Skip to main content Accessibility help
×
Hostname: page-component-7479d7b7d-8zxtt Total loading time: 0 Render date: 2024-07-15T21:37:25.291Z Has data issue: false hasContentIssue false

7 - Technical Collection in the Post–September 11 World

from PART 2 - RESEARCH ON NEW CHALLENGES, METHODS, AND THREATS

Published online by Cambridge University Press:  05 June 2012

Jeffrey T. Richelson
Affiliation:
National Security Archive
Gregory F. Treverton
Affiliation:
RAND Corporation, California
Wilhelm Agrell
Affiliation:
Lunds Universitet, Sweden
Get access

Summary

A quarter-century ago, Wilhelm Agrell reflected on the impact of technical collection – which initially consisted of overhead photographic reconnaissance and communications intelligence (COMINT) – on national intelligence. On the positive side, it made it possible for the most advanced countries to get “an almost complete picture of the strength, deployment, and activity of foreign military forces.” The negative, for Agrell, was an overemphasis on what could be counted. Intelligence became “concentrated on evaluation and comparison of military strength based exclusively on numerical factors.”

Yet, since the fall of communism and since 11 September 2001, research has not really asked similar questions about the impact of technical collection. To be sure, the highly classified nature of some collection makes it difficult for outsiders to judge the effects on policy outcomes. It is possible, however, to come to the kind of judgments Agrell rendered about the impact of technical collection on the practice of intelligence. So far, however, more serious research has not moved much beyond the post–September 11 conventional wisdom that the change in intelligence's target renders technical collection less effective. Terrorists, it is thought, are small and fleet – networked enough not to depend on large fixed facilities that can be monitored from space and nimble enough to shift to forms of communication, such as couriers, that cannot be intercepted by satellite systems.

This chapter assesses research on technical collection, looking across the various “INTs” and, in particular, probing that conventional wisdom.

Type
Chapter
Information
National Intelligence Systems
Current Research and Future Prospects
, pp. 147 - 176
Publisher: Cambridge University Press
Print publication year: 2009

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Wilhelm Agrell, , “Beyond Cloak and Dagger,” in Agrell, Wilhelm and Huldt, Bo (eds.), Clio Goes Spying: Eight Essays on the History of Intelligence (Lund: Lund Studies in International History 17, 1983), pp. 184–5Google Scholar
Turner, Stansfield, Secrecy and Democracy: The CIA in Transition (Boston: Houghton Mifflin, 1985), p. 207Google Scholar
Richelson, Jeffrey T., The U.S. Intelligence Community (Boulder, CO: Westview, 1999), pp. 170–3, 193Google Scholar
Richelson, Jeffrey T., America's Space Sentinels: DSP Satellites and National Security (Lawrence, KS: University Press of Kansas, 1999), pp. 189–91Google Scholar
Diamond, John M., “Re-examining Problems and Prospects in U.S. Imagery Intelligence,” International Journal of Intelligence and Counterintelligence, 14, 1 (Spring 2001), 1–24CrossRefGoogle Scholar
Keefe, Patrick Radden, “A Shortsighted Eye in the Sky,” The New York Times, February 5, 2005, p. A17Google Scholar
Zegart, Amy, “September 11 and the Adaptation Failure of U.S. Intelligence Agencies,” International Security, 29, 4 (Spring 2005), pp. 78–111 at p. 107CrossRefGoogle Scholar
Gup, Ted, “Clueless in Langley,” Mother Jones, January/February 2002, pp. 33–7Google Scholar
Drogin, Bob and Daragahi, Borzou, “Arabs Make Plans for a Future with Nuclear Power,” Los Angeles Times, May 26, 2007, pp. A1, A6–A7Google Scholar
Corera, Gordon, Shopping for Bombs: Nuclear Proliferation, Global Insecurity, and the Rise and Fall of the A. Q. Khan Network (New York: Oxford, 2006), p. 235Google Scholar
Gertz, Bill and Scarborough, Rowan, “Inside the Ring,” Washington Times, May 10, 2002, p. A10Google Scholar
Gertz, Bill, “Iraqis ‘Moving Stuff’ at Germ Plant,” Washington Times, August 14, 2002, pp. A1, A18Google Scholar
Sanger, David E. and Schmitt, Eric, “Satellites Said to See Activity at North Korean Nuclear Site,” The New York Times, January 31, 2003, pp. A1, A10Google Scholar
Sanger, David E. and Broad, William J., “U.S. Cites Signs of Korean Steps to Nuclear Test,” The New York Times, May 6, 2005, pp. A1, A6Google Scholar
Richelson, Jeffrey T., The U.S. Intelligence Community, fifth edition (Boulder, CO: Westview, 2007), pp. 177–81Google Scholar
Selding, Peter B., “European Space-Based Reconnaissance Takes Off,” Space News, June 11, 2007, p. 13Google Scholar
Fulghum, David A., “Global Hawk UAVs to Remain Unarmed,” Aviation Week & Space Technology, April 15, 2002, pp. 20–1Google Scholar
Robertson, Scott, “Collaboration Is Cornerstone of UFAC,” Pathfinder, May/June 2007, pp. 21–2Google Scholar
Richelson, Jeffrey T., Spying on the Bomb: American Nuclear Intelligence from Nazi Germany to North Korea and Iran (New York: W. W. Norton, 2006), pp. 427–35Google Scholar
Turner, Stansfield, “Intelligence for a New World Order,” Foreign Affairs, Fall 1991, pp. 153–66Google Scholar
Meyer, Josh, “CIA Expands Use of Drones in Terror War,” Los Angeles Times, January 29, 2006, pp. A1, A28–A29Google Scholar
Richelson, Jeffrey T., The Wizards of Langley: Inside the CIA's Directorate of Science and Technology (Boulder, CO: Westview, 2001), p. 148Google Scholar
Bin, Li, “Tracking Chinese Strategic Mobile Missiles,” Science and Global Security, 15, 1 (January–April) 2007, pp. 1–30CrossRefGoogle Scholar
Day, Dwayne, “Early American Ferret and Radar Satellites,” Spaceflight, 43, July 2001, pp. 288–93Google Scholar
Pike, Christopher Anson, “CANYON, RHYOLITE, and AQUACADE: U.S. Signals Intelligence Satellites in the 1970s,” Spaceflight, 37, 11, November 1995, pp. 381–3Google Scholar
Richelson, Jeffrey T., The U.S. Intelligence Community, fifth edition (Boulder, CO: Westview, 2007), pp. 219–20Google Scholar
Richelson, Jeffrey T., “Desperately Seeking Signals,” Bulletin of the Atomic Scientists, March/April 2000, pp. 47–51CrossRefGoogle Scholar
Wilson, George C., “Soviet Nuclear Sub Reported Sunk,” Washington Post, August 11, 1983, p. A9Google Scholar
Ottaway, David B., “Iraq Said to Have Expelled High-Level U.S. Diplomat,” Washington Post, November 17, 1988, p. A-33Google Scholar
Church, George J., “Destination Haiti,” Time, September 26, 1994, pp. 21–6Google Scholar
Andrew, Christopher, For the President's Eyes Only: Secret Intelligence and the American Presidency from Washington to Bush (New York: HarperCollins, 1995), p. 520Google Scholar
Johnston, David, “U.S. Agency Secretly Monitored Chinese in ‘96 on Political Gifts,” The New York Times, March 13, 1997, pp. A1, A25Google Scholar
Boustany, Nora and Duffy, Brian, “A Top U.S. Official May Have Given Sensitive Data to Israel,” Washington Post, May 7, 1997, pp. A1, A28Google Scholar
Watson, Russell and Barry, John, “Our Target Was Terror,” Newsweek, August 31, 1998, pp. 24–9Google Scholar
Aid, Matthew M., “The Time of Troubles: The U.S. National Security Agency in the Twenty-First Century,” Intelligence and National Security, 15, 3 (Autumn 2000), pp. 1–2CrossRefGoogle Scholar
Aid, Matthew M., “All Glory Is Fleeting: SIGINT and the Fight Against International Terrorism,” Intelligence and National Security, 18, 4 (Winter 2003), pp. 72–120CrossRefGoogle Scholar
Aid, Matthew M., “All Glory Is Fleeting: SIGINT and the Fight against International Terrorism,” Intelligence and National Security, 18, 4 (Winter 2003), pp. 72–120CrossRefGoogle Scholar
Treverton, Gregory F., “Intelligence Crisis,” Government Executive, November 1, 2001Google Scholar
Ritter, Scott, Iraq Confidential: The Untold Story of the Intelligence Conspiracy to Undermine the UN and Overthrow Saddam Hussein (New York: Nation Books, 2005), p. 135Google Scholar
Richelson, Jeffrey T., The Wizards of Langley: Inside the CIA's Directorate of Science and Technology (Boulder, CO: Westview, 2001), p. 93Google Scholar
Aid, Matthew M., “All Glory Is Fleeting: SIGINT and the Fight against International Terrorism,” Intelligence and National Security, 18, 4 (Winter 2003), pp. 72–120 at p. 90CrossRefGoogle Scholar
Gellman, Barton, “Broad Effort Launched After ‘98 Attacks,” Washington Post, December 19, 2001, pp. A1, A26Google Scholar
Smith, Michael, The Killer Elite: The Inside Story of America's Most Secret Special Operations Team (London: Weidenfield and Nicolson, 2006)Google Scholar
Sibbet, Daniel B., “MASINT: Intelligence for the 1990s,” American Intelligence Journal (Summer/Fall 1990), pp. 23–6Google Scholar
Morris, John, “The Nature and Applications of Measurement and Signature Intelligence,” American Intelligence Journal, Winter 1999–2000, pp. 81–4Google Scholar
Macartney, John, “John, How Should We Explain MASINT,” Intelligencer, Summer 2001, pp. 28–34Google Scholar
Richelson, Jeffrey T., “MASINT: The New Kid in Town,” International Journal of Intelligence and Counterintelligence, 14, 2 (Summer 2001), pp. 149–92CrossRefGoogle Scholar
Hawley, Chadwick T., “MASINT: Supporting the Warfighter Today and Tomorrow!,” Communiqué, May 1996, p. 14Google Scholar
Richelson, Jeffrey T., Spying on the Bomb: American Nuclear Intelligence from Nazi Germany to Iran and North Korea (New York: W. W. Norton, 2007), p. 560Google Scholar
Madrell, Paul, Spying on Science: Western Intelligence in Divided Germany 1945–1961 (London: Oxford University Press, 2006), p. 152CrossRefGoogle Scholar
Earley, Pete, Confessions of a Spy: The Real Story of Aldrich Ames (New York: Putnam, 1997), pp. 19, 117, 197Google Scholar
Bridis, Ted, “The CIA Dept. of Quirky Tricks,” Washington Post, December 31, 2003, p. A17Google Scholar
Brusnitsin, Lt. Gen. Nikolai, Openness and Espionage (Moscow, 1990), p. 15Google Scholar
Starr, Barbara, “Super Sensors Will Eye the New Proliferation Frontier,” Jane's Defence Weekly, June 4, 1994, p. 19Google Scholar
Loeb, Vernon, “Drug Plant Attack on Target, Says CIA Chief,” Washington Post, October 21, 1999, p. A27Google Scholar
Benjamin, Daniel and Simon, Steven, The Age of Sacred Terror (New York: Random House, 2002), pp. 259, 355–6Google Scholar
Lowenhaupt, Henry S., “Mission to Birch Woods,” Studies in Intelligence, 12, 4 (Fall 1968), pp. 1–12Google Scholar
Kessler, Glenn, “N. Korea Nuclear Estimate to Rise,” Washington Post, April 28, 2004, pp. A1, A16Google Scholar
Bernstein, Adam, West, Todd, and Gupta, Vipin, “An Assessment of Antineutrino Detection as a Tool for Monitoring Nuclear Explosions,” Science and Global Security, 9, 3 (2001), pp. 235–55CrossRefGoogle Scholar
Habib, B., “Estimation of the Electromagnetic Radiation Emitted from a Small Centrifuge Plant,” Science and Global Security, 15, 1 (2007), pp. 31–48CrossRefGoogle Scholar
Risen, James and Lichtblau, Eric, “Bush Lets U.S. Spy on Callers without Courts,” The New York Times, December 16, 2005, p. 1Google Scholar
Lichtblau, Eric, Bush's Law: The Remaking of American Justice (New York: Pantheon, 2008), pp. 223–4Google Scholar
Bergman, Lowell, Lichtblau, Eric, Shane, Scott, and Natta, Don, “Spy Agency Data after Sept. 11 Led F.B.I. to Dead Ends,” The New York Times, January 17, 2006, pp. A1, A12Google Scholar
Yoo, John, War by Other Means: An Insider's Account of the War on Terror (New York: Atlantic Monthly Press, 2006), p. 85Google Scholar
Hardin, David, “The Fuss over Two Small Words: The Unconstitutionality of the USA PATRIOT Act Amendments to FISA under the Fourth Amendment,” George Washington Law Review, 71, 2 (April 2003), pp. 291–345Google Scholar
Broglio, Nola K., “Leaving FISA Behind: The Need to Return to Warrantless Foreign Intelligence Surveillance,” Yale Law Journal, 113, 1 (October 2003), pp. 179–217 at pp. 179–81CrossRefGoogle Scholar
Sims, John Cary, “What NSA Is Doing.…and Why It's Illegal,” Hastings Constitutional Law Quarterly, 33, 2 & 3 (Winter–Spring) 2006, pp. 101–36Google Scholar
Block, Robert, “U.S. to Expand Domestic Use of Spy Satellites,” Wall Street Journal, August 15, 2007, pp. A1, A9Google Scholar
Hsu, Spencer S., “Administration Set to Use New Spy Program in U.S.,” Washington Post, April 12, 2008, p. A3Google Scholar
Korody, Patrick, “Satellite Surveillance within U.S. Borders,” Ohio State Law Journal, 65, 4 (2004), pp. 1627–62Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×