Tag Archives: featured

Time to Wake Up: Snowden’s Cost

THIS ARTICLE WAS ORIGINALLY PRINTED ON MAR 30, 2014 AND IS BEING RE-PRINTED FOR “CHALLENGES OF INTELLIGENCE COLLECTION WEEK.”

Regardless of how you feel about Edward Snowden’s domestic surveillance program revelations, it’s time to get real about the cost we are paying for Snowden’s leaks about America’s signals intelligence programs. In a conversation a few months ago with a very senior former US intelligence official, I was struck by their apocalyptic assessment of the damage Snowden’s leaks had caused America’s intelligence capabilities. While he naturally considered the domestic concerns overblown, he was even more upset at Snowden undoing of decades of groundbreaking American work securing our own communications and spying on foreign governments.

Success in signals intelligence relies almost entirely on the opponent not knowing where and how he is being spied upon. As soon as your methods are discovered, your opponent can evade your espionage or, even worse, spoof you with false intelligence. Be detailing the methods that the US uses to spy on other countries, Snowden’s revelations immediately and directly limited the NSA’s capabilities. We are just now beginning to see the fruit of that.

The Crimean crisis has revealed tremendous gaps in American SIGINT and comms against the very country in which Snowden happened to take asylum. Just over a year after Snowden’s releases, it is no coincidence. Now, I don’t mean to give Snowden all the credit – the Russians have maintained aggressive measures against American SIGINT since at least the mid 2000s. But it is not clear that, before the Snowden revelations, they were certain how effective their countermeasures were. By laying bare the sorts of measures the NSA has honed to break open world communications, Snowden has given the Russian military and IC exactly what it needs to craft communications in the American blindspot. Thus, the American intelligence community was blindsided by the Crimean invasion – while they observed the Russian military buildup, the lack of an increase in comms traffic lulled them into a false sense of optimism. Thanks to Snowden, the Russians could be confident that their countermeasures would be effective.

There is another piece of this puzzle that has been troubling me; Over the past year, there have been a number of alarming communications security breeches that have embarrassed US, EU, and Ukrainian officials in ways very convenient for the ongoing Russian information war. Now, I can’t speak to the sources of the EU and Ukrainian leaks (I wouldn’t want to deprive some poor GRU operative his due!), but I was very alarmed by the US breech. Senior (and even not-so-senior) US officials working in the Former Soviet Union are subject to very strict regulations around communications. Now, it’s possible of course that Victoria Nuland and Amb. Pyatt made some error. But this isn’t the first rodeo for either of them: Nuland is the former ambassador to NATO, and Amb. Pyatt is a career FSO with decades of experience working in sensitive areas, including at the IAEA. We know that Nuland was surprised by the leak, calling it “pretty impressive tradecraft.”

There are two likely scenarios of how these communication leaks happened; both of them alarming. The first possibility is that the conversation was had in the clear on an embassy line. Intercepting embassy communications still involves a level of tradecraft above merely intercepting something over Ukraine’s telecoms network, and embassy comms being intercepted indicates a dire but not surprising familiarity with our diplomatic communications system. Nonetheless, such a breech would indicate that our diplomats had not necessarily followed protocol. The more alarming possibility is that the secure line itself was compromised. Prior to Snowden, such a breach was nigh unthinkable. But, prior to his time at the NSA, Snowden worked for the CIA…securing their communications from foreign postings. Now, I’m not suggesting that Snowden is sitting in Lubyanka Square hacking American comms. But it should scare the hell out of us that someone so intimately involved in securing American communications in addition to building American SIGINT capacities now relies on the generosity of his Russian hosts for his breakfast, lunch, and dinner.

It is possible that Snowden could compromise American intelligence in ways he is not even aware; was Snowden really clever enough to completely prevent the Russians from peeking into his document archive? Is he really smart enough to detect whether some of the security problems he might work on for his Russian clients might not actually be FSB tricks to get him to divulge how an American cryptographer might approach security? What frightens me is not the possibility that Snowden is maliciously working against the US. But the Russian intelligence community has access to people who are smarter than he is, are better hackers than him, and are world-class manipulators. Snowden’s naïveté has already harmed the US, but his hubris is positioned to do even more damage, and damage that we will not know the extent of until it is too late.

I realize that this line of analysis has a certain Ian Fleming-ish feel to it; a US cryptanalyst absconds to Russia, and a year later, American SIGINT begins to experience unusual failures and breeches. But that is the reality we are living in, and we need to wake up to it. The damage Snowden has done to America’s information security and intelligence capabilities is not hypothetical and hypothesized. It is real, it is urgent, it is extensive, and it is just starting.

Jon is a 2013 Healy Scholar, a MPhil in International Relations candidate at University of Oxford, and a Research Assistant at Georgetown University. 

Why Intelligence Matters, And Nations Need Think About Collection Methods

In the military sense, intelligence means something approximating a combination of knowledge and understanding of others – whether they are friends or foe. In the modern risk averse world the temptation has been to rely upon more and more distant observation methodologies; using satellites especially to monitor communications, movement and equipment – prima facie the what, the where and the why of information available.

The trouble is that knowing that an order has been given does not give the why – it does not give the thought process, or even more than a glimmer of the thought process, that has gone into the decisions made leading to that moment. Without such understanding of the decision, judgements are not actually judgements or even estimates, they are guestimates – they are hopes that the enemy repeats the same thought process, the same conclusions, and same actions without having any idea why. This is all ‘Human Intelligence’, and unfortunately not something that can be acquired with a satellite or the snippets of conversation  normally accessible in terms of other nations’ (or really any actors on the world stage) command personnel.

Although there is a lack of human intelligence, it is not due to any real failure of intelligence services – they would never have the resources to be able (for want of a better phrase) ‘stalk’ all the people necessary. So as the intelligence services can’t be expected to do a job so big, the question is why does the lack of it matter? What effect can the lack of it have on operations?

The impact is simple: with increasing costs, budgets being cut, and the consequently shrinking force structures (as well as the roll on effect in presence and response), the armed services are being expected to do more with less. The potential risks of making the wrong decision are multiplied as any losses equate to a larger proportion of total forces. Furthermore, loss does not need to be destruction, but could mean being in the wrong part of the world – as again a man, a tank, a plane, a ship, whatever is considered can only be in one place at any one time. Yes, ships can be moved easily as they are self-contained and self-propelled; aircraft can be moved (if there is logistics/suitable air base/support personnel) – the same goes for men and tanks. The moves are not instantaneous; though it seems that each generation of leaders has to relearn this for themselves.

Many ministers (some of whom had themselves served in WWII or other conflicts[i]) were shocked when they discovered the time it would take to deploy forces from the UK to take part in the 1982 Falklands War; ultimately, it took 47 days from the first ships of the Task Force departing from the UK on April 5th to the San Carlos landing commencing in the Falklands on May 21st[ii]. More recently, HMS Illustrious, which was conducting counter piracy operations in the Indian Ocean at the time, was ordered to provide support for the 2013 Typhoon Haiyan aid mission November 14th; however, after picking up over 500tons of supplies at Singapore, it did not arrive until the 25th of November[iii]. Apart from being a salutary example of the fact that navies do not have peacetime/war time difference in operational tempo, it again shows the realities of time. This makes the requirement for gaining as full an intelligence picture as possible—including both the knowledge and the understanding thereof—a premium; the better the intelligence picture, the lower the likelihood of a country being caught by an unanticipated surprise. This is not to say a nation will not be caught by surprise, but that it will be more prepared for that surprise when it comes. Thus, how can a nation’s understanding be increased to allow for this if the intelligence services cannot be turned into ‘stalkers anonymous’?

This solution largely depends upon the service and their national requirements; for navies, it becomes about presence, the concomitant diplomacy of port visits, and the training/interaction opportunities that occur. These roles build relationships between practitioners; yet if people do the same the job and fulfill the same role (even when using different equipment, and representing different nations), then they are usually half way to understanding the other anyway. Whilst it does work both ways—giving understanding to the other nation/actor as well as gaining it for their own—it still provides a better overall position and a level of understanding than that which no interactions provides. But as a proposed measure for improvement, how can it be implemented?

For the navies of nations which are local or even regional powers, this naturally represents less of a challenge (and less of a strain on limited resources), since the operations can, for the most part, be supported from home ports, and could utilise shorter range vessels such as patrol boats[i]. However, for the navies of nations with national interests of a range that require a broader interaction—a global approach—it becomes more difficult. The emphasis such navies often experience, on building first rate, top of the line vessels for all roles, means their ships are often too expensive for them to build in the numbers that would be required for a proper presence[v].

This presents a problem for those navies and in a way it requires both a greater acceptance of the role of services in ‘peacetime’[vi] from leadership (supported by navies finding a way to highlight this more, perhaps by being less reticent about what they do, perhaps by borrowing some of the showmanship exhibited by other government organisations to demonstrate why they matter); it also needs those navies to look at building ships for which in warfighting terms would be described as ‘Task Group vessels’. Ships which could never be a picket, either for anti-submarine or air defence, but which can provide extra security for auxiliaries, aircraft carriers and amphibious ships. Ships which will have small crews, but good range and very good wining & dining facilities. Ships which will probably carry a small helicopter, some drones, boats and marines[vii] in order to maximise their presence wherever they are. They would not need to be big, but they would need to be flexible. Most of all they would need to be cheap, not cost effective, cheap; they must cost not a lot to build (so everything should come off the shelf) and not a lot to run.

For example the solution for the RN is quite easy to see:

  • Hull/design- a slightly enlarged River class vessel, with a hangar,
  • Sensors – a suitable radar,
  • Naval Gunfire Support (for helping out with amphibious or littoral operations) – A medium calibre deck gun,
  • Defensive weapons – a Close in Weapon System such as Phalanx plus a small number of Sea Ceptor (the RN’s name for its new Point Defence Surface to Air Missile System, which is part of the tri-service Common Anti-Air Modular Missile) to help it with defending itself if caught by surprise, but most importantly defending the ships as described above
  • Offensive weapons – perhaps some Stanflex modules[viii] (or other equivalent of the shelf modular system) could be acquired from Denmark to support torpedoes, towed sonar array and anti-ship missiles; if not decisions have to be made about what is necessary, rather than trying to fit it all, perhaps the route of the Type 12 Leander class would be best where each batch was focused on a different mission for the task group[ix], so some could carry torpedoes (or maybe as a class would rely upon their helicopters entirely for that), some anti-ship missiles and some perhaps land attack weapons (or a system could be chosen which was capable of both missions on an equal or nearly equal basis).

Going into such detail makes this example sound bigger than it reality is[x], but this goes to demonstrate how capable and how complex even a cheaper ship would have to be fulfill its role as a presence/task group ship; the fact is though that if everything was bought ‘off-the-shelf’ rather than developed fresh, then the costs would drop dramatically. This would happen because it’s the research which costs the money (especially as unit numbers have fallen at the same time as complexity increased, accelerating cost-per-unit growth), not the hardware. Such ships though would not be an easy sell, as their role would not be to replace anything, but to support it[xi]; therefore the case would need to be made well as, whilst not much (in the context of what services they would provide), new money would have to be found.

For navies that succeeded in making the case, in securing some more of their national budgets and then acquiring them then these vessels would be of huge benefit. In Peacetime they would be the vital global presence[xii], they would provide a much needed supplement to the first rate ships of the escort force (as well as the modern Capital Ships, the Aircraft Carriers and Amphibious Ships) as representatives of their nations and its national interests around the world. They would act in peacetime, as escorts always have, as their nations diplomats of the sea, police of the maritime highways, eyes and ears of the homeland in distant quarters[xiii]; whilst in war time they would again take a supporting role that would free up the more capable ships for pickets, providing the inner layers of defence to help protect those vessels upon which their nations primary capability projection rests.

As an intelligence paper, this paper should conclude with a focus on exactly that: intelligence matters because, when properly conducted, it will make leaders’ decisions easier and safer. The best way to increase understanding is to improve the level of interaction so as to allow those expected to make the decisions to learn it first-hand. For navies, this means cranking up the presence abroad, which will necessitate increasing the ‘presence’ at home to secure the funding necessary – something which will be even more crucial for those navies which serve nations with extensive global interests, as they will need to acquire the resources to build these vessels in the numbers necessary without compromising on crucial existing projects; a very tricky task in the modern world.

Dr. Alexander Clarke is our friend from the Phoenix Think Tank and host of the East-Atlantic edition of Sea Control. He recently received the rest of the paperwork necessary to put a well-deserved “Dr” at the beginning of his name.

[i] For example in 1982 the Deputy Prime Minister & Home Secretary William Whitelaw (1st Viscount Whitelaw) had served in the Scots Guards with 6th Guards Tank Brigade during WWII, http://en.wikipedia.org/wiki/William_Whitelaw,_1st_Viscount_Whitelaw (06/07/2014), the Defence Secretary Sir John Nott served with the 2nd Gurkha Rifles in Malaysia, http://en.wikipedia.org/wiki/John_Nott (06/07/2014), and the Foreign Secretary Peter Carington (6th Baron Carrington) served throughout WWII with the Grenadier Guards, http://en.wikipedia.org/wiki/Peter_Alexander_Rupert_Carington,_6th_Baron_Carrington (06/07/2014)

[ii] http://www.telegraph.co.uk/news/worldnews/southamerica/falklandislands/9181252/The-Falklands-War-timeline.html, (05/07/2014)

[iii] http://www.royalnavy.mod.uk/news-and-latest-activity/news?s={271126E5-06D3-4721-BEA9-9F8011615CE3}&page=6 & http://www.royalnavy.mod.uk/news-and-latest-activity/news?s={271126E5-06D3-4721-BEA9-9F8011615CE3}&page=5 (both 05/07/2014)

[iv] The other factor to be increased alongside visits will be the quantity of reports; i.e. all Officers, NCOs and even some ratings should provide write ups of their experience that could be provided to the intelligence/command communities – they may have nothing useful, but it’s the overall picture that the information helps to create which will be of service; the more details gathered the greater the understanding that should be gained.

[v] http://www.europeangeostrategy.org/2014/07/centrepiecebut-rest-board/ (06/07/2014)

[vi] With Counter-Piracy, Counter-Narcotics, Counter-Human Trafficking, Counter-Terrorism, Freedom of the Seas, Fishery Protection, Search & Rescue, Humanitarian Aid, Allied Training, Maritime Security (including national and allied standing patrols), Constant At Sea Strategic Deterrence and of course various Diplomatic duties (naming just the major mission clusters) for ‘peacetime’ read even more for navies to do, but more than li

[vii] http://www.royalnavy.mod.uk/news-and-latest-activity/news/2014/may/28/140528-hms-somerset-drug-bust, http://www.royalnavy.mod.uk/news-and-latest-activity/news/2014/january/13/140213-rm-receives-lsgc-medal & http://www.royalnavy.mod.uk/news-and-latest-activity/news/2014/march/17/140317-rm-practise-pirate-take-down (all 06/07/2014)

[viii] http://en.wikipedia.org/wiki/StanFlex (06/07/2014) – on the face of it a system with a lot to offer that has been around a long time, if it had been developed and used by a larger navy then more than likely more nations would be using it.

[ix] http://www.hazegray.org/navhist/rn/frigates/leander/ (06/07/2014) – a total of 44 of these ships were built, 26 for the RN which were built with a range of capabilities, a state which was expanded as time went on and they were upgraded http://en.wikipedia.org/wiki/Leander-class_frigate (06/07/2014); for more information http://www.phoenixthinktank.org/2011/05/future-surface-combatant-%E2%80%93-is-this-the-successor-of-the-leander-class/ (06/07/14)

[x] Possibly have gone into too much detail for what this work is supposed to be, but it seemed necessary to help illustrate the point.

[xi] Although arguably they could be said to be taking on what was traditionally a significant part of the peace-time cruiser role http://www.britishnavalhistory.com/sverdlov_class_rn_response/ (06/07/2014)

[xii] http://amphibiousnecessity.blogspot.co.uk/2013/11/october-2013-thoughts-extended-thoughts.html (06/07/2014)

[xiii] Just recently for example the RN has met the Russian’s of the West Coast of Scotland, http://www.royalnavy.mod.uk/news-and-latest-activity/news/2013/october/31/131031-royal-and-russian-navy (06/07/2014), exercised with the Indian Navy in the Indian Ocean, http://www.royalnavy.mod.uk/news-and-latest-activity/news/2013/november/01/131101-hms-westminster-indian-navy (06/07/2014), and has taken command of a multi-national Maritime Security Task Force East of Suez, http://www.royalnavy.mod.uk/news-and-latest-activity/news/2014/april/17/140417-ctf150-command (06/07/2014).

The Current State of Maritime Global Counter-Proliferation

THIS ARTICLE WAS ORIGINALLY PRINTED ON JUL 17, 2013 AND IS BEING RE-PRINTED FOR “CHALLENGES OF INTELLIGENCE COLLECTION WEEK.”

Spanish Marines Board SO SAN in 2002
Spanish Marines Board SO SAN in 2002

Authorities in Panama detained a North Korean-flagged ship on Monday after apparently discovering onboard what has been described by Jane’s as a Fire Control Radar for use with the SA-2 Surface-to-Air Missile system. CHONG CHON GANG was stopped on suspicion of carrying drugs near Manzanillo before entering the Panama Canal after a port call in Cuba (where it purportedly on-loaded its cargo).  What may be most interesting about this case is what did not happen, however, and what illicit proliferation of weapons by states like North Korea currently looks like.

While Panama was involved in this case, it was not in its role as a major provider of flags-of-convenience to international shipping.  A U.S.-led system known as the Proliferation Security Initiative (PSI) was announced in 2003 in order to establish a framework in which states worldwide “that have a stake in nonproliferation and the ability and willingness to take steps to stop the flow of such items at sea, in the air, or on land” are able to take action to do so.  The event generally attributed to spurring the creation of PSI was the interdiction of a ship named SO SAN in 2002 while it was carrying SCUD missiles from North Korea to Yemen.  SO SAN was ultimately released after “the Yemeni government insisted the missile shipment was the product of a legitimate transaction in accordance with international law,” with the diplomatic wrangling associated with it being stopped complicated by the fact that it was flying no flag at the time of the boarding.

The United States attempted to fix the problem of boarding a ship flying a flag-of-conveniance through the PSI and an accompanying series of “bilateral boarding agreements” with the major providers of registries (such as Panama, Antigua and Barbuda, the Bahamas, Belize, Croatia, Cyprus, Liberia, Malta, the Marshall Islands, Mongolia, and Saint Vincent and the Grenadines).  However, this is not an instance of the United States (or another interdicting state) asking for permission to board a ship flying the Panamanian flag, but rather Panama exercising its sovereignty and ability to regulate shipping in its territorial waters.

This instance provides something of a surprise regarding expectations of how North Korea uses flags-of-convenience, with initial reports indicating that CHONG CHON GANG was registered in North Korea, rather than its commonly used flags-of-convenience such as Cambodia, Tuvalu, and Mongolia.

It also shines on light on current global counter-proliferation efforts, with Arms Control Now arguing it demonstrates that:

“most PSI interdictions occur while vessels suspected of transporting WMD related materials are in port, rather than on the high seas in international waters. This is in contrast to the popular perception that most PSI operations involve commandos in black masks storming freighters filled with centrifuges. As much as that captures the imagination, it does not reflect the “operational reality” of PSI, at least not most of the time.”

Despite its prominence, it remains unclear whether PSI has proved to be a successful tool for the global counter-proliferation regime.  This is in large part due to U.S. secrecy, “since so very few interdictions are ever made public.”  Critics have claimed that “the overall lack of transparency makes it difficult for open source analysts and think tanks to assess the overall success of” PSI.  Both the U.S. Department of Defense and State Department have refrained from offering “details about actual interdiction operations and WMD seizures” because they “often involve intelligence information and foreign partner sensitivities.”

Lieutenant Commander Mark Munson is a Naval Intelligence officer currently serving on the OPNAV staff.  He has previously served at Naval Special Warfare Group FOUR, the Office of Naval Intelligence, and onboard USS Essex (LHD 2).  The views expressed are solely those of the author and do not reflect the official viewpoints or policies of the Department of Defense or the U.S. Government.

Introduction: Challenges to Intelligence Collection

“Intelligence remains our basic national instrument for anticipating danger—military, political, and economic.”—President George H.W. Bush

In preparation for our first “Challenges to Intelligence Collection” week, our CIMSEC editors observed a surprising lack of published information on intelligence collection, both in the general world of scholarship and here at CIMSEC, despite intelligence collection being one of the most controversial topics in the media in the past year. Furthermore, few organizations have adapted as drastically to institutional and operational changes since September 11th as the intelligence community. Yet the body of knowledge on this subject remains conspicuously sparse.

Recently, John O. Brennan, Director of the Central Intelligence Agency, delivered the keynote address at the first annual “Ethos and Profession of Intelligence” conference. In his address, Director Brennan admitted “the Central Intelligence Agency does not hold a lot of public conferences. Our foreign counterparts tend to hold even fewer—as in zero”. [2]  Subsequently, our valiant contributors will attempt to address this uncharted academic terrain. We will publish new articles that address and identify possible operational, procedural, and cultural impediments to efficient intelligence operations.

Georgetown University and the CIA hosted the “Ethos and Profession of Intelligence” conference on June 11th, 2014 in Georgetown’s historic Gaston Hall. Despite the overt anachronism of discussing cyber attacks and geospatial intelligence under Gaston’s neo-Gothic paneling, the elaborate setting emphasized the role of intelligence as a historically significant aspect—and perennial fixture—of the United States’ national defense organization. Conversely, panelists’ discussions addressed pressing concerns for the future of the intelligence community, such as evolutions in cyber technology, the emerging importance of public sector involvement, and the precarious balancing act between domestic transparency and community integrity. [2]

Ultimately, the conference emphasized the irrevocable tension between meeting the demands of the future while still maintaining the core tenants of the intelligence profession. The mere fact that the CIA was willing to participate in a public conference represents exactly how far the intelligence community has evolved in the past decade. The joint CIA-Georgetown University conference marked the CIA’s first-ever public national security conference, suggesting that as the intelligence community rises to meet the demands of the future, the CIA intends to lead this evolution. At the same time, the careful and intentional inclusion of the word “Ethos” in the conference title involuntarily invokes the Aristotelian appeal for credibility and the enduring need for trustworthy intelligence professionals. [3] It is also reminiscent of the gravity of the intelligence mission; in the domain of intelligence, the ability to persuade is often a matter of life and death.

In a similar vein, CIMSEC will feature articles this week that connect the intelligence community’s past to its demands for the future. Our contributors will demonstrate how far intelligence collection has evolved since the end of World War II and portend the challenges that will threaten specific intelligence communities in the future. Likewise, form will follow (editorial) function; we will feature previously published articles on Naval intelligence, cryptology, and emerging technology, highlighting the need for continued discourse on this subject and CIMSEC contributors’ willingness to address this significant knowledge gap.

Jillian Danback McGhan is a surface warfare officer in the U.S. Navy Reserve and a former instructor at the United States Naval Academy. She is currently a student at the Edmund A. Walsh School of Foreign Service and a research assistant for the Center for Risk and Economic Analysis of Terrorist Events (CREATE). The views expressed here are her own and do not represent those of the Department of Defense, the Department of the Navy, Georgetown University, or CREATE.

[1] “Remarks for Central Intelligence Agency Director John O. Brennan as Prepared for Delivery at the Conference on the Ethos and Profession of Intelligence, Georgetown University”, 11 June 2014. https://www.cia.gov/news-information/speeches-testimony/2014-speeches-testimony/remarks-for-cia-director-brennan-at-georgetown-conference.html.

[2] Video footage of the conference, including all panel discussions and remarks by CIA Director John O. Brennan and former FBI Director Robert Muller, can be found on the CIA’s website: https://www.cia.gov/news-information/blog/2014/cia-georgetown-conference-livestream.html

[3] For a refresher on Classic rhetorical appeals, see the Purdue Online Writing Laboratory’s summary “Aristotle’s Rhetorical Situation”,   https://owl.english.purdue.edu/owl/resource/625/03/.