Did the U.S. Teach Iraq to Hide Its Terror Arms?

Did the U.S. Teach Iraq to Hide Its Terror Arms?

Did the U.S. Teach Iraq To Hide Its Terror Arms? P YA't :3 3VIP Scott Malone MERICAN INTELLIGENCE that was shared with Saddam Hussein for six years during the Fran-Iraq War may have helped Iraq hide weapons of mass destruction—including most Aof its secret atomic bomb project—from U.S. forces seeking to destroy the arsenals during the Gulf War. This possibility has arisen in the aftermath of the recent discoveries in Iraq by United Nations inspectors that Saddam's deadly stockpile was more than 10 times as large as predicted by U.S. intelligence agencies cu-- ing the Gulf War. By any analysis, what Operation Desert Storm missed in its Gulf War effort to destroy Saddam's se- cret arms caches was staggering—more than 819 Scud missiles, a huge cannon almost 100-feet long resting on a mountainside and aimed at Israel, more than 11,000 chemical shells and three uranium enrichment/hydro- gen bomb component factories, according to U.N. re- ports. "Our failure to cover the Iraqi weapons programs was clearly a significant intelligence failure," former acting CIA operations chief Edward Juchniewicz re- cently concluded. The causes of the U.S. miscalculations are not clear. But numerous former intelligence officials and other specialists in interviews expressed concerns that infor- mation given to Iraq—including photo-reconnnaissance data—as part of the Reagan administration's "tilt" to- ward Saddam to prevent an Iranian victory in the 1980- 88 war could have been used to shelter Saddam's mil- itary might during Operation Desert Storm. On one occasion, Saddam is said to have personally shown one Soviet defense official a U.S. satellite image, according to two former intelligence officials, and asked for help in concealing things from the spy orbiters. The Soviets responded with training in military deception tactics and communications security. According to one of the former officials, the Soviets later provided the United States with some of the details of the tech- niques just before the Gulf War. The long-running U.S. "intelligence liaison" with Iraq was the subject of a recent closed-door debate on the nomination of Robert M. Gates as CIA director. A majority of the Senate Select Committee on Intel- ligence concluded that all intelligence supplied to Iraq was "appropriately sanitized" and thus of little use to Saddam other than helping him in his war with Iran. But not all the senators agreed, and important ques- tions about the scope of the intelligence transfer re- main unanswered. In a report released last week, the panel noted that during the summer of 1986, "CIA staff officers had, on two occasions, shared certain intelligence with the See IRAQ, C4, Ca I Scott Malone is an investigative reporter for PBS's "Frontline," whose documentary, "The Man Who Made the Supergun," will be rebroadcast Nov, 26 ternational flow of weapons to Iran only. In knowledge of U.S. collection devices employed the United States supplied photographs. "They November 1984, President Reagan signed a during the Iran-Iraq war could only have provided satellite photographs, not [just] di- Did the U.S. Aid Iraq? still-secret National Security Decision Direc- helped the Iraqis during the Gulf war three agrams." tive (NSDD), calling for direct "intelligence years later. "By knowing how we go about it, "If somebody gave them actual photos they liaison" with Baghdad. The United States re- the layering of [satellite] passes—they [prob- should be prosecuted," said Juchniewicz. and analysts adds unsettling details to the sto- opened its Baghdad embassy and intelligence ably] were able to work it back so they could Some specialists have raised the possibility ry of the "intelligence • liaison" between the began to flow. employ deception. It gave them an enormous that Saddam shared his U.S. intelligence with Reagan administration and Baghdad. It also Iraqis which, at the time it was provided, According to recently convicted Iraqi arms advantage." his major arms benefactor, the Soviet Union. raises questions about whether the Soviet mil- may have exceeded the scope of the sharing dealer Sarkis Soghanalian, who was in constant After the Iran-Iraq war ended in July 1988, This could have benefited Soviet intelligence itary may have gained insights into U.S. intel- arrangement which had been authorized.' touch with Saddam and his generals in the ear- Gates has testified, "our intelligence assets agencies in the years before the country was ligence-gathering methods because Saddam The problem was taken care of, the re- ly 1980s, "Sometimes [the intelligence] was were shifted away." But when Iraq invaded overtaken by internal crisis. The Soviets may shared some U.S.-supplied intelligence with port noted, by having the National Security good, and sometimes it was bad. The Iraqis Kuwait in August 1990, U.S spy satellites re- have aided the Iraqis in finding ways to thwart the Soviets. Council (NSC) grant an expanded "author- felt that they [the U.S.] were playing both appeared over the region. The nature of sat- U.S. espionage collection by analyzing the U.S. And the episode stands as a cautionary tale ity" three months after the fact, in October. ends against the middle." But, Soghanalian ellite "orbital parameters" could have easily be- data. for U.S. policymakers contemplating the na- 1986. But this did not keep the Iraqis from recalled, "the Iraqis took whatever they of- come clear to the Iraqis, specialists said. "If a "It is only reasonable to conclude, given the tion's intelligence activities in the post-Cold siCrtifinizing the data for minute clues to feredT h.e" physicist in Berkeley with a slide rule can do it, level of cooperation between Iraqis and Sovi- War era. U.S.' intelligence-gathering methods—per- intelligence provided to Iraq, Juchnie- the Iraqis certainly can," said William E. Bur- ets, that they were privy to what Saddam Although the Senate committee said the wicz said, "was short range tactical intelli- rows, author of "Deep Black," a book on sat- knew, particularly [U.S.] intelligence," said haps so that counter-measures could be de- U.S. intelligence "liaison" with Iraq began in gence. Tactical. To keep Tehran out of Bagh- ellite espionage.. former Pentagon official Frank Gaffney. signed and implemented. 1984, it actually started two years earlier, dad. To neutralize Iran, not to strengthen Iraq. Part of the worry about the material Iraq "Generally speaking, it is always a risk when Iran began winning the war that Iraq had ven more sensitive than satellite recon- The only thing the U.S. government did was to obtained relates to whether it was actual im- when you share intelligence," said Gen. Wil- initiated. It was then that the Reagan admin- naissance is signals intelligence (sigint), stop the collapse of Saddarn's military. It was agery from photo-satellites and communica- liam Odom, director of the super-secret istration decided to secretly "tilt" toward the interception and decryption of electronic perfectly clear to us, and to the Israelis, that tions intercepts from eavesdropping appara- E National Security Agency from 1984 to then "terrorist" regime of Saddam Hussein. signals and communications, the purview of Iran was lusting after the Arab Gulf states. We tus. The more precise the material, the more 1987. "When you give people intelligence, "The theory [was] that the enemy of our NSA- could not allow that to happen." the Iraqis could glean from it in assessing U.S. however well-sanitized, it is pretty hard to enemy [was] our friend," said Juehniewicz. Juchniewicz said that until mid-1986, U.S. But the flow of intelligence increased in intelligence-gathering capabilities. keep the recipient from making certain deduo- "The basic decision was made March 15, intelligence reports that went to the Iraqis 1986 to much higher quality data delivered in Juchniewicz, who left the CIA before the 1982, when Iraq was taken off the [State De- usually contained "general numbers of tanks tions. And the more you do it, the worse the "almost real-time," (with very little tune tag program was "upgraded" in 1986, said: "I saw partment's] terrorist list," recalled former and troops, order of battle scenarios." risk becomes." between the event and the intelligence) ac- one packet and it was all hand-drawn. I think Reagan NSC staff member Howard Teicher. But after the liaison upgrade that summer, 'Anytime you give access to photo- cording to sources. The material included nar- they may have showed them the photos, but "The political decision was made to help [the one source said, "the words [that] went with reconnaissance," said another former intelli- rative text reports derived from highly-sen- they sure wouldn't let them leave with it." Iraqis] help themselves—to show them how the diagrams" were a major improvement for gence official and technical consultant, "a good sitive electronic intercepts and photo-recon- Acting CIA Director Kerr recently testified they were vulnerable." the Iraqis. "The extent to which there was interpreter could devise the countermeasures naissance of Iranian targets, according to sev- that the Iraqis were given "some line draw- Said former NSC staffer Geoffrey Kemp, "I information on unit designations .... They necessary to counteract the effectiveness of eral former intelligence officials. ings" and that "imagery was shown." don't recall ever seeing a [particular] piece of could see how radio silence and land [tele- The liaison proved remarkably resilient, Former NSC staffer Teicher thinks the such coverage." paper ... It was [more of] a hip pocket op- phone] lines worked; they could see the raw surviving even the scandal that erupted with question is irrelevant. "What are satellite pho- Sen.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    2 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us