Intelligence: Another Reason Why al Qaeda Loves the New York Times

Archives

October 22, 2006: One of the reasons many are angered about things like leaks of details about the NSA's Terrorist Surveillance Program, is the fact that such leaks could warn al Qaeda of these efforts. That seems to have happened with the news of a manual that references a number of NSA projects - including ECHELON.

In the past, other leaks that could have aided terrorists have occurred as well. One of these was the interrogation log for Mohammed al Khatani, who was believed to have been slated to be the 20th hijacker. By publishing the log, Time Magazine gave al Qaeda an idea of what might be done. Other leaks have exposed the existence of CIA programs to keep senior al Qaeda personnel on ice to avoid giving the organization an idea of what the United States might know and on efforts to monitor financial transactions. These programs have helped break up attacks, including the plot to blow up airliners over the Atlantic this past August.

Surveillance of communications is often used as a means of gathering. How this is done is not talked about often. This is because the information that is acquired is often very good. Surveillance of enemy communications was one of the biggest factors in the American victory at Midway in 1942, and many other operations since. In 1943 Ten months later, a similar surveillance led to the mission in which Tom Lanphier shot down the plane carrying Isoroku Yamamoto. Communications intelligence also played a major part in defeating the U-boats in the Atlantic as well.

A lot of the methods used to gather intelligence in World War II (particularly codebreaking) were kept classified for decades after the Japanese surrender ended the war in 1945. Similarly, the Venona project stayed secret in the 1950s, even when information from that project could have defused controversies over the prosecution of the Rosenbergs or Alger Hiss.

In the war on terror, this is equally important. Not just for breaking up attacks, but also for mapping out the networks through a process known as traffic analysis. This can be done with just phone records (the leak of the NSA's request to various phone companies managed to tell terrorist which companies cooperated, and who company didn't). This is vital in terms of building an organizational chart of any enemy capabilities, but only if the enemy doesn't think that others are listening.

The al Qaeda manual that was reported on, though, indicates that al Qaeda is aware that intelligence agencies are listening. As a result, locating new cells will be much more difficult, making a future attack more likely to succeed. - Harold C. Hutchison (haroldc.hutchison@gmail.com)

 


Article Archive

Intelligence: Current 2022 2021 2020 2019 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 2004 2003 2002 2001 2000 1999 


X

ad
0
20

Help Keep Us Soaring

We need your help! Our subscription base has slowly been dwindling. We need your help in reversing that trend. We would like to add 20 new subscribers this month.

Each month we count on your subscriptions or contributions. You can support us in the following ways:

  1. Make sure you spread the word about us. Two ways to do that are to like us on Facebook and follow us on Twitter.
  2. Subscribe to our daily newsletter. We’ll send the news to your email box, and you don’t have to come to the site unless you want to read columns or see photos.
  3. You can contribute to the health of StrategyPage. A contribution is not a donation that you can deduct at tax time, but a form of crowdfunding. We store none of your information when you contribute..
Subscribe   Contribute   Close