Intelligence ops in Baghdad show need for physical security back home
Computerworld - The U.S. Central Command today declined to offer details on how U.S. military forces were tipped off to an alleged meeting of Saddam Hussein and his top aides yesterday. But sources indicated today that physical taps on telephone and fiber-optic landlines in the Iraqi capital of Baghdad may have played a role.
"We have a number of methods that we use to gain information," Brig. Gen. Vincent Brooks said during today's Central Command press briefing. "A single source is never adequate, so we have multiple sources."
Bombing missions near civilian targets also require that somebody on the ground "see" the target, he said.
The process by which the CIA and the military determined the likely location and time of an Iraqi leadership meeting is known in intelligence parlance as all-source fusion -- a process by which human intelligence, surveillance, imagery from satellites and aircraft and intercepted communications form pieces of a puzzle that help officials understand what's happening on the battlefield. It is the last piece, communications intelligence, that experts say may have played a key role in targeting Saddam.
"Tapping a fiber-optic cable without being detected, and making sense of the information you collect, isn't trivial but has certainly been done by intelligence agencies for the past seven or eight years," said John Pescatore, an analyst at Stamford, Conn.-based Gartner Inc. and a former National Security Agency analyst. "These days, it is within the range of a well-funded attacker, probably even a really curious college physics major with access to a fiber-optics lab and lots of time on his hands."
The importance placed on fiber-optic communications cables in Baghdad by the Iraqi regime dates to the first Gulf War in 1990. Saddam quickly realized that the U.S. was capable of intercepting most radio and wireless communications, and as a result, worked to avoid detection by hiring French and Chinese companies to install a fiber-optic backbone that is closely integrated with the civilian telephone network. That makes it difficult for intelligence services to determine the separation point between civilian networks and the government's command-and-control networks.
U.S. intelligence agencies or their foreign adversaries have in the past employed physical taps on fiber-optic and telephone cables to gain intelligence. In 1955, during what was known as Operation Gold, the CIA tunneled under the border between East and West Berlin to tap phone lines used by Soviet intelligence. Likewise, during the early 1980s, the CIA's Operation TAW involved the tapping of a top-secret communications center outside Moscow by placing listening devices on cables in sewer tunnels.
Fiber-optic cables use light
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts