-Caveat Lector-

The Potential Impact of Dedicated Intelligence Internet Sites on the Role of
US Army Counterintelligence as a Force Multiplier

<http://www.amsc.belvoir.army.mil/timothygeary.htm>

by Timothy E. Geary

Introduction
This paper proposes creating dedicated intelligence Internet web sites for
Army strategic and tactical CI units. These sites will be accessible from
anywhere in the world by Army intelligence personnel through designated Army
core groups. The intent of this system is to create a common user data base
for tactical and strategic CI Army elements, assist in the cross-training of
tactical and strategic assets within the Army, and maximize resource
capability to fulfill their force protection role. Within the next two
years, other military departments will develop their intelligence networks
and common data bases, which will be followed by national level intelligence
agencies. The ultimate goal is to develop a data base, which will provide
National Military Strategy (NMS) and National Security Strategy (NSS)
leaders an evaluated product derived from information provided by the entire
U.S. intelligence community. Such a system does not currently exist. Also
suggested are several ways this kind of system could facilitate the training
and mentoring of CI personnel stationed worldwide.

Within the context of this paper, counterintelligence (CI) is defined as
"identifying, exploiting, and neutralizing a foreign intelligence service
threat against Department of the Army personnel, equipment, facilities, and
installations." Protection of these elements become a force multiplier for
the warfighter. Today this role includes preventing technology transfer,
which becomes a major force protection measure.

Impact of Downsizing and Absence of Common Data Bases
Downsizing has dramatically reduced the size of the strategic and tactical
CI workforce in the Department of Defense, and, in particular, within the
Army. To meet this challenge, the US Army is using current information
technology to effectively husband its limited resources. Although there are
numerous secure intelligence communications systems within the Army,
information is compartmented and rarely shared with other units. Common
accessible data bases are not widespread within the Army, much less within
the US intelligence community at large. Duplication of effort within the US
intelligence community does not markedly improve support to the NMS or the
NSS. Creating the means to securely transmit and receive classified
information from multiple users located around the world will result in a
system capable of providing national leaders with a total product, not one
developed from a single intelligence service.

If Army CI is to prepare for the 21st Century, it must begin using
information technology now to understand its capabilities and potential
applications. We must rapidly integrate technology "know-how" into all
facets of CI, if we are to marshal our limited resources to fulfill mission
needs.

The level of experience in many Army Military Intelligence Resident Office
has been radically reduced as a consequence of the downsizing of the Army's
CI workforce. In 1994, for example, there were 22 members assigned to the
National Capital Region Resident Office (NCRRO) at Fort Belvoir, Virginia.
Today there are only three. According to Paul Godlewski, Special Agent in
Charge of the NCRRO, he has 16 years of military service and the remaining
two members have five years each. (Godlewski, 14 Nov 96) NCRRO is not an
isolated example of the impact of downsizing within the Army's CI community.
If CI is to contribute to force protection by the prevention of technology
transfer, then innovative ways of using information technology must be
created, explored, and, above-all, shared.

Intelligence personnel are beginning to routinely use available technologies
to gather supporting information for investigative leads or to fulfill
assigned functions, such as, preparing a Subversion and Espionage Directed
Against the Army (SAEDA) briefing. For example, an effective SAEDA
unclassified briefing can be developed by using the Internet to access the
Country Study Fact Sheets produced by the Central Intelligence Agency (CIA)
or the Department of State (DOS).

Unfortunately, successful ventures or accomplishments are generally not
recognized by higher headquarters, and as a consequence, success stories are
not disseminated throughout a core group command. Higher headquarters are
interested in statistical results; not necessarily the methodology used to
acquire the end product. This trend must be reversed if technology transfer
is to be identified, tracked, and defeated by today's small Army CI
contingent. Secure web sites will allow peers, friends, mentors to
brainstorm the "how to" attack a problem. This aspect of the proposed system
will energize critical thinking throughout the entire system, as opposed to
relying on appointed leaders to resolve issues. This is a force multiplier
in the purest sense.

We must advertise the "how we did it" to other investigators and
intelligence operators, in order to augment experience lost due to
downsizing. Shared knowledge of methodology used to advance an investigation
or operation in today's technology driven environment is crucial in
educating investigators and intelligence professionals, many of whom have
not attended any formal professional training in years. Creating dedicated
intelligence networks will assist in training, educating, and mentoring our
workforce.

The System in General
The proposed intelligence network suggests information will be shared by
using the Internet and will involve several dedicated network servers using
modified software to protection data/information.

Three separate Internet webs will be used to tie several geographic core
Army intelligence organizations together. One Internet will use INTELINK-S
software dedicated to Secret collateral information, while the second
classified World Wide Web (WWW) Internet using INTELINK software should be
dedicated to SCI. In addition to current raw information, these classified
Internets will enable personnel to obtain finished intelligence products.
Unclassified material could have its own dedicated web site with assigned
protocol for set for Secret information. This protection level is to protect
discussions concerning methodology, etc., not the information itself.

Currently, the intelligence community is moving towards establishing a
complete collateral Secret WWW, which will run on the Secret Internet
Protocol Routing Network (SIPRNET) (Turner, Sep 96, pg 43). Within the next
two years, plans envision four specific web sites being activated: Army, Air
Force, Navy, and one for OSIA [On Sight Inspection Agency]. Over the next
three or four years, national level organizations (CIA, FBI, and DIA) will
be gradually added to the system. The overall goal is to establish a joint
data base within the intelligence community capable of producing a holistic
intelligence product in response to a national crisis, should the need
arise.

According to Mark Deeds, Chief, Information Management Office, Foreign
Counterintelligence Activity, this Internet system will also benefit the
Combatant Commanders, who will have access to the Secret and SCI nets, in
order to monitor current information relating to his area(s) of concern.
When the systems are established, users will be able to use web technology,
like Yahoo, to search for information provided by other organizations within
the intelligence community. It will also be possible to locate finished
intelligence products authored by other intelligence agencies. (Deeds, 14
Nov 1996) Overall, this system will facilitate exchange of information and
generate discussion between members of the US intelligence community,
particularly between Army intelligence members involved in force protection.
Suggested core Army units for both classified systems are: 902d MIG and the
513th MI Bde in the US; 650th MIG and 66th MIG in Europe; and the 500th and
501st MI Brigades in the Far East. These units know what needs to be
protected and the overall threats to security within their geographic area
of responsibility. The dedicated net sites will 1) facilitate coordination
and sharing of information and ideas from intelligence units world wide 2)
allow users to freely discuss possible intelligence applications of
information technology to on-going investigations or operations and 3) allow
passage of information directly to interested customers. For example, a
terrorist incident in Japan may be of interest to the CINC EUCOM and the
66th MIG in Germany, if the terrorist organization has a following in
Germany.

Current WWW Internet Use Limitations
Agents are able to tailor requests for unclassified information through the
judicious use of available commercial Internet websites. Access to
classified data bases with evaluated intelligence is severely restricted
largely due to the absence of an intelligence Internet with the requisite
security measures to preclude compromise of holdings. Systems that do exist
are not linked. The need to know principle when combined with the
requirement to deal with individual intelligence agencies separately, does
not create an environment for a timely response to most inquiries. Although
you may submit a request for information through the "chain of command," the
final product may not be received in time or be what you want. A dedicated
classified intelligence network will eliminate this deficiency. If Army CI
is to contribute to preventing technology transfer, access must be expanded
from unclassified sources to evaluated information from joint sources.

An Example of the Current System
The following example illustrates what an experienced CI agent can develop
using current commercially available WWW sites. The military net (MILNET),
which contains unclassified information, can be accessed through the
Internet to provide useful CI leads to prevent technology transfer. Using
the MILNET to access the DTIC (Defense Technology Intelligence Center) data
base allows an agent to conduct an electronic search for companies denied
government contracts. Results of such inquires provide investigators with
the types of information certain companies were attempting to acquire.
Further electronic checks and coordination with other investigative agencies
could ascertain that a certain foreign government was using retired military
personnel and attempting to acquire technology denied by treaty or
agreements.

In my example, the agent identified a threat to U.S. national security, one
which could have impacted on a CINC. Equally important, is using the
dedicated intelligence net to discuss methodology, tactics, and issues. Such
actions would most likely generate a lively discussion of other successful
investigative or operational methods used or raise "what if" scenarios. If
we are to fully develop our capabilities with our reduced manpower levels,
we must use information technology to our full advantage by sharing
information with others in the community.

Currently, Army CI does not have a system to informally pass seemingly minor
lessons learned information to others in the CI community. Investigative or
operational results are entered into the appropriate channel without the
higher headquarters learning how an individual agent successfully used
information technology of today to do tomorrowís business smarter.
Consequently, although we are doing "business smarter" in some circles, we
need to do it better and on a broader scale. Establishing the multi-level
internet web servers and sites help us accomplish this goal.

Perhaps the true potential benefit of the INTELINK systems concerns its use
in seemingly unrelated roles. These systems will provide a unique
opportunity to share with other CI units ground level experiences in
leveraging information technology to accomplish assigned missions. For
example, the use of the DTIC to identify investigative leads to thwart
technology transfer. The INTELINK-S system can be used within the core
groups to suggest operational, investigative, or tactical uses for off the
shelf products in an operational/investigative or tactical role; OR use the
system to access the "School Without Walls" at the US Army Intelligence
Center and School (USAICS), Fort Huachuca, Arizona.

USAICS is actively developing Intelligence Training XXI strategy to promote
several TRADOC 21st Century training initiatives: the evolution of Classroom
XXI and "distance learning." (Turner, 96, pg 40) Classroom XXI is a concept
which will reengineer the classroom of Army training institutions to
capitalize on new training methods and leverage information technology. Once
courses are designed, instructors will be able to rapidly up-date on-line
lessons, thereby providing the most current doctrinal information to
students. Moreover, courses of instruction can be reviewed by anyone with
the appropriate pass word to determine MOS doctrine and methods.

As the School Without Walls and "distance learning" become established, it
is entirely possible that interactive Internet courses will become common
and can be applied to communicate with and train the force (active duty,
reserve force and national guard structure) (MI Bulletin, Dec 95, pg 46).
Interactive distance learning would certainly reduce the cost of training
large numbers of personnel and has the distinct advantage of allowing
distance learners to receive refresher training without travel being
involved. For example, consider the writer of this paper. I attended the
basic CI Agent Course nearly 28 years ago. Unquestionably, what I was taught
then does not resemble what is taught now. Distance learning would enable me
to take the course and to understand what training junior agents receive
today. Based on this knowledge, I would know what skills and basic knowledge
of CI procedures and doctrine to expect from a new agent and then could
revise my training programs accordingly.

CONCLUSION: If US Army CI members are to meet the challenge of truly
protecting the force, it must master and leverage information technology to
the fullest extent possible. Developing a common intelligence data base will
facilitate Army CI operations worldwide, particularly when Secret and SCI
web sites and servers are established in the core Army groups. Within the
next four or five years, the proposed system should include all military
services and national level intelligence organizations. Developing
investigative and operational skills today will place Army at the fore front
in the fight against technology transfer. The system has a tremendous
potential to facilitate training and mentoring of our workforce, and should
be fully exploited to encourage critical thinking by all members.

Bibliography
Cairns, Donald W. The Doctrine Internet. INSCOM Journal Nov - Dec 95.

Deeds, Mark. Personal Interview. 8/19 Nov 96.

Fischer, Joan E. LIWA Levels Playing Field. INSCOM Journal May-Jun 95.

Godlewski, Paul. Personal Interview. 14 Nov 1996.

Humphreys, Vernon. Training the Total Organization. Training and Development
Journal, Oct 90.

Hunter, Hal. The Opposite Sector. Training and Development Magazine, May 95.

Jones, Jerry. USAICS&FH. Personal Interview. 24 Oct 96.

Lowrey, Dennis A. Center Without Walls: Training in the Information Age.
Military Intelligence Professional Bulletin, PB 34-95-4. Oct - Dec 95.

Juechter, W. Mather. Learning by Doing. Training and Development Magazine.
Oct 93.

Turner, Edward F. School Without Walls: IEW Maintenance Training in the
Information Age. MI Professional Bulletin. PB 34-96-3. Jul-Sep 96.

Ward, Edna C. and Lee, J. Edward. An Instructor's Guide to Distance
Learning. Training and Development Magazine, Nov 95.

<A HREF="http://www.ctrl.org/">www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html">Archives of
[EMAIL PROTECTED]</A>

http:[EMAIL PROTECTED]/
 <A HREF="http:[EMAIL PROTECTED]/">ctrl</A>
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to