-Caveat Lector-

WJPBR Email News List [EMAIL PROTECTED]
Peace at any cost is a Prelude to War!




------------------------------------------------------------------------------

--
ARTICLE 02 – Denying Success in Human Intelligence Collection

------------------------------------------------------------------------------

--


Special Series: Third of Four Installments
By J. David Galland

The targets of U.S. intelligence collection efforts, whether governmental or
non-governmental organizations, are normally aware that they will be subject
to penetration attempts by the United States or other foreign governments,
opposition groups, political parties or other unanticipated directions. All
have varying motivations, different goals, and perceived justifications.

Organizations such as opposition political parties, national liberation
movements, and terrorist groups, should rightfully assume that they will be
targeted for intelligence collection – particularly if they themselves are
operating within the borders of the United States.

One of the recent issues facing the U.S. intelligence community has been the
fact that congressional intelligence oversight committees, and
nongovernmental watchdog panels view domestic intelligence collection with
disdain. In recent years, these groups have focused on the constitutional
rights of a potential spy, or the proper conduct of intelligence operations,
as opposed to domestic security and national defense.

It is important both for citizens and elected officials to understand that
neither intelligence operations, nor counter-intelligence operations, are the
same as criminal investigations. Intelligence collection must not be
constrained by the rule of law or traditional jurisprudence per se. In
response to this, neither should counter-intelligence efforts be hamstrung by
the legal rules of a possible future prosecution or the admissibility of
evidence in a courtroom. What must determine the guidelines for collection
missions and counter-intelligence operations is the level of danger and the
validity of the threat, as well as the potential value of the intelligence
"take."

Given the general awareness among governments and subnational organizations
such as al Qaeda to U.S. and Western intelligence-gathering capabilities, it
is logical to presume in coming years that collection efforts will continue
to encounter new and increasingly sophisticated measures to thwart them.
Circumventing and overcoming such counter-intelligence efforts will be a very
dangerous business, and a rather tall order.

During the Cold War era, security precautions to deny collection in the
communist bloc were governed by a paranoid suspicion of outsiders and the
secretiveness of entire societies. A classic example of the multi-tiered
counter- intelligence effort is the former East Germany. With its many
civilian, military and police intelligence services, bolstered by its
paranoid suspicious political system, East Germany was able to protect itself
quite well from the West. Any experienced case officer can affirm that East
German intelligence targets were a hard nut to crack. Invariably, it would be
assumed that any human East German intelligence source was either doubled, or
was, in fact, a double agent. Some double agents flourished and collected for
as long as thirty years.

With the opening of East Berlin in 1989, and the seizing of the files of the
East German security service (the Staatssicherheitsdienst, or "Stasi") this
was proven to be a chillingly correct assumption. The Stasi files are now
referred to as the "Gauck Files," for the name of a cleric who rescued and
secured these files at the central repository building after the Berlin Wall
came down in 1989. Since that time, these files have been thoroughly
exploited and researched by U.S. and German Intelligence agencies, most
particularly the Bundesnachrichtendienst, the German equivalent to the CIA.

The explosive growth of information technology will continue to manifest
itself in the counter-intelligence effort as it does in all other fields.
Advanced electronic computer systems and platforms will produce more
effective solutions for targeted organizations to protect their most
sensitive secrets and valued holdings.

As counter-intelligence capabilities become more sophisticated and
practically undetectable, collection sources will likely be inhibited in
their efforts to gather information. In an operation where an intelligence
source is being used to target his own government or employer, the constant
thought of how betrayals are dealt with constitutes an implied threat. This
often instills a level of paranoia which severely hampers the intelligence
operation. This form of implied counter-intelligence can be classified as
"institutional" and is very difficult to overcome when human sources are the
primary collection asset.

United States intelligence agencies have been on the cutting edge of
operational security, information security and signals security for many
years. These protection caveats generally fall into the field of technical
counter-intelligence collection. However, they have their shortcomings as
well.

In most cases, a persistent, well-placed human intelligence source, with
routine access, who is operating within an organization in which the source
is employed, can remain undetected for many years. Such a source is often
beyond the capability limits of technical counter-intelligence efforts unless
caught red-handed. (Former FBI agent Robert Hansson, who spied within his
agency for more than 15 years before being caught, is a good example of
this.)

In the human intelligence business, my experience has been that the best
method of denying information to a hostile collecting source, is the
aggressive use of "offensive counter-intelligence teams", known by the
acronym, "OFCO."

An OFCO operation is highly demanding and, by necessity, extremely
"close-hold" in nature. Such a counter-intelligence operation may operate for
the short term, locally, or may involve an multi-year global effort.
Primarily, the offensive counter-intelligence operation is used in situations
when it is determined that allowing a "discovered" clandestine collector to
continue the collection mission is in the best interest of U.S. intelligence.

These operations are extremely tenuous, but critically important. They
constitute the best method to learn of, and further detect, hostile spies.
Offensive counter-intelligence operations are characterized by numerous
inherent dangers and challenges that are always unique to the mission. It is
the goal of the team to detect and collect every shred of information about
the spy. Often the spy is aggressively exploited, deceived, and led in
specific directions without his or her knowledge.

Frequently attempts are made under these circumstances to un-wittingly
"double" the spy. This requires highly developed intelligence skills on the
part of personnel involved, as well as meticulous coordination and planning.

Particular areas of interest and questions that ought to be answered before
the spy is finally thwarted are:

* Who does the spy work for?

* What are the person’s motivations and possible personal goals?

* How is the spy being rewarded or paid?

* What is the communications plan with the spy’s controller?

* What is the collection focus?

* What is the spy’s level of sophistication of intelligence tradecraft?

* How and where has the source been trained by the hostile intelligence
service?

When offensive counter-intelligence investigations are performed correctly,
these operations can yield a bounty of information revealing critical secrets
of how the hostile intelligence agency operates and manages its collection
agents. More importantly, they answer questions which will ultimately improve
intelligence denial and collection capabilities important to the success of
the United States to identify and neutralize foreign intelligence operations
directed at our critical national interests.

J. David Galland, Deputy Editor of DefenseWatch, is the pen name of a career
U.S. Army senior Non-Commissioned Officer currently serving in Germany. He
can be reached at [EMAIL PROTECTED]





ARTICLE 03 – Champs & Chumps: Special Holiday Awards

------------------------------------------------------------------------------

--


>From the Editors:



It’s time for another installment of Champs and Chumps, our occasional and
informal recognition of the best and the worst, of leadership and loopiness,
in this new era of bipartisanship, 24-7 media zaniness and armed combat.
Maybe it’s the potent eggnog or perhaps merely the seasonal cheer, but we
have many more champs than chumps.



A salute to the champions on American Airlines Flight 63 for their heroic and
effective response to an apparent act of terrorism on a Dec. 22 flight from
Paris to Miami. When a passenger tentatively identified as British passport
holder Richard C. Reid reportedly tried to ignite explosives secreted in his
shoes, two flight attendants, Hermis Moutardier and Cristina Jones, and as
many as 10 passengers rushed the man and immobilized him with belts and
straps, after which two physicians onboard sedated the man. This fast action
probably prevented a life-threatening mishap on the airliner. A chump award
goes to the French officials who apparently allowed Reid – despite his
matching a security profile of suspicious persons – to board the aircraft one
day after rejecting his attempt to fly out of Paris on another airliner.



A retrospective salute to Gen. Tommy Franks and his staff at the U.S. Central
Command for their steadfast yet creative application of military leadership
in the Afghanistan operation. In particular, a cheer for the Centcom
logisticians who managed to locate and ship saddles and horse feed to the
Northern Alliance cavalry, and for the U.S. Special Operations Command
education team who realized that in the era of satellite-guided precision
munitions there is still room for the horse cavalry on the training agenda.



Another reach-back cheer to the unidentified Pan Am International Flight
Academy instructors in Minnesota and Arizona who – we learned from news
reports last week – repeatedly raised questions to the FBI and FAA about
accused terrorist Zacarias Moussaoui (currently facing arraignment in federal
court) and Hani Hanjour (pilot of the hijacked airliner that struck the
Pentagon on Sept. 11). We reserve future chump awards to the federal
officials who obviously failed to wake up in time to the potential threat.



We cannot let 2001 go by without issuing a mega-chump award to Geraldo Rivera
for his egotistic and factually-challenged TV reports from Afghanistan,
particularly his inaccurate assertion that he had prayed at the site of a
friendly-fire accident near Kandahar when in fact he was several hundred
miles away near Tora Bora at the time. Whenever our friends in the mainstream
press have occasion to wonder why many senior military commanders mistrust
the news media, it is decisions to deploy journalists like this that add new
poison to the well.



"Why Are We in Afghanistan?" columnist Nicholas von Hoffman wrote on Nov. 19
in The New York Observer. "We are mapless, we are lost, and we are distracted
by gusts of wishful thinking" to believe Afghans would switch sides so
easily. "Moreover, as hellish as the Taliban are, it appears that the
ordinary people of Afghanistan prefer them to the brigands and bandits with
whom we've been trying to make common cause." That same week, male citizens
of Kabul gleefully shaved of their Taliban-imposed beards and Mr. von Hoffman
earned a chump award for clueless prophecy (to be shared with several dozen
other laptop bombardiers in the press who, from the outset, cheerfully
predicted a Vietnam-style quagmire in the Hindu Kush).



Two final salutes: A full-fledged cheer and Oscar nomination for Secretary of
Defense Donald H. Rumsfeld stemming from his stellar performance before the
Pentagon press corps. Not only has he calmed and heartened the nationwide
audience watching his daily appearances on TV, but he has actually added
drama, suspense, humor and common sense to a normally dreary Q&A.



And our hearty endorsement as well to the good people of Time magazine for
doing the right thing: Making New York City Mayor Rudi Guiliani their – and
our – Person of the Year for 2001.



Editor’s Note: We have received numerous requests from readers to make
“Champs and Chumps” a regular feature of DefenseWatch, and are resolved to
do so in the near future. We invite your nominations. Please email any
recommended Champ or Chump (with supporting evidence) to [EMAIL PROTECTED]
or to [EMAIL PROTECTED] for consideration. Due to the high volume of
email we receive, please mark your email with “Champs and Chumps” in the
header field.




Table of Contents





------------------------------------------------------------------------------

--
ARTICLE 04 – Medal of Honor Recipient – HEDRICK, CLINTON M., Tech. Sgt. USA

------------------------------------------------------------------------------

--




Rank and organization: Technical Sergeant, U.S. Army, Company I, 194th Glider
Infantry, 17th Airborne Division.



Place and date: Near Lembeck, Germany, 27-28 March 1945.



Entered service at: Riverton, W. Va. Birth: Cherrygrove, W. Va. G.O. No.: 89,
19 October 1945.



Citation: He displayed extraordinary heroism and gallantry in action on 27-28
March 1945, in Germany. Following an airborne landing near Wesel, his unit
was assigned as the assault platoon for the assault on Lembeck. Three times
the landing elements were pinned down by intense automatic weapons fire from
strongly defended positions. Each time, T/Sgt. Hedrick fearlessly charged
through heavy fire, shooting his automatic rifle from his hip.



His courageous action so inspired his men that they reduced the enemy
positions in rapid succession. When six of the enemy attempted a surprise,
flanking movement, he quickly turned and killed the entire party with a burst
of fire. Later, the enemy withdrew across a moat into Lembeck Castle.



T/Sgt. Hedrick, with utter disregard for his own safety, plunged across the
drawbridge alone in pursuit. When a German soldier, with hands upraised,
declared the garrison wished to surrender, he entered the castle yard with
four of his men to accept the capitulation. The group moved through a sally
port, and was met by fire from a German self-propelled gun.



Although mortally wounded, T/Sgt. Hedrick fired at the enemy gun and covered
the withdrawal of his comrades. He died while being evacuated after the
castle was taken. His great personal courage and heroic leadership
contributed in large measure to the speedy capture of Lembeck and provided an
inspiring example to his comrades.



Editor’s Note: If you know of any MOH recipient who is hospitalized or has
passed away recently, please email DefenseWatch MOH Editor Jim H. at
[EMAIL PROTECTED]






Table of Contents





------------------------------------------------------------------------------

--
EDITOR'S NOTE: Your Support is Important!

------------------------------------------------------------------------------

--


Footnote: The ultimate success in reviving and expanding SFTT depends on
everyone. We need your financial contributions to continue our operation.
While any amount is welcome, we suggest a $30 annual contribution from each
member will enable us to succeed.



The IRS recognizes SFTT as a 501(c)3 Non-Profit Educational Foundation (IRS
EIN 31-1592564).



Donations are tax deductible. Send us some moral support and encouragement to
help in the struggle to improve combat readiness. Every little contribution
helps. Mail your checks to:



Soldiers For The Truth Foundation

P.O. Box 11179

Greenwich CT 06831






*COPYRIGHT NOTICE** In accordance with Title 17 U. S. C. Section 107,
any copyrighted work in this message is distributed under fair use
without profit or payment to those who have expressed a prior interest
in receiving the included information for nonprofit research and educational
purposes only.[Ref. http://www.law.cornell.edu/uscode/17/107.shtml ]

Want to be on our lists?  Write at [EMAIL PROTECTED] for a menu of our lists!
Write to same address to be off lists!

<A HREF="http://www.ctrl.org/";>www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substancenot soap-boxingplease!  These are
sordid matters and 'conspiracy theory'with its many half-truths, mis-
directions and outright fraudsis used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html";>Archives of
[EMAIL PROTECTED]</A>

http:[EMAIL PROTECTED]/
 <A HREF="http:[EMAIL PROTECTED]/";>ctrl</A>
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to