Return-Path: <sentto-279987-3179-1003628748-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Sat, 20 Oct 2001 18:47:07 -0700 (PDT) Received: (qmail 12397 invoked by uid 510); 21 Oct 2001 01:45:21 -0000 Received: from n30.groups.yahoo.com (216.115.96.80) by 204.181.12.215 with SMTP; 21 Oct 2001 01:45:21 -0000 X-eGroups-Return: sentto-279987-3179-1003628748-fc=all.net@returns.onelist.com Received: from [10.1.4.54] by n30.groups.yahoo.com with NNFMP; 21 Oct 2001 01:45:48 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_0_1); 21 Oct 2001 01:45:47 -0000 Received: (qmail 58420 invoked from network); 21 Oct 2001 01:45:46 -0000 Received: from unknown (10.1.10.142) by l8.egroups.com with QMQP; 21 Oct 2001 01:45:46 -0000 Received: from unknown (HELO red.all.net) (65.0.156.78) by mta3 with SMTP; 21 Oct 2001 01:45:46 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id f9L1jt422370 for iwar@onelist.com; Sat, 20 Oct 2001 18:45:55 -0700 Message-Id: <200110210145.f9L1jt422370@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Sat, 20 Oct 2001 18:45:55 -0700 (PDT) Reply-To: iwar@yahoogroups.com Subject: [iwar] [fc:Intelligence.cooperation.on.the.frontline.of.terrorism:.Easier.Said.Than.Done] Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Intelligence cooperation on the frontline of terrorism: Easier Said Than Done Oct. 18, 2001 In the wake of the events of Sept. 11, a number of voices called for the United States to enhance intelligence relationships with other nations, especially those with proximity to Afghanistan. Undoubtedly, this intelligence will play an important role in managing international terrorism. But the countries on the frontline of the terrorist conflict are governed by authoritarian regimes with conflicted priorities not always in line with American interests. These nations have intelligence services that reflect different ethics regarding intelligence, questionable levels of professionalism, problematic internal agendas, and varying degrees of corruption. American intelligence officials will confront these problems in their pursuit of timely and accurate information. Pakistan Pakistan is a strong case-in-point. The 40,000 strong Inter-Service Intelligence Agency (ISI) exerts a great deal of influence within the Pakistani political dynamic. Moreover, the ISI spent much of the last decade financing, supplying, and advising the Taliban. Consequently, it has developed an intimate knowledge of the movement, and most likely, the al Qaeda network in Afghanistan. ISI intelligence would be an invaluable resource for the United States. But factions within the service are conflicted by President Pervez Musharraf's call for the agency to share intelligence with the CIA. On Oct. 7, Musharraf was forced to purge some ISI officers sympathetic to the Taliban, including the agency's chief, Gen. Mahmoud Ahmad. Several of the officials purged from the ISI and the Pakistani military, including Gen. Ahmad, played key roles in the 1999 military coup that placed the current regime in power. The ISI is peppered with officers who identify strongly with the Taliban and its militant Islamic ideology. In late September, a small delegation of Pakistani military and intelligence officials visited the Taliban stronghold of Kandahar, reportedly to assist the Taliban in military preparations. The trip, which seems to have been a private initiative of these officers, reflects the degree of resistance to cooperation with America that exists within some intelligence and military circles in Pakistan. Currently, CIA and ISI officials are discussing the ground rules for conducting covert operations on or originating in Pakistani territory. But there are compelling reasons to suspect that disclosure of any operation to the ISI would mean disclosure to the Taliban as well. Saudi Arabia A reluctance to cooperate with U.S. intelligence officials is also apparent in Saudi Arabia, and predates the Sept. 11 attacks. Following the bombings of U.S. military installations in Riyadh and Dhahran in 1995-1996, American intelligence officials complained that Saudis denied access to detained suspects. Moreover, according to U.S. officials, the Saudis were reluctant to discuss any broader implications of the attacks that might have pointed to Osama bin Laden and al Qaeda. Unlike their counterparts in Pakistan, the reluctance of the Saudi Directorate of Intelligence to cooperate with U.S. officials emanates from the top down. The directorate reports directly to the King, who shares the royal family's ambivalence about bin Laden. As a former member of the political elite in the Kingdom, Osama bin Laden retains a nebulous array of contacts within influential circles. More importantly, the regime is acutely aware of bin Laden's antipathy to its reign, as well as his popularity within the conservative religious establishment. This community is an important pillar of support for the House of Saud. Government efforts to role up al Qaeda and arrest bin Laden remain a sensitive issue with connotations for Saudi stability. After the Sept. 11 attacks, intelligence sharing between the United States and Saudi Arabia continued to follow this problematic pattern. Officials in the administration of President George W. Bush complain that the Saudis are failing to cooperate fully with U.S. intelligence officials attempting to investigate the hijacking suspects. Central Asia The Central Asian states pose a set of unique challenges for American intelligence and diplomatic officials. Uzbekistan, Turkmenistan, Kazakhstan, and Tajikistan all have a number of intelligence organizations responsible for providing domestic and foreign intelligence. Both Turkmenistan and Kazakhstan have a Committee for National Security (KNB), thought the latter also has the Barlau, the external intelligence agency. In Uzbekistan, the National Security Service (NSS) handles a broad range of security issues. Finally, in Tajikistan, the Ministries of Interior, Security, and Defense share responsibility for security and intelligence matters. These nations are a product of the security vacuum that emerged in the region after the dissolution of the Soviet Union. Both Saudi Arabia and Afghanistan sponsored extremist Islamic insurgencies in Central Asia in the last decade. As such, these fledgling states found common interest in cooperating with the United States on security issues as a hedge against internal insurgencies and Russian and Chinese pressure. Taken together, however, the region characterized by dubious political systems, tenuous stability, economic stagnation, and seriously flawed human rights records. Their security and intelligence services may possess valuable resources for the United States. But they are also key actors in extinguishing even benign internal dissent and propping up heavily authoritarian personalities. Moreover, civil control of the security services cannot be taken for granted. In Tajikistan, for instance a small group of commanders use their forces to support internal fiefdoms. Corruption is an enduring problem throughout the region and within the security services. Clearly, the proximity of the Central Asian states to Afghanistan enhances their value to the United States. But security associations in the region will have to be forged at the price of U.S. diplomatic exposure. Conclusion If the United States is to penetrate international terrorist networks, it will need access to resources outside the purview of Western intelligence sources. But information provided from the nations listed above will come with its own set of biases. There is little reason to believe that many of these security services approach the business of intelligence with the concept of neutral analysis that is the ideal of their Western counterparts. A reluctance to cooperate, political spin, selectivity, or simple miscommunications will play a part to corrupt or obfuscate what may be a wealth of information. Sources: U.S. Department of State, 1999 Country Reports on Human Rights: Kazakhstan; Tajikistan; Turkmenistan; Uzbekistan. Radio Free Europe/Radio Liberty: Central Asian Report, Washington Post, New York Time, Las Angeles Times, London Daily Telegraph, The New Yorker. By Dr. Michael Donovan CDI Research Assistant <a href="mailto:mdonovan@cdi.org?Subject=Re:%20(ai)%20INTELLIGENCE%20COOPERATION%20ON%20THE%20FRONTLINE%20OF%20TERRORISM:%20Easier%20Said%20Than%20Done%20(CDI)%2526In-Reply-To=%2526lt;002201c159c0$3a12fb80$2bab85ce@oemcomputer">mdonovan@cdi.org</a> ------------------------ Yahoo! Groups Sponsor ---------------------~--> Pinpoint the right security solution for your company- Learn how to add 128- bit encryption and to authenticate your web site with VeriSign's FREE guide! http://us.click.yahoo.com/yQix2C/33_CAA/yigFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:56 PST