attacks known a week ahead

by Satanus 5 Replies latest jw friends

  • Satanus
    Satanus

    For what it is worth. Skolnick has a lot of stuff.

    S

    ----------------------------------------------------------------------
    Rense.com

    Skolnick - US Government
    Had Prior Knowledge Of Emergency
    By Sherman H. Skolnick
    [email protected]
    http://www.skolnicksreport.com

    America's Reichstag Fire


    The most massive so-called "terrorist" attacks on U.S. soil since the Oklahoma City bombings of 1995, were known, a week ahead of time, by the American CIA. Among the foreign intelligence agencies who penetrated the plots were the French CIA and Israel's The Mossad, units of both often working with one another.


    Foreign intelligence sources confirm the validity of this story. And they state that they informed the U.S. secret police who absolutely failed, neglected, and outright refused to take action as to known prior specifics of which the top-level of the CIA were informed in advance.


    As made known to the CIA, were the following, among other details:


    [1] That George Herbert Walker Bush, as President, at the close of the Persian Gulf War, 1991, arranged to bring into the U.S. some four thousand Iraqi military officers, some from intelligence units, and their families.


    [2] Some 550 of these officers became residents in Lincoln, Nebraska, AND TWO THOUSAND OF THEM took up residence in Oklahoma City. In a watered down story, CBS' "60 Minutes" Program did a segment once on this about Lincoln, Nebraska but said NOTHING about the Iraqi military officers in Oklahoma City.


    [3] The financial and other provisions for them and their families were arranged by the Elder Bush, and then quietly continued by Bill Clinton as President, and perpetuated by George W. Bush as White House "resident" and "occupant". The arrangements included financial subsidies, housing, and employment for the Iraqi officers.


    [A brave Oklahoma City TV Reporter, Jayna Davis, on their local TV station, put on the air several stories about the Iraqi connection to the bombing of the Alfred P. Murrah Building, the bombing done with the aid of domestic dissidents as surrogates. A group bought out the TV station and silenced her. Timothy McVeigh's chief defense counsel for the murder trial, Stephen Jones, on behalf of McVeigh, filed an extra-ordinary petition in the next higher court, just prior to the murder trial. To no avail, Jones tried to force Denver U.S. District Judge Richard Matsch to compel the American CIA to disgorge records held by them showing prior U.S. knowledge of the bombing, as confirmed by other known records, some of them also in secret court records. We have a copy of the 185 page U.S. Court of Appeals, 10th Circuit, petition filed by Jones and almost uniformly ignored by the American monopoly press. The petition raises the Iraqi connection.]


    [4] The foreign intelligence agencies informed the American CIA that guns would be planted on-board as many as ten U.S. commercial airflights. This to be done by airplane clean-up crew members who are generally not subject to airport security provisions. These workers most likely did not know the purpose of the gun-planting.


    [5] The CIA also was informed prior to the "terrorist" attacks scheduled for "911" Emergency Day [September 11], that highly skilled Iraqi pilots, among the four thousand Iraqi officers resident in the U.S., would take over the commercial flights, by retrieving the weapons concealed onboard, and then commandeering the flight deck.


    [6] The Elder Bush, Clinton, and George W. Bush, all were in a position to know that the Iraqi officers that they provided for included some double-agents. The FBI Counter-Intelligence Division at no time was instructed to do anything about these double-agents in a position to commit mischief, murder, and mayhem, on U.S. soil.


    [7] As I revealed a week prior to the "terrorist" attacks, some foreign television networks were busy preparing lengthy documentaries that would scandalize George W. Bush and other members of the Bush Family, including the Elder Bush and Jeb Bush. The subject matter included how forty million dollars in dope funds were used by the Bush Family to reportedly corrupt South Florida DEMOCRATS to abandon the recount even ahead of the U.S. Supreme Court ruling installing George W. Bush as the "resident" and "occupant" of the White House. The dope funds came reportedly from Bush Family business partner, Carlos Lehder, co-founder of the U.S./Colombia medellin dope cartel. [Visit our website story, "Chandra Levy Affair, Part Two".] I discussed this on radio talk shows.


    [8] As part of the targetting of the World Trade Center buildings, a group of surrogates for the Iraqi military officers, reportedly spent considerable time within one of the buildings, with building security officers somehow oblivious of their presence.


    [9] As the CIA top officials were informed and had prior knowledge, the purpose of the "terrorist" attacks was to effectively paralyze the financial infrastructure of the U.S. Some of the most important stock and bond houses in the world, with their key people having loads of inside knowledge and hard to replace trading tricks and expertise, were located in the known-to-be-targetted twin towers of the World Trade Center, New York City. It was like blowing up the main "financial factory" and destroying their inventory. The so-called "back-up" records kept parked across the river in New Jersey, are not only inadequate but cannot help reconstruct various accounts and transactions in the works.


    Financial experts tell us the "back up" records parked in New Jersey, may NOT be sufficient to re-start the American financial apparatus. Some of the experts are loudly grumbling that they should have early on seen Federal Reserve Czar Alan Greenspan on the television explaining about the financial ramifications. Of course, some suppose that Americans would panic and run out of control. So we are dealt with like little children.


    [10] It is a serious mistake, according to savvy American and foreign intelligence sources, to blame the Emergency all on Osama bin Laden. As readers of our website are aware, we have long pointed out that bin Laden is reportedly in the Mid-East Construction business. His reputed partners? The family of Sharon PERCY Rockefeller. She is the wife of John D. Rockefeller 4th (D., W.Va.), great grandson of the founder of the infamous Standard Oil Trust that used to bomb their own obsolete buildings to falsely blame onto their competitors. Bin Laden's so-called "secret" accounts, which the White House has said they would like to freeze, are or have been actually reportedly in the Harris Bank, Chicago, joint accounts with the family of Sharon PERCY Rockefeller.


    [11] The Saudi Royal Family actually consists of some five thousand members, some of whom actually are for the U.S. and some anti-U.S. Some of them have bankrolled Iraq's war against Iran, 1980 to 1988, to destroy some oil facilities and keep the price of oil HIGH. The foreign intelligence agencies, that penetrated the plots to be carried out on U.S. soil, are aware that some of the Saudi royals are actually sympathetic to the Iraqis destroying the World Trade Center Buildings and in part, wrecking the Pentagon. [As if the American CIA did not ALREADY have their own knowledge of this.]


    Whenever there is a political assassination or some other unusual violent event, what is the key question the oil-soaked, spy-riddled monopoly press ALWAYS fails to ask? WHO BENEFITS. With a scandal about to break against George W. Bush, he and his circle had an interest NOT to stop these things from happening. And to divert attention. The White House has a strong motive to silence critics and urge people TO RALLY AROUND THE PRESIDENT. Simple-minded folks, of course, often poorly informed,do not understand how the ruling classes would shed the blood of thousands if not millions of innocent people, in some instigated war, to avoid dealing with the apparent on-coming economic disasters.


    In the midst of this prior-knowledge emergency, who dares now to point to the Bush Family as reputed business partners of the major kingpin, Carlos Lehder, of the U.S./Colombia medellin dope cartel? Or how huge dope money bought the Electoral College trick in Florida and corrupted the U.S. Supreme Court's "gang of five".


    This is America's REICHSTAG fire. Adolph Hitler burned down the German parliament and falsely blamed his enemies and had them rounded up and put in the concentration camps. Has the U.S. Constitution now been revoked? More coming.

    Stay tuned.

    MainPage
    http://www.rense.com

  • FiveShadows
    FiveShadows

    NWO i tell ya...this REEKS of the NWO

    FiveShadows

  • heathen
    heathen

    I often spend time trying to concieve conspiracy theories but
    this is beyond anything I could have cojured .Maybe you
    should try writing fiction this is way out there making
    water gate sound like a church picnic.Oliver stones jfk
    was another masterpiece of espionage and government corruption.
    There is no doubt that the corruption in government is at
    a staggering dismal high.Although it is hard to believe what
    happened in new york I just couldn't imagine the government
    letting these terrorists orcestrate such a devestating and
    inhuman act on US soil.the tie in with the saudis was a nice
    touch, as I was watching government officials today stating
    that the middle east is not an area of the world to count
    on for any kind of political resolve ,stating they really
    don't like the US .can't wait to see your next post

  • Kent
    Kent

    I don't know about this story, but it isn't any stranger than most others.

    What IS a proven fact is that Bin Laden is trained by the CIA to do - exactly - terrorist attacks! He was trained by the Americans to do terrorist attacks against the Russians, and what he does (whatever he do) is what he did learn by the US!

    I wonder why the CNN does not report that!

    I wonder what happened to the message in BBC about 4 other planes being hi-jacked, and shot down by the US. They mentioned that in the morning (Norwegian time) - and they - or anyone else - never repeated the message. The sources was, BBC said, officials in FBI.

    Without any doubt at all, there is more to this case than what meets the eye. Nobody believes the US didn't know ANYTHING before this happened, but I won't speculate as to what.

    One thing is sure. IF bin Laden is behind this, and IF he managed to keep this whole operation hidden for a year while planning, why would he be so stupid to put some written material pointing directly to him in a car????

    Smells fishy, if you ask me.

    Yakki Da

    Kent

    I need more BOE letters, KMs and other material. Those who can send it to me - please do! The new section will be interesting!!

    Daily News On The Watchtower and the Jehovah's Witnesses:
    http://watchtower.observer.org

  • Kent
    Kent

    If you want to have actual evidence as to US cover-up, just check out this page:
    ยจ. http://cryptome.org/mc-gehee.htm

    Anyone who believes any secret service will let "normal" people know what they are doing, no matter classified or not, must be out of their minds.

    I don't support popular "conspiracy theories" - but facts are more weird than anyone believes. In the world of running a state - and especcially a country like the US, lies, disinformation, cencorship and discrediting critics is a way of life. Again, I don't know nothing about Iraki involvment in the Terrorist attack, but if anyone did have a "reason" besides Israel - it would be Saddam Hussein, and he's the only one that openly supported the attacks as well.

    Weirder things has happened, and in reality - it's strange it didn't happen before.

    Here is a little something:

    ------------------------------------
    10 September 2001. Thanks to Anonymous and JC.

    InfoTrac Web: Expanded Academic ASAP Int'l Ed..

    Source: Foreign Policy, Sept 2000 p18.
    Title: SPIES.(state of covert operations and spying activities around the world)
    Author: Loch K. Johnson

    Subjects: Espionage - International aspects
    Defense spending - Analysis
    Covert operations - Analysis

    Locations: United States

    Magazine Collection: 105F3606
    Electronic Collection: A67886146
    RN: A67886146

    Full Text COPYRIGHT 2000 Carnegie Endowment for International Peace

    Virtually every nation resorts to the "dark arts" of espionage to protect its government, economy, and citizens. But with the end of superpower conflict, the spread of democracy, the advent of new information technologies, and the emergence of a more transparent world, the central question about spying today is whether it is still necessary.

    Spying Is a Cold War Anachronism

    Wishful thinking. True, global spying probably reached its zenith during the standoff between the United States and the Soviet Union. Spies, though, have been around in one form or another since the Lord told Moses to "send men to spy out the land of Canaan." For all the talk of a global trend toward democracy and greater transparency, spies seem likely to thrive, even in the absence of a superpower struggle.

    In the United States, the intelligence budget--approximately $30 billion in 2000--is gradually inching back to its Cold War heights. (As a general rule, nations spend on spying an amount equivalent to about 5 to 10 percent of their defense budgets.) The difference is that whereas the United States used to allocate 65 to 75 percent of its intelligence resources to spy on the U.S.S.R., it now devotes only about 15 percent to Russia. The rest goes toward dealing with what the former U.S. Director of Central Intelligence R. James Woolsey characterized in his 1993 confirmation hearings as "a bewildering variety of poisonous snakes," whether terrorism, drugs, the spread of weapons of mass destruction, ethnic conflict, or good old-fashioned bad behavior between, among, or within nations.

    Although just about every major intelligence service shrank in size after the Cold War, most have eagerly embraced the "new threats" mantra as a strategic imperative. By 1994, the British Secret Intelligence Service--the United Kingdom's equivalent of the Central Intelligence Agency (CIA)--devoted only 15 percent of its resources to the former U.S.S.R. (compared with 37 percent during the Cold War) and roughly 40 percent to fighting drugs, terrorism, weapons proliferation, and money laundering, with the balance divided among individual countries. As Ernst Uhrlau, Germany's intelligence chief, recently noted, he sees "an ever stronger connection between transnational issues and internal and bilateral conflicts." The transnational game is one that even lesser nations feel compelled to play: In 1997, seven years after achieving independence, Namibia cited terrorism, ethnic conflict, and the trafficking in drugs, arms, and diamonds as the rationale for creating its central intelligence service.

    Bureaucracies inevitably strive to advance their own interests, especially when they are less accountable to the public. Yet even though they may inflate threats in order to pad budgets, it is hard to argue that spying is no longer necessary. During the last decade, wars and civil conflicts that threatened the interests of greater and lesser powers erupted from the Persian Gulf and the Balkans to East Timor and the Democratic Republic of the Congo. North Korea tested long-range missiles. Terrorists bombed U.S. barracks and embassies in Saudi Arabia, Kenya, and Tanzania, as well as buildings in New York City and Moscow. The Aum Shinrikyo cult in Japan released sarin nerve gas into Tokyo's subways. India and Pakistan conducted surprise nuclear tests. And, lest we forget, Russia and the United States remained (and remain) armed with enough nuclear warheads to annihilate one another in a half-hour.

    In a strategic landscape plagued by still greater uncertainties, the need to know not only endures but grows. Moreover, although globalization has brought about a new set of favorable circumstances for nations in terms of trade, travel, and communications, it has also brought greater exposure to foreign intrigue, against which intelligence can provide a shield. New information asymmetries add to the seductive power of spying: Whether on the battlefield or in trade negotiation sessions, the disproportion of the benefits that accrue to those with superior intelligence and information has grown. Given these circumstances, it should come as no surprise that spying in some cases is actually increasing in intensity. In the United States, wiretaps related to espionage and counterespionage (chiefly against suspected terrorists and international drug dealers) shot up from 595 in 1990 to 880 in 1999. In a 1994 white paper, the South African government noted that its country was experiencing a "dramatic increase in for eign intelligence activities." And from Central Asia to the Baltic States, the new nations clustered along the periphery of the former Soviet Union have experienced a surge of spying by Russia, the United States, China, and assorted other powers.

    In Spying as in War, the Enemy of My Enemy Is My Friend

    Not anymore. When the Cold War ended, the sense of threat on both sides diminished, and with it, the cohesion that had drawn allied secret agencies into a web of cooperation. The Russian secret service currently has minimal ties with the state security apparatus in most of the former Soviet satellites. In fact, it significantly increased its own spy network in Poland, Hungary, and the Czech Republic following their accession to NATO in March 1999.

    Although the foreign-policy objectives of nations within the Western alliance were reasonably compatible during the Cold War, they were never fully congruent and are less so today. In 1998, German counterintelligence uncovered a CIA attempt to recruit a Bonn official for espionage, and the next year the Federal Republic expelled three CIA officers for spying. In early 1999, Tokyo and Washington had a tiff over Japan's plans to develop its own spy satellite and enhance its intelligence capabilities. Earlier this year, a French member of the European Parliament denounced an eavesdropping operation run by the United States, the United Kingdom, Canada, Australia, and New Zealand, known as ECHELON, as "an Anglo-Saxon Protestant conspiracy."

    As shadowy figures operating outside the law or conventions of war, spies are in some ways the ultimate agents of national interest. Intelligence cooperation between nations has therefore always been marked by a sense of ambivalence. Consider the case of the European Union: Many European analysts have touted the benefits of greater intelligence cooperation in an era of falling budgets, exploding information, and growing integration; indeed there has been an improvement in cooperation among Europeans (and with the United States) in some areas, such as counterterrorism and counternarcotics. Yet intelligence services are reluctant to support the idea of a truly united European approach to intelligence sharing. Cooperation has been even more halting among the member states of the United Nations, which faces vexing disputes over secrecy and sovereignty issues. Barring the dissolution of the current system of nation-states and the establishment of full-fledged global governance, intelligence-sharing relationships will remain significantly constrained by divergent policy interests, the fear of turncoats inside an ally's government, and the general need for secrecy.

    Spying on Economic Competitors Is Now Preeminent

    Not really. When the European Parliament published its report on the ECHELON eavesdropping system last February, France's justice minister huffed that what had begun as a military system "has been diverted to the purposes of economic espionage and for keeping a watch on competitors." As one of the most aggressive practitioners of economic spying, the French could perhaps be forgiven their paranoia. But when it comes to the security agenda of most intelligence services, commerce continues to take a back seat to direct threats to national survival. Governments rightly remain more concerned about threats such as terrorism, drug smuggling, and the spread of weapons of mass destruction.

    Of course, the resources that some intelligence services devote to economic matters have been growing. In the United States, the proportion of collection and analysis resources allocated to economic intelligence rose from less than 10 to 40 percent in the immediate post--Cold War period. Of special interest has been the monitoring of unfair trade practices. In 1994, U.S. intelligence learned that the French had tried to bribe Brazilian officials in an attempt to win a $1.4 billion contract for Thomson, their communications company; when the United States objected, Brazil awarded the contract to the American company, Raytheon. U.S. intelligence agencies have also backed up diplomats in trade talks: During recent negotiations with the Japanese government over automobile imports, the U.S. delegation reportedly received agent reports and telephone taps that helped close the deal. The United States has so far refused to spy on private foreign companies, but the roll call of countries so engaged is long. A 1996 survey by the American Society for Industrial Security named China as the most aggressive perpetrator of industrial espionage against U.S. companies, followed by Canada, France, India, Japan, Germany, South Korea, Russia, Taiwan, the United Kingdom, Israel, and Mexico. The United States, however, overlooks its own self-imposed prohibition against commercial espionage if a foreign business is state owned, as is sometimes the case in the telecommunication and aerospace industries.

    But the value of economic espionage is disputed. Open government agencies often have better information on global economic activities than their clandestine cousins; so do any number of open sources, whether multilateral institutions, think tanks, or leading newspapers and magazines. One of the best economic intelligence networks is that of Japan, which relies overwhelmingly on bureaucrats at ministries, trade associations, trading firms, and companies overseas. Virtually all of the economic data obtained by Japan about the U.S. market supposedly comes from open sources.

    Moreover, economic spying raises serious practical and ethical issues. Intelligence cannot be provided in fairness to one U.S. company over another; yet widely distributing secrets risks the disclosure of sensitive sources and methods. Since most major U.S. firms are multinational, intelligence distributed to them cannot be expected to remain tidily within the United States. And if the CIA were caught with its hands in a Toyota safe at midnight, would that risk be worth the likely setback in U.S.-Japanese relations?

    Technology Has Made Spying Easier

    Yes, and harder, too. Intelligence has come a long way since the days when pigeon droppings served as a source of invisible ink. Even during the Cold War, major powers resorted to surveillance technology that now seems like something out of a Laurel and Hardy movie. Frantic to learn more about Moscow's military capabilities, the United States lofted unmanned, camera-carrying balloons across Soviet airspace; most crashed somewhere in the vast Russian expanse. In contrast, today's satellite cameras can canvass the globe and penetrate the cover of clouds and darkness. Moreover, the time required for the retrieval, development, and dissemination of the photography has diminished from weeks to minutes.

    Espionage agencies have invented a wide range of sensitive listening devices, some as small as a pinhead, others as large as a football field. For the individual agent, secret codes have become more elaborate and almost impossible to break; methods of communication between spies and their case officers have shifted from radio transmissions to quick-burst electronic messages bounced off satellites; lock picking and letter opening are now a science; and agent disguises rival those of Hollywood. Technology, though, cuts both ways. As countries have grown more sophisticated in crafting spy machines for use against adversaries, so have adversaries become more clever in evading these prying eyes and ears. During the Indian nuclear tests in 1999 that took much of the world by surprise, the Indians knew exactly when the spy cameras would be passing over the testing facility near Pokharan in the Rajasthan Desert and, in synchrony with the satellite orbits (every three days), scientists camouflaged their preparations.

    Advances in the commercial surveillance industry have further reduced the information edge once enjoyed by some governments. In 1999, the U.S. company Space Imaging launched a surveillance satellite (named Ikonos II) that yields photographs almost as detailed as the intelligence community's --imagery for sale to anyone with cash or a credit card. Within a few years, Iraq or any other nation can have their own satellites or commercially available substitutes (the "rent-a-satellite" option). Accessing communications signals has also become more difficult. Existing signals-intelligence satellites are designed to snatch analog microwave communications from out of the air. The world, though, is rapidly switching to digital cellphones and underground (and undersea) fiberoptic modes of transmission that are much harder to intercept, leaving nations with a sky full of increasingly irrelevant listening posts.

    Furthermore, even poor nations and terrorist groups can encrypt messages with complicated mathematical, computer-based technologies that stymie even the most experienced cryptologists. Under pressure from the U.S. software industry, the Clinton administration recently decided to allow the export of advanced encryption software, making life more difficult for the Federal Bureau of Investigation (FBI) and the National Security Agency (NSA, the United States' code-breaking organization). Similarly bowing to sales opportunities for their private firms, the European Union is expected to lift its barriers to the export of strong encryption software. Rest assured, however, that government spy masters will not respond by closing up shop, but by pouring more resources into the development of advanced intelligence collection, code-breaking, and counterdeception methods.

    Open Sources Provide Better Information Than Spies

    Increasingly, but not always. During the Cold War, about 85 percent of the information contained in espionage reports came from the public domain. Today, in light of the greater openness of governments around the world, that figure is more like 90 to 95 percent. Within this figure, though, are not just well-known newspapers and magazines but "gray" sources that are not secret but are nonetheless hard to find (for example, remarks by Libyan leader Col. Muammar el-Qaddafi at a political rally in Tripoli). The acquisition of such "open" information may require a covert agent in just the right place.

    Sometimes information that is openly available proves insufficient to answer an intelligence question. During its investigation into U.S. intelligence activities in 1995, the Aspin-Brown Commission (with members appointed by the president and Congress) explored the relative value of open and clandestine reporting by looking at both sources for a few days (August 3-7) with respect to events unfolding in Burundi. The commission asked the firm Open Source Solutions to explore the open side, drawing on the resources of such private information companies as Jane's Information Group, Lexis-Nexis, and Oxford Analytica. The open sources performed well, providing a brief, accurate history of the tribal conflict between the Hutu and Tutsi factions, and detailed order-of-battle statistics and descriptions of weapons in the Burundian inventory. However, contrary to some reports, the U.S. intelligence community shined as well. The CIA generated up-to-date information on the growing political polarization in the country a nd the high likelihood that violence would soon erupt. The CIA also presented comprehensive data on regional ethnic population patterns, illustrated with impressive four-color maps, along with facts on Burundi's acquisition of arms in the international marketplace (which led to U.S. diplomatic pressure to halt the shipments). The information provided by Jane's Information Group on the characteristics of weapons in Burundi proved richer than the CIA's profiles, but the CIA offered better insights into the evolving humanitarian crisis in Burundi, the attitudes of leaders in surrounding nations, and the need for the United States to begin preparing for the evacuation of U.S. and European nationals. The open and clandestine sources each revealed pieces of the Burundian jigsaw puzzle; when joined together, the picture became much clearer.

    Intelligence agencies perform especially well on topics that open reporting sources have trouble tracking, notably the precise whereabouts of foreign military forces, the activities of terrorist groups, the machinations of international criminals, and events and personalities in closed societies. Open reporting is often better for the long-term interpretation of political events. A leading newspaper, for example, may have a seasoned reporter assigned to a foreign capital for years, perhaps even decades, while intelligence officers typically undergo rapid turnover as they move from capital to capital during their careers.

    China and Japan are especially proficient at cultivating open sources of information; so are Israel, the Netherlands, Singapore, and Taiwan. And according to Robert D. Steele, the chief executive officer of Open Source Solutions, "the Nordics are sensational at open source exploitation." Sweden, for example, has pioneered new methods of coordinating open-source collection among all its government agencies and tapping the resources of the Internet. Many Western nations, though, underestimate the value of such sources. After all, an ordinary city map purchased at a Belgrade kiosk in 1999 could have saved the CIA from the embarrassing blunder of mistakenly targeting the Chinese embassy in Serbia. The U.S. National Foreign Intelligence Board found that U.S. intelligence agencies devote only 1 percent of their total budget to the aquisition of open source material, despite the importance of information from the public domain in the preparation of intelligence reports.

    Open sources, though, are no panacea. A 1996 CIA study of the Internet estimated, for example, that only 1 percent of the millions of Internet pages contained content useful for intelligence purposes. As Ray Cline, a former CIA deputy director of intelligence, once observed, "Espionage is now the guided search for the missing links of information that other sources do not reveal."

    The effective intelligence analyst starts trying to answer questions with an exhaustive examination of open sources-a much less expensive method of detection. Too often, however, analysts set aside open sources in favor of the more beguiling and abundant (if frequently less reliable) secret information that pours in from agents and spy machines-including, in the United States, some 400 photographs a day from surveillance satellites.

    Machines Provide Better Intelligence Than Humans

    Don't say goodbye to James Bond just yet. Technology is important, but agents have had their moments of glory, too. The United States' best agent during the Cold War, the Soviet military intelligence officer Col. Oleg Penkovsky, provided the CIA with information on the Kremlin's military policies and weapons, including drawings of missile sites inside Russia. In October 1962, this information allowed CIA imagery analysts to interpret telltale signs in U-2 photographs that revealed comparable sites being constructed in Cuba. Further, the CIA only initiated U-2 flights over Cuba in the first place because its agents reported unusual activity on the island, including the sighting of what appeared to be missile parts unloaded from Soviet ships. Of the 3,500 CIA-agent reports preceding the missile crisis, only eight yielded accurate information about the presence of missiles; nevertheless, those eight reports proved invaluable as triggers for the U-2 reconnaissance flights.

    But that was almost 40 years ago, before the age of advanced surveillance satellites and other major innovations in technical espionage. How useful are agents today? In those nations that can afford costly spy machines, funding for technical intelligence dwarfs that expended on agents (the spending ratio in the United States is roughly 7 to 1). But spy satellites are unable to see through roofs and into the inner councils of foreign governments where decisions are made. It takes a human agent for that.

    The need for reliable agents is continual. Although the attempted rescue of American hostages held in Tehran during the Carter administration failed, its planners had good reason to think it might succeed, in part because agents in Tehran had been able to provide information on exactly where each hostage was being held inside the U.S. embassy. During the United States' disastrous intervention in Somalia in 1993, the Pentagon learned that its powerful Black Hawk attack helicopters were worthless without spies on the ground who could point them toward the right targets in Mogadishu's twisting maze of dirt streets and alleyways. This year, U.N. blue helmet troops captured Sierra Leonean rebel leader Foday Sankoh, thanks to a tip from an indigenous agent reporting to U.S. forces among the peacekeepers. As transparent as machines have made some parts of the globe, much still remains opaque. In fact, nations like North Korea that pose the greatest threat to world peace are generally the least transparent.

    Spying and Democracy Are Fundamentally Incompatible

    On the contrary. Human rights activists and other champions of democracy have understandably balked at the excesses that have occasionally characterized intelligence activities, whether assassination plots, coups, bribery, the spreading of propaganda, or the lack of accountability. Yet during the Cold War, the Western intelligence services, working together, provided an indispensable early-warning system against threats to democracies from the Communist world. Intelligence services continue to provide this first line of defense, including efforts to uncover the use of chemical and biological warfare before the sarin gas, anthrax particles, or other horrendous substances are released among mass civilian populations.

    Spying has advanced other laudable goals, from battling international drug dealers to uncovering renegades who attempt to violate U.N. sanctions. During the recent Balkan wars, spy satellites spotted mass graves freshly dug near the villages of Pusto Selo and Izbica in Kosovo, allowing U.N. investigators to search for additional evidence of atrocities. U.S. secret agencies have been involved in environmental activities, including the use of satellite cameras to inspect crop blight as well as track the spillage of radioactive materials from submarine accidents and leaky nuclear storage sites. Intelligence agencies have been drawn into the task of global disease surveillance, too, both by doing long-range analyses and ferreting out facts beyond the ken of the Centers for Disease Control and the World Health Organization-as when the Chinese attempted in 1996 to cover up an AIDS-contaminated blood product (serum albumin) produced by a military-run factory.

    Spying, then, can be a vital support to democracy; but it can also have just the opposite effect if a regime fails to maintain a system of accountability over its secret agencies. Until recently, the intelligence services of every nation enjoyed immunity from close review by outside overseers: The philosophy was that, by necessity, secret agencies had to be divorced from society. While most intelligence services throughout the world continue to operate free from parliamentary supervision, in 1976 the United States adopted a system of legislative oversight for its intelligence activities- an approach stemming from revelations that U.S. intelligence agencies were spying on their own citizens and subsequent discoveries that the CIA had engaged in assassination plots overseas. A few other countries, most notably Canada and Australia, have also established serious parliamentary checks on intelligence activities. Ultimately, in a democracy, the viability of an effective secret service relies on public respect. Oversight by elected representatives provides an important link between the people and the hidden side of government and helps to guard against the misuse of secret power.

    Perhaps some day spying will be as outdated as dueling. But democracies will continue to tolerate espionage as an instrument to keep themselves informed about the intentions and capabilities of unpredictable nations with a penchant for international misbehavior: the North Koreas and Iraqs of the world. And even against fellow democracies, most citizens will accept spying as a necessary evil, for the simple reason that democracies still compete against one another for political and economic opportunities. A worthy goal for the future is to seek a reduction in harmful competition and spying between democracies, so they can direct their intelligence capabilities toward providing a common defense against the world's more troublesome regimes, along with the transnational threats of weapons, drugs, terrorism, crime, environmental pollution, and infectious diseases that continute to spread and endanger everyone.

    _____

    Loch K. Johnson is Regents professor of political science at the University of Georgia and author of Bombs, Bugs, Drugs and Thugs (New York: New York University Press, 2000).

    _____

    A flood tide of books and articles on intelligence has appeared over the past few years. A good place to begin is Intelligence: From Secrets to Policy (Washington: CQ Press, 2000), written by Mark Lowenthal, a former State Department intelligence official who also served as staff director of the Intelligence Committee in the U.S. House of Representatives. New and insightful, too, are more specialized studies by authors who have also worked inside the intelligence community: Bruce D. Berkowitz and Allen E. Goodman's Best Truth: Intelligence in the Information Age (New Haven: Yale University Press, 2000); Robert David Steele's On Intelligence (Oakton: OSS Academy, 2000); Arthur S. Hulnick's Fixing the Spy Machine (Westport: Praeger; 1999); and Gregory F. Treverton's Reshaping National Intelligence for an Age of Information (Cambridge: Cambridge University Press, 2000). For historical perspectives, see Rhodri Jeffreys-Jones's The CIA & American Democracy, 2nd ed. (New Haven: Yale University Press, 1996) and Loch K. Johnson's Secret Agencies (New Haven: Yale University Press, 1996).

    Michael Herman, a former British intelligence officer, has written a thorough study, Intelligence Power in Peace and War (Cambridge: Cambridge University Press, 1996), that looks at the state of espionage in a number of nations, with a special focus on Great Britain. A good general account of how various intelligence agencies have adapted to the post-Cold War world can be found in British journalist James Adams's The New Spies (London: Hutchison, 1994). For information on the KGB, see the memoir of its former chief of counterintelligence, Oleg Kalugin: The First Directorate (New York: St. Martin's, 1994).

    Those interested in technical intelligence should turn to William E. Burrows's Deep Black: Space Espionage and National Security (New York: Random House, 1986); and to two books by Jeffrey T. Richelson: America's Secret Eyes in Space: The U.S. KEYHOLE Spy Satellite Program (New York: Harper & Row, 1990) and America's Space Sentinels (Lawrence: University Press of Kansas, 1999).

    The premier scholarly quarterlies that cover intelligence are Intelligence and National Security and International Intelligence and Counterintelligence. The American Intelligence Journal, sponsored by the National Military Intelligence Association, presents up-to-date views by leading intelligence officials; and Studies in Intelligence, published in both classified and unclassified forms by the CIA's Center for the Study of Intelligence, offers mainly in-house studies. For useful reporting on international intelligence issues, readers can consult the monthly Jane's Intelligence Review.

    * For links to relevant Web sites, as well as a comprehensive index of related FOREIGN POLICY articles, access www.foreignpolicy.com.

    -- End --

    . http://cryptome.org/spy-state.htm

    -----------------------------

    Yakki Da

    Kent

    I need more BOE letters, KMs and other material. Those who can send it to me - please do! The new section will be interesting!!

    Daily News On The Watchtower and the Jehovah's Witnesses:
    http://watchtower.observer.org

  • Satanus
    Satanus

    For those interested in what some of the different security and spying bodies are called and what they do, there is a neat and safe for public consumption chart here: http://www.odci.gov/ic/icagen2.htm

    These are all supposed to have missed the 'taliban ball'.

    Their are many books written about the cia. Many of those writers are on govt payroll or pensions. For a heretical (apostate), though nevertheless eyewitness account of the developement of the cia and its methods, a complete book can be viwed or downloaded here: http://www.ratical.org/ratville/JFK/ST/

    The subject of the iridium satellites has already left the minds of most people. They were supposed to give instant telephone access to anywhere in the world. Whatever happened to them? The $5 billion system was purchaced by the US department of defense for $25 million. What do you think the dod is doing with them? I haven't checked for what the govt has adapted them.

    The US has a global electronic survillance system called echelon, to which canada, england, new zealand and probably australia are party. This is part of the system that is used to monitor all email, faxes, cellphone calls and any communication that is transmitted through the air to satelites or otherwise. Last year, enough evidence for it's existence surfaced that the european parliament voted to lodge a complaint with the parliaments conference of presidents.

    The real expert on middle eastern affaires is US 'ally', israels mossad. It is much more thourough than its US conterparts.

    While this only scrathes the surface of american govt intelligence, it should demonstrate the unbelievableness of the claim that the govt was taken by surprise by these horrible attacks.

    S

Share this

Google+
Pinterest
Reddit