17 December 1999
(Seized items represent threat to safe and secure environment) (1,530) NATO revealed December 17 that the materials seized in an October 14 sweep by Stabilization Force (SFOR) troops in the Mostar region of Bosnia-Herzegovina show "significant anti-Dayton activities" by a secret intelligence service. A report of the analysis of the seized materials -- which included documents, computer files, and communications equipment -- was posted on the NATO web site. SFOR coordinated the analysis with the Office of the High Representative (OHR), the UN Mission in Bosnia, and the Organization for Security and Cooperation in Europe (OSCE). According to the report, the information showed a pattern of activities directed against citizens of Bosnia-Herzegovina, against SFOR, and against international organizations, and was intended to disrupt a safe and secure environment in Bosnia. Much of the illegal activity was linked to the Croatian Intelligence Service (HIS) and the Bosnian Croat Intelligence Service (SNS), but, the report said, "the operation was not directed at any one particular ethnic group." Among the seized materials were 42 computers containing almost 500,000 pages of text, as well as databases containing some 10,000 documents protected by sophisticated encryption software. Many of the documents contain signatures, including that of the HIS director, verified as authentic by Western intelligence experts. SFOR also confiscated several compact disc (CD) writing machines, credit card readers, and equipment needed to counterfeit telephone and credit cards. In addition, analysts found approximately 5,000 images of pornography, which the report said, "implies that it was being sold to raise funds to either support illegal operations or for the personal financial gain of the operators." The report said the documents and other materials revealed evidence of four specific operations run by SNS: -- "Operation Puma" targeted an investigation team from the International Criminal Tribunal for the former Yugoslavia (ICTY). Intelligence activities included installing technical surveillance means in the team's hotel rooms in Livno, identifying local citizens coming into contact with the team, and attempting to recruit the team's interpreters. -- "Operation Grom" (Thunder) collected personal data on Bosnian Croats employed as linguists or interpreters by international organizations in Bosnia. -- "Operation Munja" (Lightning) observed and photographed Bosnian Croats working for international organizations in an attempt to secure their cooperation. -- "Operation Panther" collected personal details on the leadership of many organizations, such as name, nationality, position, hobbies, marital status, and religious persuasion. SFOR said it would continue "to take all necessary action to disrupt anti-Dayton activities that pose a threat to a safe and secure environment" for all citizens of Bosnia-Herzegovina. Following is the text of the NATO press release: (begin text) SFOR Peace Stabilisation Force Information Coalition Press Information Office Packet for Tito Barracks Journalists Sarajevo December 17, 1999 News Release INFORMATION SEIZED IN MOSTAR OPERATION CONFIRMS ANTI-DAYTON ACTIVITIES Information obtained by the NATO-led Stabilization Force (SFOR) in its surge operation in west Mostar, Bosnia and Herzegovina on Oct. 14 reveals significant anti-Dayton activities conducted by a secret intelligence service in BiH. These activities were clearly directed against citizens of BiH, against SFOR, and against International Organizations here. SFOR's analysis is based on an examination of the documents, computer files, communications equipment, and other material confiscated during the operation. Anti-Dayton activities represent a threat to the citizens of BiH, SFOR and the International Community. These planned or current activities aim to disrupt a safe and secure environment in BiH, which is the mandate of SFOR. During the investigation SFOR has coordinated with the Office of the High Representative, the UN Mission in BiH, and the Organization for Security and Cooperation in Europe. The International Community is united in its condemnation of these anti-Dayton activities. Law-abiding citizens, particularly Bosnian Croats, can be assured that this operation was not directed at any one particular ethnic group. SFOR's intention is to make good its commitment to provide the public with information on its findings. The prosecution of those responsible for the abuse of power is now up to the competent authorities of Bosnia and Herzegovina. Major findings-Operation Westar Documents and other materials taken during SFOR's operation in west Mostar reveal multiple anti-Dayton and other illegal activities including: -- Uncontrolled storage of weapons and explosives -- Operations inside BiH by the Croatian Intelligence Service (HIS) -- Credit card production materials and equipment for use worldwide -- Pornographic images for probable sale -- Observation of international organizations SFOR has previously indicated the quantity of weapons it seized during Westar. Among these were an Uzi-type sub-machine gun with silencer, ammunition, and explosives including hand grenades. Among the items revealed in our analysis of materials was a letter from the Director of the Croatian Intelligence Service (HIS). The letter refutes comments concerning leadership of the HIS structure in Bosnia and Herzegovina. In addition to describing Croat Intelligence Service activity in Sarajevo, payment for the work of other intelligence services in The Hague is also mentioned. During the operation, SFOR seized 42 computers containing over 200 gigabytes of information (approximately 500,000 pages of text). SFOR also confiscated numerous data bases protected by sophisticated encryption software and over 10,000 documents. Many documents contain signatures verified as authentic by Western intelligence experts. Several examples have been chosen for public release and are included in a separate compilation for journalists. In addition, SFOR confiscated several CD writing machines, credit card readers, and the equipment needed to counterfeit telephone and credit cards for use in virtually any country in the world. Hundreds of pirated and/or unregistered computer software programs were discovered on the computers and CDs. The value of this software, if legally purchased, would be more than 20,000 KM. Additionally, nearly one gigabyte (approximately 5,000 images) of pornography was discovered. This prurient material was organized into myriad categories in an extensive database. The quantity of material implies that it was being sold to raise funds to either support illegal operations or for the personal financial gain of the operators. In specific violation of Annex 1A of the Dayton Accords, documents reveal that the Bosnian Croat Intelligence Service (SNS) was conducting at least four illegal operations. These planned or currently active operations clearly represent a threat to numerous BiH citizens and to specified International Organizations targeted by these operations. These operations were initiated between Sep. 23 and 29, this year. -- Operation Puma has as its target an International Criminal Tribunal for the former Yugoslavia (ICTY) investigation team to be accommodated in a Livno hotel. SFOR has information that confirms that agents of the SNS broke into rooms of an investigation team. Overall, the aims of "Puma" are to reconnoiter and then install technical surveillance means in the hotel, to observe and photograph the arrival and disposition of the team, to identify local citizens coming into contact with the team, and to attempt to recruit the ICTY team's interpreters. -- Operation Grom (Thunder) is aimed at the collection of personal data on BiH Croats employed by International Organizations in BiH. Persons employed as linguists or interpreters of leading members of the IC were primary targets. Among the organizations identified in documents seized by SFOR were Office of the High Representative (OHR), Organization of Security and Cooperation in Europe (OSCE), United Nations High Commissioner for Refugees (UNHCR), Stabilization Force and its Joint Commission Office personnel (SFOR including its JCOs), ICTY, and the International Police Task Force (IPTF). -- Operation Munja (Lightning) is aimed at observing and photographing members of International Organizations. The targets in this case are OHR, OSCE, UNHCR, SFOR and its JCOs, ICTY, IPTF, and Merhamet. This activity was taken in response to SFOR's Operation Joint Resolve, which demonstrated the capability to reinforce SFOR operational elements. Canton 7 is the primary area for Munja actions with attention given to Mostar and Stolac. Munja's purpose is to identify BiH-Croats working for these organizations and to attempt to secure their cooperation as well as that of individual members of staff to these organizations. -- Operation Panther is aimed at collecting personal details on the leadership of many organizations. Included are OHR, OSCE, UNHCR, SFOR, ICTY, IPTF, Merhamet, and others. This operation extended throughout BiH. Those targeted were to be identified by name and surname, nationality, position, vehicle details, photographs, profession, cultural background, hobbies, personal inclinations, places frequented, marital status and religious persuasion. Summary SFOR's actions in conducting the Westar operation were in full compliance with Article VI, Annex 1A of the Peace Agreement, which authorizes SFOR to do what is necessary and proper to create secure conditions for the continued implementation of the peace settlement. SFOR is continuing its examination of the equipment, software, and documents confiscated during this operation. SFOR will provide the authorities of BiH material appropriate for possible prosecution or further use. SFOR will determine additional actions based on the results of further examination of the information from Operation Westar. SFOR will continue to take all necessary action to disrupt anti-Dayton activities that pose a threat to a safe and secure environment for all citizens of BiH. (end text) (Distributed by the Office of International Information Programs, U.S. Department of State)