http://www.strategypage.com/htmw/htintel/articles/20061022.aspx
Another Reason Why al Qaeda Loves the New York Times October 22, 2006: One of the reasons many are angered about things like leaks of details about the NSA's Terrorist Surveillance Program, is the fact that such leaks could warn al Qaeda of these efforts. That seems to have happened with the news of a manual that references a number of NSA projects - including ECHELON. In the past, other leaks that could have aided terrorists have occurred as well. One of these was the interrogation log for Mohammed al Khatani, who was believed to have been slated to be the 20th hijacker. By publishing the log, Time Magazine gave al Qaeda an idea of what might be done. Other leaks have exposed the existence of CIA programs to keep senior al Qaeda personnel on ice to avoid giving the organization an idea of what the United States might know and on efforts to monitor financial transactions. These programs have helped break up attacks, including the plot to blow up airliners over the Atlantic this past August. Surveillance of communications is often used as a means of gathering. How this is done is not talked about often. This is because the information that is acquired is often very good. Surveillance of enemy communications was one of the biggest factors in the American victory at Midway in 1942, and many other operations since. In 1943 Ten months later, a similar surveillance led to the mission in which Tom Lanphier shot down the plane carrying Isoroku Yamamoto. Communications intelligence also played a major part in defeating the U-boats in the Atlantic as well. A lot of the methods used to gather intelligence in World War II (particularly codebreaking) were kept classified for decades after the Japanese surrender ended the war in 1945. Similarly, the Venona project stayed secret in the 1950s, even when information from that project could have defused controversies over the prosecution of the Rosenbergs or Alger Hiss. In the war on terror, this is equally important. Not just for breaking up attacks, but also for mapping out the networks through a process known as traffic analysis. This can be done with just phone records (the leak of the NSA's request to various phone companies managed to tell terrorist which companies cooperated, and who company didn't). This is vital in terms of building an organizational chart of any enemy capabilities, but only if the enemy doesn't think that others are listening. The al Qaeda manual that was reported on, though, indicates that al Qaeda is aware that intelligence agencies are listening. As a result, locating new cells will be much more difficult, making a future attack more likely to succeed. - Harold C. Hutchison [Non-text portions of this message have been removed] -------------------------- Want to discuss this topic? Head on over to our discussion list, [EMAIL PROTECTED] -------------------------- Brooks Isoldi, editor [EMAIL PROTECTED] http://www.intellnet.org Post message: osint@yahoogroups.com Subscribe: [EMAIL PROTECTED] Unsubscribe: [EMAIL PROTECTED] *** FAIR USE NOTICE. This message contains copyrighted material whose use has not been specifically authorized by the copyright owner. OSINT, as a part of The Intelligence Network, is making it available without profit to OSINT YahooGroups members who have expressed a prior interest in receiving the included information in their efforts to advance the understanding of intelligence and law enforcement organizations, their activities, methods, techniques, human rights, civil liberties, social justice and other intelligence related issues, for non-profit research and educational purposes only. We believe that this constitutes a 'fair use' of the copyrighted material as provided for in section 107 of the U.S. Copyright Law. If you wish to use this copyrighted material for purposes of your own that go beyond 'fair use,' you must obtain permission from the copyright owner. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml Yahoo! Groups Links <*> To visit your group on the web, go to: http://groups.yahoo.com/group/osint/ <*> Your email settings: Individual Email | Traditional <*> To change settings online go to: http://groups.yahoo.com/group/osint/join (Yahoo! ID required) <*> To change settings via email: mailto:[EMAIL PROTECTED] mailto:[EMAIL PROTECTED] <*> To unsubscribe from this group, send an email to: [EMAIL PROTECTED] <*> Your use of Yahoo! Groups is subject to: http://docs.yahoo.com/info/terms/