Tuesday, January 17, 2006

The CIA Uncovers A Secret:
How To Look Things Up On The Internet
***************************************************

Original Source: The Washington Post
Via: The Sydney Morning Herald
January 29, 2005
http://smh.com.au

Not everyone in the Intelligence Agency derides publicly available information, writes Susan Glasser.

The CIA now has its own bloggers. In a bow to the rise of the internet-era secrets hidden in plain view, the agency has started hosting weblogs with the latest information on topics including North Korean dictator Kim Jong-Il's public visit to a military installation (his 38th this year) and the Burmese media's silence on a Ministry reshuffle. It even has a blog about blogs, dedicated to finding useful information in the rapidly expanding milieu of Online Journals and weird electronic memorabilia on the internet.

The blogs are posted on an unclassified government-wide website, part of a rechristened CIA office for monitoring, translating and analysing publicly available information, called the DNI Open Source Centre.

The Centre, which made it's debut this month, marks the latest wave of reorganisation in response to the failures of intelligence collection before the September 11, 2001, attacks.
Analysis of those failures pointed to insufficient efforts to tap into the huge realm of information on the internet, as well as a climate of disdain for such information among spy agencies. "There are still people who believe if it's not top secret it's not worth reading," says an outside expert who works with government Intelligence Agencies.

By adding the new Centre, "They've changed the strategic visibility," says the Centre's Director, Douglas Naquin, a CIA veteran. "All of a sudden open source is at the table."
But he acknowledges that "managing the world's unclassified knowledge [is] much bigger than any one organisation can do."

The DNI Open Source Centre began life in 1941 as the Foreign Broadcast Information Service--FBIS to insiders--which was charged with monitoring publicly available media and translating their output.

At the height of the Cold War, it was FBIS translators who pored over Izvestia and Pravda from the Soviet Union, providing the little hints such as a word change that might signal something broader for the CIA's Kremlinologists.

September 11 gave it a new purpose, as "Open Source" became an Intelligence buzzword.
Across government, policymakers began to debate how to find the nuggets of genuine information hidden in the internet avalanche.

Even before the Open Source centre officially opened it had added a video database that makes it's archives available online, and rolled out an upgraded website with blogs and homepages on topics such as Osama Bin Laden, the Iraq Insurgency, Abu Musab Al-Zarqawi, China and Bird Flu.

The Centre sees itself as a repository of what Naquin calls "Open-Source Tradecraft" in a self-conscious echo of his clandestine colleagues. It teaches courses such as Advanced Internet Exploitation to Intelligence Analysts.

Perhaps the toughest challenge for the new Centre is proving its mettle inside the special world of Intelligence, where the stolen secret has long been prized above the publicly available gem.

Although the Centre's website is unclassified and available across the government, so far it has only 6,500 users with active accounts, Naquin says.

"The reluctance to use it is astounding to me," says Michael Scheuer, the former head of the CIA's Bin Laden Unit. "Nobody wants to go back in response to an assignment and say, 'Oh, my Open Source Centre found this on a Server in Belgium.'"

The culture clash isn't likely to disappear soon--especially when Intelligence Services still classify material that can be found easily on the internet.

Not long ago, says a former senior government terrorism analyst, he was teaching a class to future CIA Intelligence Analyst's that included a PowerPoint Presentation on the evolution of Al-Qaeda since September 11, with images from the internet.

Two men at the back of the class came up to the instructor after the presentation. Where, they asked, had he got a particular image from Iraq? It's classified, they insisted.
The former analyst laughed, he had taken it from a gruesome website that compiles terrorist atrocity videos along with pornography.


No comments: