-Caveat Lector- from alt.politics.org.cia ----- As always, Caveat Lector. Om K ----- <A HREF="aol://5863:126/alt.politics.org.cia:41807">How the U.S. undid UNSCOM through its empire of electronic ears</A> ----- Subject: How the U.S. undid UNSCOM through its empire of electronic ears From: [EMAIL PROTECTED] Date: Thu, Feb 25, 1999 5:09 AM Message-id: <7b3i1k$nl0$[EMAIL PROTECTED]> http://www.villagevoice.com/features/9908/vest_madsen.shtml Village Voice February 24 - March 2, 1999 by jason vest and wayne madsen A Most Unusual Collection Agency How the U.S. undid UNSCOM through its empire of electronic ears When Saddam Hussein raised the possibility of attacking U.S. planes in Turkey last week, his threats illustrated what many in diplomatic circles regard as an international disgrace— the emasculation of the UN by the U.S. When UNSCOM, the UN's arms-inspection group for Iraq, was created in 1991, it drew on personnel who, despite their respective nationalities, would serve the UN. Whatever success UNSCOM achieved, however, was in spite of its multinational makeup. While a devoted group of UN staffers managed to set up an independent unit aimed at finding Saddam's weapons and ways of concealing them, other countries seeking to do business with sanctions-impaired Iraq— notably France and Russia— used inspectors as spies for their own ends. But what ultimately killed UNSCOM were revelations that the U.S. government had manipulated it by assuming control of its intelligence apparatus last spring (or perhaps even earlier by using the group to slip spies into Iraq) not so much to aid UNSCOM's mission, but to get information for use in future aerial bombardments. When stories to this effect broke last month, however, there was almost no consistency in descriptions of the agencies involved or techniques used. The New York Times, for example, said only one CIA spy had been sent into Baghdad last March to set up an automated eavesdropping device. Time had multiple Defense Intelligence Agency (DIA) operatives planting bugs around Baghdad throughout 1998. The Wall Street Journal referred to the use of one "device" from the National Security Agency (NSA) last year and "a series of espionage operations used by the U.S. [since] 1996 to monitor the communications" of Saddam and his elite. When probing the world of espionage, rarely does a clear picture emerge. But according to a handful of published sources, as well as assessments by independent experts and interviews with current and former intelligence officers, the U.S. government's prime mover in Iraqi electronic surveillance was most likely a super-secret organization run jointly by the the CIA and the NSA— the spy agency charged with gathering signals intelligence (known as SIGINT)— called the Special Collection Service. Further, there is evidence to suggest that the Baghdad operation was an example of the deployment of a highly classified, multinational SIGINT agreement— one that may have used Australians to help the U.S. listen in— months after the CIA failed to realize the U.S. objective of overthrowing Saddam Hussein through covert action. According to former UNSCOM chief inspector Scott Ritter, when the U.S. took over the group's intelligence last year, a caveat was added regarding staffing: only international personnel with U.S. clearances could participate. "This requirement," says Ritter, "really shows the kind of perversion of mission that went on. The U.S. was in control, but the way it operated from day one was, U.S. runs it, but it had to be a foreigner [with a clearance] operating the equipment." Under the still-classified 1948 UKUSA signals intelligence treaty, eavesdropping agencies of the U.S., United Kingdom, Canada, Australia, and New Zealand share the same clearances. According to Federation of American Scientists intelligence analyst John Pike, this gives the U.S. proxies for electronic espionage: "In the context of UKUSA, think of NSA as one office with five branches," he says. As UNSCOM demonstrates, though, sometimes the partnership gets prickly; the British, according to Ritter, withdrew their personnel following the U.S.'s refusal to explain "how the data was going to be used." (According to a longtime British intelligence officer, there was another reason: lingering bad feelings over the NSA's cracking a secret UN code used by British and French peacekeepers during a Bosnian UN mission.) At this point, says Ritter, he was instructed to ask the Australian government for a "collection" specialist. "We deployed him to Baghdad in July of 1998," recalls Ritter. "In early August, when I went to Baghdad, he pulled me aside and told me he had concerns about what was transpiring. He said there was a very high volume of data, and that he was getting no feedback about whether it was good, bad, or useful. He said that it was his experience that this was a massive intelligence collection operation— one that was not in accordance with what UNSCOM was supposed to be doing." In other words, the Australian— most likely an officer from the Defence Signals Directorate, Australia's NSA subsidiary, who was supposed to have been working for the UN— may have been effectively spying for the U.S. Stephanie Jones, DSD's liaison to NSA, did not take kindly to a Voice inquiry about this subject; indeed, despite being reached at a phone number with an NSA headquarters prefix, she would not even confirm her position with DSD. However, a former high-ranking U.S. intelligence official said that such a scenario was probable. "The relationship between the UKUSA partners has always been of enormous value to U.S. intelligence, even when their governments have been on the opposite sides of policy issues," the official said. "I would not be surprised at all if the Aussies happened to be the ones who actually did this [at U.S. behest]." With an intelligence community of over a dozen components, billion-dollar budgets, and cutting-edge technology, the U.S. can cast a wide net, be it with human sources or signals interception. Iraq, however, has presented a special challenge since Saddam's Ba'ath party took power in 1968. "In Iraq," says Israeli intelligence expert Amatzai Baram, "you are dealing with what is arguably the best insulated security and counterintelligence operation in the world. The ability of Western or even unfriendly Arab states to penetrate the system is very, very limited." According to the former Cairo station chief of the Australian Secret Intelligence Service (ASIS), the West got this message loud and clear after Iraqi counterintelligence pulled British MI6 case officers off a Baghdad street in the mid '80s and took them to a warehouse on the outskirts of town. "They had arrayed before them the various agents they had been running," the ex-ASIS officer told the Australian Broadcasting Corporation in 1994. "There were wires hanging from the rafters in the warehouse. All the men were strung up by wires around their testicles and they were killed in front of the faces of their foreign operators, and they were told, you had better get out and never come back." When UNSCOM was inaugurated in 1991, it quickly became apparent that the organization's intelligence capability would depend largely on contributions from various UN member countries. According to several intelligence community sources, while the CIA did provide UNSCOM with information, and, later, serious hardware like a U-2 spy plane, the focus of the U.S. intelligence community at the time was on working with anti-Saddam groups in and around Iraq to foment a coup. What resulted, as investigative authors Andrew and Patrick Cockburn demonstrate in their just published book Out of the Ashes: The Resurrection of Saddam Hussein, were two of the most colossally bungled CIA covert operations since the Bay of Pigs. While details of one of the failed operations were widely reported, the Cockburns fleshed out details of an arguably worse coup attempt gone awry in June 1996. Iraqi counterintelligence had not only managed to finger most of the suspects in advance, but months before had even captured an encrypted mobile satellite communications device that the CIA gave the plotters. Adding insult to injury, the Cockburns report, Iraqi counterintelligence used the CIA's own device to notify them of their failure: "We have arrested all your people," the CIA team in Amman, Jordan, reportedly was told via their uplink. "You might as well pack up and go home." Some UNSCOM staffers— first under Russian Nikita Smidovich, later under American Scott Ritter— managed to create what amounted to a formidable micro- espionage unit devoted to fulfilling UNSCOM's mission. Between information passed on from various countries and use of unspecified but probably limited surveillance equipment, the inspectors were gathering a great deal. But in March 1998, according to Ritter, the U.S. told UNSCOM chair Richard Butler of Australia that it wanted to "coordinate" UNSCOM's intelligence gathering. Ritter insists that no U.S. spies under UNSCOM cover could have been operating in Baghdad without his knowledge prior to his resignation in August 1998. However, as veteran spies point out, if they were, Ritter probably wouldn't have known. A number of sources interviewed by the Voice believe it possible that Special Collection Service personnel may have been operating undercover in Baghdad. According to a former high-ranking intelligence official, SCS was formed in the late 1970s after competition between the NSA's embassy-based eavesdroppers and the CIA's globe-trotting bugging specialists from its Division D had become counterproductive. While sources differ on how SCS works— some claim its agents never leave their secret embassy warrens where they perform close-quarters electronic eavesdropping, while others say agents operate embassy-based equipment in addition to performing riskier "black-bag" jobs, or break-ins, for purposes of bugging— "there's a lot of pride taken in what SCS has accomplished," the former official says. Intriguingly, the only on-the-record account of the Special Collection Service has been provided not by an American but by a Canadian. Mike Frost, formerly of the Communications Security Establishment— Canada's NSA equivalent— served as deputy director of CSE's SCS counterpart and was trained by the SCS. In a 1994 memoir, Frost describes the complexities of mounting "special collection" operations— finding ways to transport sophisticated eavesdropping equipment in diplomatic pouches without arousing suspicion, surreptitiously assembling a device without arousing suspicion in his embassy, technically troubleshooting under less than ideal conditions— and also devotes considerable space to describing visits to SCS's old College Park headquarters. "It is not the usual sanitorium-clean atmosphere you would expect to find in a top-secret installation," writes Frost. "Wires everywhere, jerry-rigged gizmos everywhere, computers all over the place, some people buzzing around in three- piece suits, and others in jeans and t-shirts. [It was] the ultimate testing and engineering centre for any espionage equipment." Perhaps one of its most extraordinary areas was its "live room," a 30-foot-square area where NSA and CIA devices were put through dry runs, and where engineers simulated the electronic environment of cities where eavesdroppers are deployed. Several years ago, according to sources, SCS relocated to a new, 300-acre, three- building complex disguised as a corporate campus and shielded by a dense forest outside Beltsville, Maryland. Curious visitors to the site will find themselves stopped at a gate by a Department of Defense police officer who, if one lingers, will threaten arrest. There are good reasons, explains an old NSA hand, for havingelectronic ears on terra firma in addition to satellites. "If you're listening to something from thousands of miles up, the footprint to sort through is so huge, and finding what you are looking for is not a simple chore. If you know more or less specifically what you want, it's easier to get it in close proximity. And if it happens to be a low-powered signal, it may not travel far enough." According to two sources familiar with intelligence activity in Iraq, the U.S. may have been aided by information delivered either to UNSCOM or SCS from Ericsson, the Swedish telecommunications firm. It's not an unreasonable assumption; though Ericsson brushes off questions about it, in 1996 a Middle Eastern businessman filed suit against the company, claiming, among other things, that it had stiffed him on his commission for brokering a deal between the Iraqis and Ericsson for sensitive defense communications equipment, which, reportedly, included encrypted cell phones. Speaking on condition of anonymity, a veteran intelligence official confirmed that the NSA has "arrangements" with other communications firms that allow NSA to access supposedly secure communications, but cooperation from Ericsson would be "a breakthrough— despite our best efforts, they always kept their distance. But it's not beyond the realm of possibility." (This is not without precedent; though hardly covered in the American press, it has been reported that Switzerland's Crypto AG— long the supplier of cipher equipment to many of the world's neutral and "rogue" states— enjoyed such an "arrangement" with the NSA for decades. Crypto AG denies this.) There is, however, another possible scenario regarding participation by Ericsson in an intelligence venture. According to FAS analyst Pike, it's much more likely that anyone doing intelligence work in Iraq would want a schematic of Baghdad's telephone system— which Ericsson installed in the late '60s and has subsequently updated. "I would find it to be far more plausible that the U.S. intelligence community would be interested in acquiring, and Ericsson would be interested in supplying, the wiring diagram for Baghdad's telephone exchange than encryption algorithms for cell phones," he says. Also, he explains, finding ways to tap into a whole phone system or pull short- range signals out of the air without being obvious is clearly SCS's portfolio. "This type of risky close surveillance is what SCS was formed to do," he says. "When you think of NSA, you think satellites. When you think CIA, you think James Bond and microfilm. But you don't really think of an agency whose sole purpose is to get up real close and use the best technology there is to listen and transmit. That's SCS." Regarding any possible collaboration in Iraq with SCS or UNSCOM, Kathy Egan, Ericsson spokesperson, said she had no information on such an operation, but if there was one, "It would be classified and we would not be able to talk about it." It's also possible, according to Mike Frost, that cleverly disguised bugs might have been planted in Baghdad— SCS, he recalls, managed to listen in on secured facilities by bugging pigeons. But, says a retired CIA veteran, with UNSCOM effectively dead, bugging is now out of the question. "I hope the take from this op," he says, "was worth losing the only access the outside world's disarmament experts had to Iraq." ------------------------------------------------------------------------------ -- The Radome Archipelago During the Cold War there were hundreds of secret remote listening posts spread around the globe. From large stations in the moors of Scotland and mountains of Turkey that were complete with golf ball-like structures called "radomes" to singly operated stations in the barren wilderness of Saint Lawrence Island between Alaska and Siberia that had only a few antennae, these stations constituted the ground-based portion of the United States Signals Intelligence (SIGINT) System or "USSS." Operated by the supersecret National Security Agency (NSA), these stations were designed to intercept Morse Code, telephone, telex, radar, telemetry, and other signals emanating from behind the Iron Curtain. At one time, the NSA contemplated a worldwide, continuously operated array of 4120 intercept stations. While the agency never achieved that goal, it could still boast of several hundred intercept stations. These included its ground-based "outstations," which were supplemented by other intercept units located on ships, submarines, aircraft (from U-2s to helicopters), unmanned drones, mobile vans, aerostats (balloons and dirigibles), and even large and cumbersome backpacks. With the collapse of the Communist "bloc" and the advent of microwaves, fiber optics, and cellular phones, NSA's need for numerous ground-based intercept stations waned. It began to rely on a constellation of sophisticated SIGINT satellites with code names like Vortex, Magnum, Jumpseat, and Trumpet to sweep up the world's satellite, microwave, cellular, and high-frequency communications and signals. Numerous outstations met with one of three fates: they were shut down completely, remoted to larger facilities called Regional SIGINT Operations Centers or "RSOCs," or were turned over to host nation SIGINT agencies to be operated jointly with NSA. However, NSA's jump to relying primarily on satellites proved premature. In 1993, Somali clan leader Mohammed Farah Aideed taught the agency an important lesson. Aideed's reliance on older and lower-powered walkie-talkies and radio transmitters made his communications virtually silent to the orbiting SIGINT "birds" of the NSA. Therefore, NSA technicians came to realize there was still a need to get in close in some situations to pick up signals of interest. In NSA's jargon this is called improving "hearability." As NSA outstations were closed or remoted, new and relatively smaller intercept facilities— such as the "gateway" facility in Bahrain, reportedly used for retransmit signals intercepted in Baghdad last year to the U.S.— sprang up around the world. In addition to providing NSA operators with fresh and exotic duty stations, the new stations reflected an enhanced mission for NSA economic intelligence gathering. Scrapping its old Cold War A and B Group SIGINT organization, NSA expanded the functions of its W Group to include SIGINT operations against a multitude of targets. Another unit, M Group, would handle intercepts from new technologies like the Internet. Many people who follow the exploits of SIGINT and NSA are eager to peruse lists of secret listening posts operated by the agency and its partners around the world. While a master list probably exists somewhere in the impenetrable lair that is the NSA's Fort Meade, Maryland, headquarters, it is assuredly stamped with one of the highest security classifications in the U.S. intelligence community. — W.M. & J.V. ------------------------------------------------------------------------------ -- The United States SIGINT System (USSS) The following list is the best unclassified shot at describing the locations of the ground-based "ears" of the Puzzle Palace. It is culled from press accounts, informed experts, and books written about the NSA and its intelligence partners. It does not include the numerous listening units on naval vessels and aircraft nor those operating from U.S. and foreign embassies, consulates, and other diplomatic missions. United States NSA Headquarters, Fort Meade, Maryland Buckley Air National Guard Ground Base, Colorado Fort Gordon, Georgia (RSOC) Imperial Beach, California Kunia, Hawaii (RSOC) Northwest, Virginia Sabana Seca, Puerto Rico San Antonio, Texas (RSOC) Shemya, Alaska -3 Sugar Grove, West Virginia Winter Harbor, Maine Yakima, Washington Albania Durrës -6 Shkodër -6 Tirana -6 Ascension Island Two Boats -1 Australia Bamaga -6 -7 Cabarlah -7 Canberra (Defense Signals Directorate Headquarters) -5 Harman -7 Kojarena, Geraldton -1 Nurunggar -1 Pearce -1 Pine Gap, Alice Springs -1 Riverina -7 Shoal Bay, Darwin -1 Watsonia -1 Austria Konigswarte -7 Neulengbach -7 Bahrain Al-Muharraq Airport -3 Bosnia and Herzegovina Tuzla Botswana Mapharangwane Air Base British Indian Ocean Territory Diego Garcia -1 Brunei Bandar Seri Begawan -7 Canada Alert -7 Gander -7 Leitrim -1 Masset -6 -7 Ottawa [Communications Security Establishment (CSE) Headquarters] -5 China Korla -1 -6 Qitai -1 -6 Croatia Brac Island, Croatia -6 Zagreb-Lucko Airport -7 Cuba Guantanamo Bay Cyprus Ayios Nikolaos -1 Denmark Aflandshage -7 Almindingen, Bornholm -7 Dueodde, Bornholm -7 Gedser -7 Hjørring -7 Løgumkløster -7 Eritrea Dahlak Island -1 (NSA/Israel "8200" site) Estonia Tallinn -7 Ethiopia Addis Ababa -1 Finland Santahamina -7 French Guiana Kourou -7 (German Federal Intelligence Service station) Germany Achern -7 Ahrweiler -7 Bad Aibling -2 Bad Münstereifel -7 Braunschweig -7 Darmstadt -7 Frankfurt -7 Hof -7 Husum -7 Mainz -7 Monschau -7 Pullach (German Federal Intelligence Service Headquarters) -5 Rheinhausen -7 Stockdorf -7 Strassburg -7 Vogelweh, Germany Gibraltar Gibraltar -7 Greece Iráklion, Crete Guam Finegayan Hong Kong British Consulate, Victoria ("The Alamo") -7 Iceland Keflavik -3 India Charbatia -7 Israel Herzliyya (Unit 8200 Headquarters) -5 Mitzpah Ramon -7 Mount Hermon, Golan Heights -7 Mount Meiron, Golan Heights -7 Italy San Vito -6 Sorico Japan Futenma, Okinawa Hanza, Okinawa Higashi Chitose -7 Higashi Nemuro -7 Kofunato -7 Miho -7 Misawa Nemuro -7 Ohi -7 Rebunto -7 Shiraho -7 Tachiarai -7 Wakkanai Korea (South) Kanghwa-do Island -7 Osan -1 Pyong-dong Island -7 P'yongt'aek -1 Taegu -1 -2 -6 Tongduchon -1 Uijo ngbu -1 Yongsan -1 Kuwait Kuwait Latvia Ventspils -7 Lithuania Vilnius -7 Netherlands Amsterdam (Technical Intelligence Analysis Center (TIVC) Headquarters)-5 Emnes -7 Terschelling -7 New Zealand Tangimoana -7 Waihopai -1 Wellington (Government Communications Security Bureau Headquarters -5 Norway Borhaug -7 Fauske/Vetan -7 Jessheim -7 Kirkenes -1 Randaberg -7 Skage/Namdalen -7 Vadsø -7 Vardø -7 Viksjofellet -7 Oman Abut -1 Goat Island, Musandam Peninsula -3 Khasab, Musandam Peninsula -3 Masirah Island -3 Pakistan Parachinar Panama Galeta Island -3 Papua New Guinea Port Moresby -7 Portugal Terceira Island, Azores Rwanda Kigali São Tomé and Príncipe Pinheiro Saudi Arabia Araz -7 Khafji -7 Singapore Kranji -7 Spain Pico de las Nieves, Grand Canary Island -7 Manzanares -7 Playa de Pals -3 Rota Solomon Islands Honiara -7 Sri Lanka Iranawilla Sweden Karlskrona -7 Lovön (Swedish FRA Headquarters) -7 Muskö -7 Switzerland Merishausen -7 Rüthi -7 Taiwan: Quemoy -7 Matsu -7 Shu Lin Kuo -5 (German Federal Intelligence Service/NSA/Taiwan J-3 SIGINT service site) Turkey Adana Agri -7 Antalya -7 Diyarbakir Edirne -7 Istanbul -7 Izmir -7 Kars Sinop -7 Thailand Aranyaprathet -7 Khon Kaen -1 -3 Surin -7 Trat -7 Uganda Kabale Galangala Island, Ssese Islands (Lake Victoria) United Arab Emirates Az-Zarqa¯ -3 Dalma¯ -3 Ras al-Khaimah -3 Sir Abu Nuayr Island -3 United Kingdom: Belfast (Victoria Square) -7 Brora, Scotland -7 Cheltenham (Government Communications Headquarters) -5 Chicksands -7 Culm Head -7 Digby -7 Hawklaw, Scotland -7 Irton Moor -7 Menwith Hill, Harrogate -1 (RSOC) Molesworth -1 Morwenstow -1 Westminster, London -7 (Palmer Street) Yemen Socotra Island (planned) KEY: -1 Joint facility operated with a SIGINT partner. -2 Joint facility partially operated with a SIGINT partner. -3 Contractor-operated facility. -4 Remoted facility. -5 NSA liaison is present. -6 Joint NSA-CIA site. -7 Foreign-operated "accommodation site" that provides occasional SIGINT product to the USSS. -----------== Posted via Deja News, The Discussion Network ==---------- http://www.dejanews.com/ Search, Read, Discuss, or Start Your Own ----- Aloha, He'Ping, Om, Shalom, Salaam. Em Hotep, Peace Be, Omnia Bona Bonis, All My Relations. Adieu, Adios, Aloha. Amen. Roads End Kris DECLARATION & DISCLAIMER ========== CTRL is a discussion and informational exchange list. Proselyzting propagandic screeds are not allowed. Substance—not soapboxing! These are sordid matters and 'conspiracy theory', with its many half-truths, misdirections and outright frauds is used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRL gives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credeence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. ======================================================================== Archives Available at: http://home.ease.lsoft.com/archives/CTRL.html http:[EMAIL PROTECTED]/ ======================================================================== To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om