A Most Unusual Collection Agency
February 24 - March 2, 1999
jason vest and wayne madsen How the U.S. undid UNSCOM through its empire of electronic ears
When Saddam Hussein raised the possibility of attacking U.S. planes in Turkey last week, his threats illustrated what many in diplomatic circles regard as an international disgrace— the emasculation of the UN by the U.S.
When UNSCOM, the UN's arms-inspection group for Iraq, was created in 1991, it drew on personnel who, despite their respective nationalities, would serve the UN. Whatever success UNSCOM achieved, however, was in spite of its multinational makeup. While a devoted group of UN staffers managed to set up an independent unit aimed at finding Saddam's weapons and ways of concealing them, other countries seeking to do business with sanctions-impaired Iraq— notably France and Russia— used inspectors as spies for their own ends.
But what ultimately killed UNSCOM were revelations that the U.S. government had manipulated it by assuming control of its intelligence apparatus last spring (or perhaps even earlier by using the group to slip spies into Iraq) not so much to aid UNSCOM's mission, but to get information for use in future aerial bombardments. When stories to this effect broke last month, however, there was almost no consistency in descriptions of the agencies involved or techniques used. The New York Times, for example, said only one CIA spy had been sent into Baghdad last March to set up an automated eavesdropping device. Time had multiple Defense Intelligence Agency (DIA) operatives planting bugs around Baghdad throughout 1998. The Wall Street Journal referred to the use of one "device" from the National Security Agency (NSA) last year and "a series of espionage operations used by the U.S. [since] 1996 to monitor the communications" of Saddam and his elite.
When probing the world of espionage, rarely does a clear picture emerge. But according to a handful of published sources, as well as assessments by independent experts and interviews with current and former intelligence officers, the U.S. government's prime mover in Iraqi electronic surveillance was most likely a super-secret organization run jointly by the the CIA and the NSA— the spy agency charged with gathering signals intelligence (known as SIGINT)— called the Special Collection Service. Further, there is evidence to suggest that the Baghdad operation was an example of the deployment of a highly classified, multinational SIGINT agreement— one that may have used Australians to help the U.S. listen in— months after the CIA failed to realize the U.S. objective of overthrowing Saddam Hussein through covert action.
According to former UNSCOM chief inspector Scott Ritter, when the U.S. took over the group's intelligence last year, a caveat was added regarding staffing: only international personnel with U.S. clearances could participate. "This requirement," says Ritter, "really shows the kind of perversion of mission that went on. The U.S. was in control, but the way it operated from day one was, U.S. runs it, but it had to be a foreigner [with a clearance] operating the equipment."
Under the still-classified 1948 UKUSA signals intelligence treaty, eavesdropping agencies of the U.S., United Kingdom, Canada, Australia, and New Zealand share the same clearances. According to Federation of American Scientists intelligence analyst John Pike, this gives the U.S. proxies for electronic espionage: "In the context of UKUSA, think of NSA as one office with five branches," he says. As UNSCOM demonstrates, though, sometimes the partnership gets prickly; the British, according to Ritter, withdrew their personnel following the U.S.'s refusal to explain "how the data was going to be used." (According to a longtime British intelligence officer, there was another reason: lingering bad feelings over the NSA's cracking a secret UN code used by British and French peacekeepers during a Bosnian UN mission.) At this point, says Ritter, he was instructed to ask the Australian government for a "collection" specialist. "We deployed him to Baghdad in July of 1998," recalls Ritter. "In early August, when I went to Baghdad, he pulled me aside and told me he had concerns about what was transpiring.
He said there was a very high volume of data, and that he was getting no feedback about whether it was good, bad, or useful. He said that it was his experience that this was a massive intelligence collection operation— one that was not in accordance with what UNSCOM was supposed to be doing."
In other words, the Australian— most likely an officer from the Defence Signals Directorate, Australia's NSA subsidiary, who was supposed to have been working for the UN— may have been effectively spying for the U.S. Stephanie Jones, DSD's liaison to NSA, did not take kindly to a Voice inquiry about this subject; indeed, despite being reached at a phone number with an NSA headquarters prefix, she would not even confirm her position with DSD. However, a former high-ranking U.S. intelligence official said that such a scenario was probable. "The relationship between the UKUSA partners has always been of enormous value to U.S. intelligence, even when their governments have been on the opposite sides of policy issues," the official said. "I would not be surprised at all if the Aussies happened to be the ones who actually did this [at U.S. behest]."
With an intelligence community of over a dozen components, billion-dollar budgets, and cutting-edge technology, the U.S. can cast a wide net, be it with human sources or signals interception. Iraq, however, has presented a special challenge since Saddam's Ba'ath party took power in 1968. "In Iraq," says Israeli intelligence expert Amatzai Baram, "you are dealing with what is arguably the best insulated security and counterintelligence operation in the world. The ability of Western or even unfriendly Arab states to penetrate the system is very, very limited."
According to the former Cairo station chief of the Australian Secret Intelligence Service (ASIS), the West got this message loud and clear after Iraqi counterintelligence pulled British MI6 case officers off a Baghdad street in the mid '80s and took them to a warehouse on the outskirts of town. "They had arrayed before them the various agents they had been running," the exASIS officer told the Australian Broadcasting Corporation in 1994. "There were wires hanging from the rafters in the warehouse. All the men were strung up by wires around their testicles and they were killed in front of the faces of their foreign operators, and they were told, you had better get out and never come back."
When UNSCOM was inaugurated in 1991, it quickly became apparent that the organization's intelligence capability would depend largely on contributions from various UN member countries. According to several intelligence community sources, while the CIA did provide UNSCOM with information, and, later, serious hardware like a U-2 spy plane, the focus of the U.S. intelligence community at the time was on working with anti-Saddam groups in and around Iraq to foment a coup.
What resulted, as investigative authors Andrew and Patrick Cockburn demonstrate in their just published book Out of the Ashes: The Resurrection of Saddam Hussein, were two of the most colossally bungled CIA covert operations since the Bay of Pigs. While details of one of the failed operations were widely reported, the Cockburns fleshed out details of an arguably worse coup attempt gone awry in June 1996. Iraqi counterintelligence had not only managed to finger most of the suspects in advance, but months before had even captured an encrypted mobile satellite communications device that the CIA gave the plotters. Adding insult to injury, the Cockburns report, Iraqi counterintelligence used the CIA's own device to notify them of their failure: "We have arrested all your people," the CIA team in Amman, Jordan, reportedly was told via their uplink. "You might as well pack up and go home."
Some UNSCOM staffers— first under Russian Nikita Smidovich, later under American Scott Ritter— managed to create what amounted to a formidable micro-espionage unit devoted to fulfilling UNSCOM's mission. Between information passed on from various countries and use of unspecified but probably limited surveillance equipment, the inspectors were gathering a great deal. But in March 1998, according to Ritter, the U.S. told UNSCOM chair Richard Butler of Australia that it wanted to "coordinate" UNSCOM's intelligence gathering.
Ritter insists that no U.S. spies under UNSCOM cover could have been operating in Baghdad without his knowledge prior to his resignation in August 1998. However, as veteran spies point out, if they were, Ritter probably wouldn't have known. A number of sources interviewed by the Voice believe it possible that Special Collection Service personnel may have been operating undercover in Baghdad.
According to a former high-ranking intelligence official, SCS was formed in the late 1970s after competition between the NSA's embassy-based eavesdroppers and the CIA's globe-trotting bugging specialists from its Division D had become counterproductive. While sources differ on how SCS works— some claim its agents never leave their secret embassy warrens where they perform close-quarters electronic eavesdropping, while others say agents operate embassy-based equipment in addition to performing riskier "black-bag" jobs, or break-ins, for purposes of bugging— "there's a lot of pride taken in what SCS has accomplished," the former official says.
Intriguingly, the only on-the-record account of the Special Collection Service has been provided not by an American but by a Canadian. Mike Frost, formerly of the Communications Security Establishment— Canada's NSA equivalent— served as deputy director of CSE's SCS counterpart and was trained by the SCS. In a 1994 memoir, Frost describes the complexities of mounting "special collection" operations— finding ways to transport sophisticated eavesdropping equipment in diplomatic pouches without arousing suspicion, surreptitiously assembling a device without arousing suspicion in his embassy, technically troubleshooting under less than ideal conditions— and also devotes considerable space to describing visits to SCS's old College Park headquarters.
"It is not the usual sanitorium-clean atmosphere you would expect to find in a top-secret installation," writes Frost. "Wires everywhere, jerry-rigged gizmos everywhere, computers all over the place, some people buzzing around in three-piece suits, and others in jeans and t-shirts. [It was] the ultimate testing and engineering centre for any espionage equipment." Perhaps one of its most extraordinary areas was its "live room," a 30-foot-square area where NSA and CIA devices were put through dry runs, and where engineers simulated the electronic environment of cities where eavesdroppers are deployed. Several years ago, according to sources, SCS relocated to a new, 300-acre, three-building complex disguised as a corporate campus and shielded by a dense forest outside Beltsville, Maryland. Curious visitors to the site will find themselves stopped at a gate by a Department of Defense police officer who, if one lingers, will threaten arrest.
There are good reasons, explains an old NSA hand, for havingelectronic ears on terra firma in addition to satellites. "If you're listening to something from thousands of miles up, the footprint to sort through is so huge, and finding what you are looking for is not a simple chore. If you know more or less specifically what you want, it's easier to get it in close proximity. And if it happens to be a low-powered signal, it may not travel far enough."
According to two sources familiar with intelligence activity in Iraq, the U.S. may have been aided by information delivered either to UNSCOM or SCS from Ericsson, the Swedish telecommunications firm. It's not an unreasonable assumption; though Ericsson brushes off questions about it, in 1996 a Middle Eastern businessman filed suit against the company, claiming, among other things, that it had stiffed him on his commission for brokering a deal between the Iraqis and Ericsson for sensitive defense communications equipment, which, reportedly, included encrypted cell phones.
Speaking on condition of anonymity, a veteran intelligence official confirmed that the NSA has "arrangements" with other communications firms that allow NSA to access supposedly secure communications, but cooperation from Ericsson would be "a breakthrough— despite our best efforts, they always kept their distance. But it's not beyond the realm of possibility." (This is not without precedent; though hardly covered in the American press, it has been reported that Switzerland's Crypto AG— long the supplier of cipher equipment to many of the world's neutral and "rogue" states— enjoyed such an "arrangement" with the NSA for decades. Crypto AG denies this.)
There is, however, another possible scenario regarding participation by Ericsson in an intelligence venture. According to FAS analyst Pike, it's much more likely that anyone doing intelligence work in Iraq would want a schematic of Baghdad's telephone system— which Ericsson installed in the late '60s and has subsequently updated. "I would find it to be far more plausible that the U.S. intelligence community would be interested in acquiring, and Ericsson would be interested in supplying, the wiring diagram for Baghdad's telephone exchange than encryption algorithms for cell phones," he says.
Also, he explains, finding ways to tap into a whole phone system or pull short-range signals out of the air without being obvious is clearly SCS's portfolio. "This type of risky close surveillance is what SCS was formed to do," he says. "When you think of NSA, you think satellites. When you think CIA, you think James Bond and microfilm. But you don't really think of an agency whose sole purpose is to get up real close and use the best technology there is to listen and transmit. That's SCS."
Regarding any possible collaboration in Iraq with SCS or UNSCOM, Kathy Egan, Ericsson spokesperson, said she had no information on such an operation, but if there was one, "It would be classified and we would not be able to talk about it." It's also possible, according to Mike Frost, that cleverly disguised bugs might have been planted in Baghdad— SCS, he recalls, managed to listen in on secured facilities by bugging pigeons. But, says a retired CIA veteran, with UNSCOM effectively dead, bugging is now out of the question. "I hope the take from this op," he says, "was worth losing the only access the outside world's disarmament experts had to Iraq."
The Radome Archipelago
Copyright 1999 The Village Voice - all rights reserved.