini suspended evade deterrence and acquire the technology, training, Iran’s nuclear program over religious objections and fiscal materials, and processing equipment needed for nuclear self- prioritization of the new Islamic state. Iran’s nuclear sufficiency. This phase concluded in August 2002 when the cooperation with the U.S. ended with the official break in National Council of Resistance of Iran (NCRI), a political diplomatic relations. Construction on two semi-finished opposition group designated a terrorist organization by the reactors at Bushehr and plans for two additional reactors U.S. Department of State, reported the existence of uranium to be built by France at Ahvaz were cancelled. By 1982, enrichment facilities at Natanz and Arak to the International however, Khomeini sought to reinstate the nuclear Atomic Energy Agency (IAEA). A subsequent inspection program due to the regime’s recognition of the financial of these facilities by the IAEA indicated that Iran had failed complexity of suspending the commercial reactor project.29 to comply with conditions set forth in the NPT, which The decision was heavily influenced by the 8-year Iran- prompted the UN Security Council to invalidate Iran’s right Iraq War initiated by Iraq’s 1980 invasion of Khuzistan.30 to peaceful nuclear technology and implement financial 35 The war prompted Iranian officials to call for the sanctions. development of a nuclear deterrent in response to the threat of the U.S. and growing evidence of a covert Iraqi This deception phase significantly advanced Iran’s uranium nuclear weapons program. In 1984, then-President Ali mining infrastructure, uranium conversion capabilities, Khamenei announced to top Iranian officials that indigenous heavy water reactor and associated heavy water 36 Khomeini had decided to reactivate the nuclear program production plant, and uranium enrichment programs. In as the only way to secure the Islamic Revolution from 1989 then-President Rafsanjani signed the 10-point Iran- threats by its adversaries, especially the U.S. and Israel.31 Russia cooperation pact on the peaceful utilization of 37 By 1985, Iran officially reinstated its nuclear program nuclear materials and related equipment. The following beginning with the research and development of a self- year, Iran signed a nuclear cooperation agreement with sufficient gas centrifuge program. China which allowed it to procure covertly one metric ton of uranium hexafluoride (UF6) and feed gas for gas centrifuges This process required extensive meetings with without reporting the transaction as required by IAEA 38 international suppliers to procure covertly the necessary safeguards. These incidents coincided with a series of equipment, material, technology, and training to install 1,600 recently declassified telexes initiated by Iran’s secret and operate the system. In 1987 Iran employed a military research institute posing as Sharif University, proliferation network managed by the “father of requesting purchases for significant quantities of controlled 39 Pakistan’s nuclear program,” A.Q. Khan, to pursue this nuclear items. national objective. Khan utilized extensive D&D measures throughout this process. Active methods of
Vol 32, No 2 Page 52 American Intelligence Journal In response to these repeated violations, the U.S. IC military transports flying nonstop from Kazakhstan to Dover employed high-tech and human intelligence elements to Air Force Base, Delaware. The shipment was then monitor Iran’s nuclear developments. It also obtained transported via convoy to a storage site in Oak Ridge, information from partners such as Great Britain and Israel, Tennessee.42 and scrutinized IAEA reports from inspectors who were able to examine Iran’s declared nuclear facilities. Among the Further efforts were initiated by the U.S. IC to counter intelligence gathered by those means was the procurement Iranian nuclear procurement by sharing intelligence reports of a calutron, an electromagnetic device used to separate on Iranian proliferation endeavors with its greatest nuclear isotopes, purchased from China by Iran for its Center for suppliers, Russia and China. This change was a departure Agriculture Research and Nuclear Medicine. This device is from U.S. strategy as sensitive intelligence was usually normally used for peaceful purposes, though it also carries shared only when confronting these nations with an the dual capability to produce weapons-grade uranium. accusation. This outreach did very little to counter Russian News of this procurement concerned U.S. officials who and Chinese nuclear business with Iran. In response, the believed Iran might eventually be able to adapt a version for U.S. again changed its strategy and enacted the 1995 Iran military purposes. In addition to this information, further Trade Embargo to ban all U.S. trade with Iran which, among collection of Chinese nuclear assistance to Iran prompted other products, included 20% of its crude oil exports. This U.S. officials to conclude in the 1991 U.S. National response was believed to be an overreaction by states such Intelligence Estimate (NIE) that Iranian leadership was as France and Germany, which promoted political dialogue to committed to weaponizing its nuclear technology. Despite resolve the situation with Iran.43 this conclusion, the NIE did acknowledge that Iran’s nuclear program was in the primary stages of development, a This approach produced significant results in terms of determination considered to be overly optimistic by some delaying Iran’s progress toward proliferation. The CIA administration officials and field experts.40 estimated in 1992 that Iran could have nuclear weapons by 2000; however, in 1997, John Holum, Director of the Arms Iran’s presumed nuclear intentions were reported to the U.S. Control and Disarmament Agency, calculated that the Congress in 1992 by the Director of Central Intelligence, embargo resulted in delaying that date until 2005 at the Robert Gates. Gates testified that, without intervention, Iran earliest.44 would achieve its nuclear weaponization objective. His report, resulting from Iran’s increasing pattern of covert Between 1999 and 2000, Iran conducted tests on centrifuges procurement, led to an increase in U.S. intelligence collection at Kalaye Electric Company, its secret research and and information sharing to deter future nuclear transactions. development facility, using the Chinese-supplied UF6. Continued attempts by Iran to procure the materials These tests constituted further violations against safeguard necessary to advance its nuclear program only reinforced agreements and the NPT. In August 2002, the NCRI the U.S. IC’s conclusion of its nuclear motives.41 reported the existence of a uranium enrichment facility at Natanz and a heavy water plant at Arak. The Institute for Gates’ Congressional testimony specifically resulted in the Science and International Security located these sites and prevention of sales in nuclear goods to Iran on two released satellite imagery of both facilities.45 By December of significant occasions. The U.S. Ambassador to the IAEA, that year, the U.S. formally accused Iran of an “…across-the- Richard Kennedy, persuaded Argentina to defer from selling board pursuit of weapons of mass destruction.” 46 Iran nuclear fuel fabrication equipment which would have allowed it to convert natural uranium into weapons-grade Overt Enrichment and Clandestine Pursuit for Nuclear uranium. J. Stapleton Roy, U.S. Ambassador to China, Weapons, 2003-2013 visited a Chinese nuclear facility to examine a model of a reactor Iran wanted to purchase. Following a diplomatic Iran attempted to counter this accusation by complying with exchange, an official from the China National Nuclear select IAEA requests for nuclear monitoring. In February Corporation stated that China could not supply the reactor 2003, the IAEA was permitted to visit disclosed nuclear to Iran for technical reasons. These were not the only facilities; it concluded that the Arak facility was a heavy attempts to prevent procurement. In 1994 intelligence water production plant and that the Natanz enrichment services received information that Iran intended to purchase facility was equipped to hold 51,000 centrifuges. Presented large quantities of highly-enriched uranium and beryllium with this information, the European Union 3 (EU3), including from Kazakhstan. Under the approval of President Bill France, the United Kingdom, and Germany, succeeded in Clinton, the U.S. purchased all 1,320 pounds of the nuclear negotiations to persuade Iran to suspend its uranium material in an extensive operation codenamed SAPPHIRE. enrichment activities and implement the NPT’s Additional This operation involved the expertise of 31 U.S. specialists Protocol for nuclear safeguards. These measures to manage the secure transfer of the material in three C-5 strengthened the IAEA’s ability to monitor Iran’s nuclear
American Intelligence Journal Page 53 Vol 32, No 2 program through “snap inspections” to ensure that it did not Iran. The conspiracy began with an exchange of e-mails have any covert nuclear sites. This accord was sealed in the initiated by Khaki directing Yi to contact U.S. companies 2004 Paris Agreement which extended the temporary about purchasing nuclear equipment and materials. Under suspension of Iran’s nuclear activities pending negotiations the auspices of his purported position as managing director of long-term arrangements.47 for Monalila, Co. LTD in Guangzhou City, China, Yi and other middlemen sent price quote requests to various U.S. By 2006 Iran reneged on its commitment to the Paris companies for C-350 marging steel, metallic strip foil, thermal Agreement by resuming uranium conversion at its Esfahan ionization mass spectrometers, magnetic mass plant and blocking all impromptu IAEA inspections.48 Iran spectrometers, magnetic gauging equipment, TCH600 adapted its deception strategy by openly acknowledging its nitrogen/hydrogen/oxygen analyzers, vacuum pumps, nuclear pursuit and challenging the invalidation of its rights lathes, 7075-O aluminum rods, MKS baratron transducers, as as an NPT signatory while simultaneously exploiting its well as radioactive materials pertinent to nuclear dual-use technology. Iran’s official protests to the UN development. Each conspirator was met with a similar Security Council, including Germany (P5+1) in nuclear official response requesting confirmation that he/she was an negotiations, currently allows for the delay in diplomatic end-user and that the controlled items would not be used for intervention against its nuclear program. These delays buy nuclear activities. Khaki began to petition the services of time for Iran to advance its capabilities while it impedes the additional middlemen in the Philippines and the U.S. to diplomatic process.49 increase his chances of procurement. These contacts were tasked with, among other things, enlisting entities to serve as front company end-users on behalf of Khaki to procure ...the UN passed four rounds of economic the necessary equipment and materials. When engaging sanctions against Iran for its failure to with U.S. sellers, misrepresentations and false statements suspend enrichment and fully cooperate were made to convince them that no license was required by the U.S. government to ship the goods to a third country, with the IAEA. that being China, where Yi could then smuggle the controlled items directly to Khaki in Iran. Payments for these orders were transferred from a bank in China to further In 2009 the U.S. joined the EU3 in its failing diplomatic validate the seller’s confidence in the end-user.52 The negotiations with Iran. By September of that year, the U.S., success of this deceptive procurement strategy is flaunted in France, and the United Kingdom publicly revealed the a 2008 photograph of President Mahmoud Ahmadinejad existence of a secret uranium enrichment site being built near touring the Natanz enrichment plant where a U.S.-made MKS the city of Qom. This revelation prompted concern among baratron pressure transducer can be seen in the background the international community that Iran intended to construct a installed in Iranian nuclear equipment.53 Though probable, potential breakout facility where it could quickly produce the acquisition of this controlled item cannot be weapon-grade uranium for a bomb.50 conclusively attributed to Khaki and Yi; however, this evidence proves that proliferation networks, regardless of Throughout repeated negotiations between 2006 and 2010, the broker, are Iran’s key to its nuclear weaponization the UN passed four rounds of economic sanctions against objective. Iran for its failure to suspend enrichment and fully cooperate with the IAEA. In keeping with economic restrictions Khaki’s efforts were finally thwarted as he unknowingly instigated by the U.S. trade embargo, these sanctions target entangled himself in a U.S. counter-smuggling operation by entities and officials associated with the nuclear program, as propositioning an undercover federal agent for illicit well as illicit banking, shipping, and procurement industries procurement assistance. As a result, both he and Yi were supporting Iran’s nuclear endeavors.51 Despite these indicted on seven counts of conspiracy, smuggling, and countermeasures, there has been no lack of brokers, Iranian illegally exporting U.S. goods to Iran. Khaki was arrested in or otherwise, who would miss the opportunity to exploit the the Philippines at the behest of the U.S. government. Yi financial gains associated with the procurement of controlled remains at large.54 items for Iran’s nuclear program. This was demonstrated in the recent indictment of two such opportunists, Parviz Despite the outcome of this example, proliferation networks Khaki, an Iranian procurement agent, and Zongcheng Yi, a continue to provide lucrative opportunities for procurement Chinese middleman, who were charged with conspiracy, agents, which serve as an effective option for Iran to acquire smuggling, and illegally exporting U.S. goods to Iran. covertly the means to weaponize its nuclear capabilities.
Between October 2008 and January 2011, Khaki and Yi procured U.S. goods used to construct, operate, and maintain gas centrifuges to enrich uranium for customers in
Vol 32, No 2 Page 54 American Intelligence Journal D&D CASE COMPARISON and Delay’ with Nuclear Program,” published on March 6, 2013, cited a senior U.S. envoy of accusing Iran of here are three common denominators identified in the “deception, defiance, and delay” in its attempts to avert deception strategies of interwar Germany and nuclear the IAEA inspections of Tehran’s expanding uranium TIran: covert procurement networks, dual-use ruses, enrichment program.55 Joseph Macmanus, chief delegate and diplomatic deception and delay. of the IAEA, suggested that the U.S. should respond with tougher diplomatic action against Iran for this behavior. Covert procurement networks enabled both the Germans He further indicated that the U.S. should lobby for a and Iranians to acquire the materials, equipment, special inspection of Parchin, a facility that the Agency technology, and training necessary to facilitate the suspects was used to test explosive triggers for nuclear installation and operation of their clandestine armament weapons. International criticism of Iran has waned since objectives. This was accomplished in both cases through the February 2013 negotiations in Tehran, which is in the utilization of complex international procurement contrast to Macmanus’ statements advocating continued systems. This benefited Germany which established a international pressure to deter Iranian nuclear military/industrial cooperation with manufactures such as proliferation Krupp, Fokker, Koch, and Keinzle to advance its munitions, aviation, and secret weapons programs. Iran Just like Hitler in his diplomatic assurance that Germany followed suit through the use of proliferation networks had neither aviation defenses nor desire for aerial run by Khan, as well as secret agreements with Chinese, aggression, Iran denies any such aspiration for nuclear Russian, and European firms to attain nuclear self- weaponization. This denial is in contradiction to sufficiency. These systems networks allowed these significant evidence collected by Western intelligence states to evade authorities in the acquisition of controlled that it has hidden its rapidly expanding enrichment items to advance their illicit arms programs. program for years. This proof adds to suspicion that Iran’s primary objective is to produce fissile warhead Dual-use ruses also served as primary enablers to material over nuclear reactor fuel. Iran dismisses this provide cover for their strategies to achieve rearmament intelligence as “faked,” and refuses to allow the IAEA to and nuclear weaponization. In each case, Germany and resume inspections until details of the process are Iran lobbied authorities to authorize dual-use technology established.56 This is just one delay tactic stipulated by under diplomatic assurances that they were needed as a the West. Another is Iran’s chief delegate, Ali Asghar means to secure self-preservation. The Germans affected Soltanieh’s, blame of IAEA chief Yukiya Amano for the this deception through a ruse propagandizing its inability lack of progress in reopening the Agency’s probe by to defend itself from invading Russian bombers. Playing “issuing reports to provoke member states through on the Allies’ shared concern over the Russian threat allegations that his country denies.” This behavior is allowed the Germans to receive approval for limited aerial typical of Iran’s deviance and the UN Security Council’s police units as well as export licenses to legitimately demands to stop all enrichment and allow increased UN purchase air engines and other necessary aviation oversight in exchange for relief from international components. This dual-use ruse enabled Germany to sanctions severely hindering the Iranian economy. advance its clandestine air force under the guise of national defense. Iranians utilize this active method as Iran maintains an extensive history of past operational cover for self-preservation in much the same way as the practices of diplomatic delay in the evaluation portion of Germans though through the guise of equal access to this process. Its ability to employee this form of peaceful technology as a means to provide energy for the deception has postponed IAEA inspections and nation. This is a much easier ploy for Iran which, despite subsequent responses by the international community to UN sanctions and embargos, is still technically a deter advances in its suspicious nuclear program. Its signatory to the NPT which justifies its right to access, intent behind this deception is to buy time to complete its thus covertly weaponizing this dual-use technology. proliferation objectives and avert further sanctions that could hinder its future nuclear progress. Analysis of the Diplomatic deception and delay, the final enabler, played a deception strategy through this cognitive framework vital role in providing each of these actors the time, validates Iran’s motive to conceal its weaponization space, and security needed to develop their arms objective. The following models compare and contrast programs. This active method is an inherent component D&D in each of these cases used to achieve their of general Iranian statecraft and has been extremely respective arms objectives in pursuit of their shared grand effective in delaying international intervention and strategies to assert their regional dominance and status as deterrence in its national proliferation objective. The world powers. Associated Press article “U.S. Accuses Iran of ‘Deception
American Intelligence Journal Page 55 Vol 32, No 2 Vol 32, No 2 Page 56 American Intelligence Journal Analysis of Lessons Learned from the German E1 reflects the lack of continuity among members of Allied Rearmament Applied to Iranian Nuclear Proliferation leadership and the Control Commission to enforce sanctions against treaty violations that carried inconvenient political he culmination of this analogical comparison was tested implications. This observation corresponds to the same in an ACH to determine the most likely of four reasonable effect between U.S. decision-makers and Iranian leadership Toutcomes in the Iranian nuclear proliferation scenario. who consistently violate their commitment to the NPT with These hypotheses span a spectrum of applicability to answer minimal retribution to deter its pursuit for nuclear arms. E2 the thesis question: To what extent can the U.S. IC identify and refers to apathy in the Allies’ preference to put ill-placed counter Iranian deception in efforts to deter nuclear proliferation faith in agreements to avoid confrontations in challenging through lessons learned from the German rearmament? These Germany’s armament objective. This vulnerability is hypotheses (H) include: synonymous with various responses from U.S. decision- makers and members of the U.N. Security Council H1: Lessons learned from the German rearmament throughout nuclear negotiations with Iran. This issue is will not aid in identifying and countering Iranian further compounded by Western aspirations that Iran will deception, and will therefore result in a failure to change its nuclear policy under the current administration. deter nuclear proliferation. E3 concludes that automatic sanctions could have H2: Lessons learned from the German rearmament financially deterred the rearmament progress had they been will limitedly aid in identifying and countering included in arms limitation agreements. Though this Iranian deception, and will therefore result in a deficiency has since been rectified with subsequent minimal delay of nuclear proliferation. sanctions and embargos, they were not included in the initial H3: Lessons learned from the German rearmament NPT which allowed for equal access to nuclear technology will significantly aid in identifying and countering without penalties to counter treaty violations. This factor is Iranian deception, and will therefore result in an also lacking in the current proposal from the P5+1 offering indefinite delay nuclear proliferation. significant concessions to coerce Iran to abandon its pursuit H4: Lessons learned from the German rearmament for nuclear weaponization. E4 refers to the impact of will fully aid in identifying and countering Iranian analytical misjudgments made by technical experts tasked by deception, and will therefore result in a complete the Allies to determine German military intentions. This deterrence of nuclear proliferation. intelligence deficiency was prevalent throughout the first two deception phases of Iranian nuclear evasion, but These potential outcomes are compared against seven pieces improved following the 9/11 Commission’s recommendations of evidence to calculate their impact on corresponding to reorganize the U.S. IC and its combined analytic approach hypotheses. This evidence includes Whaley’s seven lessons toward strategic national security threats. E5 highlights the learned from the German rearmament translated into analytic ongoing issue from interwar Allied intelligence services to and decision-making standards to reflect their applicability current intelligence services to current intelligence services toward the Iranian. This evidence (E) includes: to report only that information that reflects the biases and needs of decision-makers. E6 determined that money was E1: Political leaders must heed intelligence that has the key to Germany’s ability to advance its rearmament awkward political implications. objective, and that fiscal anomalies were not effectively E2: Negotiators must not place unwarranted faith in scrutinized to identify and counter-deception motives. The agreements and loose skepticism of Iran’s nuclear difficulty continues to exist in the IC’s monitoring Iranian intentions. nuclear evasion. That is why economic collection and E3: Current nuclear agreements must contain analysis must take precedence over other collection automatic sanctions to deter evasion capabilities. objectives in the intelligence strategy to counter this issue. E4: Intelligence analysis must be conducted by E7 concludes that Allied preconceptions and biases took professional analysts and not nuclear experts to precedence over evidence in the analysis and decision- ensure continuity and accuracy in intelligence making processes to counter German arms evasion. This reporting. characteristic is just as prevalent, if not more so, throughout E5: Intelligence services must report accurate the internal and external debates over Iran’s covert nuclear information and not data that reflects the biases and development. This evidence is tested against the potential needs of the clientele. hypotheses in the following ACH matrix. E6: Economic collection and analysis must take precedence in monitoring Iran’s nuclear progress. This ACH deems that H1: Not Aid/Failure to Deter and H2: E7: Preconceptions and bias must not take precedence Limitedly Aid/Minimal Delay carry the most inconsistencies over evidence in the analysis or decision-making and are therefore the least likely outcomes in this spectrum process. of hypotheses. H3: Significantly Aid/Indefinitely Delay
American Intelligence Journal Page 57 Vol 32, No 2 ACH Matrix Lessons Learned from Interwar Germany Applied to Nuclear Iran
H1:Lessonslearnedwill H2:Lessonslearnedwill H3:Lessonslearnedwill H4:Lessonslearnedwill notaid,andresultina limitedlyaid,andresultin significantlyaid,and fullyaid,andresultina failuretodeternuclear aminimaldelayofnuclear resultinanindefinite completedeterrenceof proliferation proliferation. delayofnuclear nuclearproliferation. proliferation.
E1:Politicalleadersmust headintelligencethathas I I C I awkwardpolitical implications.
E2:Negotiatorsmustnot placeunwarrantedfaithin agreementsandloose I C C C skepticismofIran's nuclearintentions.
E3:Currentnuclear agreementsmustcontain I I C C automaticsanctionsto deterevasioncapabilities.
E4:Intelligenceanalysis mustbeconductedby professionalanalystsand nottechnicalexpertsto I I C C ensurecontinuityand accuracyinintelligence reporting.
E5:Intelligenceservices mustreportaccurate informationandnotdata I I C C thatreflectsthebiases andneedsoftheclientele.
E6:Economiccollection andanalysismusttake I C C C precedenceinmonitoring Iran'snuclearprogress.
E7:Preconceptionsand biasmustnottake precedenceoverevidence I C C C intheanalysisordecision makingprocesses.
TotalInconsistencies: 7 4 0 1 Source: Author’s Model and H4: Fully Aid/Complete Deterrence carry the least amount of political sanctions or concessions could coerce amount of inconsistencies but are separated by a single Iran into voluntarily abandoning its proliferation endeavor. variant which requires a secondary review of the weight given This examination therefore concludes that H3 is the most to each piece of evidence in its application to the likely outcome of this ACH. This conclusion determined corresponding hypotheses. H3 received consistency ratings that lessons learned from the German rearmament can for E1 through E7 because all evidence supports the premise significantly aid the U.S. IC’s ability to identify and counter of the hypothesis. H4 received consistency ratings for E2 Iranian deception, and result in an indefinite delay of nuclear through E7 for the same reason; however, it received an proliferation, so long as they are appropriately and inconsistency rating for E1 because it is not believed that any consistently applied to this intelligence issue.
Vol 32, No 2 Page 58 American Intelligence Journal At its current rate of development this analysis concluded 18 Ibid., 41. that Iran will achieve nuclear self-sufficiency within the near 19 William Manchester, The Arms of Krupp, 1587-1968 (Boston: future unless greater countermeasures, such as application Little Brown, 1968), 356. 20 Martyn Whittock, The Third Reich: The Rise and Fall of the of the analytic and decision-making standards established in Nazis (Philadelphia: Robinson and Running Press, 2011), 71-72. the ACH, are implemented to deter its progress. Based on 21 Barton Whaley, Covert German Rearmament (Frederick, MD: past operational practices utilizing covert procurement University Publications of America, Inc., 1984), 42-45. networks, dual-use ruses, and diplomatic deception and 22 Roger Manvell and Heinrich Fraenkel, Goering (New York: delay to advance this national objective, it is evident that Simon and Schuster, 1962), 116-117. Iran would not limit its nuclear capabilities solely to peaceful 23 Herbert Malloy Mason, The Rise of the Luftwaffe: Forging the energy production as it claims. This assertion does not Secret German Weapon, 1918-1940 (New York: Dial Press, 1973), signify that Iran would choose to use nuclear weapons; 176-177. 24 however, the fact that it merely possessed the technology Hauptmann Hermann, The Luftwaffe: Its Rise and Fall (New York: Putnam, 1943), 128-129. would be sufficient to incite an international nuclear standoff 25 Herbert Malloy Mason, The Rise of the Luftwaffe: Forging the with the potential to culminate in a third world war. It is Secret German Weapon, 1918-1940 (New York: Dial Press, 1973), therefore incumbent on the U.S. IC and decision-makers to 189. employ lessons learned from the German rearmament to deter 26 William Manchester, The Arms of Krupp, 1588-1968 (Boston: Iranian proliferation as a means to assert its regional Little, Brown 1968), 383. dominance and status as a world power. 27 Barton Whaley, Covert German Rearmament (Frederick, MD: University Publications of America, Inc., 1984), 58. Notes 28 David Albright and Andrea Stricter, “Iran’s Nuclear Primer,” 1 United Nations Office for Disarmament Affairs, “Treaty on the The Iran Primer, http://iranprimer.usip/org/resource/irans-nuclear- Non-proliferation of Nuclear Weapons,” http://www.un.org/ program (accessed on June 3, 2013). 29 disarmamentWMD/Nuclear/NPT.shtml,(accessed on May 11, Ibid. 30 2013). Elmer Swensen, “What Happens When the Islamists Take 2 Colleen McCain Nelson and Julian Barnes, “Obama Sets Power? The Case of Iran,” http:// Timeline on Iran Nuclear Bomb,” The Wall Street Journal (March gemsofislamism.tripod.com?khomeini_promises_kept.html 15, 2013). (accessed on June 3, 2013). 31 3 Barton Whaley, Covert German Rearmament (Frederick, MD: David Albright and Andrea Stricter, “Iran’s Nuclear Primer,” University Publications of America, Inc., 1984), 1 and 14. The Iran Primer, http://iranprimer.usip/org/resource/irans-nuclear- 4 Ibid., 4. program (accessed on June 3, 2013). 32 5 Barton Whaley, Military Deception and Strategic Surprise, eds. Aubrie Ohlde, “Proliferation Network Denial and Deception: John Gooch and Amos Perlmutter (New York: Routledge Taylor The A.Q. Khan Network through a New Lens” (master’s thesis, and Francis Group, 1982), 183-185. Joint Military Intelligence College, 2006), 66-71. 33 6 Ibid. Ibid., 71-76. 34 7 Scott Gerwehr and Russell Glenn, Unweaving the Web: Ibid. 35 Deception and Adaptation in Future Urban Operations (Santa David Albright and Andrea Stricter, “Iran’s Nuclear Primer,” Monica, CA: RAND, 2002), 51. The Iran Primer, http://iranprimer.usip/org/resource/irans-nuclear- 8 Richards J. Heuer, Psychology of Intelligence Analysis program (accessed on June 3, 2013). 36 (Washington, DC: Center for the Study of Intelligence, Central Ibid. 37 Intelligence Agency, 1999), 115-126. Oxford Research Group, “Chronology of Iran’s Nuclear 9 Herbert Malloy Mason, The Rise of the Luftwaffe: Forging the Programme, 1957-2007,” Oxford Group, http:// Secret German Weapon, 1918-1940 (New York: Dial Press, 1973), oxfordresearchgroup.org.uk/oxford_ 77-79. research_group_chronology_irans_nuclear_programme (accessed 10 Barton Whaley, Covert German Rearmament (Frederick, MD: on May 3, 2013). 38 University Publications of America, Inc., 1984), 10. David Albright and Andrea Stricter, “Iran’s Nuclear Primer,” 11 Anthony Fokker and Bruce Gould, Flying Dutchman: The Life The Iran Primer, http://iranprimer.usip/org/resource/irans-nuclear- of Anthony Fokker (New York: Holt, 1972), 216-217. program (accessed on June 3, 2013). 39 12 Ibid., 244. Joby Warrick, “Formerly Secret Telexes Reveal Iran’s Early Use 13 Herbert Rosinski, The German Army (New York: Praeger, of Deceit in Nuclear Program,” The Washington Post, http:// 1966), 70-74. www.washingtonpost.com/world/national-security/formerly- 14 Hauptmann Hermann, The Luftwaffe: Its Rise and Fall (New secret-telexes-offer-window-into-irans-nuclear-deceit/2012/02/11/ York: Putnam, 1943), 47. gIQAOiBlTR_story.html (accessed on November 26, 2013). 40 15 Hanfried Schleiphake, The Birth of the Luftwaffe (Chicago: Jeffrey Richelson, Spying on the Bomb (New York: W.W. Regnery, 1972), 16 and 29. Norton & Company, 2007), 506-507. 41 16 James Corum, The Roots of the Blitzkrieg: Hans Von Seeckt and Ibid. 42 Germany Military Reform (Lawrence: University Press of Kansas, Ibid., 507. 43 1992), 160. Ibid., 507-511. 44 17 John W. Wheeler-Bennett, The Nemesis of Power: The German Ibid., 509. Army in Politics, 1918-1945 (London: Macmillan, 1935), 185-186.
American Intelligence Journal Page 59 Vol 32, No 2 45 David Albright and Andrea Stricter, “Iran’s Nuclear Primer,” www.foxnews.com/world/2013/03/06/us-accuses-iran-deception- The Iran Primer, http://iranprimer.usip/org/resource/irans-nuclear- and-delay-with-nuclear-program (accessed on March 16, 2013). program (accessed on June 3, 2013). 56 Ibid. 46 Oxford Research Group, “Chronology of Iran’s Nuclear Programme, 1957-2007,” Oxford Group, http:// [Editor’s Note: This manuscript was written prior to the so- oxfordresearchgroup.org.uk/oxford_ called “nuclear deal” among Iran, the United States, and research_group_chronology_irans_nuclear_programme (accessed several European entities agreed to in mid-2015. Obviously, on May 3, 2013). some of the suppositions expressed by the author will have 47 David Albright and Andrea Stricter, “Iran’s Nuclear Primer,” The Iran Primer, http://iranprimer.usip/org/resource/irans-nuclear- to be modified based on the final outcome of this deal, which program (accessed on June 3, 2013). is still unclear and highly contentious.] 48 Oxford Research Group, “Chronology of Iran’s Nuclear Programme, 1957-2007,” Oxford Group, http:// Lisa M. Lopez is a Special Agent in the Diplomatic Security oxfordresearchgroup.org.uk/oxford_ Service of the U.S. Department of State and a 2013 research_group_chronology_irans_nuclear_programme (accessed graduate of the National Intelligence University’s Master on May 3, 2013). of Science of Strategic Intelligence program. This article 49 David Albright and Andrea Stricter, “Iran’s Nuclear Primer,” was adapted from her MSSI thesis, titled A Case Study The Iran Primer, http://iranprimer.usip/org/resource/irans-nuclear- Comparison of Denial and Deception: Applying Lessons program (accessed on June 3, 2013). 50 Ibid. Learned from the German Rearmament to Deter Iranian 51 Ibid. Nuclear Proliferation. 52 United States v. Parviz Khaki (a/k/a “Martin”) and Zongcheng Yi (a/k/a “Yi Cheng,” a/k/a “Kohler,” a/k/a “Kohler Yi”), 12-cr- 00061 (July 12,2012), 2-17. 53David Albright and Andrea Stricter, “Chinese Salesman Arrested in Pressure Case,” Institute for Science and International Security, January 18, 2013, 2. 54 Charlie Savage, “U.S. Charges Men in Plot to Violate Iran Embargo,” The New York Times, http://nytimes.com/2012/07/14/ world/middleeast (accessed on April 15, 2013). 55 Associate Press, “U.S. Accuses Iran of ‘Deception and Delay’ with Nuclear Program,” Fox News, March 6, 2013, http://
THE VALUE OF CHANGING OPEN SOURCE DATA INTO ACTIONABLE INTELLIGENCE.
©2014 Northrop Grumman Corporation www.northropgrumman.com
Vol 32, No 2 Page 60 American Intelligence Journal So Many Ways to Lie: The Complexity of Denial and Deception
by David T. Moore and Dr. William N. Reynolds
[Authors’ Note: We gratefully acknowledge the assistance WAYS TO THINK ABOUT COMPLEXITY of Rita Bush, David Dixon, William Mills, George Mitroka, Amanda Redmond-Neal, William Parquette, Suzanne Sluizer, Terms of Reference and Marta Weber in the preparation of this article. The views expressed are those of the authors and do not reflect he term “complexity” is frequently used but poorly the official policy or position of the National Security understood. Colloquially, all sorts of things may be Agency, the Department of Defense, the Advanced Tcalled “complex” whether or not this description is Research and Development Activity, the Central Intelligence backed up by a quantitative argument. Naturally, complexity Agency, the Office of the Director of National Intelligence, scientists have an interest in eliminating this ambiguity, and or the U.S. government.] there have been literally dozens of attempts to define “complexity” in such a way that it can be quantified in many INTRODUCTION different contexts.1 Two formulations of particular note are Andrey Kolmogorov’s descriptive complexity, the length of n recent years, the Intelligence Community has paid the shortest computer program that can reproduce a increasing attention to the role of complexity science in system’s output,2 and Ludwig Boltzmann’s concept of Iintelligence analysis. It is well known that intelligence entropy3 (called information by Claude Shannon4). problems are “complex,” insofar as they are detailed, Following Kolmogorov’s approach, Murray Gell-Mann has multifaceted, and extremely dynamic. However, this insight proposed crude complexity, that is, the length of a system’s has remained qualitative in nature, precluding the description given by one human expert to another.5 development of methods for reducing the complexity of Recently, Yaneer Bar-Yam has developed a metric for scale- these problems to a level within the capabilities of human dependent complexity that attempts to unify both entropy reasoning. A more realistic goal is to measure quantitatively and descriptive complexity.6 the complexity of modern intelligence problems so that their difficulty can be assessed up front. Such measurements will Fundamentally, reasoning about a complex system considers help determine the cost-benefits associated with a problem, two aspects of the system: First, the constituent elements the resource allocation it demands, and the most useful that make up the system, and second, the configurations analytic methods to solve it. those constituent elements can take. The Kolmogorov/Gell- Mann formulations focus on the first aspect of a complex It is well known that intelligence problems system. These gauge the complexity of a system according are “complex,” insofar as they are detailed, to the number of elements that make up the system. For multifaceted, and extremely dynamic. example, the complexity of a paused chess game would be given by a description of the positions of the pieces, along with the rules of chess. More pieces would lead to a longer description—hence, a more complex configuration. In In this article, we present a simple quantitative metric for general, this corresponds to our intuitive notion of estimating the complexity of denial and deception problems. complexity. We tend to assume that the more features that We show that the complexity of a problem increases as a are to be considered the more complex the system. product of the numbers of possible states (in essence, true, deceptive, etc.) for each of the possibly deceptive pieces of Boltzmann and Shannon’s entropy quantifies the second evidence. We enumerate the complete set of contingencies aspect. It simply counts the ways that a system can be that must be considered in a denial and deception problem configured, and uses this number as a measure of the and provide a heuristic-based method for pruning these system’s complexity.7 For example, the entropy of a certain down to a manageable set that can reasonably be considered set-up of a chessboard would be given as the number of by analysts and decision-makers. possible games that can be played from that starting point.
American Intelligence Journal Page 61 Vol 32, No 2 In intelligence problems, this is an extremely important problems. For example, consider a simple indicators and concept—how many contingencies does the analyst or warnings problem. The problem consists of five indicators, decision-maker have to consider? In our view, the answer is and each one of these occurs in one of two states, hostile or a two-step process: First, we must determine the complete peaceful, as shown in Table 1. space of all possibilities—in other words calculate the entropy, and second, we must reduce this space to those If troops are in garrison, communications are normal, artillery possibilities relevant to the decision to be made. Every such is not on the border, aircraft sorties are low, and leadership is reduction should be explicitly justified, as discounting visible in public, then the situation is normal. If troops are contingencies without justification invites strategic surprise. deployed, communications are off the air, artillery is relocated to the border, aircraft sorties are high, and Finally, the Bar-Yam approach attempts to unify these two leadership is not in public (i.e., deployed to a protective views of complexity by asking: how do the elements of a bunker), then war is imminent. But, what if all of the system impact the number of configurations that a system previous conditions are true except that leadership is still can take? Using our chess example, if we were to remove a visible in public? This, it is learned, is the profile for an piece from the board, would the number of possible games exercise. This was observed in the past, and the other side increase or decrease? In general, we would expect the mobilized its troops only to have the adversary redeploy its number of games to decrease, since we are removing all of troops and artillery to garrisons, restart communications, and the possible moves and stratagems that the deleted piece reduce aircraft sorties. Since responding troop mobilizations made available. However, it is quite conceivable that there are expensive and dangerous—one side might preemptively are some circumstances where the removal of a piece could attack first—the pattern of an exercise is learned. Now, increase the number of possible games instead. Bar-Yam’s when all the indicators for war but one in particular are approach quantifies the impact that constituent elements present, the conclusion is reached that it is an exercise. have on a system’s configurations. Indicator Condition (G=In Garrison, D=Deployed)
Troops G G G G G G G G G G G G G G G G D D D D D D D D D D D D D D D D Complexity and Intelligence Communications G G G G G G G G D D D D D D D D G G G G G G G G D D D D D D D D
Artillery G G G G D D D D G G G G D D D D G G G G D D D D G G G G D D D D
Aircraft Sorties G G D D G G D D G G D D G G D D G G D D G G D D G G D D G G D D
Indicator Status Conclusion Leadership G D G D G D G D G D G D G D G D G D G D G D G D G D G D G D G D
Troops Garrison Deployed Table 2: The Set of Indicators and Conditions of a Five- Communications Normal OTA Normal Indicator Binary Warning System. Which indicate peace? Artillery Garrison Border Which indicate war? What do the others signify? (Peacetime) Aircraft Sorties Low High
Leadership Visible Bunker What of the other possibilities (as shown in Table 2)? One
reason why indicator-based assessments fail is that the Indicator Status Conclusion number of indicator combinations exceeds the sense-making Troops Garrison Deployed capabilities of analysts. The “additive misperception” arises Communications Normal OTA when a linearly thinking analyst considers that adding a
Artillery Garrison Border War Pending single indicator to five preexisting indicators merely
Aircraft Sorties Low High increases the things he/she has to worry about by 20%. If another indicator is added, his/her manager may suggest Leadership Visible Bunker adding another analyst to the team to cope with the
Indicator Status Conclusion increase.8 Troops Garrison Deployed Exercise? Communications Normal OTA However, a Kolmogorov/Gell-Mann formulation of the Denial and Artillery Garrison Border complexity of this indicators and warnings problem would Deception before going Aircraft Sorties Low High place its complexity at 5, meaning the addition of a sixth to War? indicator increases the complexity of the problem by 20%. If Leadership Visible Bunker we use an entropic metric, we must also consider every state Table 1: Indicators of Peace, War and Uncertainty. that the indicators can take. In this case, that number is 2 (the number of states) to the power of 5 (the number of So what do these technical musings on the nature of indicators), or 32. Adding a new indicator increases the complexity have to do with intelligence problems? We exponent to 6, yielding 64 contingencies—an increase of submit that the increase in contingencies with the number of 100%. Adding yet another new indicator, for a total of elements is a basic confounding mechanism in intelligence
Vol 32, No 2 Page 62 American Intelligence Journal seven, a 40% change, leads to a 400% increase. This is a Moreover, it may be that an evolving pattern of relationships nonlinear, multiplicative progression that is typically and among the indicators reveals the adversary’s intentions. An erroneously thought of as additive. The addition of the emerging behavior develops based on the noted indicators extra analyst to the problem is an insufficient solution to the and the responses by the other side. Finally, a temporal combinatorial explosion. dimension can be added, compounding further what is already complex. Further, what happens if the adversary knows what indicators are employed in making determinations of war, As the indicators in Table 1 move from blue to red, a peace, and exercises? In this case, adversarial denial and decision point is reached. While analysts may not deception can disguise or mask key indicators, leading to understand what the pattern means, a warning must be miscalculations. As illustrated in the third table in Table 1, issued to the policy community. Deterrents—either the leadership might remain in public, offering statements of diplomatic or military—require preparation in advance. If the peace even while the troops are massing on and then situation really is a prelude for an attack, then the deterrent pouring over the border. The leadership subsequently may effectively prevent it. If no attack was planned, perhaps disappears into the bunkers as hostilities begin. The because the other side was conducting an exercise, then adversary knows that providing the other side—and both sides can refer to their actions as “exercises.” There is, perhaps its U.S. allies—with little or no advanced warning of course, a risk that if the adversary misperceives the increases the likelihood of (at least initial or partial) success. deterrent preparations then its own actions may escalate.
An illustration of such denial and deception occurred when the United States government issued a demarché to India in A response to an adversary’s state could 1995. By warning the Indian government not to conduct trigger further actions leading to an what appeared to be a nuclear test, the U.S. officials revealed accelerating pattern of miscalculations that the indicators employed in making such assessments. U.S. intelligence professionals believed their subsequent results in hostilities. analyses showed no Indian nuclear test preparations. Instead, they were being denied access to the indicators of such a test. When in 1998 India successfully conducted a Ultimately, can such judgments reliably be made in the first nuclear test, surprising the United States, the Indian place? David Schum notes: “There is never any base of government boasted of its success.9 relevant evidence that can be analyzed statistically.”10 In other words, every indication-based situation is unique. Therefore, the premises on which such considerations are Indicators themselves are a coarse-grained made are false: The fact that something occurred in the past shorthand for reality. is no guarantee that it will happen again in the future. Indeed, the closer one gets to individual actors, the less likely it is that specific actions will be repeated. As noted, a response to an adversary’s state could trigger further There are several considerations that require further actions leading to an accelerating pattern of miscalculations discussion. First, indicators themselves are a coarse-grained that results in hostilities. shorthand for reality. “Troops in Garrison” is a binary summary of a continuous reality. In fact, some troops are In a sense, this is what happened during the Cold War. Both always in garrison while others are not. The same is true for sides engaged in brinksmanship based on a series of other indicators in the example cited above. Making them indicators and warnings, but fortunately backed down when discrete indicators introduces approximations that may not things got too heated. Somehow, each side assessed correspond to the actual situation. correctly when the other was engaged in an exercise. Although mistakes were made, neither side overreacted, The reality is actually much more complex. Such systems are perhaps because the ultimate consequences were mutual rarely based on only five (or six, or seven) binary indicators. destruction.11 Many different indicators with trinary or greater outcomes are possible and likely. These combine in novel fashions Finally, complexity is not simply multiplication—these that quickly outstrip assessment capabilities of people and indicators are related to one another in subtle ways. A even computers. Consequently, while too coarse-grained a human is needed to determine, of the 100% increase in states scale may not capture reality, a too fine-grained one that comes with each new indicator, how many really convey overwhelms the capacity to detect significant changes. new information. This task cannot be trusted to a formula or other automation because the different indicators have highly non-linear relationships with one another that depend
American Intelligence Journal Page 63 Vol 32, No 2 on hypotheses about the intentions and capabilities of the evidence/hypothesis combination, the analyst determines adversary as well as the meanings of the indicators. The whether the evidence is confirmatory, disconfirmatory, or addition of constituent elements to a problem frequently has irrelevant to the hypothesis, with disconfirmatory evidence a confounding impact, wherein the number of configurations carrying the greatest weight.15 To address denial and increases, but sometimes it disambiguates existing deception problems, the analyst provides a deception configurations instead, reducing the set of contingencies hypothesis, which is also scored against the evidence. that must be considered. Each of the indicators can be characterized by its impact, confounding or disambiguating, Unfortunately, the addition of a single deception hypothesis on the complexity of the problem. does not properly capture the complexity of any denial and deception problem. Although it is an absolutely essential THE CHALLENGE OF DENIAL AND first step, admitting the possibility that one is being DECEPTION deceived does not answer whether one is being deceived, and in particular, it does not answer how one might be enial and deception is an ongoing problem because deceived—a fundamental problem for the victim of it works so well. As Cynthia Grabo observed, even deception is that there are so many ways to lie. Barton elementary deceptions are often very effective.12 In Whaley suggests that one response to the deception D problem is to seek inconsistencies in one’s perceived our view, they succeed because our analytic process either 16 does not generate correct hypotheses in the first place, or information. The problem with this approach is, again, allows hypotheses to be discarded without justification. combinatorial explosion—for N pieces of evidence, there are 2 With this in mind, we argue that the first step in a method to (N -N)/2 two-way possible comparisons that should be counter denial and deception should be to systematically examined. Since inconstancies typically occur at very fine- generate all possible deception hypotheses. As we have grained levels, where there are lots of data, this leads to argued above and will demonstrate further, there are multiple enormous numbers of comparisons (e.g., 1000 data elements difficulties with this approach—difficulties that reflect the would require 999,000 comparisons). If data need to be underlying complexity of the denial and deception problem. compared three at a time or more to detect a deception, the problem worsens, increasing as the number of elements to the power of the number of comparisons. The first step in a method to counter denial Since discovering deception, a priori, from data is difficult, and deception should be to systematically it seems reasonable to generate specific hypotheses as to generate all possible deception hypotheses. how an adversary may attempt to deceive us, and use these hypotheses as guides for detecting deception and developing contingencies to respond to possible deceptions As previously described, the possibility of deception (i.e., take measures to avoid surprise). How then do we introduces a combinatorial explosion of hypotheses that generate appropriate deception hypotheses? One approach must be considered, and the limitations of human reasoning is indicated by insights into the nature of deception: make addressing all possible hypotheses unreasonable. Thus a second requirement for a method to counter denial • If we are being deceived, then something we and deception is that it must efficiently and correctly prune believe is wrong. the number of deception hypotheses, removing those • Through a process of inversion, we should use hypotheses that are disconfirmed by evidence. The output each of our potentially erroneous beliefs as a of the method should be a set of related hypotheses of starting point for generating deception cognitively manageable size, that is, five to seven items at a hypotheses. time.13 By efficiently we mean that the method must be • We do not know which, if any, of our beliefs to usable by analysts in realistic time frames (requiring an analyst to exhaustively consider 10,000 deception distrust, and are thus faced with an hypotheses one by one is clearly not realistic). By correctly overwhelming set of deception hypotheses. we mean that the method should weed out only those deception hypotheses that are explicitly disconfirmed by Above, in speaking of “things we believe,” we are referring evidence. to items of evidence. Evidence consists of beliefs we hold about the state of the world that are created through a One approach to denial and deception problems is Heuer’s process of marshaling data and information. At their most Analysis of Competing Hypotheses (ACH).14 ACH involves basic level, these beliefs depend on credibility, relevance, marshaling the available information into a set of evidentiary and inferential or probative force. In other words, our beliefs elements, and then listing the evidence in a table, along with are scrutinized in terms of whether they are indeed a set of hypotheses generated by the analyst. For each believable, bear on the issue, and are persuasive.
Vol 32, No 2 Page 64 American Intelligence Journal Unfortunately, the analysts involved must establish these method, the causal hypotheses must be generated properties for each fact or collection of facts that ultimately separately for each evidentiary hypothesis and scored will become evidence. When effective, such considerations against the potentially deceptive evidence. However, in this abet uncertainty reduction. This occurs through a process new approach, we no longer need to add a special deception of argument, creative hypothesis generation, and the hypothesis because each configuration of the evidence development of chains of reasoning.17 indicates how the deception is being conducted.
For purposes of denial and deception discovery, analysts This first step provides a systematic enumeration of possible must consider two potential states for each piece of deceptions, given a particular set of evidentiary beliefs. The evidence: “true” or “deceptive.” A more sophisticated next question is how to effectively handle this potentially approach uses multiple evidentiary states, for example, enormous set of evidentiary hypotheses. A natural place to “true,” “deception by adversary,” or “self-deceptive.” In start is at the source of our combinatorial explosion—the fact, reasoning with uncertain or contradictory evidence is a likely deceptiveness of the evidence. If we are considering hallmark of intelligence analysis—consequently, this the possibility of active deception by our adversary, then we uncertainty will often be incorporated in the possible states must ascertain the likelihood that each individual piece of analysts will attribute to the evidence. Since they do not evidence is deceptive. A short list of indicators that helps in know exactly which, if any, items of evidence are deceptive, that task is: means, opportunity, motive, and past analysts must consider all possible configurations of the operational practices. evidence. For example, analysts may be uncertain about the state of a given piece of evidence—they have contradictory Means statements about leadership’s visibility. Thus, an indicator of four states can be assigned: “visible, true” – analysts The first question is whether the adversary is capable of perceive the leadership are visible and they are not being faking a particular piece of evidence. Some evidence, such deceived; “visible, deceptive” – analysts perceive the as that based on signals, is fairly easy to falsify, but other leadership is visible and they are being deceived; “hidden, evidence, such as that provided by multiple types of true” – analysts perceive the leadership is hidden and they sensors, is more difficult to falsify.18 For our modified ACH are not deceived; and “hidden, deceptive” – analysts method, the means test is to sequentially consider each perceive leadership is hidden and they are being deceived. piece of evidence that represents our belief and determine Since they must consider the possibility of deception for whether the adversary has the means to falsify it. If the each evidentiary element, analysts must deal with a answer is no, then evidentiary hypotheses that assume the combinatorial explosion of possible deceptions. Finally, piece of evidence is falsified can be discarded. For each additional sources of uncertainty and deception can be such elimination, we reduce the number of evidentiary added, such as the possibility of self-deception by adding hypotheses by a factor of the number of states for that piece possible states that each evidentiary element can take. of evidence.
Let us revisit our earlier indicators and warnings problem, Opportunity which involved five pieces of evidence—only this time, the evidence items can be either true or deceptive (rather than This next test asks whether our adversary is aware of our hostile versus peaceful), and we have no uncertainty in our collection mechanisms and is able to transmit falsified data perceptions of their state. Considering the possibility that for our sensors. Again, the type of the evidence will any combination of these could be true or deceptive gives determine whether there are reasonable grounds to suspect us 25 = 32 different configurations of the evidence. Thus, falsification. If insufficient opportunity exists for instead of considering a single problem with 5 pieces of falsification of a given piece of evidence, we can eliminate all evidence, in order to completely cover the deception space deception hypotheses that include the falsification of that we must consider 32 separate problems: the original problem evidence. Again, we expect a factor-of-state-number plus 31 deception problems. If there were 3 possible reduction in evidentiary hypotheses for each such deception states for each indicator, then the number of elimination. deception hypotheses would be 35 =243. These numbers provide a rough metric of the extent to which deception Motive compounds complexity in this type of problem. Informally, we are counting the number of ways to lie. In the context of Motive deals with the why of deception. What is the the original ACH approach, we now have two separate types purpose the adversary is trying to achieve by engaging in a of hypotheses: evidentiary hypotheses, which conjecture deception? In the context of ACH using evidentiary on the deceptiveness of the evidence, and causal hypotheses, questioning motive puts the cart before the hypotheses, which provide explanations of the evidence horse. In the proposed approach, we instead posit certain (including its deceptive nature). As in the original ACH
American Intelligence Journal Page 65 Vol 32, No 2 patterns of deception and then generate hypothetical the island.21 Most or all of these reports were discounted by motives that fit the evidentiary hypotheses. In this method, analysts who were inured to spurious reports of Soviet the absence of a reasonable motive to fit into a particular equipment secreted away in caves.22 evidentiary hypothesis would constitute a disconfirmatory argument, allowing us to discard that hypothesis. However, James Hansen—who worked in both CIA and DIA—posits this approach means that each evidentiary hypothesis must that the U.S. intelligence and policy communities were the be considered in turn, so it does not meet our requirement victims of a concerted Soviet campaign of denial and for efficiency. In the interest of efficiency, analysts should deception that masked the deployment of Soviet forces and only speculate about motive after applying the tests of missiles to Cuba.23 The deception campaign included means and opportunity. “accurate information about the deployment [leaked] so as to mask it.”24 As Raymond Garthoff relates, “There were Past Operational Practices literally thousands of reports of missiles in Cuba in the period before any missiles were actually brought there.”25 Does the adversary have a past history of deception? This question gets to the heart of whether the adversary is likely to engage in a deception today. In other words, how The Soviet campaign of denial and seriously do we need to take the likelihood of deception? deception took advantage of American Knowledge of an adversary’s culture may reveal evidence of points of view about the likelihood of Soviet the likelihood of deception. For example, how does the fact that Russians have ingrained cultural concepts, such as weapons being located in Cuba. maskirovka, increase or decrease the likelihood that their armed forces will engage in deceptive practices as a matter of military doctrine? How does what they have done in the Indeed, the Soviets were able to deploy more than the past—such as the deceptions that paralleled Operation offensive nuclear missiles that became the centerpiece of the ANADYR, the deployment of medium-range and subsequent crisis with the United States. While U.S. intermediate-range ballistic missiles in Cuba in 1962— analysts and policymakers knew of the conventional indicate what, when, and how they will deceive 44 years weapons buildup, they were blind to the presence of SS 4 later? Medium Range Ballistic Missiles (MRBM) and SS-5 Intermediate Range Ballistic Missiles prior to the U-2 Evidentiary Combinations overflights of 14 and 15 October. Additionally, they never discovered the presence of approximately 100 tactical As mentioned in our discussion of the indicators and nuclear weapons deployed on the island.26 There is warnings example, evidence does not exist in a vacuum, one contradictory evidence whether U.S. intelligence also piece isolated from another. Different evidentiary elements underestimated the number of Soviet troops deployed to are often coupled to one another, and inconsistencies in Cuba. Garthoff reports that one CIA unit concluded there evidence are one of the best indicators of deception.19 were between 45,000 and 50,000 Soviet troops in Cuba (the Typically, skilled adversaries know better than to concoct actual number was about 42,000) but the official estimate was self-contradicting evidence. With this knowledge, between 4,500 and 5,000 prior to the crisis.27 contradictory hypotheses can be eliminated, again reducing by multiplicative factors the number of problems to be The Soviet campaign of denial and deception took considered. advantage of American points of view about the likelihood of Soviet weapons being located in Cuba. As Robert Jervis DENIAL AND DECEPTION IN CUBA, makes clear: A CASE STUDY20 The U.S. did not expect the Russians to put missiles into Cuba or Japan to attack Pearl Harbor because The Deployment of Missiles in Cuba American officials knew that the U.S. would thwart these measures if they were taken. These judgments uring the summer of 1962, analysts at the Central were correct, but because other countries saw the Intelligence Agency (CIA) and the newly formed world and the U.S. less accurately, the American DDefense Intelligence Agency (DIA) received a spate predictions were inaccurate.28 of potentially alarming reports about Russians being seen in Cuba. The reports, however, were only part of a stream of It could have been worse. As Gil Merom writes, the Soviets similar, “farfetched tales of African troops with rings in their might have completed the bases and “threatened major U.S. noses, lurking Mongolians, and even Chinese troops” on cities with extinction.”29
Vol 32, No 2 Page 66 American Intelligence Journal It should be noted that the U.S. Intelligence Community was necessitating revision, but rather was ‘rehabilitated’ and not blind to the possibility that the Soviets might conduct a rendered ‘harmless’ on the basis of ad hoc statements.”37 military buildup in Cuba. In fact, there were two theories Instead, inductive reasoning generally led analysts to being debated about such a buildup—one, that the Soviets “prove” their theory and subsequently to adhere to it “until would deploy defensive weapons, and the other, that they it was proven wrong by conclusive hard evidence,” would deploy offensive weapons. Senior analysts in the evidence provided by the U-2 photos.38 Intelligence Community held the former theory while John McCone, then Director of Central Intelligence, favored the What tipped off the overhead surveillance were two latter. The defensive weapons theory predominated.30 HUMINT reports of “a Soviet truck convoy that appeared to be towing ballistic missiles toward the San Cristobal area.”39 The Soviets took advantage of the American beliefs and That these reports were taken seriously is one of the curious faulty reasoning. Capitalizing on the idea that it is easier to serendipities that occur from time to time in intelligence lead a target astray than to try to change his mind, they analysis (and other research-based domains). What successfully placed the nuclear missiles in Cuba.31 Heuer prompted the CIA and DIA analysts to take these reports observes: seriously while earlier reports had been dismissed remains a mystery. Garthoff asserts that it was new information taken [Deceptions] that follow this principle seldom fail, for in context with the observed “pattern of SA-2 surface-to-air the odds are then strongly in favor of the deceiver. missile sites in Western Cuba” that led to the tasking of the The human capacity to rationalize contradictory U-2 flight on 14 October.40 evidence is easily sufficient to outweigh the pernicious effects of security leaks and uncontrolled channels of Analysis of the Deception information that planners of deception…might compromise their efforts.32 The question on the minds of the CIA analysts and their policymaking customers was: Why are the Russians in Cuba, Roberta Wohlstetter commented about the crisis in and what are they doing? For purposes of this retrospect, “We would like to know not only how we felt, but counterfactual analysis, we must ask another question: what we did and what we might have done, and in particular Given their point of view, could analysts have known they what we knew or what we could have known.”33 were being deceived? Reviewing the evidence, an analyst Wohlstetter’s musings lead to a key question for analysts: would be faced with significant uncertainty as to the How could this successful deception campaign have been deployment of either missiles or troops. Further, Soviet thwarted? doctrine and the extremely high volume of reports coming out of Cuba—“dazzling” in the language of J. Barton Simply looking at additional evidence is sometimes promoted Bowyer41—would give analysts good reason to hypothesize as a means of detecting denial and deception by adversaries. deception. But if the Soviets were conducting a deception, In the Cuban case, however, analysts had already processed then how? What type of lie could the Russians be telling? a superabundance of evidence. Wohlstetter suggests that such riches can be “embarrassing.”34 This is because, even To answer these questions, we focus on the potential as “signals” point falsification of two key pieces of evidence in the problem: the presence of offensive Soviet strategic missiles and the to the action or to an adversary’s intention to undertake presence of Soviet troops. The Soviets had both the means it, “noise” or a background of irrelevant or inconsistent and opportunity to falsify the presence of both missiles and signals, [and] signs pointing in the wrong troops, and past operational practices indicated that they directions…tend always to obscure the signs pointing were very likely to employ deception, but the analysts of the the right way.35 day apparently were not predisposed to consider this possibility. In the Cuban case, HUMINT assets overwhelmed analysts’ abilities to distinguish signals from noise. Heuer and Given that there was a great deal of uncertainty regarding Hansen agree that, once “locked in,” analysts resisted the presence of strategic missiles, and the number of Soviet changing their minds. More evidence alone fails to change troops in Cuba, the evidentiary states for both should have an analyst’s mind because “[new] information is assimilated included “present” and “absent.” In either case, the to existing images”—a common means by which people perceived presence or absence could be deceptive, meaning cope with the combinatorial explosion of evidence, the most reasonable interpretation of the evidence would be inferences, and hypotheses.36 As Gil Merom notes, misleading. Enumerating the possible states of deception “Information that was inconsistent with the prevailing would have given the analyst insight as to not only what conservative theory was not considered as alarming and types of deception he should consider but also the possible
American Intelligence Journal Page 67 Vol 32, No 2 motives underlying the deception. To demonstrate, for both event of attack, the United States would still have had a missile and troop deployments, we will construct four devastating retaliatory strike capability due to deployments evidentiary states: of strategic weapons in Turkey and, second, the United States had the capability to interdict shipments of nuclear 1. Present, but we are deceived to think that it is missiles to Cuba if it became aware that they were being absent. deployed. 2. Present, and we are not being deceived. 3. Absent, but we are deceived to think that it is Based on the evidence, we construct two hypotheses: That present. the Soviets are planning a surprise attack on the continental 4. Absent, and we are not being deceived. United States using nuclear weapons, and that the Soviets are deploying the missiles to obtain a better strategic Our two evidentiary elements, each with four possible states, negotiating position. We score the hypotheses with a ‘+’ yield a total of 42 = 16 evidentiary hypotheses, each of which for supporting evidence, ‘-’ for disconfirmatory evidence, must be considered in turn. Table 3 summarizes the possible and ‘0’ for indeterminate evidence, with the number of evidentiary hypotheses. pluses and minuses representing the strength of the evidence. The results are shown in Table 4. The most likely hypotheses, given that we are being deceived about both troop and missile deployment, is that the Soviets are Evidentiary Hypotheses attempting to obtain strategic leverage over the United States. They are less likely to attempt a pre-emptive strike Missile Deployment Troop Deployment due to U.S. retaliatory capabilities. 1 Present (deception) Present (deception)
2 Present (no deception) Present (deception) H2: Establishing a Strong 3 Absent (deception) Present (deception) Evidence H1: Surprise Attack Bargaining Position Hidden Deployment of 4 Absent (no deception) Present (deception) + + + + + + 5 Present (deception) Present (no deception) Strategic Weapons Hidden Deployment of + + + + + + 6 Present (no deception) Present (no deception) Support Troops Strong U.S. Capability for 7 Absent (deception) Present (no deception) - - + + 8 Absent (no deception) Present (no deception) retaliatory strike. Strong U.S. Capability for 0 + + 9 Present (deception) Absent (deception) U.S. to interdict deployment 10 Present (no deception) Absent (deception) 11 Absent (deception) Absent (deception) Table 4: ACH Table for Evidentiary Hypothesis 1. 12 Absent (no deception) Absent (deception) 13 Present (deception) Absent (no deception) There are 11 other such ACH tables, each with its own 14 Present (no deception) Absent (no deception) hypotheses that should be constructed in order to consider 15 Absent (deception) Absent (no deception) 16 Absent (no deception) Absent (no deception) fully the possibilities and implications of Soviet deception operations in Cuba. This process is the key to generating Table 3: Possible Deceptions (Evidentiary Hypotheses) for specific and novel deception hypotheses. Deployment of Troops and Strategic Weapons in Cuba in 1962. SO WHAT? In principle, each of these evidentiary hypotheses should have been considered individually, whereupon new e have argued that one thing which makes denial hypotheses could be generated and compared against the and deception so difficult to detect is the other (presumably non-deceptive) evidence. We begin by Wtremendous variety of channels and means. ruling out those evidentiary hypotheses that contain a Considering all possible combinations of more than a few perceived presence of strategic missiles combined with a elements is well beyond unaided human cognitive capacity. perceived absence of Soviet troops. Such a combination— Although talented analysts can and have captured the strategic weapons unsupported by ground forces—clearly is subtleties of denial and deception problems, the great unrealistic. On these grounds, we discard evidentiary potential for committing critical errors necessitates hypotheses 2, 3, 14, and 15. This leaves twelve evidentiary techniques for exploring these complex deception spaces. hypotheses to consider. We will consider only one of them Even problems that are conceptually simple to describe can here, in the interest of brevity: spawn deception-induced combinatorial explosions, a dangerous trap for analysts that can lead to strategic Evidentiary Hypothesis 1: In this case, we are being surprise, as it did with Cuba in 1962. Short descriptions and deceived that there are neither strategic weapons nor troops explosive combinations make denial and deception problems in Cuba. We construct an ACH table, listing, among other good candidates for intervention with automated methods— items, these two assumptions as evidence: First, in the input time is relatively short, and the hard work of
Vol 32, No 2 Page 68 American Intelligence Journal enumerating combinations is exactly the strength of 5 Murray Gell-Mann, The Quark and the Jaguar: Adventures in computational approaches. Sadly, the analysts of 1962 the Simple and Complex (New York: W.H. Freeman and lacked appropriate methods, technology, and experts in their Company), 24. 6 Yaneer Bar-Yam, “Multiscale Complexity/Entropy,” application to help them detect the Soviet denial and Advances in Complex Systems 7 (2004), 47-63. deception or even understand the Soviets’ intentions and 7 Formally, “entropy” is defined as the logarithm of the number actions. By contrast, contemporary analysts do have such of configurations, however we will ignore this distinction, aids. The means and experts in structured, methodological although this does bring up some interesting issues—Bar-Yam’s intelligence sensemaking are available and can be integrated formulation of complexity may be viewed as a quantification of into teams of analysts working hard problems. Technology the extent to which the number of components in a system to manage the ensuing collaboration has been proposed. departs from logarithmic dependence on the number of configurations. 8 A related argument was developed by IBM vice president CONCLUSION Frederick P. Brooks based on his management experiences during the 1960s and 1970s. See Frederick P. Brooks, The n this article, we have developed a procedure for Mythical Man-Month: Essays on Software Engineering, 20th characterizing the complexity of denial and deception Anniversary Edition (Boston, MA: Addison-Wesley problems by counting the number of lies that are possible Professional, 1995). I 9 given the evidence and the characteristics of the Paul J. Raasa, “The Denial and Deception Challenge to adversary. We find that introducing deception into a Intelligence,” in Roy Godson and James J. Wirtz, Strategic problem enormously complicates analysis. Even problems Denial and Deception (New Brunswick, NJ: Transaction Publishers, 2002), 178, 223-224. that are easily described can have extremely large 10 David A. Schum, “Evidence Marshaling for Imaginative Fact deception spaces that quickly outstrip human cognitive Investigation,” Artificial Intelligence and Law 9 (2001), 165. Of capability. We have presented a simple method, based on note is the fact that the insurance industry bases its business on Heuer’s Analysis of Competing Hypotheses and well- capitalizing the opposite view. However, insurance is based on known features of denial and deception, that predictions about things not happening. Further, acceptance systematically explores the deception space, considering and premiums are based on the absence of risk in policyholders. each possible deception and either eliminating it or Houses on eroding cliffs and policyholders with terminal developing causal hypotheses that might explain it. illnesses are routinely denied insurance policies. 11 The notion of “transparency” combined with a couple of assumptions contributed to each side’s being able to predict the By quantifying the complexity of denial and deception likely actions of the other. Adversaries invited observers at problems, analysts and decision- makers can gauge how exercises. Training followed scripts that were predictable. difficult their problems are. This will help them calibrate Moreover, both sides assumed the other would not want to both the level of effort they expend on these problems start something that led to its own annihilation. Even so, the and the confidence with which they make assessments. Soviet Union successfully surprised the United States on These metrics can also help the community determine the several occasions, as the 1956 Hungarian repression, the 1962 level of effort that should be put into research to address Cuban missile crisis, the 1968 Czech repression, and the 1979 these and related problems—if the typical deception invasion of Afghanistan make clear. 12 problem contains 100 billion possible deceptions, it will Cynthia M. Grabo, Anticipating Surprise: Analysis for Strategic Warning (Washington, DC: Center for Strategic require a different approach from problems that must Intelligence Research, Joint Military Intelligence College, 2002), consider only several hundred alternatives. 129. 13 George A. Miller, “The Magical Number Seven, Plus or Notes Minus Two,” The Psychological Review 63 (1956), 87, URL: < 1 Bruce Edmonds, Syntactic Measures of Complexity, Doctoral http://psychclassics.yorku.ca/Miller/>, accessed 14 March Dissertation, University of Manchester, 1999, URL:
American Intelligence Journal Page 69 Vol 32, No 2 17 For more information on evidentiary considerations see 41 J. Barton Bowyer, Cheating (New York: St. Martin’s Press, Francis J. Hughes and David A. Schum, Credibility Assessment: 1980), 55. A First Step in Intelligence Analysis, unpublished tutorial, Joint Military Intelligence College, April 2003; and David T. Moore, David T. Moore is a career senior intelligence analyst Critical Thinking and Intelligence, Occasional Paper Number 14 and technical director at the National Security (Washington, DC: Center for Strategic Intelligence Research, Agency. He is an adjunct faculty member of the Joint Military Intelligence College Press). Cited hereafter as Moore, Critical Thinking. National Cryptologic School and has taught at the 18 Whaley and Busby, “Detecting Deception,” 196. Joint Military Intelligence College and at Trinity 19 Whaley and Busby, “Detecting Deception,” 193. University, both in Washington, DC. He holds a 20 An expanded version of this case study is included in Moore, Master of Science of Strategic Intelligence degree Critical Thinking. from the Joint Military Intelligence College (now 21 James H. Hansen, “Soviet Deception in the Cuban Missile National Intelligence University). He is the author of Crisis,” Studies in Intelligence 46, no. 1 (2002), 56. Cited hereafter Critical Thinking and Intelligence Analysis as Hansen, “Soviet Deception.” (Washington, DC: NDIC Press, 2009); co-author of 22 Hansen, “Soviet Deception,” 56. 23 Hansen, “Soviet Deception,” 49-58. “Intelligence Analysis, Does NSA Have What It 24 Domingo Amuchastegui, “Cuban Intelligence and the October Takes?” Cryptologic Quarterly 20, nos. 1/2 (Summer/ Crisis,” in James G. Blight and David A. Welch, eds., Intelligence Fall 2001); “Core Competencies for Intelligence and the Cuban Missile Crisis (London: Frank Cass, 1998), 101. Analysis at the National Security Agency,” in Bringing 25 Raymond L. Garthoff, “US Intelligence in the Cuban Missile Intelligence About: Practitioners Reflect on Best Crisis,” in James G. Blight and David A. Welch, eds., Intelligence Practices, Russell Swenson, ed. (2004); “Evaluating and the Cuban Missile Crisis (London: Frank Cass, 1998), 22 Intelligence: A Competency-Based Approach,” in the (emphasis in original). Cited hereafter as Garthoff, “US International Journal of Intelligence and Intelligence.” 26 Garthoff, “US Intelligence,” 29. CounterIntelligence 19, no. 2 (Summer 2005); and 27 Garthoff, “US Intelligence,” 28, 58. The number of Soviet author of “Species of Competencies for Intelligence troops in Cuba eventually increased to about 22,000, calculated in Analysis,” Defense Intelligence Journal 11, no. 2 early 1963. This number still fell far short of the total number of (Summer 2002), and American Intelligence Journal 23 Soviet troops deployed on the island. (2005) (expanded version of original article). Over 28 Robert Jervis, System Effects: Complexity in Political and Social two decades of intelligence assignments, both in the Life (Princeton, NJ: Princeton University Press, 1997), 45. Jervis Washington area and abroad, have provided Mr. draws on the work of Klaus Knorr; see Knorr, “Failures in National Intelligence Estimates: The Case of the Cuban Missiles,” Moore expertise in the areas of intelligence analysis World Politics 16 (April 1964): 455-467. competencies, methods, and standards. The above 29 Gil Merom, “The 1962 Cuban Intelligence Estimate: A article builds on six years of advocacy for, and Methodological Perspective,” Intelligence and National Security mentoring of, best practices in intelligence. 14, no. 3 (Autumn 1999), 49. Cited hereafter as Merom, “Estimate.” Dr. William N. Reynolds is President and Chief 30 Merom, “Estimate,” 58. Science Officer of a private software firm. He holds a 31 Richards J. Heuer, Jr., “Strategic Deception and PhD in Theoretical Physics from the University of Counterdeception: A Cognitive Process Approach,” International Studies Quarterly 25, no. 2 (June 1981), 200. Cited hereafter as California, San Diego. He has been working in Heuer, “Strategic Deception.” It is interesting to speculate complex systems research for over 15 years and whether the Soviets had a feedback channel that informed them of studying intelligence problems for the past five years. the predominant theory. His research focuses on the implications that 32 Heuer, “Strategic Deception,” 200. complexity science brings to real-world decision- 33 Roberta Wohlstetter, “Cuba and Pearl Harbor: Hindsight and making and analysis. His studies have included topics Foresight,” Foreign Affairs 46, no. 3 (July 1965), 691. Cited as diverse as the behavior of slime mold colonies and hereafter as Wohlstetter, “Cuba.” the complex dynamics of stock markets and 34 Wohlstetter, “Cuba,” 691. 35 Wohlstetter, “Cuba,” 691. battlefields. He is the designer and lead developer of 36 Heuer, Psychology, 10-11. Landscape/Decision, a tool for supporting analysts 37 Merom, “Estimate,” 69. trying to understand complex decision processes, and 38 Merom, “Estimate,” 69 (emphasis in original.) Policrash, a general-purpose system for agent-based 39 Graham Allison and Philip Zelikow, Essence of Decision: modeling. Explaining the Cuban Missile Crisis, 2nd ed. (New York: Longman, 1999), 220. Cited hereafter as Allison and Zelikow, Essence of Decision. Raymond Garthoff also notes this fact. See Garthoff, “US Intelligence,” 23. 40 Garthoff, “US Intelligence,” 23.
Vol 32, No 2 Page 70 American Intelligence Journal Hiding in Plain Sight
by R. Kent Tiernan
[Editor’s Note: This article was first published in Defense about the desired benefits. We also experienced the same Intelligence Journal, Vol. 15, No. 2, 2006. It is reprinted here result in our search for innovative human and technical with permission of the author.] approaches. In effect, we discovered that bridging the gap between theoretical, abstract ideas and practical applications of new collection and analytic tools took years before any We must significantly reduce our vulnerability to noticeable improvement occurred in our corporate ability to intelligence surprises, mistakes, and omissions caused discern truth in a world filled with an overabundance of by the effects of denial and deception (D&D) on information, misinformation, and aggressive competitors. collection and analysis. Weapons of Mass Destruction Given the serious threats that confront us today, Commission Report, p. 410A substantive actions must take precedence over future potentialities that are primarily centered on process ardly a day passes that I am not made aware—either solutions. We must also minimize the predictable paralysis, through Congress, the media, or by senior leaders— or “watch and wait” attitude that generally permeates the Hthat the Iraq Weapons of Mass Destruction (WMD) Intelligence Community (IC) when significant changes send debacle was primarily a failure of collection and analysis. tremors throughout the intelligence system. Instead, we in Hoping to avoid repeating the same mistakes, the the education and training community must seek proactive establishment has predictably embarked on a series of ways to turn generally well-defined corrective actions into actions that look very much like those implemented in the improving intelligence collection and analysis capabilities of mid- to late-1970s. Those actions, then as now, follow a the IC. similar path. First, a massive and disruptive institutional, command and control reorganization takes place. Second, ....development of new intelligence new money is injected into the system. Third, a big push on education and training curricula is not a hiring more personnel takes place. Fourth, an almost messianic search ensues for innovative technical and necessary prerequisite for improving human-based approaches that will advance collection and collection and analysis capabilities. analysis effectiveness. Fifth, many methods and approaches used prior to the intelligence failure are perceived as tainted, ineffective, or irrelevant to the new environment and are In this article, I submit that development of new intelligence deemphasized or removed altogether. education and training curricula is not a necessary prerequisite for improving collection and analysis AVOIDING “DEJA VU ALL OVER AGAIN” capabilities. In particular, I believe that those responsible for determining academic and training program standards for the hose of us who experienced the impact of the Church 21st century should instead place greater emphasis and and Pike Committees, and the A-team/B-team energy on extant substantive approaches, many of which are controversy of the mid- to late-1970s are painfully already fully integrated as part of the IC Denial and T Deception (D&D) awareness courses, to include the post- aware that it will probably take several years, if not more, to reap the benefits of current initiatives that look strikingly baccalaureate Denial and Deception Advanced Studies similar to those that were attempted almost 30 years ago. Program (DDASP) curriculum. Such a commitment will make What we discovered then, and hopefully have not forgotten better use of what already exists and is bearing fruit, and will now, is that rearranging things, flooding perceived contribute directly to enhancing the collection and analysis deficiencies with more money, and adding more people to fix capabilities of a greater number of students in a shorter a problem essentially emphasize process rather than period of time, irrespective of the ongoing IC reorganization substance, and take a considerable amount of time to bring and transformation process.
American Intelligence Journal Page 71 Vol 32, No 2 CURRENT EDUCATION AND TRAINING prostitution, should be considered the world’s oldest STRUCTURE profession. Although carnal motivations still earn a cherished spot on Maslow’s pyramid of basic needs, the he “Big Five” intelligence agencies (DIA, CIA, NSA, requirement to survive still unquestionably surpasses all NRO, and NGA) have been involved in coordinated other instinctual human urges or drives. Before anything and regularly scheduled foreign D&D awareness else could be considered and acted upon, primitive man had T to ensure his survival given the many threats around him. It training courses since the late 1990s. These awareness courses vary in length from 4-hour large group presentations was only due to his cleverness and cunning in engaging in to 5-day blocks of classroom instruction. With the exception deceptive techniques that he could compete successfully for of one agency, student attendance is voluntary. Best food and ensure his physical security. As a matter of fact, estimates indicate that these entry-level offerings attract the earliest evidence of a designed deception against a approximately 6,000 students per year. human target for the purpose of seeking something other than food or physical safety can be traced to a wall painting Active since 2002, the Foreign D&D Committee-sponsored found in a 4500 B.C. Egyptian burial chamber. The painting post-baccalaureate DDASP at the Joint Military Intelligence depicts a shell game played by a deceiver and an unwitting 2 College is an IC education initiative designed to develop a target. cadre of counter-D&D specialists with applied critical analytic thinking skills.1 [Editor’s Comment: As discussed Since that time we find many examples of D&D as means of elsewhere in this volume, the above program at the now- attaining military, economic, and political advantage, or National Intelligence University was unfortunately ensuring survival against those wishing to do harm. Not discontinued in 2015.] surprisingly, the planning and implementation of D&D practices against a witting or unwitting target are just as Advanced critical thinking skills are developed in the relevant today as they were in the past. As Michael Handel DDASP through a vigorous regimen of student readings, observed: written and oral exams, research papers, case study exercises, and subject matter immersion relevant to collection Deception can be found in any human activity that and analysis-related themes that culminate in a real-world involves competition over scarce resources or any capstone scenario exercise. Thus, in addition to examining other desired benefits that are limited in supply. many of the basics of collection and analysis tradecrafts, Whenever and wherever a situation exists—in great emphasis is placed on developing the perspectives and business, economic life, politics of all levels, love, problem-solving skills required for addressing the breadth of etc.—through which an advantage can be gained by foreign D&D practices and their deleterious impact on cheating, there will always be individuals or groups 3 intelligence collection and analysis. who will resort to it.
PLACING GREATER EMPHASIS ON D&D are a natural manifestation of all nation-states’ and non-government organizations’ searching for survival and DENIAL AND DECEPTION security. All collectors and analysts must understand that IN INTELLIGENCE EDUCATION AND the use of D&D is not an aberrant act conducted outside the TRAINING CURRICULA acceptable norm of nation-state or non-government organization behavior. In fact, such manipulative acts are or those who would argue that studying D&D has little commonplace and nothing more than a natural manifestation contemporary value to intelligence, and subsequently to leverage or gain advantage against a perceived Fis too narrow in scope to deserve greater education competitor. The study of D&D strips away the commonly and training attention, I would claim that just the opposite is held perception that there is something mystical or other- true. D&D are core analytic disciplines that are mainstream in worldly about such activity, making its presence appear as their impact and relevant to implementing many of the an exception rather than the rule. collection and analysis recommendations articulated in the WMD Commission report. D&D contribute to applying Foreign D&D activities threaten the credibility, accuracy, collection and analysis best practices. In essence, studying and timeliness of products. By their very nature, D&D are D&D and learning how to detect D&D provide an excellent focused on hiding reality from the prying eyes of a framework for improving our overall collection and analysis competitor by replacing reality with a false picture aimed at capabilities for the following six reasons: misdirecting or misleading a target. By doing so, the perpetrator of any D&D action creates an environment D&D have a long, historical/behavioral pedigree and designed to degrade a competitor’s collection and analytic contemporary relevance. The practice of D&D, not efforts to discern truth. For this reason alone, all intelligence
Vol 32, No 2 Page 72 American Intelligence Journal officers, especially collectors and analysts, should have a education; and third, an intuitive nature, logical but pursuing greater appreciation and comprehensive understanding of other than direct linear thinking.6 D&D tactics, techniques, and practices designed to attack the very essence of what we do, that is, to seek, find, Furthermore, Whaley asserts that those who conduct first- characterize, and report reality. We cannot expect to improve rate deception, as well as the analysis to detect it, not only our ability to effectively collect and analyze, or get to our have the quality of a “prepared mind,” but also possess a customers “the firstest with the mostest,” if we are not Machiavellian personality, empathy, and the ability to think constantly sensitized to the deleterious effects that D&D indirectly.7 have on our intelligence products. I am not suggesting that the study of D&D encourages the Studying D&D highlights the need for an interdisciplinary development of Machiavellian personalities but, if I approach. The study of D&D requires an intellectual understand the essence of Whaley’s desired characteristics commitment to developing an inter-disciplinary perspective for good detectives and analysts, he is encouraging all truth and approach in discerning and countering foreign D&D seekers to develop a healthy skepticism, vivid imagination, practices. For example, deception is found in war and magic, active curiosity, and acute sensitivity to anomalies identified games and sports, sex and religion, business and journalism, in observables and data streams. The leadership of the IC politics and espionage, and art and science.4 We can also should look for these qualities in all of their collectors and learn how to detect and counter deception through the analysts. Exposing all intelligence officers to foreign D&D study of such disciplines as counterintelligence, forensic education and training is ultimately critical to promoting science, cognitive psychology, police investigation, collection and analysis best practices. medicine, and political-military theory.5 Such an approach provides the required depth and context to better assess the CORE THEMES UNDERPINNING THE all-encompassing nature, relevance, and commonality of FOREIGN DENIAL AND DECEPTION deceptive practices and their influence on our perception of EDUCATION AND TRAINING CURRICULA reality. Mitigating the negative impacts on our collection and analysis capabilities caused by foreign D&D is predicated on an interdisciplinary approach. f the subject and study of foreign D&D constitute a legitimate and fundamental enabler for improving our Studying D&D inherently promotes critical thinking. Icollection and analysis capabilities, then what should be Detecting the presence of D&D requires a myriad of analytic taught to strengthen our intelligence professionals as we tools and methodologies that enable analysts to attack a move into the 21st century? Greater emphasis on the problem from a variety of investigative angles and following themes already incorporated into our D&D perspectives. For example, students seeking to determine if curricula provides a good starting point. deceptive activities are at play are always encouraged by D&D instructors to consider a multitude of approaches (e.g., U.S. intelligence professionals, especially collectors and Bayesian analysis, Analysis of Competing Hypotheses, analysts, must have a better understanding of what Emulating Deception Planning, Red Teaming, Source/ adversaries know about how, where, and when we conduct Information Vetting techniques, and Critical Question our intelligence activities. “The fact is that al Qaeda’s Development) before ultimately deciding on what particular playbook is not printed on Page One, and when America’s suite of methodologies to employ against a certain problem. is, it has serious ramifications. You don’t need to be Sun Tzu D&D curricula emphasize that the use of methodologies is to understand that [sic]” (Trent Duffy, White House Deputy 8 always situational, and no one analytical process fits all Press Secretary). Increasing foreign knowledge of U.S. stages of an analytic investigation. intelligence by illegal acts and other means has created a situation that threatens the credibility, timeliness, and Studying D&D develops qualities and skills that foster best accuracy of U.S. collection and analysis efforts. As the IC practices in collection and analysis. Fundamentally, the spends millions of dollars and resources on developing, study of D&D promotes and nurtures the development of designing, and implementing more sophisticated ways to qualities, perspectives, and attributes essential for building monitor and assess adversarial activities, information sound investigatory practices. Dr. Barton Whaley, world- compromising U.S. intelligence sources and methods is renowned deception and counter-deception researcher- reaching foreign intelligence services at an ever-increasing theorist and historian, concludes that all consistently rate, arguably undermining those very attempts to gain, successful detectives were found to possess a minimum of sustain, and improve an intelligence advantage over these three necessary characteristics: first, a strong drive to solve same adversaries. The numerous disclosures over the past mysteries; second, a prepared mind based on experience and several years of how NSA collects against terrorist activities represent one such example.
American Intelligence Journal Page 73 Vol 32, No 2 Until such time as we are able to mitigate the corrosive Commission reports in the last two years, we can no longer effects of increasing foreign knowledge, we must teach afford to overlook the cognitive factors affecting our ability intelligence officers how to maximize their ability to squeeze to make sound judgments. as much value as possible out of current collection and analysis tactics, techniques, and practices. The first step Innovative technical and human-based intelligence tools toward achieving this goal is to ensure that collectors and should never be accepted as a replacement for sound analysts understand the depth and scope of what the intellectual rigor, proven critical thinking approaches, and adversary knows about them, their work, and their business problem-solving skills. As important as it is to understand practices in order to develop and implement effective and appreciate one’s own psychological impediments to counter-strategies and tactics. Failure to know what the sound judgments, Richards J. Heuer, Jr., contends that enemy knows will promote a “business as usual” attitude “even increased awareness of cognitive and other that will not contribute to reducing our vulnerability to ‘unmotivated’ biases does little by itself to help analysts deception. deal effectively with uncertainty.” He goes on to claim that “tools and techniques that gear the analyst’s mind to apply higher levels of critical thinking can substantially improve Failure to know what the enemy knows analysis [and collection] on complex issues on which will promote a “business as usual” attitude information is incomplete, ambiguous and often distorted.”9 that will not contribute to reducing our Thus, while it is extremely important that any basic vulnerability to deception. intelligence education and training curriculum include a concentrated block of instruction addressing current and most promising new technical or human-based tools, we U.S. collection systems have impressive capabilities, but should never leave the impression that technology can they also have significant limitations. To improve our remove the human element from the collection and analysis collection and analysis capabilities, U.S. intelligence officers decision-making equation. We must remain mindful of must be cognizant of their collection systems’ blind spots, Heuer’s view that technology should stimulate the as well as comparative advantages. Otherwise, U.S. intelligence officer’s mind to higher levels of critical thinking, collection strategies and analytic assessments may be based but at the same time be continuously aware that an over- on false assumptions of what we can or cannot perform dependence, or over-reliance, on technology can undermine technologically. Therefore, education and training programs intellectual rigor. must provide a comprehensive treatment of the limitations as well as strengths of each collection system to avoid People from other countries and cultures generally do not misinterpreting their true capabilities. think, act, and respond to the same stimuli as we do. Critical reviews of intelligence shortfalls that resulted from the A- All intelligence officers possess inherent psychological and team/B-team imbroglio in the 1970s and the 2004 WMD cognitive biases and predispositions that tend to obfuscate controversy in Iraq underscore the tendency of U.S. and misdirect their search for truth. Because of the quirks intelligence to judge world events through a U.S.-centric inherent in our psychological make-up, intelligence officers prism, resulting in our misreading foreign actions and are prone to see what they want to see, hear what they want intentions. More recently, the January 7, 2006, Washington to hear, base conclusions on insufficient evidence, create Post editorial “Learning Languages” warns: “It has been order and patterns out of random events, and oversimplify clear for more than four years, since Sept. 11, 2001, that the complex. Discovering the truth, therefore, becomes an Americans are horrifically deficient in knowledge about extremely problematic exercise for those delegated to find those parts of the world that now most threaten us, as well (collect) and describe (analyze) it. as about those that may pose important security challenges in the future.” Interestingly enough, no matter how many Until we spend more time addressing our propensities to times this vulnerability is mentioned, we still do not really deceive or mislead ourselves, we can never hope to improve “get it.” If we do understand, then attempts to mitigate the our ability to discern truth from falsehood—whether we are deleterious impact continue to take a back seat to more engaged in collection, analysis, counterintelligence, or any short-term, crisis-driven requirements that promise quicker, other intelligence discipline. Failure to clearly understand albeit more transitory, results. and appreciate those factors unique to our thought processes that influence how we select and analyze The D&D training curriculum uses case studies to show information will inevitably make it difficult to improve our intelligence officers how their perceptions of reality and their chances of “getting it right” the first time. Given the assumptions used in making risk/reward assessments can scathing criticisms articulated in the 9/11 and WMD differ drastically from those of our foreign competitors. Such
Vol 32, No 2 Page 74 American Intelligence Journal case study analyses continue to prove extremely successful First, we must avoid the tendency to look at everything in helping mitigate the tendency to ascribe American we did prior to the reorganization of the IC as tainted, motives, behaviors, and responses to other peoples and ineffective, and irrelevant. A total intelligence education countries that have been shaped by significantly different and training house-cleaning and restructuring may not be historical, psychological, and intellectual experiences. the panacea for all our current real, or perceived, ills. Perhaps what we are experiencing is not a systemic U.S. intelligence officers must always question the collection and analysis problem, but instead the result in credibility of their sources and the quality of the part of a misdirected curricular emphasis throughout the information derived from these sources. Too often, IC. We should focus more on subjects that have direct intelligence analysts accept information at face value by impact on improving the quality of critical thinking among assuming that the credibility of the source of the information our professional intelligence cadre. Perhaps we should is directly related to the level of classification; thus, the follow Dr. Barton Whaley’s recommendation and look for higher the classification of information, the more credible the better ways to foster intelligence professional attributes source becomes. Related to this predisposition is the belief and characteristics that promote prepared minds and that if the source is “good,” then the information derived sound investigatory practices. Collectors and analysts do from that same source must also be reliable. not automatically bring critical thinking and healthy skepticism with them to their respective operational environments. Instead, these attributes must be If a source is deemed credible, collectors highlighted, taught, and reinforced in our classrooms on a and analysts should not automatically regular basis as our collectors and analysts advance in assume that the information from the source their careers. Looking for new and creative ways to improve our collection and analysis processes is always a is true or valid. In fact, good sources have good idea, but more time must be spent on inculcating our been known to pass bad information. intelligence professionals with characteristics and attributes that will prepare them intellectually and psychologically to address and confront the myriad of To prevent collectors and analysts from making such threats to U.S. national security. erroneous assumptions, they should be encouraged to develop a healthy skepticism toward all information that Second, we must strike a more equitable balance in crosses their desks, to include the source of the information. teaching both collection and analysis process and For example, if an imagery analyst attempts to derive application in our education and training courses. We information from a newly collected airborne sensor, one of must do a better job of teaching our students how to more the first questions to be asked is what and how much does effectively apply their knowledge to enhancing best the target of U.S. collection actually know about the intelligence practices and products. capabilities of the airborne collector? To succeed, our instructor cadre must follow the adage If a source is deemed credible, collectors and analysts that “knowledge is good, but knowledge without should not automatically assume that the information from [application and] practice is virtually useless.”10 the source is true or valid. In fact, good sources have been Therefore, we must demand that all IC educators and known to pass bad information. In all cases, intelligence trainers take steps to ensure that the leap from abstract professionals must be encouraged to ask specific questions knowledge to practical application is made with clarity of regarding the acquisition or derivation of the information to purpose and understanding as to why and how such ensure their assessments, judgments, and conclusions are applications will enhance collection and analysis the closest to the truth. capabilities. Our instructor cadre must fully understand the relevance of what they are teaching and how that QUO VADIS? knowledge can then be effectively applied to real-world situations. o where do we take our education and training curricula development from here? At the very least, As I was putting this article together, I had the good Show can we continue to make strides toward fortune of reading a thought- provoking work by Jeffrey improving our collection and analysis capabilities while the R. Cooper. In “Curing Analytical Pathologies: Pathways IC is undergoing restructuring? I offer the following two to Improved Intelligence Analysis,” Cooper argues that suggestions. before any improvement in analysis [and collection] is realized a significant shift in attitudes and approaches throughout the IC must take place. Interestingly, he
American Intelligence Journal Page 75 Vol 32, No 2 touches upon many of the themes that D&D instructors 3. John Gooch and Amos Perlmutter, eds., Military already emphasize in their classrooms. He refers to the Deception and Strategic Surprise (London: Frank Cass, duty of curiosity, intuition, and creative thinking; 1982), p. 122. alternative hypothesis development; application of diverse methodologies; contrarian approaches to collection and 4. See the cover/fly-leaf in J. Barton Boyer, Cheating. analytic situations; cognitive biases; and appreciation of cultural differences, to name a few.11 5. Barton Whaley, Detecting Deception: A Bibliography of Counterdeception Across Time, Cultures, and Disciplines I was pleased to discover that Cooper’s recommendations (CD Version, 2nd edition, May 2006). are not unfamiliar to the founders of the D&D curricula being taught throughout the IC. Speaking for the D&D curriculum 6. Roy Godson and James Wirth, eds., Strategic Denial and developers and instructors who have been committed to Deception: The Twenty-First Century Challenge (New promoting this spectrum of psychological, analytical, and Brunswick/London: Transaction Publishers, 2002), 186-212. methodological approaches, I offer a resounding “Amen” to the courses of action skillfully articulated by Cooper. 7. Telecon with Barton Whaley on May 9, 2006. He indicated that the term “Machiavellian personality” was coined by a group of psychologists at Columbia University, and that its ...one solution to significantly improving use here is not intended to carry a moral connotation. collection and analysis capabilities is Instead, it reflects their skepticism over the basic nature of already in place and is simply hiding in all people. Dr. Whaley further stated that, if one were to ask for a phrase to describe the group’s position on dealing with plain sight. people, it would be “trust but verify.”
8. “Justice Department Investigating Leak of NSA I was further encouraged to discover that as of this writing Wiretapping,” The Washington Post, December 31, 2005. the Office of Analytic Integrity and Standards under the Deputy Director of National Intelligence for Analysis, in 9. Richards J. Heuer, Jr., Psychology of Intelligence Analysis cooperation with the National Intelligence University, is in (Center for the Study of Intelligence, 1999), xviii. the process of developing a community-wide Analysis 101 pilot course. Topics such as critical thinking, collection 10. “Knowledge is good” refers to the inscription at the base strengths and weaknesses, and D&D are intended to be key of the statue of the president of Faber College (from the cult components of the new curriculum. Furthermore, the Joint movie classic “Animal House”). “Knowledge without Military Intelligence College is planning to expand its practice is useless” is mentioned in the Vietnam War-era evening and weekend offerings of DDASP classes to its novel titled The 13th Valley by J.M. Delvecchio. part-time students. 11. Jeffrey R. Cooper, Curing Analytical Pathologies The D&D education and training roadmap for improving (Center for the Study of Intelligence, December 2005), 42-44. collection and analysis capabilities already exists. It is hoped that amid the ongoing reorganization effort those responsible for developing new education and training R. Kent Tiernan has been involved with various aspects of approaches will pause to review the existing D&D curricula deception for over 20 years as an Air Force Special Studies before embarking on a new path. If they do, they will find Division Chief, a U.S. government contractor, and currently that one solution to significantly improving collection and as the Deputy Staff Director of the Foreign D&D analysis capabilities is already in place and is simply hiding Committee, to include acting as the Education and in plain sight. Training Subcommittee Chair, as well as Director of the DDASP. He received a BA in History from Stanford Notes University and an MA in Western European Area Studies 1. As of the publication of this article, approximately 175 from the University of Notre Dame. JMIC students have taken at least one of the four 30-hour courses offered as elective requirements for the JMIC Master of Science of Strategic Intelligence program.
2. J. Barton Bowyer, Cheating (New York: St. Martin’s Press, 1982), p. 10.
Vol 32, No 2 Page 76 American Intelligence Journal Toward a Counterdeception Tradecraft
by Michael Bennett and Edward Waltz
he process of countering deception has been Deception may be acknowledged as a strong possibility of described by numerous authors in a well-developed employment by the adversary, and the potential avenues of Ttheory that explains the means of detecting standard attack are often well-known by analysts, yet they are often deception indicators as well as the means of discovering the deceived—unwarned, unaware, and wrong. Furthermore, subtle incongruities of deception that cue the observer to many analysts have had formal instruction in the elements of something suspicious. From Busby’s Ombudsman method deception—fabrication, manipulation, conditioning and for revealing the magician’s illusions to Harris’ approaches diversion (misdirection). Perhaps, to some degree, they to countering strategic deception, a common theoretical understand a set of principles and explanations—a theory of thread underlies the established theory of countering deception—yet they are deceived. Why? deception. In our 2007 textbook on counterdeception, we covered the theory, challenges, and examples of approaches We believe this is because there is an urgent need for to countering deception. [1] But while counterdeception is translation of the theory—the set of concepts about making well-established at the theoretical and conceptual level, the a deception—to practice in the analyst’s own domain. [3] means to widely and effectively translate the theory into Respected scholar in deception theory Barton Whaley has practice has been elusive. [2] Moreover, the track record of mused, “Is deception the result of individual or of collective counterdeceivers is not good. After reviewing the essentials thought and teaching?. . . And is it the same for of counterdeception theory, we explain why the counterdeception theory, doctrine, and practice? This implementation of a counterdeception methodology is question is not just academic because the answer or answers unique to each domain in which deception is practiced. We will affect both how we can best teach the subject and how then propose a procedure for developing implementing we can most efficiently organize to practice it.” [4] tradecraft methods in a specific domain, recognizing the unique context, sources, channels, targets, and time frames The literature on deception is broad and replete with a of each domain. We conclude by encouraging the strong theoretical basis and centuries of examples and development of domain-specific countermeasures that statistics that will alarm the analyst seeking to counter explain to practitioners the subtleties and rationale for these deception. [5] The literature of counterdeception is smaller, measures. and the objective of our 2007 text, Counterdeception Principles and Applications for National Security, was to COUNTERDECEPTION IN THEORY AND provide a comprehensive and robust reference on the PRACTICE subject. While it provided a coherent theory and examples of counterdeception practice, we did not provide the cookbook ounterdeception refers to the practice of sustaining to translate theory to practice. In this article, we hope to an awareness of the potential for adversarial provide a path to bridge that gap from theory to practice. Cdeception, and the application of methods to actively consider and evaluate evidence to detect or discover the Why, one might ask, has the gap not been filled before? presence of a deception when it is present. Several factors are the culprits: Counterdeception, like many diagnostic practices in medicine, market trading, air traffic control, and cyber • The implementation of a practical approach is defense, requires vigilance and experience to observe low unique to the analyst’s domain. Cyber base rate activities (e.g., in the examples cited: rare disease, counterdeception is quite different from the market downturns, near-collisions, or zero-day attacks). The operational deception that a military officer may unique difference for the intelligence officer is that the low encounter, and this is quite different from the base rate event is specifically designed by an adversary to strategic forms of deception that a senior decision- deceive—not just to hide the occurrence. The purpose of a maker may encounter. deception is to misdirect attention (from the real) and to cause the target to believe (the false) and take action (as desired by the deceiver).
American Intelligence Journal Page 77 Vol 32, No 2 • Most analysts have not experienced the pain of Before detailing our theory-to-practice approach to fill the deception in their domain—and if they have, it gap, it is necessary to introduce the fundamentals of the was but one of many forms of deception that can theory that must be translated to practice. occur. The next deception will be a different one. • Worse yet, we are not always aware of when we COUNTERDECEPTION THEORY are being deceived by our adversary in times short of war. Deception is not easily measured heories containing key definitions, domains in which where there is no ground truth for comparison. Is deception and counters are practiced, principles, the object in the image a decoy? And how would Tfunctional models, and examples that provide validity we know? Is the person reporting in social media to the models have existed for a long time. Theories to for real, is she competent to report on her explain magical illusions and humor were developed observations, and is she credible? Or is she a throughout the 20th century, but the Cold War was cause for plant reporting an exaggerated activity or development of more formal models and theories to explain diversion? the methods, operations, and effects of tactical, operational, and strategic intelligence deception [7]. The field of foreign Nobel laureate (2005) Thomas Schelling once noted, “During denial and deception was recognized as a discipline and ordinary analysis one thing a person cannot do is to draw up formal definitions were established (Panel 1). a list of the things that would never occur to him or to think of all the ways a statement he has carefully composed could An overview of counterdeception theory requires a be misinterpreted under pressure.” [6] Similarly, we suggest, commensurate description of the complementary theory of one more thing an analyst cannot do is to draw up a list of all how deception is produced. For this brief introduction we the practical ways that would never occur to him how he illustrate the deception process and then the may be deceived. Yet this is just about our challenge. countermeasure process as an information flow that
Panel 1
Key Definitions in the Deception Discipline [i]
Denial includes those measures designed to hinder or deny the enemy the knowledge of an object by hiding or disrupting the means of observation of the object. Deception includes those measures designed to mislead the enemy by manipulation, distortion, or falsification of evidence to induce him to react in a manner prejudicial to his interests. The goal of deception is to make an enemy more vulnerable to the effects of weapons, maneuver, and operations of friendly forces. Denial and Deception (D&D) includes the integration of both processes to mislead an enemy’s intelligence capability. The basis of denial is dissimulation, the concealing of the truth, and the basis of deception is simulation, the presentation of that which is false. The acronym C3D2 is synonymous with D&D; it refers to Cover, Concealment, Camouflage, Denial and Deception. Deception means or mechanisms are those methods, resources, and techniques that can be used to convey information to the deception target. The U.S. DoD categorizes means as: x Physical means - Activities and resources used to convey or deny selected information to a foreign power (examples: military operations, including exercises, reconnaissance, training activities, and movement of forces; the use of dummy equipment and devices; tactics; bases, logistics actions, stockpiles, and repair activity; and test and evaluation activities.) x Technical means - Military material resources and their associated operating techniques used to convey or deny selected information to a foreign power through the deliberate radiation, re-radiation, alteration, absorption, or reflection of energy [this includes all forms of communication]; the emission or suppression of chemical or biological odors; and the emission or suppression of nuclear particles. x Administrative means - Resources, methods, and techniques to convey or deny oral, pictorial, documentary, or other physical evidence to a foreign power. The deception target is the adversary’s decision-maker with the authority to make the decision that will achieve the deception objective—the desired result of the deception operation. Channels of deception are the information paths by which deception means are conveyed to their targets. [This can include the collectors, processors, and even the analyst who conveys the information to the target.]
Vol 32, No 2 Page 78 American Intelligence Journal proceeds from the deceiver’s objective to the including specific objects or activities as well as counterdeceiver’s detection or discovery of the deceit the context in which the objects or activities are (Figure 1). placed.
The following paragraphs follow the figure from top to The Elements of Counterdeception Theory bottom, summarizing the principles of the theories that include information manipulation, control, and presentation 6. Target perception – The target of deception—an (deception) followed by contextualization and examination to intelligence analyst, a military commander, or a detect things known to be deceptive or to discover things policy decision-maker—creates a first perception that are incongruous (not known to be deceptive, but of the situation based on the information inconsistent or out of place in the current context). [8] presented. 7. Target deception awareness – Deception is for The Elements of Deception Theory the unaware. A key principle of countering deception is the discipline of preparing the mind. 1. Deception objective – The deception planner Sixth century military strategist Sun Tzu defines the objective of the deception—to create recognized, “All warfare is based on deception an effect in the mind of the target to cause the ... A military leader of wisdom and ability lays target to take an action (or inaction). This effect deep plans for what other people do not figure of the misperception may be a misjudgment, a on.” [9] It is the counter-deceiver’s business to crucial delay in decision, confusion, or a specific prepare the mind to “figure on” the possibilities decision and action that achieves the goal of the of deceit. Four principles are necessary to critically deceiver. The causal chain from objective to examine the first perception: mechanisms, sources, channel, and effects must a. Know Yourself – The analysts must then be developed, as well as the critical timing avoid seeing what they expect to see, to achieve the desired perception. and confirming what they expect to 2. Deceptive mechanisms or means – The confirm. To accomplish this the analyst mechanisms to implement the deception are must know his or her analytic biases, chosen from the basic means table (to the right in assumptions, preconceptions, and the figure) that distinguish concealing expectations—all are uncritical thinking mechanisms (Dissimulation) and revealing susceptibilities that add to weaknesses mechanisms (Simulation); a combination of due to time pressure, lack of channels, mechanisms is applied to create the deception. etc. Self-reflection provides self- 3. Sources of data and information – Multiple awareness necessary to acknowledge information sources are chosen to provide the vulnerability to deception and prepare appropriate credibility, reliability, and context to for more critical analytic thinking. [10] convey the desired perception-creating b. Know Your Adversary – Because information. (For the magician, these may include deception is directed at manipulating various apparatuses, beautiful assistants and, of information on the deceiver’s true course, smoke. Those who seek to deceive intentions and capabilities, the analyst intelligence analysts choose events, places, and must thoroughly study the possibilities people to source their information.) of deceptive intentions and the means 4. Channels – The channels that convey the that may be used to carry them out. information to the target are chosen and timing of Most analysts focus on order of battle; the delivery is carefully planned. (Channels to the critical counter-deceiver studies the intelligence analysts include open source media, order of deception. GEOINT, SIGINT, and other known intelligence c. Know the Situation – The analyst must channels.) also understand and continually 5. Deception target – Receives the coordinated evaluate the environment (sources, information to create a situation perception that channels, background, political context, is coherent, consistent with the context, and etc.) in which the deception may occur. wrong. The combined effect is the result of d. Know Sources and Channels – The information being coordinated in the deception analyst must also distinguish the matrix (illustrated to the right of the deception characteristics of the available sources target) that selectively reveals and conceals of evidence (e.g., reliability, information to control the target’s perception vulnerability, consistency, accuracy,
American Intelligence Journal Page 79 Vol 32, No 2 and the possibility of a compromised source or corrupted channel) and how to apply multiple channels to unmask deceptive information flows. 8. Situation examination – The situation and information are examined carefully from two different perspectives to evaluate the potential for deceptive content [11]: a. Reconstructive Inference for Deception Detection – Search for the presence of spurious signals (called sprignals) that are known indicators of a deceptive activity. The key here is that these sprignals are known a priori—based on prior knowledge of the adversary’s means of deception (e.g., signatures of known decoys, the inaccurate replication of a known signal, etc.). The process results in the detection of evidence of a deception (or one element of a larger deception). b. Incongruity Testing for Deception Discovery – Search for incongruities—
these are inconsistencies (inconsistent with other data, with the local context, Figure 1. The Major Elements of Deception and or with history). These incongruities Counterdeception Theories Organized as an Information are cues that may lead to the discovery Flow from the Deceiver to the Counter-Deceiver. of deception-induced information that This sequence emphasizes the information flow view of will lead to the discovery of a deception and counterdeception theories—proceeding from deception—and new indicators not deception objective to false perception to corrected previously recognized. Outliers, perception by detection or discovery of the deceit. The flow deviation from the normal or the view also highlighted the major elements of both theories expected, abnormalities, and and the key principles of counterdeception: Four areas of contradictions must all be examined for deception awareness and two methods of catching the their potential to reveal the hidden. deceit—detection of known patterns or discovery of 9. Alternative hypotheses – Detected deception previously unknown patterns through their incongruous cues as well as discovered incongruities are appearance. applied to the consideration of multiple hypotheses to explain a situation—and one or We now turn to the issue of translating these theoretical more of these hypotheses may include deceptive concepts to practical implementation in tradecraft that can be elements. The existence of multiple hypotheses codified, taught, understood, experienced, and applied by to explain the current situation aids the awareness intelligence analysts. required to “know the situation” and guide a more critical examination of the evidence being presented by the adversary. TRANSLATING THEORY TO PRACTICE 10. Warning and countermeasures – Of course, the result of successful counterdeception is the ndy Grove, a pioneer in the semiconductor industry, reporting of the deceit and the truth, but it may popularized the phrase Only the Paranoid Survive in also include the development of new Ahis business classic by the same name that warns of countermeasures that take advantage of the the complacency of success, and that the seeds of business 12 hidden knowledge. failure are grown in complacency. [ ] Even for the successful and insightful intelligence analyst, who seeks to catch the deceit of the adversary, we must develop a tradecraft that achieves an appropriate level of vigilance without a paralyzing hyper-vigilance that loses objectivity and seeks only to confirm a preconceived deception. [13]
Vol 32, No 2 Page 80 American Intelligence Journal The process of applying the previously described sensitivity, etc.), effectiveness (deceit detection), counterdeception theory to practice requires the and involvement must be monitored and managed translation of abstract and generalized principles to to introduce changes to increase specific and concrete actions that: (1) assure all counterdeception awareness and effectiveness. principles are covered, (2) apply to the specifics of the • Involve practitioners in the work design and domain, (3) assure that the implementing actions workflow decisions – The tradecraft must be correspond to the principles and are coherent with the developed by and for the intelligence practitioners theory, and (4) can be validated with known cases in the who implement analysis and operations. In domain and can be extended to credible cases of addition, their experience must be respected in deception not yet observed. In addition, the practice must refining theory. be useful, usable, and transparent for the analyst and for • Create a learning organization – As threats change those who must provide oversight (e.g., Congress). and they adapt capabilities, the analytic Countering deception is not alone in facing the challenge organization must maintain culture that learns, of translating a well-grounded theory to a daily practice transfers shared knowledge and lessons learned, that can be consistently and effectively performed widely and continuously trains. across a workforce. The non-intelligence areas mentioned earlier are also diagnostic in nature, and require vigilance Focus on Tradecraft Development – While the basic to distinguish the subtle and avoid misdiagnosis and theory provides a static foundation (based on human surprise. And these fields also are challenged by behavior), the tradecraft development process must be an translating well-developed abstract theories to an ongoing process, tailored to the specific intelligence implementing practice. This is because in each of these domain and its ever-changing characteristics. This is domains, like intelligence counterdeception, the because the translation is not a once-done-and-completed implementation of an attentive and diagnostic practice is process; rather, it is an ongoing process as the dependent on the unique factors that characterize the environment and threats change, as methods are refined, domain. As the practice of cancer diagnosis differs from as technology is introduced, and as deception targeting is infectious disease diagnosis, even so the refined. counterdeception practice for a GEOINT analyst supporting PACOM maritime domain awareness differs in To appreciate the scope of the problem, the reader should practice from the tradecraft performed by a HUMINT case consider just six of the domains of intelligence that must officer focused on countering human deception in the be vigilant for deceptive activities of adversaries, and the counterterrorism domain. unique characteristics of each domain that influence counterdeception implementation (Table 1). The factors The practice of nursing, for example, devotes an entire that distinguish these domains and therefore require journal, Theory to Practice, to the subject of research and different implementations of counterdeception theory translation of medical care to practical nursing in the include: clinical setting. The discipline is focused on translating evidence-based medicine theory to clinical nursing • Operating time frame – The time frame of practice across a broad workforce, and has identified five key translation practices that can be directly applied to development of the deception to effect can be the counterdeception tradecraft process [14]: extremely short (milliseconds from a phishing scam to computer penetration) or can unfold over months for a strategic deception. • Balance the tension between efficiency and • Source and channel characteristics – The number effectiveness – Effective counterdeception requires critical and cautious analysis that may and types of sources and channels of information reduce the demand for production (efficiency); as well as the technology employed in the channels the tension must be balanced. determine the breadth and sophistication of the deception—and the analysis required (see the • Create and sustain trust – Information sharing, following paragraph on social media). based on trust, must be maintained between • Deception intent and context – The practical analysts across channels, and with intelligence consumers. intent (desired effect) and context of deceptive activities vary across domains—though they all • Actively manage the process of change – The have the common objective of subtle influence elements of training, feedback from practice to on the target’s perception. theory, measurement of analytic performance (awareness, criticality, depth, incongruity
American Intelligence Journal Page 81 Vol 32, No 2 Intelligence Deception Ploys and the Unique Characteristics
Domain Challenge to Counterdeception
Deception: Coordinate denial and deception Time frame: weeks, months across many channels to create incorrect situation Channels: Across all INTs and Strategic perceptions. in open source Intelligence CD Challenge: detect and discover coordinated Context-Culture: High-Level subtle effects across multiple intelligence decision-making channels. Deception: Apply camouflage, concealment, and Time frame: days, weeks, deception to hide physical assets, while placing months, years GEOINT decoys to misdirect attention from real assets. Channels: EO, IR , spectral, CD Challenge is to understand the physical order radar, other geo-sensors of target sets (objects, activities) and distinguish Context-Culture: Spatial- real from decoy in context. [i] temporal and contextual analysis Deception: Apply combination of identity cover, Time frame: minutes to physical disguise, and behavior—insert deception lifetimes HUMINT via HUMINT channel. Channels: Human agency CD Challenge: Verify credibility of agent- Context-Culture: Personal, and ii supplied information and detect deceit. [ ] cautious tradecraft Deception: Employ signal denial, disruption, and Time frame: microseconds deceit (spoofing, mimicking, etc.) methods in Channels: All RF channels: SIGINT sequence across multiple channels to deny correct voice, digital data, command exploitation. and control CD Challenge: Distinguish true and false signals Context-Culture: Signal, to perform traffic or content analysis and content, temporal, and discriminate deceit at signal, traffic, and content contextual analysis levels. Cyber Deception: Combine human deception (e.g., Time frame: microseconds to “phishing” and man-in-middle attacks) to induce minutes Computer errors to exploit software and system Channels: email, software vulnerabilities. [iii] Network requests, user installations, CD Challenge: Immediately detect/correct when other vectors Operations user succumbs to deception event; preempt Context-Culture: Human users escalating attack chain. and system operations Misinformation and targeted deceit is focused on Time frame: minutes, hours, vulnerable audiences to create social unrest and days Social incite action in susceptible individuals (e.g., lone Channels: microblogs, blogs, Media wolf actors). media sharing, blog forums, CD Challenge: Detect and locate deceptive bookmarking sites memes and counter them over the appropriate Context-culture: public- channels to prevent viral spread and impact. popular connected and sharing
Table 1 – Counterdeception Practice in Six Intelligence Domains
• Culture – Each source and channel has its own with truthful information.” [17] The research includes culture that distinguishes what is normal or out methods to detect, classify, and track deceptive memes so of place (incongruous). The culture of social they can be countered with truthful messages and media and its participants is quite different from supporting evidence. Unique to this domain of those of the more disciplined domains of military counterdeception is the search for social media-specific channels, for example. [15] linguistic cues of deception and the ability to monitor the propagation, spread, and even impact of deceitful messaging campaigns. [18] Tradecraft development must also consider the ways in which information from multiple domains can provide Tradecraft Development Process – Because we have cross-domain information. While domains have specific argued that tradecraft is unique to each domain, and that differences in characteristics, there is a common basis for that there is general absence of tradecraft across domains, identifying indictors and incongruities that may be we can, of course, offer no practical counterdeception correlated and combined to reveal deception. tradecraft here. Instead, we recommend a procedure for any sharp analyst or officer, or any innovative analytic or Consider one of the newest and most pervasive areas of collection team, to develop, maintain, and share a counterdeception—social media. As social media tradecraft unique to their domain, or for application across channels have blossomed, so has their use as a tool of domains. deception for insurgents, market manipulators, sexual predators, and thieves. [16] The DARPA Social Media in Tradecraft development falls within the field of education, Strategic Communications (SMISC) program includes the particularly the process of teaching theoretical concepts aim to “to counter misinformation or deception campaigns by providing knowledge and developing the skills in the
Vol 32, No 2 Page 82 American Intelligence Journal application of that knowledge. The development process theoretical elements of deception to specific items in the generally includes the following elements, as we apply real world of the analyst or officer. This description them to our tradecraft: should be documented (a shareable document or web page) and maintained as new channels and sources arise. • Identify the knowledge, skills, and abilities Just as orders of battle are conscientiously maintained by (KSAs) relevant to countering deception, to military analysts, the intelligence analyst must maintain an aid in personnel selection and development of order of deception for the domain. supporting capabilities required by analysts. Stage 2: Development – Next, the analytic means for • Provide training and education programs that detecting indicators of deception and discovering include lecture and workshop (theory) and incongruities must be developed and enumerated—for the hands-on exercises which emphasize the domain. In one domain this may include psychologically- practice. based tradecraft (e.g., lying detection, asset validation) • Provide professional development while in another it may include technologically-based opportunities throughout an analyst’s career; methods (e.g., SIGINT signal comparison, GEOINT this includes classroom to in situ opportunities spectral analysis, linguistic analysis of media, etc.). The to focus on actual deception practices. means of expressing and maintaining alternative • Exploit learning opportunities from experienced hypotheses and their evaluation must be described, analysts who capture and share lessons learned. specifically (e.g.. in document tables or spreadsheets, in These lessons should be reviewed and specialized computer tools). Even the means of expressing compared to conceptualize their experiences in the possibility of deception in reporting should be terms of the deception theory for validation described and honed—because this is where the danger and refinement. This process can help of crying “wolf” is greatest. This process of articulating analysts master their understanding of the craft or doctrine deepens the translation to practice by exiting theories and their implications in enumerating the breadth of detection and discovery practice. (An analyst must, for example, see processes available. Again, this description is based on how a real SIGINT misdirection unfolds, or the counterdeception theory described earlier and must be what a read GEOINT decoy looks like.) documented and shared. In this process of development, prior experiences of deception should be collected and Our recommendation for a counterdeception tradecraft placed in cases—narrative explanations of how considers three interacting stages that account for theory, adversaries carried out deception—their objectives tradecraft development, and an emphasis on practice sources, channels, and effects. These cases or lessons (Figure 2). learned should also identify the vulnerabilities exploited and the effectiveness of the operation. [19]
Stage 3: Employment and Practice – Employment of the tradecraft means practice of the tradecraft. We emphasize practice as the actual exercise of the human faculties in situations that are selected to stress the recognition of subtle indicators and incongruities, to test the ability to manage multiple explanations (hypotheses) in environments that build tension between efficiency (the report is due) and effectiveness (a mistake can be catastrophic). The tradecraft that is deployed must be practiced, and we believe the craft that is practiced routinely is effectively employed! We recommend the following methods of employment and practice:
Figure 2. Three Stages of Counterdeception Tradecraft • Publication – The deception order of battle (Stage Development. 1) and continually refining tradecraft (Stage 2) must Stage 1: Description – The domain (e.g., social media) be published on the analyst’s and operator’s networks must be described in terms of deception theory—the and shared across disciplines. Tradecraft must be possible objectives and effects of deception, the viewed as an ongoing development with opportunities categories of sources, and the specific channels. This for all to contribute lessons learned, examples, and description begins the process of translating the recommended refinements.
American Intelligence Journal Page 83 Vol 32, No 2 • Training – The Intelligence Community currently how to form judgments and make decisions. applies multiple teaching methods, including [22] coursework (theory), workshops that address specific emerging deceptive practices of foreign threats, and Case study analysis and simulation methods can even exercises. The National Intelligence University be conducted as individual case analyses, (NIU) School of Science and Technology Intelligence classroom discussions, small-group challenges offers a concentration in Foreign Denial and Deception (performing collaborative problem-solving), or (D&D) that includes coursework, case studies, and computer simulations. [23] Common to all is a offsite experiences with subject matter experts. The problem, contextualized by a narrative story and coursework covers the psychological and cultural backed by data that pose a problem to be solved— aspects and D&D impact on national security is there deception present or not? Can it be decision-making, as well as D&D and discovered? How confident can you be? How counterdeception tradecraft, tools, and would you report this situation? [24] methodologies. In addition, the students can participate in capstone exercises that immerse • Deception Exercises – Just as the U.S. Air Force students in a dynamic multi-level political-military learned the importance of training pilots in realistic situations that include the potential to experience exercises to experience air combat failures before intelligence denial and deception. [20] The CIA deployment to war, we believe analysts should Sherman Kent School of Intelligence Studies experience the humiliation of deception in training provides ongoing awareness training in foreign exercises or simulations prior to entering the D&D and distinguishes among introductory-level, intelligence war and all through their career. [25] mid-level, and expert-level (analysts with 10 or more Exercises, more elaborate than case studies, can be years of experience) effort. [21] These training conducted as tabletop wargames, or computer- programs are comprehensive and professional, but simulated experiences provide the opportunity for they must be supplemented with additional case analysts and operations officers to experience the studies and exercises as we recommend below. elements of deceit in their own domain, with domain- specific overload, distraction, misdirection, • Deception Case Study Analysis – The method of spoofing, and mimicking. [26] intensive use of the analysis of prepared cases has been successfully pioneered by Harvard Business THE CHALLENGE TO INTELLIGENCE School to effectively transfer theory to practice in OFFICERS the areas of political economy, organizational behavior, and strategic leadership. We believe that he respected head of British Scientific Intelligence, deception and counterdeception cases, R.V. Jones, once noted, “In principle it should always appropriately applied, will greatly advance the art Tbe possible to unmask a deception.” [27] Now our of countering deceit. Deception cases should challenge is to translate that principle into practice. We include accounts of actual deception in the domain, have attempted to show that the development of as well as synthetic cases developed to illustrate processes for countering deception is neither well- the range of the possible. As at Harvard, the established nor completed. Indeed, as new technologies method of case study analysis must be employed— introduce new channels, as media provide new sources, forcing students to study a difficult problem without the opportunities for deception will continue to abound the benefit of any prior solution. The benefit of this and intelligence officers who counter deceit must method to law students, for example, can be directly continually refine the methods of counterdeception. The applicable to the analyst focused on detecting challenge is not an option—the effects of deception can deception: be catastrophic to an operation or a nation’s survival. In each domain of intelligence, we encourage the explicit Case studies and case simulations provide capture (written and shared) of information described in the rich milieu of facts, data, documents, and the model in this article and the development of explicit circumstances, and require students to apply processes to develop the self-awareness of vulnerabilities the law to a complex set of facts without the and adversary awareness that is necessary to enable the benefit of a prior analysis, which is really the critical and creative thinking necessary to expose and win essence of problem-solving. Through these the game against deception. methods, students learn how to analyze business problems and legal issues, and then
Vol 32, No 2 Page 84 American Intelligence Journal Notes punchline is revealed. See Arthur Koestler, The Act of Creation 1 Michael Bennett and Edward Waltz, Counterdeception (New York: Macmillan, 1964), pp. 105-109, for a description Principles and Applications (Boston: Artech House, 2007). of the principles of discovery in humor and science. See also 2 We cautiously use the common term “Tradecraft” in our title the article by British scientific intelligence pioneer, R.V. Jones, as used by CIA to refer simply to the practice of a formally that relates deception to humor and hoaxes in “The Theory of defined analytic method to counter deception. We acknowledge Practical Joking – Its Relevance to Physics,” Bulletin of the that the use of term has been debated, though we apply it to Institute of Physics, June 1917, p. 193. refer to skills and methods of counterdeception. The CIA has 8 DoD terms are based on definitions in U.S. DoD Dictionary noted that “the word ‘tradecraft’ comes from our colleagues in of Military Terms, Publication 1-02. the clandestine service, who use it to embody the special skills 9 There exist many individual deception and counterdeception and methods required to do their business.” We have borrowed theories, most of which are described in our text. Many of the it to capture our special skills and methods in “A Compendium elements of those theories, whether for countering magical of Analytic Tradecraft Notes,” Volume I, February 1997, p. v. illusions or military deceptions, are common and overlapping. See also the use of the term to refer to structured analytic Here we provide a high-level overview of the integrated methods in “A Tradecraft Primer: Structured Analytic concepts provided in our text. Techniques for Improving Intelligence Analysis,” prepared by 10 Samuel B. Griffith, Sun Tzu, The Art of War (New York: the U.S. government, March 2009. Both documents can be Oxford, 1971), p. 17. accessed online at http://www.au.af.mil/au/awc/awcgate/cia/ 11 We recommend the thorough treatment of critical thinking in tradecraft_notes/contents.htm and https://www.cia.gov/library/ the text by David T. Moore, Critical Thinking and center-for-the-study-of-intelligence/csi-publications/books-and- Intelligence Analysis, Occasional Paper Number 14 monographs/Tradecraft%20Primer-apr09.pdf, respectively. (Washington, DC: National Defense Intelligence College Press), 3 By theory, we refer to the typical definition within operations March 2007. research: a theory is a description of a process or phenomenon 12 This situational examination approach adopts the method that is composed of four components: (a) definitions, (b) a developed by William Harris in a classic ARPA study of domain of applicability, (c) a set of relationships of variables, counterdeception for Cold War applications. See William R. and (d) specific predictions or factual claims. See J. Wacker Harris, On Countering Strategic Deception, R-1230-ARPA, (1998), “A definition of theory: Research guidelines for November 1973, Chapter III, “Counter-Deception Planning different theory-building research methods in operations Methodologies,” pp. 33-50. management,” Journal of Operations Management, 16 (4), pp. 13 Andrew Grove, Only the Paranoid Survive (New York: 361-385. Doubleday, 1996). 4 Barton Whaley, “The Prevalence of Guile: Deception through 14 Hypervigilance is a psychological condition of maintaining an Time and across Cultures and Disciplines,” prepared for the abnormal awareness of environmental stimuli that may not be Foreign Denial & Deception Committee of the National healthy (Merriam-Webster’s Medical Dictionary, 2014). This Intelligence Council, Office of the Director of National condition, often associated with post-traumatic stress disorder Intelligence, Washington, DC, 2 February 2007, p. 81. (PTSD), renders the subject anxious, distressed, scanning, and 5 The important classic literature on deception theory includes: even obsessed to a level that may cause the loss of objectivity. (1) Donald C. Daniel and Katherine L. Herbig, eds., Strategic Counterdeception tradecraft must make the analyst aware of Military Deception (Elmsford NY; Pergamon Press, 1982); (2) the dangers of losing objectivity in his/her vigilance, and over- M. Dewar, The Art of Deception in Warfare (London: David & fitting the evidence to fit a preconceived deception hypothesis. Charles Publishers, 1989); (3) Roy Godson and James Wirtz, In such a case, the analyst falls prey to his/her own bias to eds., Strategic Denial and Deception: The Twenty First Century confirm the presence of a potentially high-risk deception For Challenge (New Brunswick, NJ: Transaction Publishers, 2002); example, “Stress, task fixation, and unconscious distortion of (4) John Gooch and Amos Perlmutter, eds., Military Deception data may have played a major role” in the errors that led to the and Strategic Surprise (London: Frank Cass, 1982); (5) Richards USS Vincennes downing of a commercial airliner in 1988 J. Heuer, “Strategic Deception and Counterdeception: A (Fogarty report, pp. 44-45). “Scenario fulfillment” is the term Cognitive Process Approach,” published in International used by investigators to refer to the extra vigilant state of naval Studies Quarterly, Vol. 25, No. 2, June 1981, pp. 294-327; (6) officers who had been briefed on the possibility of an attack. R. Jervis, Perception and Misperception in International Politics Under combat duress, the officers appeared to have “distorted (Princeton, NJ: Princeton University Press, 1976); (7) R.V. [the] data flow in an unconscious attempt to make available Jones, Reflections on Intelligence (London: William Heinemann, evidence fit a preconceived scenario.” See William M. Fogarty 1989) (Part One, Section 5: Intelligence and Deception); (8) (RADM, USN), “Formal Investigation into the Circumstances Barton Whaley, Strategem: Deception and Surprise in War Surrounding the Downing of a Commercial Airliner by the USS (Cambridge, MA: MIT Center for International Studies, 1969). Vincennes (CG 49) on 3 July 1998,” 28 July 1998. 6 Thomas C. Schelling, “The Role of War Games and Exercises,” 15 Linda Roussel, “Concepts and Theories Guiding Professional in Ashton B. Carter, John D. Steinbruner, and Charles A. Practice,” Chapter 2 in Management and Leadership for Nurse Zraket, eds., Managing Nuclear Operations (Washington, DC: Administrators, 5th ed. (Burlington MA: Jones and Bartlett Brookings Institution, 1987), p. 436. Learning, LLC, 2008), p. 28. 7 The rapid discovery of a hidden fact is the basis of humor (ha- 16 Barton Whaley makes the point that culture is an important ha!) as well as scientific discovery (aha!). The objective of the factor in the presentation of deception as well as in its defeat. deceiver is to hide the truth until the moment of surprise. The See a “The Prevalence of Guile: Deception through Time and objective of the humorist is to hide the full story until the
American Intelligence Journal Page 85 Vol 32, No 2 across Cultures and Disciplines,” prepared for the Foreign 27 Clyde Freeman Herreid, “Case Study Method,” Chapter 4 in Denial & Deception Committee of the National Intelligence New Directions for Teaching and Leading, No. 128 (Winter 2011), Council, Office of the Director of National Intelligence, Wiley Online Library. Washington, DC, 2 February 2007, pp. 82-83. 28 Narrative psychologist Theodore Sarbin describes the 17 For a military perspective, see FM 90-2, “Battlefield importance of a being framed in a tempting, easily believable story. Deception,” Headquarters, Department of the Army, 1988, See T.R. Sarbin, “Prolegomenon to a Theory of Chapter 6, “Deception in Operations.” Counterdeception,” in D. Daniel and K. Herbig, eds., Strategic 18 A key element of countering deceptive reporting by agents is Military Deception (New York: Pergamon Press, 1982), p. 157. assessing credibility. See David A. Schum and Jon R. Morris, 29 The U.S. Air Force conducted a detailed analysis of early “Assessing the Competence and Credibility of Human Sources Vietnam air combat operations to understand why performance of Intelligence Evidence: Contributions from Law and was lower than expected. The analysis, known as Project Red Probability,” Law, Probability, and Risk, Vol. 6, No. 1-4, pp. Baron II, quantitatively illustrated that pilots who had completed 247-274, 7 April 2007. For a military perspective, see FM 2- 10 combat missions had gained the experience that dramatically 22.3 (FM 34-52), “Human Intelligence Collector Operations.” improved their survival rate. The obvious conclusion was to assure 19 The U.S. Air Force is performing research in defensive each pilot at least 10 realistic training missions prior to actual deception methods to “provide cyber-deception capabilities combat. The analysis directly influenced the creation of the Air that could be employed by commanders to provide false Force Red Flag exercises, introduced in 1975, to provide the information, confuse, delay, or otherwise impede cyber necessary experience to assure realistic experience prior to combat. attackers to the benefit of friendly forces. Deception See John S. Attinelio, “Air-to-Air Encounters in Southeast Asia,” mechanisms must be incorporated in such a way that they are Report R-123, Volume I, Institute for Defense Analyses, October transparent to authorized users, and must introduce minimal 1967, declassified Case 92-M-0069, 12 June 1992, and accessed functional and performance impacts, in order to disrupt our online at http://www.dod.mil/pubs/foi/Science_and_Technology/ adversaries and not ourselves.” See “Capabilities for Cyber WSEG/356.pdf. Resiliency,” Solicitation Number: BAA-RIK-14-07, Department of 30 See the author’s text, Edward Waltz, Quantitative Intelligence the Air Force, https://www.fbo.gov/ Analysis: Applied Analytic Models, Simulations and Games index?s=opportunity&mode=form&id=8482f8ddcbc8471d1ff609574b2d (Lanham, MD: Rowman & Littlefield, 2014). 68e8&tab=core&_cview=1. 31 R.V. Jones, “Intelligence and Deception,” Journal of the Royal 20 One irregular warfare example is the case of Operation Institution (Spring 1980), p. 142. VALHALLA, in which insurgents in less than one hour following a firefight moved the insurgent corpses and arrayed them as if killed Michael Bennett is the lead co-author of Counterdeception while in prayer—then broadcast the deception imagery by cell Principles and Applications for National Security (Boston: phone camera over social media to show the supposed brutality of Artech, 2007). He has nearly 30 years of experience in the U.S. and Iraqi forces. See Cori E. Dauber, “The Truth Is Out There: Responding to Insurgent Disinformation and Deception Intelligence Community and the private sector as an Operations,” Military Review, January-February 2009, pp. 13-23. engineer, manager, and independent consultant. Mike’s 21 http://www.darpa.mil/OpenCatalog/SMISC.html. publications include “Using Hypergames for Deception 22 For relevant research from the SMISC program in meme Planning and Counterdeception Analysis,” with Russell R. propagation and linguistic cues to detect deception, respectively, Vane III, in the Defense Intelligence Journal, 2006, and see Xuetao Wei, “Competing Memes Propagation on Networks: A “Foreign Denial and Deception: Analytic Imperatives,” Network Science Perspective,” IEEE Journal on Selected Areas in with James R. Bruce, in Analyzing Intelligence: National Communications, Vol. 31, No. 6, June 2013; and D.S. Appling, E.J. Security Practitioner’s Perspectives, 2nd ed. (Washington, Briscoe, and H. Hayes, “Cues to Deception in Social Media DC: Georgetown University Press, 2014). Communications,” 47th Hawaii International Conference on System Sciences (HICSS), 2014. 23 Of course, these cases should include any conducted by any Edward Waltz is a distinguished member of the Technical party against another, not just those, for example, conducted Staff at Virginia Tech and works within the Intelligence against the U.S. The news media is replete with reports of Community. Prior to his current assignment he was the deception worldwide against individuals, corporations and foreign Chief Scientist for Intelligence Programs at a private militaries and these should all be considered to capture valuable defense consulting firm, where he led hard intelligence case studies. target research for a decade. Ed is the author of 24 For a course description, see http://www.ni-u.edu/schools/SSTI/ Quantitative Intelligence Analysis: Applied Analytic SSTI_dd.html. Models, Simulations and Games (Lanham, MD: Rowman & 25 Roger Z. George and James B. Bruce, eds., Analyzing Intelligence, 2nd ed., “National Security Practitioner’s Littlefield, 2014), and author or co-author of four other Perspectives,” Washington, DC: Georgetown Press, 2014, pp. 72- textbooks in the intelligence field, including 75. Counterdeception Principles and Applications for National 26 Michelle M. Harner and Robert Rhee, “Teaching LLCs Through Security. a Problem-based Approach,” Washington and Lee Law Review, 489 (2014), Washington and Lee University, Lexington, VA, p. 498.
Vol 32, No 2 Page 86 American Intelligence Journal The Assassination Attempt on Pope John Paul II: Foreign Denial and Deception?
by LTC (USAR) Raymond J. Faunt
STAGE-SETTER THE FINDINGS
ehmet Ali Agca shot Pope John Paul II on May 13, nvestigators have never factually established who was 1981; the act, witnessed by hundreds of people in behind the attempt on the Pope’s life. Unquestionably, MVatican Square, shocked and horrified millions. As IAgca pulled the trigger. However, the story behind who the Pope lay dying in the arms of one of his loyal aides, sponsored Agca (in light of all the circumstantial Vatican Swiss Guards rushed the Pontiff to the hospital evidence) cannot but help one to question if Agca was for five hours of life-saving surgery. Seconds after Agca more than a lone-wolf assassin. Once one delves into the fired the shots a stocky, yet sturdy, nun named Suor facts of the case, it appears Agca’s actions were not Letizia grabbed the assassin Mehmet Ali Agca by the arm those of a lone-wolf assassin. Were his actions and and held on. Agca screamed, “Not me!” “Not me!” She background deliberately elaborate and ambiguous or was screamed emphatically, “Yes, you! It was you!”1 it all just coincidence? Unfortunately, Agca’s recent diagnosis of mental problems (coupled with his delusional That initial exchange between Letizia and Agca would public ramblings) cannot help but leave one with the 2 encompass the history of this case. Over the course of thought that the truth may never be known. Regardless, three decades, accusations, counter-accusations, there are very strong indicators of who may have been confessions, and recanted confessions have sent this working behind the scenes to support Agca. case down twisting and turning roads. However, there are strong indicators of who may have ordered the attempt on the Pope’s life. For an intelligence analyst assigned to Bulgaria’s DS and the USSR’s KGB often this case, the question is, “After looking at all of the worked together. evidence, would you be prepared to present your findings to your boss?” With less than perfect information, one analyst did just that; she passionately defended her While researching this case, the following was established: findings and, because of her tireless efforts, Osama bin (1) It is highly likely that the Bulgarian Committee for State Laden is dead. Nevertheless, if foreign denial and Security (DS) facilitated, or at a minimum knew about, deception (FDD) has been detected or enters into the Agca’s activities.3 (2) Bank accounts opened for Agca analytical mix, no matter how good an analyst one is, he/ inside the Soviet Bloc and around Western Europe were not she could end up looking like a fool. Does Iraqi WMD done in his handwriting.4 (3) Agca received material support ring a bell? from Turkish organized crime, as well as left- and right-wing groups.5 (4) East German and Soviet archival documents A review of the Agca case would cause any intelligence labeling the Pope a subversive have been found.6 (5) Agca analyst to ask whether or not Agca’s actions were part of was positively identified at Hotel Vitosha in Bulgaria.7 an FDD operation. Who had the capability, background, (6) Bulgaria’s DS and the USSR’s KGB often worked training, experience, and a documented in-depth history in together.8 (7) In 2006 the Italian government produced designing such intricate and well-thought-out plans? forensic photographic evidence of suspected DS agent Who had the most to gain from the Pope’s death? Could it Sergei Antonov in St. Peter’s Square when Agca shot the all have been coincidence? It is very likely the Pope.9 (8) In the photo of Agca firing his weapon, there is a assassination attempt on the Pope was cloaked in an FDD man standing near Agca who resembles Turkish terrorist operation. If the attempt on the Pope’s life was not an Omer Ay.10 (9) Agca was a Grey Wolves associate, but not a FDD operation, then unquestionably it could still be used “made man.”11 (10) DS regularly worked with Turkish as a textbook example on how to conduct such an organized crime.12 (11) Turkish organized crime members operation. regularly alternated between terrorist groups and organized crime.
American Intelligence Journal Page 87 Vol 32, No 2 HISTORICAL EXAMPLE
he Normandy invasion was one of the 20th century’s The USSR utilized cutout organizations in most consequential military operations. The order to create an image of plausible Toperational denial and deception (D&D) plans that deniability. protected the Normandy invasion are a textbook example of Herbig’s Type-A Model in action. Allied D&D plans Operation FORTITUDE NORTH (invasion of Norway) and The USSR utilized cutout organizations in order to create Operation FORTITUDE SOUTH (invasion of Pas de an image of plausible deniability. The cutout intelligence Calais) were formulated in order to confuse Germany’s organization contracted and assisted the assassin to strategic leadership about the exact location of the beach eliminate the target. During that time in history, Bulgaria landing site Allied forces would use in order to conduct DS actively assisted left-wing terrorist groups while 13 forced entry operations into German-controlled Europe. fostering a fraternal relationship with the KGB.20 KGB A fictitious paper army under Lieutenant General George participation in wet affairs were risky, but cutouts and Patton was created in England; faux military lodgments D&D schemes could mitigate USSR linkages. A Soviet were constructed, and an occasional easily intercepted Bloc defector, Romanian Lieutenant General Ion Pacepa, radio message was sent in the clear. Double-agent explained: operations code named DOUBLE CROSS passed sourced information of possible Normandy, Pas de Calais, and In the early 1970s, the Soviet Bloc intelligence Norway landings. When informed that Allied forces had community started recruiting foreign professional landed in Normandy, Hitler believed it was a feint and that criminals to carry out terrorist operations abroad, in Pas de Calais remained the primary beach-landing site. order to make it even more difficult for Western For a period of 12 hours, Hitler refused to redeploy Panzer counter-intelligence investigators to attribute the 14 divisions to Normandy. By the time Hitler agreed to operations to communist governments. The release the Panzers it was too late; Allied forces had Spanish communists, who for years were exiled to already secured beach-landing sites. During the Panzers’ France, proved to be particularly adept at providing trek to Normandy, Allied air power strafed and bombed French smugglers and drug dealers. One such the columns; this culminated in the Panzers’ arrival to French smuggler, who had run afoul of Interpol, Normandy operationally degraded. Operations was granted asylum in Bucharest. When he arrived FORTITUDE NORTH and SOUTH are one of history’s he was carrying so many false passports that he most brilliant set of D&D operations. could not prove his real name. Codenamed SANDU, he and two accomplices started a new life in Romania. A HISTORICAL TREND At the time they had defected, they had had already been sent to France and West Germany on several alter Krivitsky (a high-level Soviet source) terrorist missions.21 confirmed the USSR’s involvement in “Wet WAffairs” or Mokrye Dela in 1939.15 Under Josef Pacepa gave this statement three years before Agca shot Stalin’s regime, NVKD agent Ramon Mercador killed the Pope; Agca fit this exact cutout profile. Additionally, Soviet dissident Leon Trotsky.16 In the 21st century, there was a link between the Soviet Bloc and left-wing things have not changed. In 2006 former Russian SVR terrorist groups. In 1981 the Red Brigades (RB) kidnapped officer and dissident Alexander Litvinenko was poisoned U.S. Army Brigadier General James Dozier. After his and died in England.17 Both Trotsky and Litvinenko were capture, the RB cell leader (Antonio Savasta) responsible vociferous critics of the Russian government. The USSR for the kidnapping made a startling confession. Savasta was not beyond using other Soviet Bloc intelligence confessed that, prior to kidnapping BG Dozier, he spoke agencies to help eliminate political opponents. Under with DS and DS demanded operational command and Nikita Khrushchev, the USSR became somewhat control. In a completely separate confession on an concerned about its worldly image. If it could be avoided, unrelated case, a high-level Italian politician (and DS the USSR did not want to be directly associated with agent) Luigi Scricciolo confirmed DS wanted to run the political assassinations. To solve this problem, cutouts Dozier operation.22 Obviously, DS saw an opportunity to (using another organization) were used.18 Leonid use RB elements as cutouts while maintaining direct Brezhnev would have used any asset available to him; he control and plausible deniability. had no qualms eliminating someone if he thought a political dissident’s actions could destabilize the Soviet Bloc.19
Vol 32, No 2 Page 88 American Intelligence Journal HERBIG’S DENIAL AND DECEPTION Reportedly, there were no indicators Agca would ANALYTICAL MODEL transform himself from quiet and studious to an assassin. Agca’s family stated when he left for the university: (1) erbig’s Type-A Model is relatively simple in He had no known political affiliations or interest in 30 application; it is used to confuse the intended politics. (2) He was not religious; his mosque attendance 31 target. Utilization of the model leaves the intended was limited to holidays. (3) He showed no signs of anti- H NATO sentiments, rabid Turkish nationalism, or mental target unsure of what to believe. “It seeks to compound the uncertainties confronting any state’s attempt to determine illness. In his confession, Agca stated that in 1977, after its adversary’s intentions.”23 Herbig’s Type-A Model is one his first year at the university, he trained at a terrorist 32 that falls within the dissimulation category of the model. camp in South Beirut, Lebanon. Below is an example of how the model is used: At that time, Lebanon was a mecca for terrorist training 1. Hiding (The Check Is in the Mail) camps. Agca told Italian authorities he trained at a 33 a. Masking. (When the auditor arrives, he Palestinian Liberation Organization (PLO) camp. Turkish finds neat and nifty records and a quiet, terrorist Sedat Sirri Kadem transported him to the Syrian confident embezzler who is certain that his border where he linked up with terrorist Teslim Tore. Tore theft remains hidden.) smuggled him into the country and to the camp where he 34 b. Repackaging. (Those who seek loans to trained for 40 days. These camps were sometimes 35 save starving businesses wisely wear Gucci USSR-subsidized and staffed with Cuban trainers. If loafers and drive BMWs or, better yet, are Agca traveled to Lebanon, it was under an alias, or he driven in Cadillac limousines.) was smuggled into the country. Agca never gave an c. Dazzling. (Bank accounts are funneled exact camp location, nor would he have known because 36 through so many numbers and covers in the camp rules often prevented trainees from conversing. Cayman Islands that no one can trace them His time in Lebanon has never been proven or disproven, for tax purposes.) and no one has come forward to say they recognized him from the camp.37 2. Showing a. Mimicking. (Using false British Sovereigns It was confirmed that, after his purported time in Lebanon, and money that appears real.) someone (not Agca) opened a bank account in Istanbul 38 b. Inventing. (Creating fake companies.) and deposited $1,600 into it. Over time, numerous 39 c. Decoying. (A used car salesman sees that a deposits were made to the account. Back in Turkey, potential buyer recognizes the used tires, Agca registered for classes and received a draft but he emphasizes the new paint job.)24 deferment. He never attended class and no one recalled him on campus.40 It is believed his Grey Wolves (GW) After reviewing the facts and circumstantial evidence association began at this point. By December 1978, 41 surrounding the assassination attempt on the Pope, it is $16,000 had been deposited into his bank account. easy to see how the above model could be used to confuse investigators. Agca was never a “made” member of GW, similar to the U.S. Mafia; he was merely a known associate. On MEHMET ALI AGCA February 1, 1979, it is believed GW member Oral Celik and Agca killed left-wing author Abdi Ipecki.42 A $200,000 reward was posted for Ipecki’s murderer. An anonymous ehmet Ali Agca was born and raised in Malatya, phone call resulted in Agca’s capture while Celik 25 Turkey. As a young student he was remained at large. Strangely, the $200,000 reward went Mcharacterized as studious, industrious, and uncollected.43 Law enforcement authorities admitted that thoughtful; he loved school. He often stayed up reading they had no evidence against Agca; regardless, he 26 until early morning hours. His favorite school subjects confessed to the murder.44 Ten months later, a bribed were history and literature, along with reading and writing prison guard let Agca escape.45 poetry.27 A loner, he had few friends and isolated himself 28 from peers. He displayed a propensity for linking with After Agca’s escape in December 1979, GW members teachers and family rather than seeking unfamiliar social Ramazan Gunduz and Hayadar Seyrangah were murdered. interactions. He scored high on college entrance exams It is theorized Agca killed them for turning him in to 29 and enrolled at the University of Ankara. For unknown Turkish authorities.46 It is likely Agca’s jail escape was reasons, the university became a focal point for a violent facilitated by GW’s second in charge and contract killer path in life.
American Intelligence Journal Page 89 Vol 32, No 2 Abdullah Catli. In 1996 Catli died in a car accident; inside murderer and prison escapee (with no employment, his face the wreckage was a passport with the name “Mehmet emblazoned on magazine covers and newspapers) stay in Ozbay.” Mehmet Ozbay was an alias Agca had used.47 expensive hotels and travel freely? The idea that DS did not know Agca was inside its country is unfathomable. Post-escape, Agca’s travels are difficult to trace; his fraudulent passport was stamped with numerous entry Reportedly, Hotel Vitosha was a DS intelligence collection and exit stamps from different countries. Agca said he platform.59 Turkish organized crime frequented the Vitosha traveled to Iran, Germany, England, and Yugoslavia but and DS knew this.60 Agca stayed 50 days in a DS collection there were no passport entries for these countries.48 There platform, associated with known Turkish organized crime were unaccountable time gaps and crossing travel members (Omer Mersan was a personal aide to Turkish patterns. Was this to create ambiguity? For example, it organized crime godfather Abuzer Ugurlu), and DS never was reported (but not verified) Agca was spotted in identified him?61 Terrorist Ilich Ramirez Sanchez (Carlos the Frankfurt, Germany. Turkish authorities contacted German Jackal) frequently traveled inside the Soviet Bloc and could authorities and reported it.49 Shortly after this report, a not have done so without tacit approval.62 While inside the Turkish grocer, Necati Uygur, was killed in Mainz, Soviet Bloc, Sanchez was kept under constant surveillance. Germany. Mainz is 26 miles from Frankfurt. Uygur had been part of a right-wing group called the Idealists. During his interrogation, Agca was characterized as Idealists were active in Agca’s school in Malatya.50 possessing an “extraordinary capacity for concentration and resistance.”63 A year after his conviction and facing life in The investigation of Agca’s boyhood home turned up prison, Agca decided to talk. Agca’s explosive confession pictures of Agca with Idealist members.51 The description caused the judge to reseal all trial court records and Uygur gave of his killer matched Agca, yet nothing was evidence. Agca implicated DS, Turkish organized crime, stolen from the store.52 When Agca was free, people tended GWs, and left-wing terrorist members. Almost everything to die. No trace of Agca was found in Germany, but Italian author Sterling’s investigation had uncovered until that courts cite Italian and Turkish intelligence services which point was confirmed when Agca talked post-conviction. spotted him there.53 Agca was confirmed to be in Switzerland at this time and could have easily crossed the Agca identified Bulgarian Airlines employee Sergei Antonov German border. as his handler. Reportedly, Italian intelligence had already identified Antonov as a DS agent.64 Agca gave a detailed description of Antonov’s apartment, daughter, and wife.65 When arrested, Agca had a list of phone numbers; one of It verges on the impossible that Agca the numbers was Antonov’s.66 A CIA officer familiar with received no help. Antonov’s interrogation commented that he knew remarkably little about his airline job.67
Investigators reexamined photographs of the Pope’s shooting in 2005. A man bearing a striking resemblance to Investigators estimated it cost $50,000 for all of Agca’s Antonov is standing near the Pope’s car. The bespectacled, verifiable travel. Investigators discovered that on July 11, mustachioed man had his head tilted upward, looking over 1980, a heroin dealer (confirmed by U.S. DEA), Omer Mersan, the crowd at the wounded Pope. No person ever came 54 had met and talked with Agca at Hotel Vitosha. Mersan forward to say it was them, nor was the person identified. characterized the encounter as brief. Agca stated Mersan Yet, Antonov’s co-workers vouched he was working in his 55 obtained a fraudulent Turkish passport from Omer Ay. office when the Pope was shot. Agca identified Mersan’s room number as 911, which 56 investigators confirmed. Agca stayed for 50 days but his Agca identified two others from the Bulgarian Embassy: activities were unknown. Eight months later, after jetting Zhelyo Vasilev, secretary to the military attaché, and around Europe, Agca arrived in Italy, and then shot the accountant Todor Aivazov. Suspiciously, both were recalled Pope. Two weeks later Omer Ay (suspected of standing near to Bulgaria before they could be arrested.68 Regardless, Agca during the shooting) requested political asylum in Agca identified two Bulgarians from the Embassy, one of 57 Germany. In Vatican Square, a fleeing gunman was whom was a known open-source intelligence officer photographed by ABC cameraman Lowell Newton; it is (Vasilev). Agca’s confession confirmed what Italian 58 believed this gunman was Turkish terrorist Oral Celik. authorities knew and uncovered things they did not.
It verges on the impossible that Agca received no help. During the second trial, Agca must have realized the people Common sense begs the question: How could a convicted who broke him out of prison could easily have him killed in
Vol 32, No 2 Page 90 American Intelligence Journal prison. At trial Agca acted delusional and called himself Jesus Christ, while sometimes speaking incoherently.69 In his confession, he gave detailed descriptions of individuals, dates, and places. However, in court Agca refused to identify, or misidentified, suspects. Agca’s antics, plus delusional rants, resulted in defendant acquittals.
Terrorists Sedat Sirri Kadem and Teslim Tore stated they were aware of a plot to kill the Pope. This begs the question: Why would two left-wing terrorists know about a right-wing plot to assassinate the Pope? In addition, why would a socialist country (Bulgaria) give assistance to a right-wing terrorist? In 1983, DS Agent Iordan Mantarov defected from Bulgaria and, according to The New York Times, told French intelligence that the KGB and DS were responsible for the attempt on the Pope.70
Any veteran law enforcement investigator would advise a Agca did not help reduce ambiguity when he wrote in his novice law enforcement investigator to “focus on what book that Ayatollah Khomeini ordered the assassination.71 evidence tells you.” If there is no evidence to support your The answers to this case could be in a number of answers theory, then your theory may be wrong. That is what Italian Agca gave to questions during different interrogation investigators and prosecutors did; they found strong sessions. If the Bulgarian connection had been absolutely circumstantial evidence to support their theories but proving proven, the fallout would have further smeared the USSR. them in court was another matter. During trial, Agca destroyed the case against the defendants. After the shooting, the Pope received a short letter from Premier Brezhnev expressing “concern.” Considering the Pope had threatened to resign the papacy and lead resistance forces if the USSR invaded Poland during the Since the moment Agca pulled the trigger, Solidarity uprisings, obviously there was no love lost ambiguity has been rising. between the two. Given the USSR’s history of killing political opponents, why would the Pope be off-limits? Stalin had anyone he deemed suspicious eliminated (including those who were his friends); Khrushchev and Brezhnev continued Claire Sterling made a very strong argument for DS/KGB the practice. involvement in her book The Time of the Assassins. She spent months collecting information from all over Europe. If one studies all the available evidence regarding the Then something would appear in the press, or she would attempt on the Pope’s life, there are too many interview a government official who would confirm what she coincidences—coincidences that cannot be explained had already discovered. I did not find one article that away.72 It is hard to believe the Soviet Bloc did not have an countered her findings; most of it was character idea something was going on; it had the most to gain from assassination against her because her previous book, The the Pope’s demise. Even if Khomeini ordered the hit, the Terror Network, unknowingly sourced CIA propaganda Bulgarians had to have realized that a well-known escaped articles. While true, the majority of evidence she found terrorist was in their country. People could argue that researching this book was from face-to-face interviews with shooting the Pope during a politically tenuous situation in government officials and intelligence professionals. Poland could have sparked an uprising. Brezhnev proved he was not against using force against his own people and Since the moment Agca pulled the trigger, ambiguity has other countries. In the event Poland’s government imploded, been rising. The following graph is indicative of the number the USSR had numerous divisions on its border. Brezhnev of theories that have been put forth to the public. was the type of leader who more than likely would have ruthlessly suppressed any oipposition.
Over the years, it is has become more widely accepted that Lee Harvey Oswald, upset over his lot in life, his broken marriage, and failure in everything he undertook, in a fit of rage shot President John F. Kennedy. Current-day science
American Intelligence Journal Page 91 Vol 32, No 2 has been able to explain the “magic bullet.” The “grassy 11 Sterling, 6, 25, 75, 231. knoll shooter” does not hold the weight it once did; 12 Ibid., 63, 208. computer-enhanced images of the so-called Zapruder film 13 Thadeus Holt, The Deceivers: Allied Military Deception in the show JFK’s skull exploding from rear to front. The entry Second World War (New York: Skyhorse Publishing, 2007), 534- 539, 631, 639, 642, 643, 678. wound in his skull was in the back of the head, not the front 14 Ben Macintyre, Double Cross: The True Story of the D-Day or side. Oswald’s sniper nest in the Schoolbook Depository Spies (New York: Crown Publishers, 2012), 235, 330, 331. was much closer to the President’s car than people realized. Convinced that Allied forces would land at Pas de Calais, Hitler Oswald as the sole assassin has become more of an located the Panzer divisions north and east of the Seine River. accepted fact. Perhaps one day the same will occur 15 Paul Henze, The Plot to Kill the Pope (New York: Charles regarding the Pope’s shooting. Maybe we will find out that Scribner and Sons, 1983), 85. Senior-level Romanian intelligence Italian law enforcement really did get it right, but that a officer Lieutenant General Ion Pacepa has also confirmed this. brilliant FDD operation protected the truth in a bodyguard of 16 Edward Lucas, Deception: The Untold Story of East-West lies. Espionage Today (New York: Walker and Company, 2012), 340. 17 Ibid., 80, 82. 18 Peter Finn and Petra Convee, The Zhivago Affair (New York: Notes Pantheon Books, 2015), 191, 192. Robert Service, History of 1 Claire Sterling, The Time of the Assassins (New York: Holt, Modern Russia from Tsarism to the 21st Century (New York: Rinehart, and Winston, 1983), 4. Penguin Books, 2009), 380, 381. By the time Nikita Khrushchev 2 Henry Chu, “Turkey releases gunman who shot pope in 1981,” came to power he adopted a less iron-fisted approach inside the The Los Angeles Times, January 19, 2010. USSR. Despite Dr. Zhivago’s indictment of communism, 3 Sterling, 99,114. While in Sofia, Bulgaria, Agca stayed at the Khrushchev ordered state services to leave Zhivago’s author alone. Hotel Vitosha. The Vitosha was where many of Turkey’s most Khrushchev’s thaw froze with the arrival of Leonid Brezhnev. A notorious organized crime figures stayed. One Turkish organized conservative, Brezhnev believed a police state protected Soviet crime godfather had his minions stab a man in the hotel. DS and interests. The assassination of Afghan leader Hafizullah Amin law enforcement took no action. In a communist police state such during Operation STORM 333 by Spetsnatz during the Soviet as Bulgaria, it is hard to believe DS was unaware Agca was at the invasion of Afghanistan was not something Brezhnev would have Vitosha. In Claire Sterling’s book, her source told her that every lost sleep over. Brezhnev was in charge at the time of the attempt room in the Vitosha was bugged and the hotel had been assessed as on the Pope and he clearly identified the Pope as a destabilizing one large collection platform. threat to the Soviet Bloc. 4 Sterling, 50. 19 John Lewis Gaddis, The Cold War: A New History (New York: 5 Ibid., 6, 18, 25, 52, 53, 108, 173, 213-15. Agca’s association Penguin Press, 2005), 192. To be more specific, Gaddis states that with Omar Mersan (who illegally secured him a passport from the Soviet Union had labeled the Pope an “enemy.” Christopher Turkey) establishes the link. In Italian court, Mersan admitted he Andrew and Vasili Mitrokhin, The Sword and the Shield: The had met Agca in Sofia but denied that he provided any assistance Mitrokhin Archive and the Secret History of the KGB (New York: whatsoever. Basic Books. 1999), 269. Under Operation PROGRESS, Karol 6 Ibid. George Weigel, Witness to Hope: The Biography of Pope Wojtyla (the Pope) was regularly surveilled while he was a junior John Paul II (New York: Harper Collins, 1999), 279. It is priest in Poland, but the Polish government was afraid to take any reported that KGB head Yuri Andropov was apoplectic upon action against him due to his popularity. Pope John Paul’s election to the papacy; he personally called the 20 West, 22. KGB office in Poland and raged at the KGB resident agent, asking 21 Ibid., 54. him how he could let this happen. Hannah Cleaver, “Stasi had a 22 Henze, 72-74. Dozen Moles Inside the Vatican in the 1980s,” The Telegraph, 23 Barton Whaley, Political-Military Deception: Basic Principles April 4, 2005. and Methods (Washington, DC: Office of the Director of National 7 Nigel West, The Third Secret (New York: Harper Collins, 2000), Intelligence, 2007), 11. 76, 77. 24 Boyer Bell and Barton Whaley, Cheating and Deception (New 8 Matthew J. Quimet, The Rise and Fall of the Brezhnev Doctrine York: St, Martin’s Press, 2009), 239-242. in Soviet Foreign Policy (Chapel Hill: University of North Carolina 25 Henze, 24. Press, 2003), 121. 26 Ibid., 24-32. 9 John O’Sullivan, The President, the Pope, And the Prime 27 Ibid., 31. Minister: Three Who Changed the World (Washington, DC: 28 Henze, 32. Regnery Pubilshing, 2006), 80. While it has never been 29 Ibid., 33. conclusively proved that Antonov was a DS agent, what is known 30 Ibid., 34. is that he knew shockingly little for an airline employee. It is also 31 Ibid., 34. highly ironic that, in what Claire Sterling reports, quite a lot of the 32 Ibid., 33, 34., Sterling, 18. people Agca picked out of a photo lineup were from the Bulgarian 33 Ibid., 196. Embassy in Italy. 34 Sterling, 18, 19. Teslim Tore was known to have been a left- 10 Michael Leeden, “The Bulgarian Connection and the Media,” wing extremist at the time. Daniel Baracskay, The Palestine Commentary, last modified June 1, 1983, accessed January 28, Liberation Organization: Terrorism and Prospects for Peace in the 2015, https://www.commentarymagazine.com/article/the- Holy Land (ABC-CLIO, 2011), 146. bulgarian-connection-and-the-media/.
Vol 32, No 2 Page 92 American Intelligence Journal 35 Richard H. Shultz, The Soviet Union and Revolutionary Italian intelligence services. Agca also described Antonov’s wife Warfare (Palo Alto, CA: Hoover Press, 1988), 111. Richard and daughter. The wife served them tea. Felix Staar, Foreign Policy of the Soviet Union (Palo Alto, CA: 66 Ibid., 17-31. Sterling 207, 209. Sterling, 193, West, 18. John Hoover Press, 1991), 243. Tania Mastrapa, “Impediments to Cornwell, The Pontiff in Winter: The Triumph and Conflict in the Effective Counterintelligence and Counterterrorism,” (October 1-3, Reign of Pope John Paul II (New York: Random House, 2007). 2003), under “Settings,” http://www.iwp.edu/news_publications/ This can be sourced to Chapter 10 of the book; unfortunately, detail/impediments-to-effective-counterintelligence-and- there was no page number available. counterterrorism (accessed January 12, 2015). 67 West, 17-31., Sterling, 207, 209, Sterling, 193, West, 18. 36 Sterling, 23. 68 Sterling, 147. 37 Ibid., 31-35. 69 John Tagliabue, “Prosecutor Asks Broader Inquiry in Trial of 38 Henze, 196. Agca” The New York Times, May 28, 1985. 39 Ibid., 196. 70 Daniel Scotto, “Pope John Paul II, the Assassination Attempt, 40 Sterling, 45. and the Soviet Union,” The Gettysburg Historical Journal, Vol. 6, 41 Henze, 197. Article 7. Bulgaria immediately attempted to discredit Mantarov, 42 Sterling, 19. stating he was nothing more than a car mechanic who worked for 43 Sterling, 48. Bulgarian DS. 44 Ibid., 40-49. 71 “Iran dismisses Khomeini Link to Pope Shooting,” Daily Mail, 45 West, 10. The guard was sentenced to 18 years in prison for his December 25, 2014, under “Settings,” http://www.dailymail.co.uk/ part in Agca’s escape. wires/ap/article-2886958/Iran-dismisses-Khomeini-link-pope- 46 Henze, 198. shooting.html (accessed January 28, 2015). 47 State Master, “Grey Wolves Member and Gladio Operative” 72 Scott, 68. When talking about coincidences, it was factually (January 12, 2015) under “Settings,” http://www.statemaster.com/ noted that, up until two weeks before the attempt on the Pope’s encyclopedia/Abdullah-Catli (accessed January 12, 2015). There life, radio message traffic spiked at the Bulgarian Embassy in Italy. was an article written stating Abdullah Catli was a Turkish Two weeks before the attempt the volume of message traffic had intelligence agent. After Catli’s death, there was a tremendous markedly dropped. uproar when one of Turkey’s head law enforcement officials was found in a wrecked car, though this would be more indicative of a LTC Raymond J. Faunt is an Infantry officer in the U.S. corrupt law enforcement official than Catli working as a trained Army Reserves. He served 17 years on active duty in agent of the government. command and staff assignments with light, mechanized, and 48 Henze, 10, 11, 196-201. special operations forces. His final assignment was with 49 Ibid., 198-199. DIA. A veteran of Operation IRAQI FREEDOM, he has 50 Sterling, 40. 51 R.W. Apple, “Trail of Mehmet Ali Agca: 6 Years of Neofascist trained members of the Georgian, Armenian, and Ties,” The New York Times, May 25, 1981. Azerbaijani militaries. He completed the U.S. Army 52 Henze, 196-201. Command and General Staff College, the U.S. Navy College 53 Sterling, 21. of Naval Command and Staff (Fleet Seminar), the U.S. 54 Ibid., 225. Marine Corps Command and Staff College through 55 Ibid., 32. seminar, and the Air War College through distance 56 Ibid., 20. education. He holds master’s degrees from the National 57 Sterling, 51, 64, 65. Defense University in Strategic Studies (with a 58 Sterling, 32. Celik disappeared for years after this; he was not concentration in Counterterrorism) and the U.S. Naval War picked up and sent to Italy until 1996. 59 Ibid., 204-205. College in National Security and Strategic Studies (with a 60 Ibid., 142, 211, 212. concentration in Insurgency and Terrorism). He also 61 Ibid., 84. earned a Master of Science of Strategic Intelligence degree 62 John Follain, Jackal: The Complete Story of the Legendary from the National Intelligence University (with a Terrorist Carlos the Jackal (New York: Arcade Publishing, 1998), concentration in Foreign Denial and Deception). In 124, 125. In this book, Carlos told the author that Hungarian addition, Ray holds two master’s degrees from American intelligence had him under constant surveillance. While in Bulgaria, Military University—one in Military Studies (with a Carlos and members of his cell walked around Sofia with their concentration in Unconventional Warfare) and the other in weapons in plain sight. It is hard to imagine that, in a police state National Security. He currently works for the Office of the such as Bulgaria, Mehmet Ali Agca was not under surveillance. 63 Ibid. Director of National Intelligence (ODNI Information 64 Sterling, 205. It was reported that one of Antonov’s best Sharing PM-ISE). friends was in fact an intelligence agent who vociferously defended Antonov and secured a pension for him for all of the pain and suffering he endured while in an Italian prison. 65 West, 17-31. Agca identified three personnel in a police lineup, gave their cover names, and described the apartment of one of the men in the photographs (Sergie Antonov) in detail. All three had been under surveillance before the attempt on the Pope’s life by
American Intelligence Journal Page 93 Vol 32, No 2 Fact and Fiction: Assessing Denial and Deception in South Africa's Nuclear Weapons Program
by Brian Gordon
There is a somewhat romantic notion in the minds of weapons program and provides an approach for analysts to many people that big decisions are discrete (often assess D&D in current and future long-term research and momentous) events… The decision to acquire and development (R&D) programs. To show the potential of deploy nuclear weapons was not a “spur of the such analysis, this article presents a synopsis of the South moment” decision by a particularly militant Chief of African nuclear weapons R&D program and discusses how the South African Defence Force. It was a resolution observables from such a case can be categorized to illustrate that grew over many years on the basis of top level the effects of deception. instructions given by many different government incumbents. HISTORICAL BACKGROUND
– van der Walt, Steyn, and van Loggerenberg (2003) detailed and comprehensive account of the South African nuclear weapons program is beyond the Ascope of this article.1 However, several incidents OVERVIEW and themes are significant for considering how deception was conducted. In the mid-1970s, the government of Prime he election of F.W. de Klerk to South Africa’s Minister John Vorster faced a precarious security situation. presidency in 1989 portended significant changes for The collapse of colonial rule in southern Africa empowered Tthe country. The world would watch de Klerk’s leftist and pro-Soviet groups both within and surrounding administration free Nelson Mandela, legalize the African South Africa. At the same time, the government faced National Congress (ANC), and end minority white rule in international condemnation for its apartheid policies. Thus, South Africa. Another significant change was not Pretoria’s challenge was that it needed to balance immediately visible. Soon after taking office, de Klerk intimidation and defeat of its regional opponents while ordered that South Africa’s nuclear weapons program be avoiding any action that would bring further condemnation suspended and its half dozen gun-type weapons be from abroad.2 In addition to this challenge, Vorster also dismantled. The dismantlement would be conducted in the inherited a robust nuclear program that had taken gradual highest secrecy—fitting for a program that had produced steps toward weaponization. and stored nuclear devices seemingly without the knowledge of the United States, the International Atomic South African nuclear development was originally pursued Energy Agency (IAEA), and the international community. with the assistance of the United States, which educated South African scientists in numerous relevant fields through the “Atoms for Peace” program in the 1950s.3 Those The South African government concealed scientists returned to a country with an abundant quantity and manipulated information to protect its of natural uranium and a desire to capitalize on it. By the nuclear program for two decades. 1960s, South Africa’s Atomic Energy Board (which would later become the Atomic Energy Corporation, or AEC) was conducting research on methods to separate plutonium or The South African government concealed and manipulated enrich uranium.4 The result of this research was information to protect its nuclear program for two decades. development of a unique aerodynamic separation system to The denial and deception (D&D) effort spanned multiple enrich uranium, a process the South Africans claimed to be administrations, changes in the regional security unlike any other in the world. Their goal was to sell low- environment, and unforeseen events that threatened to enriched uranium on a market that they expected to be expose the program. Individual episodes of this effort profitable due to the increase in nuclear power reactors provide insight into the conduct of deception. Analysis of throughout the world.5 To do so, a facility known as the Y- the effort as a whole, however, yields insights into South plant was constructed at Velindaba, outside Pretoria. Africa’s distinctive motivations and methods for its nuclear
Vol 32, No 2 Page 94 American Intelligence Journal African Air Force publicly announced that Buccaneer The South Africans also began to establish bombers had started practicing techniques for delivery of clandestine procurement networks to nuclear weapons, destroying a salvage ship off Cape Town support a weapons program and initiated with a “computerized technique to deliver nuclear bombs and escape the effect of the resulting explosions.”12 At this nuclear cooperation with Israel. point, with an indigenous capability of producing fissile material and a deteriorating regional security situation, South Africa’s pursuit of nuclear weapons appears to have Officials in the United States were surprised by the South approached being an open secret. African announcement of this new technique and by the construction of the Y-plant. The new reality they faced was Any secrecy would be removed the following year and that a country outside the “nuclear club” could now South Africa would be compelled to change its approach to possibly enrich uranium to a weapons-grade level.6 This protecting its nuclear weapons program. As Y-plant concern, alongside continuing objections to apartheid, led to operators worked to produce sufficient quantities of highly a suspension of U.S. assistance and fuel shipments for a enriched uranium (HEU) for a weapon, AEC scientists had vital South African research reactor in 1975. The South designed a gun-type nuclear device, similar to the one used Africans indirectly responded to this and other international on Hiroshima in 1945. In August 1977, Soviet intelligence concerns by releasing photographs and leaking some sources detected what appeared to be nuclear test information about the Velindaba facility in an attempt to allay preparations at a remote site in the Kalahari Desert. concerns and defuse speculation as to the facility’s According to former AEC official Waldo Stumpf, the activity capabilities.7 However, not all of Pretoria’s actions were was not a nuclear test but a dry run for the device design— based on openness about its enrichment capabilities. The the Y-plant had not yet produced sufficient fissile material South Africans also began to establish clandestine for a test at this point.13 Nonetheless, South African officials procurement networks to support a weapons program and must have realized the sensitive nature of this activity. In an initiated nuclear cooperation with Israel.8 attempt to confuse overhead imagery, truck-mounted rocket launchers were tested at a nearby range to provide an As South Africa researched and developed its uranium explanation for the increased traffic at such a remote enrichment process, the international community location.14 The failure to conceal the activity effectively was moving toward consensus on the need for preventing proved significant. When informed of the evidence, U.S. the spread of nuclear weapons. The government of Prime officials indicated they would support sanctions against Minister Hendrik Verwoerd was supportive of Pretoria. Prime Minister Vorster denied to President Carter nonproliferation norms but, when negotiations started for that South Africa possessed, planned to possess, or the Treaty on the Non-Proliferation of Nuclear Weapons planned to test any nuclear device.15 Despite this denial, the (NPT), South Africa did not join. For a country already U.S. government supported a resolution in the UN Security ostracized for its apartheid policies, this decision had Council later that year which resulted in a near-total arms significant potential diplomatic consequences. The Pretoria embargo of South Africa. government justified its refusal economically, stating that the safeguards and inspections in the NPT would expose The discovery of the Kalahari test activity and the proprietary South African technology (the aerodynamic diplomatic aftermath caused the South African government enrichment process) to foreign inspectors.9 Nevertheless, to change its approach to nuclear weapons R&D to a more internal documents from this period indicate that South deceptive one. Responsibility for constructing and then African officials were already “keeping the option open” for storing the devices was shifted from the AEC to ARMSCOR, nuclear weapons development.10 a semi-private armaments firm outside Pretoria that had gained experience in circumventing international sanctions In addition to internal discussions, there were observable to arm South Africa’s military.16 AEC personnel needed for indications that Pretoria was considering nuclear weapons, ARMSCOR’s task were quietly transferred to a new facility indications often made observable by the government’s own built for the construction and storage of nuclear devices, but admissions. In 1976 the CIA noted that an associate director these personnel were forbidden from discussing their new with South Africa’s Atomic Energy Board stated, “We’re job or from being publicly associated with ARMSCOR or the going to have to make an atom bomb. We (South Africa) facility. They were transported to the facility by white can’t afford it but we’re going ahead with it anyway.”11 The microbuses with frosted windows to protect their identities.17 report went on to note South Africa’s culture of secrecy and Policymaking changed as well. Shortly after P.W. Botha the possibility that such official statements might have became prime minister in 1978, he formed the “Witvlei appeared off-hand and informal but in fact were deliberate Committee,” a group of cabinet ministers, AEC and intended for a U.S. audience. Also in 1976, the South representatives, and military officials which would oversee
American Intelligence Journal Page 95 Vol 32, No 2 the nuclear weapons program and set policy. Knowledge of increased international isolation? How could these weapons this significant and expensive weapons program was not be appropriate given that Pretoria faced a “bush war” with extended to the entire cabinet, nor to the State Security its regional opponents and internal actions from the ANC? Council—an extremely unusual dynamic in the South Why was Botha strict as to the limited development of first- African system of the time.18 generation devices with no serious attempt at more advanced weapons? The motivations of the South African The Y-plant produced its first HEU in early 1978 and by the government in pursuing nuclear weapons are the keys to end of the year was producing approximately enough HEU understanding why South African R&D was conducted in to construct one gun-type bomb per year.19 The first this manner. prototype device was completed in 1982, and additional devices followed at an “orderly pace” of one per year as Though some officials in Pretoria may have contemplated HEU became available from the Y-plant.20 Six operational use of nuclear weapons during this period, numerous former devices were eventually constructed by ARMSCOR based officials and scholars have argued that the South African on the original design developed by AEC. There continues government was following a policy of “catalytic deterrence,” to be disagreement over the deliverability of these weapons. using a nuclear arsenal to compel the actions of its ally A review of a recent book by a former program participant rather than its adversary.25 A working group that was argues that these weapons were not the bulky objects many chaired by ARMSCOR and included foreign policy experts, believed they were.21 Stumpf, on the other hand, claims that military officials, and even a theologian met for over a year the safety interlock and ignition systems of these devices and developed a three-phase nuclear strategy for South made them undeliverable regardless of the weight and size. Africa.26 In phase one, the government would create Neither system was reliable without an external source of uncertainty with statements about nuclear weapons electric power, thus making the devices themselves capability but no admission that devices had been unreliable for anything other than an in-ground test.22 constructed. If a crisis forced phase two, the government would covertly acknowledge the weapons to the United States and other Western governments to gain assistance. Why would the South African government If this was unsuccessful, phase three called for a public proceed with nuclear weapons R&D despite acknowledgment of the program and some form of test 27 the potential for increased international would be conducted at the Kalahari facility. Debate continues as to whether additional steps were contemplated, isolation? such as the targeting of regional capitals. However, former officials, including Stumpf, maintain it was understood in Pretoria that any use of nuclear weapons would have led to Though ARMSCOR continued to produce these devices, global condemnation and that any targeting of Soviet- AEC was not completely removed from nuclear weapons supported or Cuban troops would have been “suicidal” for R&D. The group continued research into more advanced the South African government.28 Hence, the South African implosion weapons. To U.S. analysts, these weapons were a government saw value in the weapons despite their technological upgrade over the gun-type design and thus unsuitability for an actual conflict and was satisfied with the may have appeared to be the logical long-term goal of a weapons being produced by ARMSCOR because much of nuclear weapons program. The AEC research resulted in the intended effect came from possession of the weapons indicators that became a distraction for U.S. intelligence rather than their potential use. Though some officials likely agencies while actual device construction proceeded at did contemplate their use, it seems that others realized the ARMSCOR. This confusion was likely unintentional on the inherent risk in such a diplomatic gamble. These limited part of the South African government because Botha was intentions may explain Botha’s anger at the unauthorized reportedly “livid” when he was informed AEC had continued implosion research at AEC. research on implosion weapons and reiterated earlier decisions that only a handful of gun-type weapons were to Conditions had changed by the time de Klerk ascended to be produced.23 Nonetheless, he permitted the AEC to the presidency in 1989. The Cold War was coming to an end continue its theoretical studies and thus provided significant and cease-fire agreements had been signed in the Angolan deceptive indicators to agencies attempting to monitor the and Namibian conflicts. Maintenance of a nuclear arsenal program. Robert Kelley notes this likely unintentional was inconsistent with the goals of the new South African situation is “a good reminder that the obvious may not be government to democratize and relieve the country’s the important part of the story.”24 international isolation. As stated previously, de Klerk quickly issued a directive to dismantle the program but also Several questions emerge from the information presented stipulated that South Africa would not be admitting to its thus far. Why would the South African government proceed nuclear efforts in the foreseeable future, and hence the with nuclear weapons R&D despite the potential for
Vol 32, No 2 Page 96 American Intelligence Journal dismantlement would be secret as well.29 In preparation for South Africa’s agreement to the NPT, IAEA inspectors Analysis of the deception conducted in visited South African facilities after the dismantlement and long-term efforts, such as R&D programs, quickly became convinced that the program had progressed beyond the point admitted by Pretoria.30 One example of is rarer than that focused on strategic or evidence observed during a series of visits to what had been other forms of deception. the main ARMSCOR facility was the presence of a precision- coordinate measuring machine of Italian origin. The machine was export-controlled and had been obtained legally by a Analysis of the deception conducted in long-term efforts, South African company, but its presence in a suspected such as R&D programs, is rarer than that focused on nuclear weapons facility indicated that some form of strategic or other forms of deception. The most notable diversion had taken place.31 work in this area concerns German rearmament after the Versailles Treaty between 1919 and 1939, including excellent In March 1993, the story of the South African nuclear studies by Michael Mihalka35 and Barton Whaley.36 Both weapons program ostensibly came to an end as President de Mihalka and Whaley use a historical review of the German Klerk made a full admission of the construction and case to discuss how deception was conducted, but neither dismantlement of the nuclear devices. The program had treats the deception as a coherent and long-term effort. The started with efforts to develop an indigenous method to South Africa case shows that, to consider deception in this enrich uranium, became an effort to design a device that was way, a system must be devised to categorize and analyze the strongly suspected in the international community, and then large amount of data we can expect to see from such changed into a covert effort to build devices in the hopes of programs. influencing U.S. and Western policy in a time of crisis. This covert effort was protected by a coherent and coordinated Reveal Fact Conceal Fact Information: Information: strategic deception. The remaining questions of intended o Release true information that benefits the deceiver o Secrecy (clearance programs, physical security, and (e.g., the double bluff ruse) INFOSEC) use and deliverability, over twenty years after the end of the Physical: o Withholding information to create a false or o Display real equipment or facilities (e.g., in order to misleading impression build a source’s credibility) Physical program, are testaments to the success of that deception. A o Camouflage, concealment, signal reduction (e.g., stealth designs and materials, spread spectrum closer look at how information in these cases can be communications), disguises, dazzling o Nonverbal deceit categorized may better define this type of deception and Reveal Fiction Conceal Fiction Information: Information: how it can be assessed in the future. o Disinformation o Suppress a lie . Includes lying: providing information Physical known to be untrue o Hide a sham . Dazzling (e.g., large volumes of information) LONG-TERM DECEPTION Physical o Decoys, diversions (feints and demonstrations), duplicates, disguises, dummy positions, equipment, and facilities o Non-verbal deceit modest amount of literature and doctrine provides a basis on which to consider deception, including Figure: The Deception Methods Matrix37 Adeception conducted on a strategic level. Michael Bennett and Edward Waltz define deception as “those Bennett and Waltz propose a simple but effective means of measures designed to mislead the enemy by manipulation, categorizing the actions that comprise a deception, shown in distortion, or falsification of evidence to induce him to react the matrix above. This approach is equally effective for in a manner prejudicial to his interests.”32 Examples of strategic deception. However, the South Africa case deception frequently cited include Japanese efforts to mask indicates two modifications are required to make this matrix fleet movements prior to Pearl Harbor and the Allied descriptive of deception regarding long-term programs. campaign to convince German officials that the D-Day landings would actually come at Pas de Calais rather than at First, the descriptions in both “Reveal Fact” and “Reveal Normandy. Richards Heuer specifies strategic deception as Fiction” imply a deliberate action on the part of the deceiver. that which “aims to manipulate elite perceptions in order to This may be largely true in deception lasting weeks or gain competitive advantage.”33 Roy Godson and James months, but deliberate actions will only be part of the story Wirtz add that it deals only with issues a senior decision- for a long-term effort. Over a longer time period, it is more maker would deal with personally.34 Elements of the Pearl likely that information will be unintentionally transmitted Harbor and D-Day operations would fit these definitions, as from the deceiver to the deception target. Factual would South Africa’s nuclear weapons program. There is information of this type might include accidental statements one obvious and critical difference. Pearl Harbor and D-Day on the part of government officials or diplomatic activity that were military operations of relatively short duration, whereas simply cannot be hidden by the deceiver. Misleading a nuclear weapons R&D program can last decades. information can also be unintentionally transmitted by the deceiver, in the form of confusing or contradictory signals
American Intelligence Journal Page 97 Vol 32, No 2 that are the result of mistakes or a lack of coordination within the intent to build the Y-plant. These revelations were the bureaucracy. These unintentional signals, both factual necessary because South Africa wanted to market enriched and fictitious, are important data points that will be observed uranium to countries building nuclear facilities; it was thus by an attentive analyst. unable to keep the capacity to produce fissile materials a secret as other proliferators have attempted to do. Had no market-driven motivation existed, the South African Despite its secrecy, the South African government could have attempted to conceal its attempts to nuclear weapons program featured a produce fissile material. significant amount of factual data revealed In addition to these unavoidable factual revelations, by Pretoria. Much of this was intentional. mistakes did occur during the course of the R&D program. One that was not mentioned in previous sections involved the illicit procurement networks established to support the The second modification required for the matrix is in the program following the imposition of sanctions. In 1984, four “Conceal Fiction” category. In the matrix above, this South Africans working for a nuclear weapons subsidiary of category refers to protection of the deception itself— ARMSCOR were arrested in the United Kingdom for ensuring the target does not realize any such effort is under violations of arms export restrictions involving the way. The South Africa case shows this category should be Buccaneer bomber.39 Such incidents are likely to be found expanded to include coordination. Coordination is also a during the course of any involved R&D program that is key element in shorter deceptions. Still, for efforts which restricted by international agreement and forced to procure span multiple government ministries as well as the military material illicitly. and scientific sectors, such as nuclear weapons R&D, an individual, group, or organization with sufficient clout to Conceal Fact direct the deception is essential. Presumably, the existence of such an organization and its coordination results in This article has focused mainly on deception in the South potentially observable signatures. A review of data from the African program, but denial was a critical element as well. South African case shows that this and the addition of The clandestine networks established to procure material for unintentional information results in an effective way to the program, such as the Italian-made precision-coordinate categorize information from these R&D programs.38 machines found by IAEA inspectors once the program was disestablished, were intended to conceal this activity. Also Reveal Fact noteworthy are the measures taken to protect the identities and purposes of personnel involved with the program. One Despite its secrecy, the South African nuclear weapons example mentioned previously was the quiet transfer of program featured a significant amount of factual data personnel from AEC to ARMSCOR when the latter took over revealed by Pretoria. Much of this was intentional. The the construction of the gun-type devices and the covert public announcement that Buccaneer bombers were movement of personnel in government vehicles to various practicing the delivery of nuclear payloads was certainly an facilities involved with the effort. intentional release of true information. Also intentional, though incomplete, were the leaks of information and Though the South Africa case presented no modifications to photographs of the Y-plant and South Africa’s capability to this section of the matrix, the importance of concealing fact enrich uranium. If the CIA analysis in 1976 was correct, a cannot be overstated. In his work on strategic deception, series of off-hand statements by South African officials was Abram Shulsky highlights the significance of denial for also an intentional transmission of factual information due to controlling information. “Almost by definition, deception the normally strict observance of security by white South must include denial: in order to induce an adversary to African officials. accept a cover story, information that would reveal the true state of affairs must be denied him.”40 While South Africa Several unintentional revelations occurred during the course was essentially a one-party state during this period, it was of the program as well. Perhaps the most significant falls also a relatively free society for whites. Hence, a robust into the category of information that the deceiver simply security program was required to keep control of information cannot hide. South Africa’s refusal to join the NPT critical to the program’s security. negotiations and sign the agreement was a factual revelation that could not be hidden. It raised the suspicions of the Reveal Fiction international community and led to lingering doubts about South Africa’s intentions due to the lack of outside The most intuitive category of deception activities is the inspections of Pretoria’s facilities. Also unavoidable were transmission of fictitious information from the deceiver to the initial revelations of the uranium enrichment process and the target. Numerous examples of this exist in the data
Vol 32, No 2 Page 98 American Intelligence Journal presented. Perhaps the most blatant was Prime Minister Vorster’s denial of a nuclear program to President Carter In the case of South Africa’s nuclear following the discovery of the Kalahari test site in 1977. weapons program, deception was largely While his claim that no nuclear test was taking place may successful. have been technically true (due to the lack of HEU in the device), his assertion that there were no plans for nuclear weapons was certainly not. The design of the device by AEC and preparations for Y-plant’s production of HEU CONCLUSION indicate a decision had already been made by Vorster himself. The Kalahari episode also includes an additional hen considering any case involving deception, the fictitious data point with the false rocket system test that first question one likely asks is: Was the was scheduled nearby to mask increased activity at the test Wdeception successful? Any evaluation in this site. article must include the caveat that only unclassified and declassified sources were consulted. Nonetheless, it Similar to the “Reveal Fact” category, unintentional actions appears that, in the case of South Africa’s nuclear weapons are also possible in these long-term R&D efforts. These program, deception was largely successful. It seems that the actions do not fall within traditional definitions of deception. United States and others in the international community had The target that is fooled by unintentionally deceptive acts is a general understanding of South African capabilities and guilty more of self-deception than of being deceived.41 From R&D potential, but the deception can still be judged the analyst’s perspective, however, it is important to effective for two reasons. understand that, in the course of observing a potential R&D effort over time, misleading “noise” will complicate analysis. First, there is no clear evidence that U.S. officials were aware Whether an individual action is intentional on the part of the of the existence of the weapons produced by ARMSCOR. deceiver is, in this context, not as important as the Early in the program, analysts in the U.S. national laboratory recognition that continuous scrutiny of the information complex noted that uncertainty as to the output capacity of received about an R&D program is essential to recognizing the Y-plant complicated assessments of whether weapons and discarding fiction. The South Africa case provides an were actually being constructed.42 Several years later, excellent example of this with the AEC’s continuing research analysts were confident enough to project how much fissile on implosion weapons. The attention paid to this effort material had already been produced, stating in a National distracted from identification of ARMSCOR’s production of Intelligence Estimate that “South Africa could stockpile actual devices, though there is no evidence the approach annually enough highly enriched uranium for two to four was intentional on the part of Pretoria. nuclear explosives, depending on the design.”43 Though this estimate was high, it shows that U.S. officials and Conceal Fiction analysts were aware of South African efforts and had a general knowledge of capabilities. In the declassified The Conceal Fiction category is perhaps the most significant sources, however, no further estimates are given of weapons modification to the matrix and the case provides a clear actually produced and assembled. example. Any coordinated deception to protect an effort that involved the highest levels of the South African Second, it is unclear to what extent U.S. officials understood government, AEC, ARMSCOR, and the South African that one of South Africa’s primary motivations in pursuing military must have had a coordinating organization. In this the weapons was to persuade the United States to intervene case, the Witvlei Committee served that role. Made up of in the event of a crisis. The possibility is entertained in the Prime Minister as well as key cabinet and technical several declassified analyses. One early analysis briefly officials, this group had complete oversight of the policy and notes that a South African nuclear strike capacity “would execution of the weapons program. It also had sufficient compel some Western intervention in support of the regime power to direct the allocation of resources, the definition of in order to prevent such an attack.”44 Later assessments responsibility between the groups, and the official “line” of acknowledge the awkwardness of the U.S. position in the the government, which had to be consistent for the event of a revelation of South African nuclear weapons, but deception to be effective. Though collection of information focus on the implications for U.S. policy in general and the on such a group is extremely challenging when assessing a potential of South Africa cutting off important mineral current potential program, knowledge that such an exports to the United States if Pretoria did not see the organization must exist gives analysts the ability to request desired U.S. support.45 Therefore, it appears that the information from collectors proactively that would support possibility of a political dimension to the South African determination of whether deception is taking place. weapons program was recognized by analysts. Yet, there is no available evidence that policymakers were told of
American Intelligence Journal Page 99 Vol 32, No 2 anything resembling the three-phase strategy—a strategy 4 Albright, “South Africa and the Affordable Bomb,” 39. intended to compel them to take actions on Pretoria’s behalf. 5 Robert E. Kelley, “The Iraqi and South African Nuclear Weapons A lack of understanding in this area may have had Programs: The Importance of Management,” Security Dialogue 27, ramifications beyond briefing policymakers. The focus on no. 1 (1996): 29. 6 implosion research may have been logical to U.S. analysts at Anna-Mart van Wyk, “Ally or Critic? The United States’ Response to South African Nuclear Development, 1949-1980,” the time, but in retrospect such advanced weapons were Cold War History 7, no. 2 (2007): 200. beyond what was required for South African purposes. A 7 Kelley, “The Importance of Management,” 33. better understanding of South African motivations may have 8 Albright, “South Africa and the Affordable Bomb,” 39. led U.S. analysts to ask harder questions about whether 9 Betts, “A Diplomatic Bomb,” 96. more basic weapons already existed. 10 Jo-Ansie van Wyk and Anna-Mart van Wyk, “From the Nuclear Laager to the Non-Proliferation Club: South Africa and the NPT,” South African Historical Journal 67, no. 1 (2015): 34. It is no longer possible to design and develop 11 Central Intelligence Agency, “South Africa Again Rumored to be Working on Nuclear Weapons,” Weekly Surveyor 2 (1976), 1. a nuclear weapon in secret, using only 12 Central Intelligence Agency, Trends in South Africa’s Nuclear denial to protect the program. Arms control Security Policies and Program (1984), 17. regimes, enhanced means of collecting 13 Dr. Waldo Stumpf, email to author, December 30, 2015. 14 Richardt van der Walt, Hannes Steyn, and Jan van Loggerenberg, intelligence, and increasingly connected Armament and Disarmament: South Africa’s Nuclear Weapons global scientific communities make Experience (Pretoria: Network, 2003), 40. deception a necessary component of any 15 David Fischer, “South Africa,” in Nuclear Proliferation after the Cold War, eds. Mitchell Reiss and Robert S. Litwak (Washington, long-term weapons R&D effort in the future. DC: Woodrow Wilson Center, 1994), 209. 16 van der Walt, Steyn, and van Loggerenberg, Armament and Disarmament, 51. It is no longer possible to design and develop a nuclear 17 Ibid., 80. weapon in secret, using only denial to protect the program. 18 Liberman, “The Rise and Fall of the South African Bomb,” 53- Arms control regimes, enhanced means of collecting 54, 66. 19 Thomas C. Reed and Danny B. Stillman, The Nuclear Express: intelligence, and increasingly connected global scientific A Political History of the Bomb (Minneapolis: Zenith, 2009), 176. communities make deception a necessary component of any 20 Waldo Stumpf, “South Africa’s Nuclear Weapons Program: long-term weapons R&D effort in the future. It is therefore From Deterrence to Dismantlement,” Arms Control Today 25, no. incumbent on researchers and intelligence analysts to 10 (1995): 5. consider how such deception is constructed and executed. 21 Jeffrey Lewis, “Revisiting South Africa’s Bomb,” review of The The South Africa case provides examples of indicators in Bomb: South Africa’s Nuclear Weapons Programme, by Nic von long-term deception that, if observed and correctly Wielligh, Arms Control Wonk, December 3, 2015, http:// understood, can aid analysts in their assessments of current www.armscontrolwonk.com/archive/1200544/revisiting-south- proliferation efforts. The modifications to Bennett and africas-bomb/. 22 Stumpf, email to author, December 30, 2015. Waltz’s matrix form the basis of a fresh look at deception in 23 Ibid. long-term R&D programs that will improve the analyst’s 24 Kelley, “The Importance of Management,” 37. ability to provide quality assessments to policymakers and 25 Donald L.R. Goodson, “Catalytic Deterrence? Apartheid South deter the pursuit of mankind’s most dangerous weapons. Africa’s Nuclear Weapons Strategy,” Politikon: South African Journal of Political Studies 39, no. 2 (2012): 209. [Author’s Note: The research in this article was made 26 Liberman, “The Rise and Fall of the South African Bomb,” 56. possible by funding from RAND’s Intelligence Policy Center 27 Albright, “South Africa and the Affordable Bomb,” 38. and Project AIR FORCE.] 28 Stumpf, email to author, December 30, 2015. 29 Albright, “South Africa and the Affordable Bomb,” 46. 30 Ibid., 38. Notes 31 Frank V. Pabian, “South Africa’s Nuclear Weapons Program: 1 For a more comprehensive account, the author recommends Lessons for U.S. Nonproliferation Policy,” The Nonproliferation Zondi Masiza’s “A Chronology of South Africa’s Nuclear Review 3, no. 1 (1995): 13. Program” (The Nonproliferation Review, no. 1, 1993), David 32 Michael Bennett and Edward Waltz, Counterdeception Albright’s “South Africa and the Affordable Bomb” (Bulletin of the Principles and Applications for National Security (Boston: Artech, Atomic Scientists 50, no. 4, 1994), Peter Liberman’s “The Rise and 2007), 5. Fall of the South African Bomb” (International Security 26, no. 2, 33 Richards J. Heuer, “Strategic Deception and Counterdeception: 2001), and Frank V. Pabian’s “The South African Denuclearization A Cognitive Process Approach,” International Studies Quarterly Exemplar” (The Nonproliferation Review 22, no. 1, 2015). 25, no. 2 (1981): 294. 2 Richard K. Betts, “A Diplomatic Bomb for South Africa?” International Security 4, no. 2 (1979): 104. 3 Masiza, “A Chronology,” 35.
Vol 32, No 2 Page 100 American Intelligence Journal 34 Roy Godson and James J. Wirtz, “Strategic Denial and 44 Special Projects Division, Lawrence Livermore National Deception,” International Journal of Intelligence and Laboratory, Proliferation Analysis and International Assessments, CounterIntelligence 13, no. 4 (2000): 425. (Livermore, 1980), 11. 35 Michael Mihalka, German Strategic Deception in the 1930s, 45 CIA, Trends in South Africa’s Nuclear Security Policies and Santa Monica, CA: RAND Corporation, 1980. Program, 2. 36 Barton Whaley, Covert German Rearmament, 1919-1939, Frederick, MD: University Publications, 1984. Brian Gordon is an assistant policy analyst at the RAND 37 Bennett and Waltz, Counterdeception Principles, 52. Corporation and a PhD candidate at the Pardee RAND 38 Citations for each example can be found in the earlier section on historical background. Graduate School. He is an 11-veteran of the U.S. Navy, 39 Pabian, “The South African Denuclearization Exemplar,” 35. with service in both submarines and surface ships as well 40 Abram Shulsky, “Elements of Strategic Denial and Deception,” as with the Multi-National Security Transition Command- in Strategic Denial and Deception: The Twenty-First Century Iraq in Baghdad. He received a BA in Political Science Challenge, eds. Roy Godson and James J. Wirtz (New Brunswick, from the University of Kansas on a Navy ROTC scholarship NJ: Transaction, 2002), 16. and a master’s in International Affairs from Columbia 41 James B. Bruce and Michael Bennett, “Foreign Denial and University’s School of International and Public Affairs. His Deception: Analytic Imperatives,” in Analyzing Intelligence: forthcoming dissertation focuses on the means by which National Security Practitioners’ Perspectives, eds. Roger Z. deception was employed to protect nuclear weapons George and James B. Bruce (Washington, DC: Georgetown University Press, 2014), 202. programs in India, Iraq, and South Africa. 42 Special Projects Division, Lawrence Livermore National Laboratory, South Africa: Motivations and Capabilities for Nuclear Proliferation, (Livermore, CA: 1977), 61-62. 43 CIA, Trends in South Africa’s Nuclear Security Policies and Program, 1.
INTELLIGENCE That Makes the Difference
When national security is at stake, CACI provides the intelligence tools and tradecraft to deliver information to the tactical edge. Our intelligence analysts engage all sources of information to empower decision makers. From commanders in the field to policy-makers across government, our customers stay armed with the knowledge they need to outmaneuver foreign and domestic threats.
Learn more at: www.caci.com/Intelligence_Services
A Fortune World’s Most Admired Company
©2016 CACI · A346_1605
American Intelligence Journal Page 101 Vol 32, No 2 Intelligence Support to Humanitarian Assistance/Disaster Relief Operations: A Case Study in Ebola Response
by LTC (USA) Richard D. Conkle
At the request of the Liberian government, we’re Ebola Treatment Unit (ETU) beds would be needed by the going to establish a military command center in Liberia end of November 2014. The most severely affected to support civilian efforts across the region…our countries (Guinea, Sierra Leone, and Liberia) were struggling forces are going to bring their expertise in command to control the outbreak on the foundation of a weak and control, in logistics, in engineering. And our healthcare system, limited capacity for response, and Department of Defense is better at that…than any widespread fear. In Liberia, the average daily number of organization on Earth. suspected and probable cases reached its peak of 81 on 19 — President Barack Obama September. The daily average of confirmed cases continued 16 September 2014 to rise until it hit its peak of 79 on 28 September, and new EVD cases more than doubled during the month of September. Additionally, epidemiologists feared a large, FOREWORD unreported population of EVD-infected individuals whose presence could have meant the real number of EVD cases eventy-two hours after President Obama pledged was two or three times what was known. By 20 September United States Department of Defense support to the 2014, predictions over the extent of the outbreak had become fight against Ebola, the 101st Airborne Division (Air so dire that UN Secretary General Ban Ki-Moon officially S established the United Nations Mission for Ebola Assault) was alerted to deploy to Monrovia, Liberia, in support of the lead federal agency, the U.S. Agency for Emergency Response, the first-ever UN emergency health International Development (USAID). While a few staff mission. members had experience in Humanitarian Assistance/ Disaster Relief (HA/DR) missions in Haiti, this was the first time a DoD entity was called upon to help stop a pandemic. This mission required an entirely new intelligence apparatus—one that was not focused on enemy locations, preventing enemy attacks, or high- value target tracking. It required an intelligence structure that was able to track and provide clarity to epidemiological trends; was shareable with non-governmental organizations, inter-governmental organizations, and international partners in an unrestricted, unclassified format; and could enable the embedding of intelligence analysts into a system that is historically suspicious of DoD intelligence personnel and operations.
THE SITUATION
s part of the largest Ebola epidemic in history, the Ebola Virus Disease (EVD) outbreak in West Africa continued to evolve in alarming ways in mid- A Figure 1. On September 26, 2014, The U.S. Centers for September 2014. The U.S. Centers for Disease Control and Disease Control and Prevention (CDC) in Atlanta released a Prevention (CDC) and the World Health Organization new model for the spread of EVD. Its worst-case scenario (WHO) announced that, without a significant international estimated that up to 1.4 million people could be infected by intervention, the number of Ebola cases in Sierra Leone and the end of January 2015. Liberia could reach 1.4 million by mid-January 2015. Adding to this urgency, other entities stated tens of thousands of
Vol 32, No 2 Page 102 American Intelligence Journal Transition from WFX 15-02 to HA/DR built needed to be simple and expeditionary. We were entering an immature theater that had no existing IT Meanwhile, the 101st Airborne Division (AA) G2 section was infrastructure to support JFC operations and we did not entrenched in planning for an event that could not be further have the time to create a complicated architecture. from HA/DR—a division-level Warfighter exercise (WFX), a Additionally, we would have to establish this architecture force-on-force exercise focused on violently closing with with no FSR (field support representative) support. Only two and destroying the enemy through relentless brigade-level U.S. Army soldiers from the G2’s intelligence systems air assaults and synchronized fires. This was an important maintenance section would be available in-country. event to the G2 section because we were exercising This architecture was inherently different than anything we processes we had not accomplished in many years, had done before. Its primary function would be to share specifically division-level force-on-force doctrine and information with our partners, virtually none of whom had employing a full-spectrum DCGS-A (Distributed Common access to the Army’s standard information networks. As we Ground Station-Army) intelligence architecture built on looked at what we needed to take into country with us, we Secret and Top Secret information infrastructure. In order to realized that we had to build everything; a standard facilitate our training and DCGS-A structure, we were unclassified HA/DR COP toolkit does not exist in the DoD utilizing the services of the U.S. Army Intelligence Center of inventory. However, we were able to repurpose equipment Excellence’s (USAICOE) Tactical Engagement Team (TET), a meant for classified use to meet our needs, specifically the recently assembled group of DCGS-A-savvy mentors, Army’s DCGS-A system. The DCGS-A program manager, in engineers, and trainers focused on enabling Army concert with TCM-SP (TRADOC Capabilities Manager- organizations to best utilize DCGS-A in its operations. This Sensor Processing) and INSCOM (U.S. Army Intelligence group proved to be immensely helpful. Its members were and Security Command), were able to rapidly acquire, ship, scheduled for a 22-26 September WFX-focused training and build a “fly-away” kit of unclassified DCGS-A servers event at Fort Campbell, Kentucky, but once we were notified and laptops that gave the JFC a robust capability in Liberia of our change of mission on 19 September we immediately as well as Fort Campbell, where our reachback node called for adjusting our plan. Working with the TET and the operated. Important in this is that we did everything at DCGS-A Program Manager, we were able to frame our initial virtually no cost to the Army; it was all done with existing requirements and order an unclassified DCGS-A architecture infrastructure and manning. within 24 hours. The TET attended the already planned training event, and we created a new training endstate and The most useful data we were able to share with our partners set of metrics. We would finish the next week with our final were the location and status of our labs, Ebola Treatment requirements and a new way ahead that would enable our Units (ETUs), community care centers (CCCs), and HA/DR mission. helicopter landing zones (HLZs). We were able to post those data and our common operating picture (COP) on the All INTELLIGENCE ARCHITECTURE Partners Access Network (APAN), a website built for collaboration in an HA/DR environment. Using APAN also ur requirements were seemingly easy, if a little non- allowed us to leave behind a sustainable COP that we could traditional. First, we needed systems that could work transition to a non-military entity for further development or Oon the “dirty” Internet, unencumbered by the use. Posting this information onto a website in near-real-time restrictions of a NIPR (Non-classified Internet Protocol (NRT) was incredibly useful to our partners because they Router) network. This was extremely important and probably did not have a COP and did not have a good idea on where our most critical requirement given that our partners would to start building one. Our tools gave them a foundation on not be other DoD entities but Department of State which to build and greatly assisted them in focusing their organizations, NGOs, and partner nations that did not work efforts in a common direction. Operation UNITED within a NIPR construct. Second, our geospatial tools ASSISTANCE highlights the need for a suite of rapidly needed to be Google Earth-based. All of our existing deployable, unclassified command and control (C2) tools for systems were ArcGIS-based; while ArcGIS is compatible a headquarters to use that is easily shareable with non- with Google Earth, we needed to work on the same platform military and non-governmental organizations. as our partners, who were all using Google Earth, often on personal computers and tablets. The requirement to be J2 SECTION COMPOSITION completely unclassified was one of the lessons learned from Haiti that we used as a base planning assumption, and it ur predeployment guidance was to keep staffing proved completely correct. Because of that preplanning, our small. Our division staff footprint would stay below geospatial intelligence (GEOINT) operations and common O300 personnel. Our JMD initially authorized a full operating picture (COP) functioned seamlessly when in Division G2 section deployment plus intelligence enablers theater. Our third and final requirement was that anything we (237 personnel). That number was later reduced to 150
American Intelligence Journal Page 103 Vol 32, No 2 personnel, and we deployed with just 33 individuals. In behind a robust reachback cell of 64 personnel, led by the addition to our 22-person J2 staff, we also brought one-half Division ACE Chief, to give us the analytical and production of our Air Force Staff Weather Officer (SWO) contingent, a depth we lacked forward. We intended to employ reachback human intelligence (HUMINT) team from 4th Brigade, 1st to do most of our comprehensive GEOINT and analytical Infantry Division, and two Naval Criminal Investigative projects, the base INTSUM, all signals intelligence (SIGINT) Service (NCIS) teams for counterintelligence (CI) operations. support (if required), and the bulk of collection management. Our deployed G2 section was designed to give shallow As time progressed and we refined our information and depth in GEOINT, HUMINT/CI, SYSCON, and plans, while production requirements, we were able to reduce the size of providing slightly more depth in all-source fusion. We left our reachback to 14 personnel. In the 14-person construct,
UNCLASSIFIED//FOUO JTFͲOUAJ2Forward
J2 (1) Total: 33 J2 NCOIC / SSO / DJ2 CM&D (1) (1)
OPS FUSION J2X SIGINT GEOINT SYSCON SWO (2) (9) (2) (1) (3) (2) (2)
CUOPS JICE J2X SIGINT GEOINT JWICS / SWO (2) Director (1) (1) OIC (1) (2) DCGS Tech (2) (AF) (2)
P&A Chief TFCICA IMINT (2) OIC (1) (1)
JICE HUMINT Analyst (6) (4/1) (4)
CI (Navy) (2)
CI (Navy) (2)
Essential Tasks Risk/Gaps Mitigation 1. Conduct Intelligence Operations 1. No enough GEOINT - Humanitarian 1. Reach back: Use of supplemental products 2. Conduct intelligence fusion and production of Ebola tracking, operations are extremely GEOINT from GEOINT, SIGINT, CM&D and FUSION modeling and statistics reliant • GEOINT - produces all long term products 3. Conduct intelligence fusion and production on VEO threats 2. No organic ISR – We rely on AFRICOM • SIGINT - conducts threat over watch 4. Conduct Geospatial and Imagery analysis and production for ISR/FMV support (limited) • CM&D - Liaison with AFRICOM for ISR 5. Provide support to threat assessments (J2X functions) 3. No TS network - limited need support 4. No dedicated SSO or FDO • FUSION - Initial INTSUM production, answer Capabilities 5. No SIGINT capability RFIs and produce all long term products 1. FUSION: 24 hour analysis and production 6. NCOIC serves as CM&D manager 2. Use of USARAF FDO 2. CI/HUMINT: Limited collection 3. CM&D: Limited management Continued GAP 4. SIGINT: No collection 1. SIGINT Support 5. GEOINT: Imagery download and map production 2. TS network capability 6. SWO: Dedicated 24 hour weather support
1 UNCLASSIFIED//FOUO Figure 2. Deployed J2 structure. UNCLASSIFIED//FOUO JTFͲOUAJ2Reachback
Reach Back OIC (1)
Total: 64 Reach Back NCOIC (1)
OPS FUSION G2X SIGINT GEOINT CM&D (3) (21) (12) (10) (13) (3)
BLT CPT ACE HU OIC SIGINT GEOINT OIC (2) NCOIC (1) (8) OIC (1) OIC (1) (1)
Db MGR Fusion HUMINT SIGINT GEOINT CM&D (1) Tech (2) Collector (1) Analyst (9) (5) Tech (1)
ACE CI IMINT CM&D Analyst (18) Collectors (2) (7) Analyst (1)
HU/CI Fusion (1)
Essential Tasks Production Requirements Capabilities 1. GEOINT Support 1. Daily NIPR INTSUM 1. 15 hour coverage with a 20 Hour Surge capability 2. SIGINT Analysis 2. Management of COP on APAN and Intelink 2. GEOINT support capable of 24-72 hour turnaround 3. FUSION Support 3. Weekly SIPR VEO Slide with inputs from SIGINT 3. UNCLASS DCGS Database Managers (INTSUM, 4. CM&D Support 4. CM&D management and authority SITREPs, County Assessments, EVD data) 5. HUMINT/CI Collection Analysis 5. HUMINT DIIR review 6. Network with USAID, National assets, USARAF and Local agencies
2 UNCLASSIFIED//FOUO Figure 3. J2 Reachback structure located at Ft Campbell, KY.
Vol 32, No 2 Page 104 American Intelligence Journal we put the G2X and SIGINT capabilities into an “on call” receive multiple data streams, analyze the data, and present status, condensed the GEOINT structure, and slightly that information to the Commander allowed the Intelligence reduced our all-source capability. The collection warfighting function (WfF) to drive operations within management capability remained unchanged. Liberia.
INTELLIGENCE OPERATIONS There was significant confusion on EVD data within the counter-Ebola response community at the time of our e arrived in Liberia with a traditional intelligence arrival—what it was, where it came from, what it meant. focus—force protection and security. We quickly There were multiple entities looking at and reporting the Wrealized that we were incorrectly focused. The same data in different ways. We immediately looked for the security situation in Liberia was extremely stable and most advantageous locations to embed analysts. The first showed no indications of changing in the near term. No was in the National Ebola Operations Center (NEOC), where violent extremist threat existed in the country, and the we conducted a relief in place (RIP) with U.S. Army Africa populace was (and is) disinclined to support extremism. This (USARAF). Our senior NEOC analyst was an all-source CW2 required the J2 section to refocus on its biggest intelligence who became the overall JFC-UA representative. The second gap, the epidemiological spread of EVD. location was the Ministry of Health (MOH), the final destination for all EVD data, where we placed our SIGINT Understanding the already-available data was the most CW2. Having analysts in these two critical locations was important task we had. As we tried to get an understanding immensely helpful in two primary ways. First, given their of the true spread of EVD in our area of operations, one of analytical background, they were accustomed to sifting the most common issues we faced was that most EVD data through large amounts of data and formatting it for were portrayed cumulatively. That inherently meant that the commanders. Second, these analysts were able to data would never get better, only worse. We knew this was understand the data at which they were looking, cross-talk, not the case as Liberia did have true success stories. Our and share information and nuance/context that was being first task was to understand the EVD trends and find a way lost in daily operations, thereby becoming a behind-the- to portray them in such a way that the JFC Commander could scenes piece of the connective tissue between the epicenter make decisions and recommendations to USAID on the of EVD data collection (the MOH) and the epicenter for placement of DoD assets and capabilities. This ability to counter-EVD operations (the NEOC).
Liberia Long-Term EVD Trends
BLUF: Once retests are removed from lab results, there is an overall trend downward of new cases
(U) Ebola Virus Disease (EVD): • DEC13- Index Case in Guinea • 18MAR14- Guinea declares a VHF outbreak • 31MAR14- First confirmed EVD in Liberia SOELifted • 27JUL14- Borders, schools closed; quarantines begin • 06AUG14- State of Emergency declared
144* admitted to ETUs (20NOV) • Greater Monrovia:105* patients/540 beds • Lofa: 0 patients/40 beds • Firestone: 0 patients/31 beds • Nimba: 5 patients/36 beds POTUS Announces • Bong: 30 patients/52 beds USDeployment • Bomi: 4 patients/10 beds • Margibi: 1 patients/10 beds
Overall EVD Atmospherics • 3 beds free in Bong County confirmed ward
: 25/day • Montserrado (Island Clinic) New P/S Cases Incidentcases(1st timepositivelabresults) : 9/day 75% from Cape Mount New Conf. Cases SITREPcases(suspectedandprobable) Contact Tracing: 5500 *No report submitted for ELWA 3
1 Current as of: 24NOV14 UNCLASSIFIED
Figure 4. EVD tracking tool differentiating suspected and confirmed cases.
American Intelligence Journal Page 105 Vol 32, No 2 ANALYST EMBED PLACEMENT NEOC because of the flexibility and agility of the 350F MOS, which also assisted in technically managing the integration MOH of a GEOINT analytical capability (we rotated among a 12Y10, a 35G10, and our NGA rep) in the NEOC to liaise with t the Ministry of Health, we decided on two the Liberian GIS team that supported the counter-Ebola personnel who had backgrounds in data effort. Amanagement and analysis. The first was a signals intelligence warrant officer with an analytical background in The Ministry of Health created the NEOC to be the focal databasing sectarian violence trends in Iraq, well-versed in point of Ebola response and would be held accountable for managing large amounts of data from both Iraq and rapidly responding to and isolating EVD outbreaks in the Afghanistan. The second was an all-source intelligence country. Although over 123 multinational organizations analyst experienced in targeting and improvised explosive worked within the NEOC, the lack of managerial oversight device (IED) trends in Afghanistan. Both were directed to and prioritization was apparent. The NEOC analyst embed’s understand rapidly how Ebola-related data were compiled initial assessment identified the need to develop courses of and reported on a daily basis. action that mitigated operational obstacles. Clusters and pillars worked tirelessly to identify and discuss problems, Both personnel quickly recognized that data management but meetings often concluded without recommendations on presented a major challenge at the MOH, whose employees how to solve them. With the support and implementation of struggled to improve and develop procedural systems. additional working groups specifically focused on rapid Specifically, although Ebola case definitions existed, isolation of Ebola and decision-making, these organizations interpretations varied and inconsistencies led to duplicate were able to focus on a common operating picture while reports and inaccurate reporting of Ebola-related data. The simultaneously supporting logistics and medical attention. decentralization of Ebola case information to the county The NEOC analyst embed worked with international health teams produced multiple reporting formats and organization leaders from Europe, China, the United inconsistent practices, creating information gaps that Kingdom, and Africa to distribute guidance on international prevented clear representation of the Ebola data. Based on crisis priorities and integrate these into a model that nested this knowledge, the JFC analyst embeds advised the MOH with the President of Liberia’s overall strategy on isolating staff to follow clear criteria for case definitions and centralize and defeating the Ebola crisis. the reporting of confirmed cases based on laboratory results. The efforts of all parties resulted in an improvement in the CONCLUSION accuracy of reports and an increase in communications among Ebola treatment units, laboratories, and county health Division G2 section can absolutely drive operations teams. Furthermore, the MOH data became the central in an HA/DR response, but it requires organizational repository for Ebola reports, increasing the accuracy of the Aflexibility and agility. While HA/DR is a subset of daily situational report. stability operations in U.S. Army doctrine, its unique requirements are not resident in the Army’s standard Key to the analysts’ ability to advise MOH data managers capabilities repertoire. The 101st Abn Div (AASLT) G2 was the adoption of intelligence principles to improve Ebola section and its partners from around the Army’s military case situation reports. Critical thinking and thorough fusion intelligence community were able to react rapidly to a crisis analysis of the data allowed the MOH to identify trends, situation and provide timely, accurate, and relevant products patterns, and problem areas requiring action. Our experience to the Joint Force Commander, enabling him to support the in presenting intelligence information enabled us to improve lead federal agency, USAID. the MOH’s methods in displaying the data as a graphical representation across both space and time. Finally, we ensured that proper dissemination of the data was shared LTC Richard D. (David) Conkle is currently the G2 for the with both governmental and non-governmental partners as 101st Airborne Division (Air Assault) at Ft Campbell, KY. well as their health volunteers in order to increase situational He deployed as the J2 for Joint Forces Command- awareness and to focus continued efforts toward improved Operation UNITED ASSISTANCE, combating the Ebola effectiveness. Virus Disease in Monrovia, Liberia. Dave has deployed in support of the 3rd Infantry Division (Mechanized), 10th NEOC Mountain Division (Light), 101st Airborne Division (Air Assault), and Joint Special Operations Command. Choosing an analyst embed for the National Ebola Operations Center (NEOC) proved just as important. We designated an All-Source Intelligence Technician in the
Vol 32, No 2 Page 106 American Intelligence Journal Fallacies in the Face of Freedom: Cognitive Errors from the Benghazi Attack
by Capt (USAF) George H. Van Dyke III
INTRODUCTION The United States was unequivocally embroiled in the future of a politically reshaped Libya as a result of its initial military he desert sands of Libya represent a rich, but often involvement in the ouster of Qaddafi. After Qaddafi’s conflicting, ancient history mix of nomadic tribes and demise there was a ravaged political landscape, reminiscent Tforeign invasions; Romans, Carthaginians, and of the ruins of Carthage after Scipio’s curse. U.S. interests in Greeks; kings, despots, and democracies. In its most recent North Africa and Libya’s future from this moment on were to history, Libya came out of the foreign occupation and be inseparable. The State Department increased its presence fighting of World War II with a newfound independence and in Libya after NATO and U.S. military forces began to draw an eager monarchy. The discovery of oil gave rise to an down, commenting: extremely wealthy government with unbridled potential, but unfortunately it lay in the hands of a monarch facing the Libya faces the challenges of building democratic destabilizing domestic pressures of an impoverished nation. institutions, protecting the universal rights of all Reforms were neither quick nor sufficient and a military Libyans, promoting accountable and honest coup, led by Colonel Muammar Qaddafi in 1969, established government, rebuilding its economy, and establishing a despotic “oiligarchy” or petro-dictatorship. In spring 2011, security throughout the country… The United States after years of brutal suppression, the people of Libya created continues to have a strategic interest in a stable and 2 a very uncommon phenomenon of regional Arab backlash prosperous Libya. and began a civil war to oust the brutal totalitarian Qaddafi. The players involved and their political agendas were as diversified as Libya’s ancient history, but they were What biases, cognitive errors, and extremely united in their sole objective: to remove and institutional nuances were present in the replace Qaddafi. After October 20, 2011, when this final goal intelligence analysis and decision-making came to fruition with Qaddafi’s demise, the power struggle leading up to and after the September 2012 that continues to define Libya began. Regional tribes, secular city dwellers, Islamist extremists, moderate Islamic attack on the U.S. Consulate in Benghazi farmers, foreign-educated academics, strong-armed that could have affected the outcome of this militiamen, and pan-Libyan statesmen were just a few of the fateful scenario? myriad groups in the multi-polarized political landscape who were vying for government control in Tripoli and elsewhere in Libya. On September 11, 2012, there was yet another dramatic event that would change the course of Libyan-U.S. relations and The United States and other Western nations began direct subsequently put to the test U.S. strategic decisions involvement in Libya on March 19, 2011. President Obama regarding Libya. Unknown assailants attacked the addressed the American nation: Consulate compound in Benghazi, resulting in the death of four U.S. government personnel, including Ambassador J. For generations, the United States of America has Christopher Stevens. Journalists, scholars, political played a unique role as an anchor of global security scientists, and intelligence experts have spent the last few and as an advocate for human freedom…for more than years scouring data to provide answers to an inquisitive four decades, the Libyan people have been ruled by Congress and the American public. This research project a tyrant – Muammar Qaddafi. He has denied his has looked more deeply into the causes of this event and the people freedom, exploited their wealth, murdered background context leading up to it. Fundamentally, it has opponents at home and abroad, and terrorized innocent sought to ascertain the following question: What biases, people around the world.1 cognitive errors, and institutional nuances were present in the intelligence analysis and decision-making leading up to
American Intelligence Journal Page 107 Vol 32, No 2 and after the September 2012 attack on the U.S. Consulate in expeditionary diplomatic outpost in Benghazi, and how Benghazi that could have affected the outcome of this fateful specific was that threat? These questions were paramount scenario? to the security situation at the time of the Benghazi attack LITERATURE REVIEW and are especially important as the sources that chronicled that event are reviewed. he death of four Americans courageously serving their nation in an expeditionary and highly dangerous In Under Fire: The Untold Story of the Attack in Benghazi, Tlocation deserves the utmost time, effort, and Fred Burton and Samuel Katz describe in great detail many thoroughness in reviewing the circumstances that led to attacks that occurred in the vicinity of the diplomatic mission their demise. After the September 2012 attack on the U.S. in Benghazi before September 2012. Even directly up front, diplomatic and intelligence mission in Benghazi, there was a before going into the details of the security situation of the firestorm of investigations, reports, insinuations, facts, mission, they declare, “September 2012 promised to be opinions, and conclusions, many of which were either bloody in Libya. A ‘state of maximum alert’ had been contradictory or had severe gaps in their findings which declared for Benghazi and other parts of the country on were seemingly inexplicable. The Intelligence Community’s August 29, 2012.”3 Burton and Katz describe in vivid detail organizations, people, and processes leading up to the the attack on the British ambassador a few months earlier attacks were scrutinized, as well as the State Department’s along with a couple of other events that should have cued security action and inaction before, during, and after the intelligence elements; however, they do not focus crisis. Interagency coordination and several bureaucratic adequately on summarizing what specifically were the nuances were strained and tested during the crisis; many of intelligence warning signs and what specifically was these were also scrutinized for errors that could have analyzed and reported. The official reports by Alex Tiersky prevented this tragedy. Throughout the entirety of the of the Congressional Research Service, as well as the review of available sources, the commonly recognized errors findings of the Senate Select Intelligence Committee’s in The present the following themes upon which this literature Benghazi Report (as compiled and commented by Roger review is solidly based: intelligence warning and analysis Stone), provides the best summary of the preliminary prior to the event, security structure decisions made prior to intelligence analysis and reporting before the event: the event, intelligence analysis and security coordination “FINDING #1: In the months before the attacks… the IC during the event, and intelligence analysis and decision- provided ample strategic warning that the security situation making in reaction to and following the event. Review of the in eastern Libya was deteriorating and that U.S. facilities and current sources and literature in this context has helped to personnel were at risk in Benghazi.”4 The lists of reports and answer the overall research question posed by this project. the official findings provide a useful finished conclusion that Could biases, cognitive errors, and institutional nuances that tells of the existence of intelligence warning prior to the were present leading up to and after the attack in Benghazi event; however, these reports list only the products and do have affected the outcome of this fateful scenario? little to provide insight into what cognitive errors, biases, and bureaucratic nuances prevented either better products or better dissemination of these instances of intelligence The gears of the Intelligence Community warning. Ample evidence exists of intelligence warning; were operating on overdrive in post-Qaddafi more research, though, is needed to comprehend fully why these warnings did not carry the significance necessary to Libya. change decision-making in the State Department, Defense Department, or CIA.
The gears of the Intelligence Community were operating on The established literature offers a great deal of detail on the overdrive in post-Qaddafi Libya. The environment was a subject of present security structures and the decisions that complete mess, politically, internationally, and in terms of went into their creation. A few sources delve into some of intelligence. Intelligence entities from all corners of the the requested security structure improvements at the globe and from giant multinational bodies were trying to Benghazi compound, including how and why they were determine what was to become of the newly freed but denied. The official reports disseminated by Congress dystopian Libya. In addition to the myriad state intelligence identify some of the key findings and in short describe the agencies present, there was an undetermined number of non- security deficiencies that were present at the Benghazi state actor groups trying both to gain intelligence and to mission. A better description of these security deficiencies conduct operations. These groups included Jihadists, and others is furnished in detail by Stratfor Analysis in In Libyan nationalists, tribal alliances, Qaddafi loyalists, Libya, a Deadly Attack on U.S. Diplomatic Compound. multinational criminal organizations, and local criminal Nevertheless, the details are especially descriptive in Burton organizations. Which of these groups posed a threat to the and Katz’s Under Fire:
Vol 32, No 2 Page 108 American Intelligence Journal The next day, in a cable marked SECRET, the [Regional been busy with reports flowing in from Cairo and the Security Officer] in Tripoli dispatched the conclusions demonstrations outside the US Embassy.6 of the Benghazi sit-down to his superiors in Washington, D.C. The TDY RSO emphatically stated that he did not believe the mission could be adequately Each side of the political spectrum has defended. The cable struck a resident cord with used the cognitive errors and biases derived Ambassador Stevens, who, along with other elements here to attack the other side of the political of the US intelligence and defense community, agreed with the DS in-country assessment that the security spectrum and its involvement in these errors. for the Benghazi Special Mission Compound was tenuous.5 In reaction to and following the event, there is a plethora of It is only with the details Burton and Katz provide above, information. Unfortunately, this is where most of the coupled with the important details of the context that they political influence on many of the sources plays out. In subsequently provide after this quotation, that one can start arguably the most conclusive literature surrounding the to analyze what cognitive errors could have been made to event and the reaction thereafter, the Senate Select allow the State Department to blatantly ignore the demands Committee on Intelligence review, there are several separate for a more adequate security infrastructure. The authors conclusions by Republicans that demonstrate the discuss previous State Department requests that were divisiveness of this event’s investigations. Many left- unfulfilled, which immediately suggests the need for further leaning authors argue the connectedness of the attack with comparative analysis on biases and cognitive errors the sweeping protests that occurred at the same time. associated with these cases. This was simply one example Fareed Zakaria alludes to this connection in his piece “A where, although some excellent information and sources Moment for Moderates”: “But whatever the trumped-up were available, there still were some very fundamental issues origins of the protests, the question facing a number of proposed by the research question that have yet to be newly minted democracies from Libya to Afghanistan is connected and resolved by the established literature. clear: With freedom challenged by the violence of mobs and the intolerance of masses, will anyone stand up to defend Intelligence analysis and security coordination during the it?”7 The joint Senate select committee concluded: event are commonly addressed throughout most of the “FINDING #9: …intelligence analysts inaccurately referred present literature on the Benghazi attack. To emphasize this to the presence of a protest at the Mission facility… which theme in isolation from the others, it must be addressed caused confusion and influenced the public statements of without regard to the previous intelligence warnings or policymakers.”8 Republicans and conservative authors security decisions and solely observed for what analysis blame the policymakers, while the joint statement within the and decision-making occurred during the hours from the committee’s findings is an obvious resolution: initial attack to the conclusion of hostilities. The long acknowledging incorrect statements of policymakers on the narrative focus and descriptive nature of Under Fire leads it subject, but laying blame on the IC analysts. These sources to be one of the best sources for discovering cognitive reflect the most readily available examples of cognitive errors errors in the analysis and decision-making that occurred at in analysis; biases demonstrated by analysts, mid-level the time of the event. One particular example from Under bureaucratic managers, and high-level policymakers; and Fire is a discussion of the initial cable that went out negative impacts of bureaucratic systems. Answering the notifying several other government agencies simultaneously questions posed by this research paper within the context of of the State Department emergency in Benghazi. Burton this final theme was easier than any other theme or timeline goes on to describe the relationship between the FBI and the presented in this project, because the politics involved in the Department of State, which alludes to bureaucratic reaction and aftermath of the Benghazi attack have enabled competition and established routines, to name a couple of many of the pieces to surface themselves. Each side of the nuances that have affected this theme in the research: political spectrum has used the cognitive errors and biases derived here to attack the other side of the political spectrum The [FBI workers] rushed from workstations to various and its involvement in these errors. offices where the OGAs, or other government agencies, were represented: the Diplomatic Security Service, the CIA, DoD, The challenge throughout the entirety of this research was Department of Homeland Security, and a dozen or so other to maneuver objectively through the political landscape and intelligence and law enforcement entities, each with a truly observe the errors and biases provided by both sides. specific interest in the developing crisis abroad. The events Much literature is present on the subject, some of it more in- unfolding in Benghazi were, in the multi dimensional world of depth and in detailed narrative than others. In an effort to global crisis management, a critical challenge. The day had truly understand and improve upon the terrible events
American Intelligence Journal Page 109 Vol 32, No 2 leading up to and after the September 2012 attack, this were decisions made during and after the event occurred as research will reveal biases, cognitive errors, and institutional data quickly rose to the top levels of the Obama nuances present in the intelligence analysis and decision- administration. A similar analysis occurred here as raw making. intelligence and assessments are quickly pushed for decision-making and therefore proper analysis techniques METHODOLOGY that would have normally been used are passed over due to urgency and time restraints. Finally, the post-event political he situation in Benghazi is an extremely important climate was analyzed for obvious cognitive errors in event to investigate, not only for the sake of the ill- decision-making and ignorance of intelligence data, Tfated Americans standing for freedom in the face of including “spinning” on the part of the administration and oppression but for the progression of a post-modern why this occurred. resurgence of freedom in contrast to the established paradigms of Occidentalism. Security of our consulates and Research was conducted using as many official sources as diplomatic missions is always paramount; however, we are at possible to first derive the facts and the true context of the the precipice of a decline of the ability of the U.S. to have intelligence data available. There were several Department unilateral, direct influence on Third World transitions to of State and Congressional investigations conducted, as democracy. Therefore, diplomatic missions and the well as inquiries by independent journalists/academics and influence of indirect consular services are paramount for the non-governmental organizations. Some sources have future of U.S. foreign policy. Means and methods of attempted to scrutinize the facts for decision-making errors intelligence analysts feeding security situations at these alone; these sources were included in the research but not missions will continue to be tested; this is due to the as heavily relied upon, as they often have political agendas increase in asymmetrical threats derived from the very nature and do not simply concentrate on cognitive errors in of the unstable contexts in which they work. These means analysis. The Congressional Research Office was a and methods must be scrutinized for cognitive errors and foundational source for much of the raw data surrounding biases in analysis and decision-making in order to prevent or the event. In addition, scholarly works on cognitive errors mitigate further attacks on U.S. diplomatic missions and the and biases were used when these errors were recognized spread of freedom. during the investigation, in order to effectively define and describe how they affected the events surrounding the Benghazi attack. Because of the high-profile nature of the ...we are at the precipice of a decline of the event and the need to restructure analysis and decision- ability of the U.S. to have unilateral, direct making internally, Central Intelligence Agency reports and unclassified Intelligence Community reports were essential influence on Third World transitions to in finalizing and comparing conclusions to the questions democracy. that were raised during this research.
ANALYSIS AND FINDINGS To investigate this event and its subsequent intelligence/ decision-making failures, the context and event were broken s mentioned previously, this research project down chronologically. This was to first grasp an progressed chronologically to discover the cognitive understanding of the true data after several agencies and Aerrors before, during, and after the Benghazi attack. independent observers had concluded their reports on the Thus, the analysis and findings will be presented in this event. This still is and was a highly debated and politicized fashion, beginning with the cognitive errors associated with event and, therefore, breaking down the facts of what has intelligence and security before the attack occurred. Special been proven upfront, directly, and chronologically has aided Mission Benghazi was established hastily and temporarily the rejection of some of the political contexts surrounding from its beginning. Recognizing a need to pay particular the case. After the facts of the case had been determined attention to the needs of East Libyans in the aftermath of the and analyzed, this report has sought to understand the transfer of power to Tripoli, the State Department framework of the intelligence data and analysis coming in established this Special Mission. “The Transitional National originally prior to the event, and then after the event Council (TNC) recently declared Libya liberated and moved occurred. Cognitive errors, biases, and heuristics were the center of TNC operations from Benghazi to Tripoli.”9 observed and discussed in the intelligence analysis leading However, because of its small operation, unknown lifespan, up to that fateful day. Determining what assessments were and temporary existence, the Special Mission Benghazi was made, which decision-makers received those reports, and not set up based on the security recommendations and what decisions were made with that data occupied the initial standards that are outlined in the 1985 Inman Report. Here theoretical framework of this project. Consequently, there we can see the effects of conservatism bias. Although
Vol 32, No 2 Page 110 American Intelligence Journal typically a financial bias, it can be applied to Benghazi as the concern via cables on several occasions; however, current resource allocation for security was “good enough” bureaucrats in the State Department rejected these concerns and the mission was succeeding. Sweeping security and subsequent requests for additional security. There are changes would have been required in accordance with the several cognitive errors demonstrated by the State Inman Report, particularly the chapter on physical security, Department in its decision to ignore intelligence and security and “a continued U.S. presence in Benghazi [was requested concerns. Conservatism bias can be viewed again in this only] through the end of calendar year 2012.”10 “The scenario, as there were minimal efforts to increase security, uncertain future of the Mission Facility… constrained such as the procurement of some additional security cameras decision-makers in Washington regarding the allocation of that had been purchased but not installed. We can also security enhancements to that facility.”11 There was observe normalcy bias as there continued to be intelligence reluctance to invest heavy changes in security for a reports of small-scale attacks from various militias and temporary mission, and the changes that were made were targets of opportunity, but there was no evidence of a large- disturbingly slow and minor as a result. scale, orchestrated attack. There was also no precedence for such an attack; therefore, the State Department viewed these increased attacks as normal given the security situation There was a clear perception that the higher surrounding all of Libya. This normalcy bias is easily seen reward to be had from maintaining a in the Department’s reaction after the attack occurred and its mission in Benghazi outweighed the high continued support of the idea that there was not an orchestrated attack but a target of opportunity from a protest risks of having it in such a threatening movement. Regardless, there is ample evidence as well of environment. the planned nature of the fateful attack, and consistently the State Department ignored the potential of an organized attack. “It was observed that the attackers…advanced The shear spirit of optimism and positive outcomes that throughout the compound methodically, and employed would be had in dually representing both sides of Libya military-style silent hand signals to direct their progression blinded State Department decision-makers to the fact that toward their objectives… they had been given precise orders eastern Libya was a much less secure/inclusive environment and impeccable intelligence.”15 This same situation could with more threats. “Although our presence in Benghazi has also be explained with false consensus effect because the shrunk considerably since the reopening of the Embassy in Department of State believed that these attacks were carried Tripoli… a continued presence in Benghazi will emphasize out by small unorganized groups, whereas most Libyans U.S. interest in the eastern part of Libya.”12 This is where the were appreciative of U.S. efforts in eastern Libya. The idea valence effect can be observed. According to Rosenhan, that Libyans in Benghazi followed the consensus in which with those observed under the valence effect (similar to the State Department believed was a distinct cognitive error positive outcome bias), “their behavior appears to be which shielded the reality that there were several anti-U.S. influenced by internal determinants such as effects and groups in Benghazi. A final cognitive error discovered in the motivations as well as by external determinants such as State Department’s ignorance of intelligence warnings is input probabilities.”13 Internal motivations and desires for a system justification. Because the status quo was holding positive mission in Benghazi failed to accurately assess and and the many attacks were small there was a propensity to address the dangers of leaving a mission in Benghazi, bolster the status quo and not reinforce security for an issue despite the fact that other countries were even abandoning that had never occurred: a large organized attack on a U.S. their principal missions and smaller attacks were increasing. facility in Libya. There was a clear perception that the higher reward to be had from maintaining a mission in Benghazi outweighed the The cognitive errors had already inflicted their damage and, high risks of having it in such a threatening environment. despite the warnings and obvious threats to security, the attack on the Special Mission Facility in Benghazi occurred. “FINDING #1: In the months before the attacks on When Embassy Tripoli was immediately notified there were [Benghazi], the IC provided ample strategic warning that the no U.S. government assets anywhere near the facility (with security situation… was deteriorating and that U.S. facilities the exception of a single USAF MQ-1 unmanned and personnel were at risk.”14 The U.S. Senate Select reconnaissance plane), it had no plan or way to Committee on Intelligence found as its first finding that the expeditiously evacuate the Benghazi facility. Typically, IC provided “ample warning”; however, none of this was there is a non-combatant evacuation order (NEO) that is considered. The Appendix shows a table of the various issued in these circumstances; however, there was no NEO reports that were finished intelligence products delivered to plan in place for U.S. Forces to respond to or operate from. State Department officials in the months prior to the “A myriad of bureaucratic reasons, logistics, distance, and Benghazi attack. In addition, Ambassador Stevens voiced balls dropped caused neither [the DoD or State Dept] to
American Intelligence Journal Page 111 Vol 32, No 2 have emergency evacuation plans in place.”16 This is a very good example of bureaucratic politics and organizational dynamics negatively impacting both analysis and decision- There are biases and cognitive errors on making. USAFRICOM held primary responsibility for this both sides of the political analysis of the area; however, AFRICOM was a relatively new U.S. Benghazi attack. combatant command. When the initial Operation ODYSSEY DAWN military operations commenced, AFRICOM was overwhelmed as a new COCOM and utilized USEUCOM’s personnel and equipment to remedy its inadequacies. These In the Republicans’ version, there is more specific blame inadequacies would continue through 2012, when a NEO added which identified members of the State Department for plan would not be in place for Benghazi, despite the State the continued use of the protest correlation as well as the Department’s presence. This lack of cooperation went both security issues addressed previously. There are biases and ways as the Benghazi Report recommended that “there cognitive errors on both sides of the political analysis of the should be more specific information exchanged between the Benghazi attack. Democrats in the Obama administration DoD and the IC… to make regional [COCOMs] aware of the and in the U.S. Senate can be observed falling victim to general presence of IC personnel in their areas of hostile media bias as they saw any deviation from the facts responsibility.”17 that had been presented to them within the administration was simply Fox News and Republicans attacking the After the attack, initial media reports and press releases from administration undeservedly. There also can be an argument the State Department concerned the attribution to the video that the Republican members of Congress erred in protests that were igniting several cities in North Africa and fundamental (or group) attribution as their accusations the Middle East at the time. From the onset of this dire were of “Complete Absence of Accountability… cognitive error, we can attribute it to illusory correlation. Manipulating the Facts… Disturbing Lack of Cooperation by There were fiery protests igniting that day (September 11, the State Department… [and] Failures in Leadership – State 20 2012) in response to a crude and poorly made video that Department.” While there are truths to some of these portrayed the Muslim prophet Muhammad as a bumbling accusations, there were political motivations to attribute all imbecile. Since these protests were occurring on the of the errors surrounding the Benghazi attack to Democrats anniversary of the 9/11 attacks and had been popping up in specifically, and to identify State Department leadership an increasing number of Middle Eastern cities, they captured (particularly Secretary Hillary Clinton) as purposely the predominant amount of attention and focus from the IC misleading the American people regarding these errors. and State Department. Additionally, when initial word was Within the same embattled political context, Secretary passed through IC channels, there were not enough Clinton and the State Department can be argued to have intelligence, surveillance, and reconnaissance (ISR) resources expressed self-serving bias, pushing away from available to explain quickly the events rapidly unfolding at the responsibility when exposed to their own failures. Special Mission Facility in Benghazi. This lack of concrete intelligence, coupled with the availability of an “easy” CONCLUSION explanation, led to the application of the availability heuristic in the initial IC reporting. “In the immediate aftermath of the here were several biases, cognitive errors, and attacks, the IC received numerous reports…which provided institutional nuances present in the intelligence contradictory accounts that there were demonstrations at the Tanalysis and decision-making leading up to and after [TMF].”18 When these reports continued to be contradictory the September 2012 attack on the U.S. Consulate in to incoming intelligence, particularly eyewitness reports from Benghazi. The warning signs and intelligence signals were those who were at the TMF, the State Department and present; however, these errors prevented proper analysis policymakers continued their stance unabated. This is an and preventive security decisions were not made. The example of irrational escalation. Since they had already prevailing winds of optimism did not account for a storm of “invested” in the idea and motive of the protest, violence from the opposite direction. The Regional Security policymakers irrationally “stuck to their guns” and defended Officer (RSO) at Embassy Tripoli and the State Department these assessments. This was the greatest contention should have made a final decision to determine what the between Republicans and Democrats and led to several Special Mission/Temporary Mission Facility/Consulate at additional “findings and analysis” of the U.S. Senate’s Benghazi deemed necessary and made appropriate changes official report on the attack. The IC was blamed in the to the security structure. Ambassador Stevens and the bipartisan report for “inaccurately [referring] to the presence other Americans working in Benghazi risked doing of a protest at the [TMF] … [and taking] too long to correct permanent Consulate work at a temporarily secured facility. these erroneous reports, which caused confusion and The temporary and insufficient security arrangements at influenced the public statements of policymakers.”19 Benghazi were the metaphorical haphazardly stacked
Vol 32, No 2 Page 112 American Intelligence Journal plywood in the fire, flamed by the wind of optimism. Having APPENDIX: Intelligence Reports Prior to September 2012 advisors near decision-makers who are free to take Attack on Benghazi alternative views or are purposely doing so (devil’s advocate) can encourage critical thinking in an organization. More critical thinking in the Office of the RSO in Tripoli could have either prevented the catastrophic damage from the attack or at least provided Ambassador Stevens with more security options and time to react.
Bureaucratic nuances affected the State Department’s preparation for this emergency as well as its response throughout the attack and its aftermath. Enabling lower- level leaders to make decisions but also holding them just as accountable as mid-level leaders can have an impact in lessening some of the rigidity of bureaucratic structures. Often these structures are slow to respond to changes (e.g., intelligence, security requirements, attacks) and if power is decentralized down to highly accountable lower leadership then it can often react to changes more swiftly. The IC analysts who inaccurately attributed the attack to protests as well as the policymakers who touted this information always need to double-check their facts, sources, and assumptions. The hastily contrived protester motive was born out of an unfortunate wedlock of lack of available intelligence and forced demand for intelligence in an irrational time frame. By forcibly “bending” IC analysts to a very restricted time frame, the policymakers inevitably hurt themselves as IC analysts were forced to place quantity (giving them anything in a short time) over quality (a properly vetted product using vetted sources). Decision- Notes 1 Obama, President Barack H., Public Address at National Defense makers in the Obama administration were then plunged into University, March 28, 2011, an abyss of bias, as the political environment grew http://www.whitehouse.gov/the-press-office/2011/03/28/remarks- increasingly toxic. president-address-nation-libya. 2 U.S. Department of State, “U.S. Relations With Libya,” Bureau The Department of State was immediately faced with the of Near Eastern Affairs Fact Sheet, January 15, 2013, accessed errors of unpreparedness and lack of accountability. In an July 19, 2014, http://www.state.gov/r/pa/ei/bgn/5425.htm. effort to “get on top of the situation,” the analysis was 3 Burton, Fred, and Samuel M. Katz, Under Fire: The Untold rushed and the administration created even more problems. Story of the Attack in Benghazi, New York: St. Martin’s Press, Regardless of the lack of accountability or preparation for 2013, p. 74. 4 U.S. Senate Select Committee on Intelligence and Roger Stone, such an emergency, had the administration owned up to its The Benghazi Report, New York: Skyhorse Publishing, 2014, p. previous failures and corrected the wrongly announced 11. motive for the attack, it could have avoided much of the 5 Burton, Fred, and Samuel M. Katz, Under Fire: The Untold scrutiny in the end. However, biases such as irrational Story of the Attack in Benghazi, New York: St. Martin’s Press, escalation, hostile media, fundamental attribution, and self- 2013, p. 64. serving bias took hold of the situation, making it spiral out of 6 Burton, Fred, and Samuel M. Katz, Under Fire: The Untold control surprisingly more so than it already had. The Story of the Attack in Benghaz, New York: St. Martin’s Press, lessons learned from the tragic mistakes of the State 2013, p. 135. 7 Department, the Defesne Department, and the CIA will Zakaria, Fareed, “A Moment for Moderates,” Time, October 1, 2012, Vol. 180, Issue 14, pp. 22-27. hopefully be applied to the next generation of analysts and 8 U.S. Senate Select Committee on Intelligence and Roger Stone, decision-makers. The biases and cognitive errors presented The Benghazi Report, New York: Skyhorse Publishing, 2014, p. here can be corrected only when they are keenly observed 34. by introspection or measures are put in place to properly 9 Feltman, Jeffery, Action Memo for Under Secretary Kennedy, identify and correct them. We can only hope that with these U.S. Department of State, December 27, 2011, p. 4, http:// lessons the tragic fate of these four American heroes s3.documentcloud.org/documents/783000/exemptions-of-security- defending freedom and human rights in a hotbed of anti- requirements-for-benghazi.pdf. Accessed August 30, 2014. American hatred will not be in vain.
American Intelligence Journal Page 113 Vol 32, No 2 10 Feltman, Jeffery, Action Memo for Under Secretary Kennedy, 20 U.S. Senate Select Committee on Intelligence and Roger Stone, U.S. Department of State, December 27, 2011, p. 4, http:// The Benghazi Report, New York: Skyhorse Publishing, 2014, pp. s3.documentcloud.org/documents/783000/exemptions-of-security- 67-82 requirements-for-benghazi.pdf, accessed August 30, 2014. 11 U.S. Senate Select Committee on Intelligence and Roger Stone, Capt (USAF) George H. Van Dyke III was commissioned in The Benghazi Report, New York: Skyhorse Publishing, 2014, 2009 as a graduate of the University of Houston. His p. 19. academic interests are in the fields of political science, 12 Ibid. international relations, and intelligence studies. He is 13 Rosenhan, D.L. & Messick, S., “Affect and Expectation,” currently completing an MA in Intelligence Studies from Journal of Personality and Social Psychology 3, 1966, 43. 14 U.S. Senate Select Committee on Intelligence and Roger Stone, American Military University. His professional The Benghazi Report, New York: Skyhorse Publishing, 2014. background is in organizing intelligence structures from 15 Burton, Fred, and Samuel M. Katz, Under Fire: The Untold national-level agencies down to theater- and tactical-level Story of the Attack in Benghazi, New York: St. Martin’s Press, operations. He deployed to Al Udeid Air Base, Qatar,in 2013, pp. 122-123. support of Operation ENDURING FREEDOM and also has 16 Burton, Fred, and Samuel M. Katz, Under Fire: The Untold deployed on several occasions with the E-8C JSTARS in Story of the Attack in Benghazi, New York: St. Martin’s Press, support of U.S. Pacific Command. George has trained 2013, p. 83. combat crews for all six geographic combatant commands 17 U.S. Senate Select Committee on Intelligence and Roger Stone, and has given hundreds of intelligence briefings across The Benghazi Report, New York: Skyhorse Publishing, 2014, p. 30. varying domains and subjects. 18 U.S. Senate Select Committee on Intelligence and Roger Stone, The Benghazi Report, New York: Skyhorse Publishing, 2014, p. 35. 19 U.S. Senate Select Committee on Intelligence and Roger Stone, The Benghazi Report, New York: Skyhorse Publishing, 2014, p. 34.
SOS International LLC Driven By Integrity. Unmatched In Service. We Are Your Resolute Mission And Intelligence Partner. Intelligence Solutions
Mission Solutions Training