Silent Warfare by Abram N. Shulsky & GARY J. SCHMITT

Silent Warfare by Abram N. Shulsky & GARY J. SCHMITT

Author:Abram N. Shulsky & GARY J. SCHMITT
Language: eng
Format: epub
Publisher: Potomac Books, Inc.
Published: 2002-11-15T00:00:00+00:00


COUNTERINTELLIGENCE ANALYSIS

As the discussion of double agents and deception indicates, protecting the integrity of intelligence operations can become very complicated, involving much more than catching the occasional spy. In fact, cases may be linked to each other in various ways; the overall task of guarding an intelligence apparatus against penetration and deception requires a special counterintelligence analysis office to serve as an institutional memory and analyze these connections.

The best way to determine whether one’s intelligence apparatus has been penetrated is to acquire a high-level source in the hostile service (either an agent in place or a defector). Even then, however, it would be a rare stroke of luck if the source could identify by name the spies in one’s ranks. This would be the case only if the source were directly involved in handling them or were a very high-ranking officer of the hostile service. In the much more likely scenario, the source will be able to provide only clues to the spies’ identities. Analytic work will be necessary to make those clues yield results.

For example, one may discover that the adversary has had access to several classified documents on a subject. Assuming they all came from the same agent, one could review the distribution lists for the compromised documents and note which officials had access to all of them. Alternatively, the source may know that the spy held a meeting with his handler in a certain foreign city on a specific date. Reviewing travel records would indicate which officials with access to relevant information were in that city then.

In addition, other clues may be available that suggest penetrations of some sort. Thus, if one’s operation fails (an agent is discovered or a technical collection system is thwarted) in a way that suggests the adversary had been aware of the operation before it took place, it is necessary to investigate how he may have learned of it. There will no doubt be many avenues (individuals with access to the information, as well as security vulnerabilities or lapses) by which the information could have reached the adversary. If there is a series of such failures, however, it may be possible to narrow the options; for example, maybe only one particular individual had been authorized access to all of the information. On the other hand, a series of failures may also indicate that a communication channel or system has been compromised. For instance, from the late 1960s through the early 1980s, U.S. Navy officials were routinely surprised to find Soviet ships waiting for American warships in areas that had been secretly designated for exercises. One admiral was quoted as saying, “It is as if they had a copy of the OpPlans.” But it was not until the espionage ring of John Walker was discovered in 1985 that the United States learned that naval cipher materials were being regularly given to the Soviets and hence that large amounts of enciphered naval message traffic were possibly being read by them.69 In any event, such



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.