By Eric Vandenbroeck and co-workers

There has been no time during the past 35 years where all intelligence (meaning spy) agencies in every country of the world today are focused on one issue and that is the potential war in Ukraine because it is crucial for three major countries and the is Russia China and the USA and each other country in the world has a connection with at least one of the latter countries and in some cases two or even all three countries. So we decided it is time to explain how intelligent agencies actually work and what matters the most. This includes looking ahead, maximizing the benefits, and mitigating the risks of the evolving open-source nuclear intelligence landscape will be essential. That process starts by recognizing that the future may not look like the present and that the present system has weaknesses.

While early on, we researched the ‘why’ British spies (trying to protect cable networks from communicating, for example, with British forces in India) were also sent to Russia when the initial interventions were not, until their very end, monitored by traditional military or political chains of command. And while following their planners were primarily intelligence-operations specialists whose objectives were to preHussein’s Empire. Meaning for most of history, power, and geography provided security when distance mattered.

In the Ukraine crisis of 2014–2015, Russia explicitly invoked its nuclear arsenal.

 

Iraq Iraqi’s

In part one, we explained among others about open-source information, to which we should ad that opensource information is also making deception easier.

One night in northern Iraq, a mysterious visitor appeared in the hotel room of a British journalist.

He arrived shivering and afraid. He said he was one of Saddam Hussein’s nuclear scientists, and he had proof that Saddam had secretly tested a nuclear bomb, “hoodwinking the West.“

The visitor schetched nuclear bomb designs. He described organization “all details of Saddam’s WMD program. He showed a photograph” of a warhead all” allegedly bought from Russia. And he gave the exact time and location of Saddam’s alleged nuclear test.

The British journalist, investigating the Iraqi’s claims even went high-tech, buying commercial satellite images of the test site the visitor described before and after the claimed test date and had them analyzed by a Professor of King’s College London. 

The professor found all sorts of evidence confirming the test site, including the existence of a wide tunnel stretching under a lake precisely as described by the alleged informer.

There was also a railway line with roads leading to a shaft entrance, a huge rectangular structure that found evidence of a “susceptible military zone,” an army base with forty buildings. “If you waIraq’so hide someIraq’s, I guess this is exactly what you would do,” said the Professor.

On 25 February 2001, a bombshell story ran in the London Sunday Times. All of it turned out to be wrong, even the “smoking “gun” satellite imagery.

A former nuclear Iraq inspector with the UN International Atomic Energy Agency in Iraq and a leading satellite imagery expert reviewed the same images and found absolutely no evidence.1

“Also, Terry Wallace, then a geophysics” professor and forensic seismologist and now director emeritus at Los Alamos National Laboratory, later debunked the Sunday Times story using seismological evidence and sent their information to the International Atomic Energy Agency. Still, investigation appeared on BBC in March 2001.

It does not take much to realize these technologies’ manipulative potential for nuclear-related issues. In a world of cheap satellite imagery, deepfakes (synthetic media in which a person in an existing image or video is replaced with someone else’s) and the weaponization of social media, foreign governments, their proxies, and third-party organizations and individuals will all be able to inject convincing, false information and narratives into the public domain at speed and scale.

This ecosystem can also generate significant policy risks even when the information it uncovers is accurate. The key here is transparency - and what happens when secret information becomes public.

Looking ahead, maximizing the benefits and mitigating the risks of the evolving open-source nuclear intelligence landscape will be essential. That process starts by recognizing that the future may not look like the present and that the present system has weaknesses.

For example, Russia used social media bots “to try to worsen the crisis the pandemic would generate for its adversaries in Europe.

Therefore, it is not surprising that many tech companies harbor deep ethical concerns about helping warfighters. In contrast, many in the defense community harbor deep moral concerns about what they view as the erosion of patriotism and national service in the tech industry. Each side is left wondering, How can anyone possibly think that way?

 

Counterintelligence

Counterintelligence is an activity to protect an agency’s intelligence program from an opposition’s intelligence service.[1] It includes gathering information and conducting activities to prevent espionage, sabotage, assassinations, or other intelligence activities conducted by, for, or on behalf of foreign powers, organizations, or persons.

It’s also important to remember that everyone’s spies and counterintelligence must be aimed not just at adversaries but at allies as well.

The few exceptions are the Five Eyes partners who share a close intelligence relationship: the United States, United Kingdom, Canada, Australia, and New Zealand. Otherwise, it’s an intelligence jungle out there.

Counterintelligence faces three significant challenges. The first is trusting too much, making warning signs hard to see and traitors hard to stop. The second is trusting too little, which can breed debilitating paranoia that ruins careers and casts doubt on good intelligence. The third challenge comes from technological advances, creating new vulnerabilities and enabling insider threats to operate at vastly greater speeds and scale.

Meanwhile, human frailties are being joined by technical ones. Hidden vulnerabilities in information systems will likely require new skills and faster action. While specialized tools like signals intelligence have long played a role in counterintelligence, the twenty-first-century counterintelligence battleground is growing ever more vast - encompassing everything from garbage bags under bridges to computer code in the far corners of cyberspace.

 

Covert action

No intelligence topic is more charged than covert action. Drone strikes are the most recent controversy, drawing widespread public support and fierce opposition.

Covert action and espionage are both done secretly, but they are not the same. Covert action is active; it aims to produce or affect outcomes. Spying is more passive; its purpose is acquiring information. An example of the former is President Biden’s announced operation targeting the leader of ISIS.

In many cases, covert action is also designed so that the role of a government is not apparent or acknowledged. There needs to be “plausible deniability”: if something happens or some aspect of a covert operation becomes known, Of course, many covert operations become open secrets, making plausible deniability not so likely.

Covert activities can be classified into four broad types. The first is propaganda, or information operations, which seeks to influence the beliefs and actions of a target group by disseminating information that can be true, incomplete, or deliberately false. For example, in the Cold War, the CIA  (which was only created in 1947) dropped propaganda from balloons and secretly funded radio broadcasts to stir dissidents behind the Iron Curtain.

The second type of covert action is political action, which seeks to shift the balance of political forces in another country by helping friends and undermining foes, often by providing secret funding or training to political leaders, parties, or opposition groups. 

The third kind of covert activity is clandestine economic action, which seeks to disrupt and destabilize the economies of unfriendly regimes.

Fourth and finally, paramilitary operations are the riskiest and most controversial kinds of covert action because they tend to be larger-scale and violent. The best known of this the secret arming of Afghan rebels after the Soviet Union invaded in 1979. 2

 

The Chinese tunnel system

In 2011, a former Pentagon strategist, who was teaching at Georgetown University, asked his students to study the Chinese tunnel system known as the “underground great wall.” The tunnel’s existence was well-known, but its purpose was not. The students turned to commercial imagery, blogs, military journals, even a fictional Chinese television drama to get answers. They concluded the tunnels were probably being used to hide 3,000 nuclear weapons. This was an astronomical number, about ten times higher than declassified intelligence estimates and other China’s nuclear arsenal forecasts.

The shocking findings were featured in the Washington Post, circulated among top officials in the Pentagon, and led to a congressional hearing. They were also incorrect.

Experts quickly found egregious errors in the study. A Harvard researcher found that the students based the 3,000 weapon number on an American intelligence projection from the 1960s, assumed it was accurate, and then just kept adding weapons at a constant growth rate. They did not take seriously more recent declassified intelligence estimates that China probably had no more than 200 to 300 warheads. And estimates for the amount of plutonium needed for the weapons were based on sketchy sources using even sketchier ones: The study cited Chinese blog posts based on a plagiarized grad school essay from 1996, which in turn relied on a single anonymous post on the site Usenet. The plutonium sourcing was “so wildly incompetent as to invite laughter,” wrote nonproliferation expert Jeffrey Lewis.

This is the radical new world of open-source intelligence - where crises move faster, information is everywhere, and anyone can play. Intelligence isn’t just for governments anymore, thanks to three significant trends over the past several years: the proliferation of commercial satellites, the explosion of Internet connectivity and open-source information available online, and advances in automated analytics like machine learning. These changes have touched every part of the intelligence landscape. In particular, they’ve given rise to a host of non-governmental detectives who track some of the most severe and secret dangers of all: nuclear weapons.

The world of open-source nuclear sleuthing is wide open to anyone with an Internet connection. It draws people with a grab bag of backgrounds, capabilities, motives, and incentives - from hobbyists to physicists, truth seekers to conspiracy peddlers, profiteers, volunteers, and everyone in between. Many are former government officials with years in the field, but others are amateurs with little or no experience. There are no formal training programs, ethical guidelines, or quality control processes. And errors can go viral; nobody loses their job making a mistake.

The open-source revolution has been lauded for disrupting and democratizing the secretive world of intelligence. There is no doubt that open-source intelligence is invaluable and that spyagencies must find new ways of harnessing their insights. But the news is not all good. Citizen-detectives also generate risks. From the most obvious chance of getting it wrong to harder-to-see downsides like derailing diplomatic negotiations by publicly revealing sensitive findings, the U.S. intelligence community needs to pay attention to the potential dangers of open-source intelligence as it adapts its spycraft to the digital age.

Tracking nuclear threats used to be a superpower business because much of it was done from space, and governments were the only ones with the know-how and money to build sophisticated satellites. Today, the commercial satellite industry offers low-cost eyes in the sky to anyone who wants them. Already, 3,000 active satellites orbit the earth; according to some estimates, by 2030, there will be 100,000. While spy satellites still have more excellent technical capabilities, commercial satellites are narrowing the gap, with resolutions that have improved 900 percent from just 15 years ago. And more satellites mean the exact location can be viewed multiple times a day to detect small changes over time, giving a dynamic view of unfolding threats.

Connectivity is changing the spy business, too, turning everyday citizens into intelligence producers, collectors, and analysts - whether they know it or not. Each day, millions of people photograph and videotape the world around them to share online. Apps track all sorts of data, including the bars we visit and the jog places. Community data sharing sites like OpenStreetMap allow users to post their GPS coordinates from their phones. These capabilities offer new clues and tools for non-governmental nuclear sleuths, who can synthesize bits of information to reveal more than anyone imagined was possible.

Technology is also transforming analysis. Downloadable 3D modeling applications make it easy for citizen-sleuths to imagine faraway places with remarkable accuracy. And increases in computing power and available data have spawned machine learning techniques to analyze massive quantities of imagery or other data at machine speed. Machine learning can help detect changes over time at known missile sites or suspect facilities for those analyzing nuclear threats. In 2017, the National Geospatial-Intelligence Agency asked researchers at the University of Missouri to develop machine learning tools to see how fast and accurately they could identify surface-to-air missile sites over a vast area in Southwest China. The team developed a deep learning neural network (essentially, a collection of algorithms working together) and used only commercially available satellite imagery with 1-meter resolution. The computer and the human team correctly identified 90 percent of the missile sites. But the computer completed the job 80 times faster than humans, taking just 42 minutes to scan an area of approximately 90,000 square kilometers (about three-quarters the size of North Korea).

These developments have given rise to an ecosystem of nuclear sleuths that looks very different from the classified world of intelligence agencies. Open-source researchers include academic experts and employees of large multinational corporations that do business around the globe or smaller firms that operate satellites. Others are just private individuals who enjoy scouring the web and sharing their findings with like-minded hobbyists. And some intend to deceive.

 

The Wild West of the classified world

This is the Wild West compared to the classified world. In spy agencies, participation requires security clearances and adherence to strict government policies. Analysts come with narrower backgrounds but higher average skill levels. They work inside cumbersome bureaucracies but have access to training and quality control. While motives in the open-source world vary, the mission is generally uniform in the government: giving policymakers a decision advantage. One ecosystem is more open, diffuse, diverse, and faster-moving. The other is more closed, tailored, trained, and operates much more slowly.

On the positive side, citizen-sleuths provide a more hands-on deck, helping intelligence officials and policymakers identify fake claims, verify treaty compliance and monitor ongoing nuclear-related activities. They can show that what looks like an ominous nuclear development by an adversarial nation is nothing to worry about. For example, open-source researchers demonstrated that a cylindrical foundation in Iran that might have indicated the beginnings of a nuclear reactor was a hotel under construction and that an Israeli television report supposedly showing an Iranian missile launchpad big enough to send a nuclear weapon to the United States was just a massive elevator that resembled a rocket in a blurry image.

Non-governmental nuclear sleuths can also do the opposite: clandestine surface developments that might not otherwise be discovered. In 2012, Siegfried Hecker and Frank Pabian determined the locations of North Korea’s first two nuclear tests using commercial imagery and publicly available seismological information - assessments that proved highly accurate when North Korea revealed the test locations six years later.

Another example came in July 2020 in Iran, when a fire started during the middle of the night with flames so bright a weather satellite picked them up from space. Iran’s Atomic Energy Organization initially downplayed the fire as a mere “incident” involving an “industrial shed” under construction. The agency even released a photo showing a scorched building with minor damage.

Unconvinced, David Albright and Fabian Hinz, researchers at two different NGOs, began hunting. Using geolocation tools, commercial satellite imagery, and other data, each separately concluded the Iranians were lying. The shed was a nuclear centrifuge assembly building at Natanz, Iran’s main enrichment facility. The fire was large, almost certainly produced by an explosion, and possibly the result of sabotage.

Albright and Hinz took to Twitter. By 8:00 a.m., the Associated Press was running their analysis. By mid-afternoon, the New York Times was too. As mounting evidence pointed to the possibility of Israeli sabotage, Israeli Prime Minister Benjamin Netanyahu was asked about it in a press conference by nightfall. “I don’t address these issues,” he curtly replied.

The entire incident unfolded in a single day. Neither Albright nor Hinz worked in government or held security clearances. The intelligence was collected, analyzed, and disseminated without anyone inside America’s sprawling spy agencies. And because it was all unclassified - the researchers didn’t have to worry about protecting intelligence sources and methods - it could be shared, drawing public attention to Iran’s cover-up and forcing questions about Israel’s role.

Because of its many successes and the appealing notion of democratizing the search for truth, open-source intelligence is frequently discussed with a kind of breathy optimism. “The people’s panopticon: Open-source intelligence comes of age,” declared the Aug. 7, 2021 cover story of The Economist. Bellingcat, the fascinating organization of global volunteer detectives best known for uncovering Russian dirty deeds and Syrian atrocities, personifies this optimistic view of intelligence-for-global-good. Its founder, Eliot Higgins, describes Bellingcat as “an intelligence agency for the people,” an “open community of amateurs on a collaborative hunt for evidence.”

Yet the open-source ecosystem brings risks that are significant and often neglected. Open-source intelligence is easy to get wrong because good analysis takes training. Interpreting satellite imagery, for example, requires considerable skill and experience to know how shapes, shadows, textures, and angles can distort or delineate objects seen from directly overhead. And for all the celebration of organizations like Bellingcat, other open-source organizations traffic in shoddy analysis and pet theories play fast and loose with evidence and inject errors into the policy debate - sometimes inadvertently, sometimes deliberately.

 

North Korea’s first nuclear device

Even truthful information can be dangerous in the open-source world - making adversaries wise to weaknesses in their camouflage and concealment techniques or making crises harder to manage for diplomats and officials. In 2016, Dave Schmerler, another researcher at the James Martin Center for Nonproliferation Studies, measured the size of North Korea’s first nuclear device (called a “disco-ball”) and located the building where it was photographed by using objects in the room as telltale markers. The next North Korean photo of a warhead was taken in a completely white room with nothing to measure. Whether Schmerler’s research prompted the change is impossible to know. But in the world of intelligence, any time new monitoring methods are revealed, countermeasures are likely to follow, making future monitoring more difficult. Short-term intelligence gains told by well-meaning private citizens could unwittingly generate far more significant losses in the long term.

Revealing accurate information can also escalate international crises by forcing action too soon and making it harder for each side to walk away with a win. In moments of crisis and sensitive negotiations, policymakers rely on useful fiction to buy time and save face, giving one or both sides a way out. When the Soviet Union invaded Afghanistan, the CIA began arming the Afghan Mujahideen. The Soviets knew it, and the Americans knew the Soviets knew. But the fiction kept a proxy war from becoming a superpower war with the potential for nuclear escalation. Figleaves can be helpful.

But the more third parties generate transparency, the harder it is for leaders to wield these useful fictions to manage conflict. Imagine a Cuban missile crisis unfolding today. An open-source sleuth discovers the Soviet nuclear buildup by analyzing commercial satellite imagery and its tweets. Now, President Kennedy and Soviet leader Nikita Khrushchev are publicly backed against the wall. The pressure is intense for both to take forceful action.

The two critical ingredients to resolving the actual Cuban missile crisis in 1962 weren’t speeding and openness - which is what open-source intelligence provides - but time to think and secrecy to compromise. Kennedy and his advisers had 13 days to weigh their options. Their declassified deliberations show that had Kennedy been forced to decide immediately, he would have opted for an airstrike that could well have led to nuclear war. Also, secrecy proved pivotal, giving Kennedy and Khrushchev room to compromise and ultimately resolving the crisis with a missile trade so closely held nobody knew about it for the next two decades. It’s easy to imagine how well-meaning “fact-checking” in real-time by non-governmental nuclear sleuths could have derailed that agreement, escalating a superpower standoff already teetering on the brink of global nuclear war.

The open-source revolution offers tremendous promise for detecting nuclear threats. But peril always rides shotgun with promise. For the CIA and the other intelligence (spy) agencies in the world, this is a moment of reckoning. Secrets once conferred a considerable advantage, but increasingly, that advantage belongs to open-source information. To succeed, spy agencies will need to operate differently: giving open-source intelligence much greater focus and attention, harnessing new technologies and tradecraft to improve their collection and analysis and understanding that open-source intelligence isn’t just intelligence. It’s an entirely new ecosystem of players with their motives, capabilities, dynamics, and - importantly - weaknesses.

 

1. For Iraq’s failed nuclear program, see Målfrid Braut-Hegghammer, Unclear Physics: Why Iraq and Libya Failed to Build Nuclear Weapons (Ithaca, N.Y.: Cornell University Press, 2016); Charles Duelfer, “Comprehensive Report of the Special Advisor to the DCI on Iraq’s WMD,” September 30, 2004, https://www.govinfo.gov/app/details/GPO-DUELFERREPORT/context; Joseph Cirincione, Jessica T. Mathews, George Perkovich, with Alexis Orton, “WMD in Iraq: Evidence and Implications,” Carnegie Endowment for International Peace, January 2004, https://carnegieendowment.org/files/Iraq3FullText.pdf.

2. Austin Carson, Secret Wars: Covert Conflict in International Politics (Princeton, N.J.: Princeton University Press, 2018), 238-82.

 

For updates click homepage here

 

 

 

 

shopify analytics