alqaeda CENQUAL al-CIAduh al-CIA-duh al Qaeda http://www.google.com/search?q=seymour+hersh+qaeda http://www.google.com/search?q=rashid+khalidi+qaeda+cia
--- In cia-drugs@yahoogroups.com, "muckblit" <muckb...@...> wrote: > > alqaeda al-CIAduh al-CIA-duh al Qaeda CENQUAL > > http://www.washingtonpost.com/wp-dyn/content/article/2010/03/18/AR201003\ \ > 1805464.html > http://www.washingtonpost.com/wp-dyn/content/article/2010/03/18/AR201003\ \ > 1805464_pf.html > > Dismantling of Saudi-CIA Web site illustrates need for clearer cyberwar > policies > > By Ellen Nakashima > Washington Post Staff Writer > Friday, March 19, 2010; A01 > > > > > By early 2008, top U.S. military officials had become convinced that > extremists planning attacks on American forces in Iraq were making use > of a Web site set up by the Saudi government and the CIA to uncover > terrorist plots in the kingdom. > > "We knew we were going to be forced to shut this thing down," recalled > one former civilian official, describing tense internal discussions in > which military commanders argued that the site was putting Americans at > risk. "CIA resented that," the former official said. > > Elite U.S. military computer specialists, over the objections of the > CIA, mounted a cyberattack that dismantled the online forum. Although > some Saudi officials had been informed in advance about the Pentagon's > plan, several key princes were "absolutely furious" at the loss of an > intelligence-gathering tool, according to another former U.S. official. > > Four former senior U.S. officials, speaking on the condition of > anonymity to discuss classified operations, said the creation and > shutting down of the site illustrate the need for clearer policies > governing cyberwar. The use of computers to gather intelligence or to > disrupt the enemy presents complex questions: When is a cyberattack > outside the theater of war allowed? Is taking out an extremist Web site > a covert operation or a traditional military activity? Should Congress > be informed? > > "The point of the story is it hasn't been sorted out yet in a way that > all the persons involved in cyber-operations have a clear understanding > of doctrine, legal authorities and policy, and a clear understanding of > the distinction between what is considered intelligence activity and > wartime [Defense Department] authority," said one former senior national > security official. > > CIA spokeswoman Marie Harf said, "It's sheer lunacy to suggest that any > part of our government would do anything to facilitate the movement of > foreign fighters to Iraq." > > The Pentagon, the Justice Department > <http://www.whorunsgov.com/Departments/DOJ_Organizational_Chart> and the > National Security Agency, whose director oversaw the operation to take > down the site, declined to comment for this story, as did officials at > the Saudi Embassy in Washington. > Precedent before policy > > The absence of clear guidelines for cyberwarfare is not new. The George > W. Bush <http://www.whorunsgov.com/Profiles/George_W._Bush> > administration was compelled in its final years to refine doctrine as > it executed operations. "Cyber was moving so fast that we were always > in danger of building up precedent before we built up policy," said > former CIA director Michael V. Hayden, without confirming or denying > the existence of the site or its dismantling. > > Lawyers at the Justice Department's Office of Legal Counsel > <http://www.whorunsgov.com/Departments/Justice/AG/DAG/AAG/OLC> are > struggling to define the legal rules of the road for cyberwarriors, > according to current and former officials. > > The Saudi-CIA Web site was set up several years ago as a "honey pot," an > online forum covertly monitored by intelligence agencies to identify > attackers and gain information, according to three of the former > officials. The site was a boon to Saudi intelligence operatives, who > were able to round up some extremists before they could strike, the > former officials said. > > At the time, however, dozens of Saudi jihadists were entering Iraq each > month to carry out attacks. U.S. military officials grew concerned that > the site "was being used to pass operational information" among > extremists, one former official said. The threat was so serious, former > officials said, that Gen. Ray Odierno, the top U.S. military commander > in Iraq, requested that the site be shut down. > > The operation was debated by a task force on cyber-operations made up of > representatives from the Defense and Justice departments, the CIA, the > Office of the Director of National Intelligence, and the National > Security Council > <http://www.whorunsgov.com/Departments/White_House/COS/NSC> . Lt. Gen. > Keith B. Alexander, who directs the National Security Agency, made a > presentation. > > The CIA argued that dismantling the site would lead to a significant > loss of intelligence. The NSA countered that taking it down was a > legitimate operation in defense of U.S. troops. Although one Pentagon > official asserted that the military did not have the authority to > conduct such operations, the top military commanders made a persuasive > case that extremists were using the site to plan attacks. > > The task force debated whether to go forward and, if so, under what > authority. If the operation was deemed a traditional military activity, > no congressional committee needed to be briefed. If it was a covert > action, members of the intelligence committees would have to be > notified. > > The task force weighed possible collateral damage, such as disruption of > other computer networks, against the risk of taking no action. Most > thought that the damage would be limited but that the gain would be > substantial. > > "The CIA didn't endorse the idea of crippling Web sites," said a U.S. > counterterrorism official. The agency "understood that intelligence > would be lost, and it was; that relationships with cooperating > intelligence services would be damaged, and they were; and that the > terrorists would migrate to other sites, and they did." > > Moreover, the official said, "the site wasn't a pipeline for foreign > fighters, it was a broad forum for extremists." > > But the concerns of U.S. Central Command and other defense officials > prevailed. "Once DoD went to the extent of saying, 'Soldiers are dying,' > because that's ultimately what the command in Iraq, what Centcom did, > it's hard for anyone to push back," one former official said. > > The matter appeared settled, ex-officials said. The military would > dismantle the site, eliminating the need to inform Congress. > > A group of cyber-operators at the Pentagon's Joint Functional Component > Command-Network Warfare at Fort Meade seemed ideally suited to the task. > The unit carries out operations under a program called Countering > Adversary Use of the Internet, established to blunt Islamist militants' > use of online forums and chat groups to recruit and mobilize members and > to spread their beliefs. > > "We were very clear in the meetings" that the goal was to upend the > site, one participant said. "The only thing that caught us by surprise > was the effect." > Unintended outcomes > > A central challenge of cyberwarfare is that an attacker can never be > sure that an action will affect only the intended target. The > dismantling of the CIA-Saudi site inadvertently disrupted more than 300 > servers in Saudi Arabia, Germany and Texas, a former official said. "In > order to take down a Web site that is up in Country X, because the > cyber-world knows no boundaries, you may end up taking out a server that > is located in Country Y," the task force participant explained. > > After the operation, Saudi officials vented their frustration about the > loss of intelligence to the CIA. Agency officials said the U.S. military > had upset an ally and acted outside its authority in conducting a > covert operation, former officials said. > > Efforts were made to mollify the Saudis and the Germans, they said. > "There was a lot of bowing and scraping," one official said. > > One early advocate for using cyber-operations against extremists was > Gen. John P. Abizaid, former Central Command chief. He told a Senate > committee in 2006, "We must recognize that failing to contest these > virtual safe havens entails significant risk to our nation's security > and the security of our troops in the field." > > But some experts counter that dismantling Web sites is ineffective -- no > sooner does a site come down than a mirror site pops up somewhere else. > Because extremist groups store backup copies of forum information in > servers around the world, "you can't really shut down this process for > more than 24 or 48 hours," said Evan F. Kohlmann, a terrorism researcher > and a consultant to the Nine/Eleven Finding Answers Foundation. > > "It seems difficult to understand," he added, "why governments would > interrupt what everyone acknowledges now to be a lucrative > intelligence-gathering tool." > > Staff writers Dana Priest and Karen DeYoung contributed to this report. >