Friday, November 1, 2013

Separated by a Common Language: Orcadian Dialect Edition

As I've noted previously, folk in the United States are separated from folk in the United Kingdom by a common language. Within the United Kingdom, you have regional dialects that separate UK citizens/residents from one another. One of the most entertaining of these is the Orcadian dialect.

As I mentioned yesterday, I was on the radio a couple of weeks ago to inform Orcadians about what I've unofficially dubbed the "Orcadian Gordon Highlanders Accountability Project". Several people back in the States listened to the program via the Listen Again function, and essentially all of them remarked about the accents of both the woman who introduced my segment, and the guy who interviewed me. Lady Jaye couldn't understand a word either of them said, and Windshield Ninja said she loved the musical quality of the woman's voice, but could only understand about eighty percent of what she was saying by concentrating really hard. I've spoken to several people (including Gus, who thinks he knows everything) who figured it was just Doric, but I've mentioned it to folk who actually speak Doric, and it's not Doric. Doric is different.

I sort of accidentally familiarized myself with the Orcadian Dialect by reading Alex Leonard's comic, The Giddy Limit, in which four of the five principal characters speak in a phoneticized Orcadian dialect, with the fifth character (the wife/mother, Liz, being regularly confused by both Orcadian speech and local customs). A little over a year ago, while chatting with Gray 2, I stopped her and remarked about how, if I hadn't gone through all of those comics, I'd have been completely confused by what she was saying.

On Wednesday night, and apparently on a regular basis, Radio Orkney features a program called Whassigo, which the BBC Radio Scotland website describes as an "Orcadian version of Call My Bluff". If you're reading this before 06 November 2013, you can listen to the program here. I picked up a number of other words from the Orcadian dialect that aren't really in common usage, but the show was pretty entertaining.

So, what are some of the words I've picked up over the years? The ones I picked up on the Whassigo program are marked with "(W)", and the rest aren't.

  • "bairn" - Child.
  • "beuy" - Probably derived from "boy", it's sort of the Orcadian equivalent of "dude", used mostly by older Orcadians.
  • "disnae" - Doesn't. In fact, "nae" is "not" - disnae, wasnae, cannae.
  • "fae" - From.
  • "gemple" (W) - A person who handles situations with grace and dexterity, remaining calm and sorting things out in a seemingly effortless manner.
  • "glet" (W) - A bright patch in the sky during a storm.
  • "gushel" (W) - Someone who's walking with a limp.
  • "gussel" (W) - A wind that keeps blowing, and blowing, and blowing... And blowing.
  • "heuved" (W) - To be swollen from the inside, e.g. from eating too much. This one is allegedly Old Norse, tracing back to Orkney's viking heritage.
  • "ken" - To know - as in, "Yes, I ken, but I'm nae gonna to tell ye." If you say "kent", it's the equivalent of "knew" - as in, "Yes, I kent, but I wasn'a gonna tell ye."
  • "luridan" (W) - A mythical spirit who cleans your house for you, also apparently referred to as a "broonie".
  • "mimp" (W) - To chant.
  • "nae bother" - "No bother" or "no problem", Orcadians essentially substitute this for "you're welcome".
  • "peedie" - Small.
  • "smooring" - Blowing, referring to weather. "There's a storm smooring in from the East."
  • "tatties" - Potatoes. As I'll note in an upcoming post, Orcadians love potatoes. This one isn't particularly Orcadian, as I frequently ate mince and tattie pies down in Aberdeen, but Orcadians never seem to talk about potatoes, it's always tatties.
  • "wit like/what like" - Similar to the Scottish/Doric "fit like", it's the equivalent of "how are you" or "what's happenin'?"

    So now, if you show up in Orkney, you'll be able to make out some of what they're saying. Take it from me, it requires a bit of practice, and it's much tougher on the telephone.
  • Thursday, October 31, 2013

    Operation Bold Brigand Continues!

    Regular blog readers may notice that my posting has been just a touch spotty over the last couple of weeks. I've also now reached the point of having zero, count 'em, zero posts uploaded in draft form. I intend to remedy that over the next few days, as one of my blogging secrets is to do a lot of writing up front, and then post the drafted stuff for a few weeks thereafter - particularly on busy days. I have tons of cool stuff yet to come, but as the Operation Highlander extension, Operation Bold Brigand, continues up here in Orkney, I've had my hands full with a variety of worthwhile projects. Here are a few of the things I've been working on.

    * * *

    Arabic:

    As I've noted before, I've been studying Arabic for years, trying to get myself to the point of basic fluency. During my year in Aberdeen, I was focused mainly on learning vocabulary from the Defense Language Institute's Libyan Basic Language Survival Kit (LSK), though my efforts waned later in the year. At the moment, I've transitioned to the Emirati LSK, as I think that future opportunities in the Gulf are more likely to manifest themselves than opportunities in Libya - the aforementioned Emirates Center for Strategic Studies and Research being but one example. At any rate, I've been (slightly) better about studying lately, which has involved listening to the DLI audio files while reviewing the written vocabulary on my Kindle. I've also been doing listening exercises with BBC Xtra podcasts and, occasionally, the Radio Sultanate of Oman live stream.

    Physical Training:

    In theory, I'm walking uphill from the city center to my digs three times per week, doing a full stretch-out three times per week, push-ups and sit-ups twice per week, and two swim workouts at the Pickaquoy Centre per week. In actuality, I've not set foot in the Pickaquoy Centre, I've tended to walk uphill three times, and I've done no stretching and neither a single push-up nor a single sit-up. I feel like this week will be my week... Or next week, maybe.

    Business Development:

    A couple of weeks ago, I posted about my work developing honesty traces over at the Joshua Tree Security blog. I've mentioned honesty traces on the Highlander blog once before. I'm working on this, and a handful of other projects, the idea being that I can either use them in future jobs, or possibly use them as products and/or services in the event that I ever decide to start my own business. In addition to that, I've been applying for at least twenty jobs per week, since I'll eventually have to transition back to the real world - something that requires gainful employment. (I suppose that the Arabic stuff technically falls into this category, but I prefer to keep it distinct.) So, this stuff keeps me somewhat busy as well.

    PSP Certification:

    I've spoken previously about my desire to get my PSP certification. In theory, I'm reading fifty pages per week in either The Design and Evaluation of Physical Protection Systems by Mary Lynn Garcia, or ATTP 3-39.32 Physical Security. The reality is that I've done so much studying this year, that maybe I can leave something for next year. On the plus side, the Garcia book is now available for Kindle, which meant that I was able to leave the physical copy that I'd lugged to three different continents (and only got about a quarter of the way into) with CN Homeboy, who should absolutely read it and pursue his own physical security qualifications.

    Writing Projects:

    I've actually been doing a lot of writing - just, not so much blog writing. The big thing I'm working on is a follow-on to my dissertation. When all was said and done, my final submission had fifteen or twenty mistakes in it (mainly mixed up citations, a couple of textual and bibliographical inconsistencies). As of last night, I think I've gotten the thing perfected, but should I have an occasion to use it as a writing sample, I want it to be perfect - the way it should have been when I handed it in, but that was a matter of managing my risks, so whatever. (It was still bloody good, regardless.) Anyway, the final submission was also just a portion of what I had hoped to write, so I'm also tearing the manuscript apart, reorienting it, and formatting it to include all of the notes and sources that I wasn't able to include in the original version. As discussed with the Director earlier this year, my intent is to get it to the length of a formal white paper, and then submit it to a think tank or journal for publishing along the lines of what CN Odin and I did earlier this year, except a bit more ambitious (and hopefully for pay this time).

    I've also had a couple of other projects that have spun off from that. One (that will probably be included in that white paper) involves intelligence, and another involves cultural sensitivity restrictions with which American personnel must comply while deployed to the Middle East. So, I'm working on those bit by bit as well.

    World War I Research:

    So... I've just realized that, until now, I've almost completely omitted a major chunk of what I'm doing up here in Orkney. It's a long story, but the gist of it is that I sort of stumbled into a gig on behalf of the Gordon Highlanders Museum, about which I've written before. In advance of the centenary of World War I, I'm working with the Gordon Highlanders Museum and a number of local Orcadian sources to research Orcadians who served with the regiment in World War I. I've been on Radio Orkney and in The Orcadian, conducted several interviews, met with several local experts, and have a great deal left to do while I'm here. It's been really interesting research, and it will sort of forever link me with both the museum and Orkney - that's pretty sweet, huh?

    Special Projects:

    I've also been working on a number of projects each week that don't fit into any of these other categories. For example, this week, I need to: put a variety of replacement clothing items into online shopping carts to facilitate quick ordering right before I leave Scotland; do a test pack of the stuff I intend to take home with me to ensure that I have enough room in the bags I intend to take; work on a Strategic Studies archive/database project; send an E-mail about an outstanding financial matter; do laundry; and go to the chemist. See? One of 'em's already done!

    * * *

    Oh, yeah, and I also need to make an effort to see a bunch of parts of Orkney that I haven't seen yet, enjoy my time here, and do a bit of blogging when I have a few moments. So... Stay tuned. Still.

    More to come.

    Tuesday, October 29, 2013

    Bold Brigand: Nairn Station's Ambitious CCTV Mast

    My route from the Isle of Wight back up to Orkney, I found myself waiting for half an hour on a rail platform in Nairn. I was actually fairly fortunate to get there - my flight landed with barely enough time to get to the station in Inverness in time for the late train to Aberdeen, but the cab driver asked where I was headed and suggested that he take me to Nairn instead. We got there with plenty of time, but I found myself killing time. As I was chatting on the phone with a couple of folks back in the States, I noticed a really ambitious CCTV mast. It's not uncommon to see CCTV (short for "closed-circuit television") cameras throughout the United Kingdom - British security folks love them. At any rate, I snapped a picture, and figured I'd share.

    Monday, October 28, 2013

    Island Paradise: Fun with Patties

    One of my World War I contacts, a native Orcadian himself, recommended to me that I try a patty. As you'll learn from a variety of links (such as this one, this one, this one, this one, and this one), a patty is a uniquely Orcadian dish made of potato ("tattie"), a bit of minced beef, a little bit of onion, and some seasoning, and then fried. They're pretty good. I've had several of them, and trying them puts one particular aspect of this year's Giddy Limit calendar into context.

    I was informed that the best place to go for a patties was Harbo(u)r Fry, near Kirkwall's little harbor. Last week, after a couple of drinks at a pub around the corner (to be featured soon), I decided to give it a try. I walked in, and was immediately and enthusiastically greeted by two of the young staff, one of whom is related to the restaurant's proprietor. We proceeded to have a lengthy conversation about me, them, the restaurant, and all things Orkney. I was informed that I need to be sure to stick around through Christmas and Hogmanay in order to witness or even take part in the Ba game. (I have yet to conclude whether I'll be participating or not, but if I do, you'll surely read about it.) I tend to enjoy talking to young people, not only because it's fun for people to be curious about me, but also because young people tend to be eager to talk about their experiences of living wherever it is that they live, be it Aberdeen, or Naples, or even Orkney.

    Harbo(u)r Fry is open from noon to 2:00 PM for lunch, and then from 4:00 PM to 9:00 PM for dinner. As I mentioned previously, they're located adjacent to Kirkwall's harbor, on Bridge Street, just a few steps from Skippers Bar on the right and Dil Se Indian restaurant to the left. With most of Kirkwall's bars within a few steps (for the evening opening), and Kirkwall's high street just a quick walk (during the lunch hours), you'd be hard pressed to find a better location for authentic Orkney takeaway chow. That said, I don't really understand the whole curry thing; I realize that American restaurants, mainly McDonalds, sometimes have things like burritoes or whatever, but it just strikes me as really odd that you'd walk into, say, a burger joint, and they'd have all of the fare that you're expecting, and then have a whole part of the menu dedicated to Mexican food. (The reason why I use Mexican food as an example is that Indian food is to British cuisine as Mexican food is to American cuisine - the United Kingdom has almost no Mexican restaurants and tons of Indian restaurants, while the United States has comparatively few Indian restaurants and tons of Mexican restaurants.)

    The odd thing about patties is that they're apparently served with fries/"chips". It's roughly akin to saying to someone, "Hey, here are your carrots, would you like some carrots with that?" I've decided that, in fact, patties are best employed as a side, rather than as a main course. For example, one could walk into Harbo(u)r Fry and order a fried haggis and two patties, and it would make a perfectly good meal. They seem to have tons of different menu options to choose from, even though plenty of them aren't on their actual menu board. You'd better believe that as I continue spending evenings at the pubs, enjoying the Orcadian night life, I'll be stopping into Harbo(u)r Fry to refuel.

    Sunday, October 27, 2013

    The Songs That Remind You 13

    Most of the music I've been hearing lately is absolute trash. Far too much of it is by Miley Cyrus. (Speaking of which... What happened with her!? The Onion totally called it.) Anyway, one of the great songs that I've heard while I was here was actually the soundtrack to a really weird Lexus commercial featuring kabuki dancers or something. The commercial's weird, and I'll almost certainly never buy a Lexus, but Kristina Train's cover of Aretha Franklin's song easily surpasses the original - easily.


    So, that was pretty awesome. As I said earlier, I feel like I'm being inundated by lousy garbage from Miley Cyrus. So, in lieu of posting that lousy garbage, I'm going to link to the only decent song Miley Cyrus ever did, and at this rate, will ever do. Yup. Anyway, you know what I like even better than that? Katy Perry's latest single. Like many celebrities who have never accomplished anything and have no relevant experience, Katy Perry's politics and activism annoy the living daylights out of me, but I tend to like about two thirds of her music.


    See? Isn't that so much better than anything Miley Cyrus has been releasing lately? Answer along with me: "Yes, Tom! You nailed it!"

    Friday, October 25, 2013

    Writing Sample: Strategic Intelligence Term Paper

    Note: This is the term paper I submitted to E for Strategic Intelligence about this time last year. As I read through it, I'm tempted to update it and correct a few formatting errors, but instead I'm publishing it as is.

    * * *

    "Assess the strengths and
    weaknesses of technology in
    comparison with HUMINT."




    1 Introduction


    In a sense, all intelligence is human intelligence. Regardless of the method of collection, the platform, or the system of analysis, intelligence is the focused study of inherently human factors, actions, reactions, and behaviors. At its core, the purpose of each and every intelligence operation is to discover the prior actions, or predict the future actions and reactions, of humans.

    Regardless of this philosophical observation, intelligence has become an increasingly technical field, with constantly increasing emphasis placed upon intelligence disciplines other than direct interaction between intelligence professionals and human sources. As a result, intelligence is increasingly divided between HUMINT and other, more technical fields. Chief among these are several key disciplines: signals intelligence (SIGINT); geospatial intelligence (GEOINT); and imagery intelligence (IMINT), itself a subset of GEOINT. These disciplines, like HUMINT itself, are subject to a variety of inherent strengths and weaknesses, both of which place limits on their ultimate effectiveness.

    In order to analyze the relative strengths of these technical disciplines relative to HUMINT, this study will analyze each major discipline in detail, and provide additional reflections drawn from case studies from the recent history of intelligence operations. Special concluding attention shall be paid to the intelligence estimates of Iraq prior to the coalition invasion of 2003, and to the May 2011 American raid in Abbottabad, Pakistan.



    2 SIGINT


    Assuming that one discounts such methods as mountain observation points and hot air balloons, the earliest technical method of intelligence collection is SIGINT. Military forces were among the earliest parties to utilize the new technologies developed during the industrial revolution. This included the first use of electrical telegraphy in the Crimean War[2.01], followed by the first practical use of wireless telegraphy by the end of the 19th century, and transmission of sound via radio by the end of 1900. Although terms such as "information warfare", "electronic warfare", and "signals intelligence" are generally considered modern disciplines dating back only to World War II, their genesis dates back as far as World War I, when the laying and defense of telegraph lines (or, conversely, the tapping and/or destruction of enemy lines) played an important role in the conduct of warfare for both sides.[2.02]

    These early examples provide several key illustrations of the strengths and weaknesses of signals, and the corresponding weaknesses and strengths of SIGINT. First and foremost, in order to be useful to the users, signals must be accessible - a signal is useless if the recipient is unable to receive it. The result is that in order to be effective, signals require some degree of vulnerability, with puts them at risk of interception: cables can be tapped, and wireless signals such as radio and microwave transmissions can be intercepted.

    These vulnerabilities demonstrate a second weakness of signals that presents a challenge to both signal originators, and intelligence practitioners: the requirement for security measures. Should parties sending signals wish to mitigate the risk of interception, the primary method (save for physically guarding closed circuit transmission lines) is encryption. Although generally used to describe electronic means of encoding signals, encryption can be more generally defined as a system whereby both sender and receiver (these roles being reciprocal in two-way communications) employ a system to convert messages from "plaintext" - plain, direct language - to an alternate form discernible only to the communicating parties.

    For those attempting secure communication, this presents a complex challenge prior to, during, and following any communication. As security technologist Bruce Schneier notes, "keys have to be produced, guarded, transported, used and then destroyed"[2.03] - a time consuming and expensive process. While some methods of encryption (notably one-time pads) have been demonstrated to be entirely effective when used correctly, weaknesses in encryption methodology, weak codes, or failure to follow security procedures can introduce vulnerabilities to the system, making it possible for SIGINT practitioners to decode intercepted signals. Historical examples of this include the British government's successful cryptoanalytic efforts relative to the German Enigma machines in World War II; Operation Ivy Bells, the United States' operation to tap Soviet undersea communications cables in the Sea of Okhotsk; and the American detention and prosecution of La Red Avispa/the "Cuban Five" based upon decrypted signals from the AtenciĂ³n numbers station.

    Numbers stations provide an excellent object lesson in the relative strengths and weaknesses of signals and SIGINT. In fact, the case of the Cuban Five is an excellent illustration of these phenomena. As noted by Brent Sokol of the Miami News Times:
    [T]he simplicity of a numbers station also is its strength. Unlike telephone, e-mail, and Net connections, receiving a radio signal leaves no fingerprint, no hint as to where the recipient might be physically located. And with the numbers-to-letters code known only to the spy and his handlers -- and with that code changing with each broadcast -- the secret messages they contain are theoretically unbreakable. Unbreakable, that is, unless you were able to make a copy of the same computer decryption program, which is exactly what FBI agents did in 1995 as they surreptitiously broke into at least one of the spies' apartments, allowing them to subsequently decipher the shortwave broadcasts the unknowing Cubans continued to receive until they were arrested in September 1998.[2.04]
    In fact, even if the FBI had not identified and surveilled the Cuban Five, the operators of the AtenciĂ³n station have made mistakes that undermine even the best tradecraft of field agents. Most notable among these are playing the audio intro from Radio Havana Cuba (RHC) on AtenciĂ³n; or playing AtenciĂ³n on the same frequency as RHC, and vice versa.[2.05][2.06] While these mistakes alone would compromise neither signals nor field agents, poor attention to detail by signallers suggests systematically sloppy tradecraft, the surest way to compromise the security of otherwise strong signal encryption. Thus, while perfect tradecraft can prevent (or substantially complicate) decryption by SIGINT practitioners, perfect tradecraft is rare, offering SIGINT practitioners an occasional advantage.

    Long-term study of numbers stations around the world betrays another weakness of signals: triangulation. Wireless signals, and particularly radio signals, can be triangulated, allowing SIGINT practitioners to determine the location in which signals originate. In the event that field agents are called upon to transmit signals from their positions, the host nation's ability to triangulate a signal's point of origin can lead to a compromise of either the agent or the signal itself. In fact, this vulnerability formed a central story element in John Le Carré's 1965 novel The Looking Glass War[2.07]. This phenomenon has become even more useful to SIGINT practitioners with the advent of mobile telephones.

    At the same time, triangulation betrays another drawback of SIGINT: while some signals can be intercepted from great distances, most require the surreptitious listener to operate - or, at very least, position equipment - in relatively close proximity to the point of transmission. One can imagine the sheer logistical challenges of deploying, operating, and maintaining listening equipment in even a relatively small theater of operations, such as Afghanistan or the Balkans. Given the likely wheat-to-chaff ratio from such a gargantuan endeavour, the analytical requirements alone would be staggering. This serves to reiterate the previous point: when combined with solid tradecraft on the part of those under surveillance, SIGINT practitioners will find themselves at a disadvantage with respect to the collection, interpretation, and analysis of signals. One recent example of this is the April 2001 Hainan Island incident, in which a U.S. Navy EP-3E ARIES II signals reconnaissance aircraft was forced to make a crash landing on the Chinese island of Hainan after a mid-air collision with an overzealous Chinese J-8IIM interceptor. Although the American aircraft was flying in international airspace, its mission required it to fly near Chinese territory in order to collect its signals.

    For intelligence agencies and officers, encryption - whether by tradecraft or by technology - is challenging and resource-intensive. In the case of encryption based upon technology, it can also be extremely expensive, particularly if an opponent overcomes the encryption system, requiring it to be abandoned. One illustration of this is the 2009 revelation that insurgents in Iraq had been able to intercept the unencrypted video feeds from UAVs.[2.08] While this vulnerability was allegedly known by military, the sacrifice of encrypting the high-bandwidth feeds[2.09], beyond posing the aforementioned challenge of credential management[2.03], would have caused significant operational drawbacks:
    For years, the video from UAV was unencrypted. This was to save communications capacity ("bandwidth"), which was always in short supply. To encrypt the video would require more bandwidth, and specialized equipment on the UAVs and ground receivers. There would also be a slight delay for the guys on the ground using the video. For all these reasons, the video remained unencrypted.[2.10]
    Conversely, decryption by SIGINT practitioners is also difficult, resource-intensive, and extremely expensive, as evidenced by the infrastructure and staffs employed by the National Security Agency (NSA) in the United States and Government Communications Headquarters (GCHQ) in the United Kingdom.



    3 GEOINT


    GEOINT and its subset, IMINT, saw their effective genesis in World War II following the use of hot air balloons in the 19th Century and early aerial reconnaissance in World War I. Aviation having matured substantially during the interwar years, aerial reconnaissance in World War II was increasingly sophisticated, with armed and eventually fighter-escorted bombers re-equipped with cameras to provide aerial reconnaissance of potential target areas. These were succeeded early in the Cold War by specialized reconnaissance aircraft - "spy planes" - such as the U2 Dragon Lady and the SR-71. These and other aircraft, while unarmed, were designed for extreme high altitude flight. Their capabilities were eventually complemented, and ultimately overtaken and largely succeeded, by reconnaissance satellites, although the U2's capabilities and a lack of viable gap-filling replacements continue to prolong its operational lifespan.

    As with SIGINT, GEOINT offer specific advantages and disadvantages to producers and consumers of strategic intelligence. For the potential subjects of GEOINT, GEOINT is exceptionally difficult to escape from. While the actual products of GEOINT are generally classified, some are known publicly. A few prominent open source examples from the last several years include:

  • In 2007, an open source satellite photographed a new Chinese Type 094 ballistic missile submarine.[3.01]
  • In 2007, Microsoft's Virtual Earth mapping service revealed an aerial image of an Ohio class ballistic missile submarine's exposed propeller, the design of which is classified.[3.02]
  • Open source satellite imagery has been studied extensively since the September 2007 Israeli air strike that destroyed a suspected Syrian nuclear facility. Open source analysts have compared pictures of the facility both before and after the attack, as well as subsequent open source GEOINT resources that suggest a hasty demolition, cleanup, and burial at the site.[3.03][3.04]
  • In 2008, an open source satellite photographed a Chinese Type 094 submarine, as well as new features at a Chinese naval base on Hainan Island.[3.05]
  • In 2009, Google Earth alerted open source GEOINT practitioners to the presence and new construction of Iran's previously clandestine Fordow uranium enrichment facility, located near the Iranian holy city of Qom.[3.06]
  • In 2012, publicly available satellite imagery revealed exterior water drainage and additional changes in appearance at Iran's Parchin nuclear site, suggesting that the Iranian government had carried out some type of testing at the site before cleaning it to eliminate evidence of illicit, possibly nuclear-related activities.[3.07]

    These cases represent a mere handful of publicly known cases of open source GEOINT betraying the national security secrets of a variety of major players in international affairs. If one considers the resources, including manpower, training, and equipment, that are available to the American National Reconnaissance Office (NRO) and National Geospatial-Intelligence Agency (NGA), and extrapolates the resources that are likely available to such other nations as Russia and China, the obvious conclusion must be that very little of strategic importance must take place on the face of the planet without first- and second-tier international powers finding out about it in due course of time. This betrays two of the challenges faced by GEOINT practitioners: location, and time.

    The case of the Iranian nuclear program is an excellent demonstration of the former, as the Iranian government has elected to tunnel deep into mountains and underground in order to protect nuclear sites from aerial bombardment, but also to protect those same sites from the prying eyes of Western GEOINT assets. A second example took place following the aforementioned Hainan Island incident, when the Chinese military used shrouds to obscure their exploitation teams' efforts from American GEOINT assets. In addition, orbiting satellites are observable from the Earth's surface, allowing their orbits to be determined - a phenomenon dramatized in the 1992 film Patriot Games. Accordingly, parties who expect attention from rival GEOINT practitioners are likely to adjust to the expectation that someone is trying to observe their movements and actions, potentially catching them in the midst of hostile acts.

    The latter factor - time - is another potential weakness of GEOINT. One of the reasons why the aforementioned U2 aircraft are currently expected to remain operational for at least another decade is that despite the strengths of satellite-based GEOINT, U2 observation flights can be scrambled to an area of interest in short order, whereas altering a satellite's existing orbital pattern can be cost- or operationally-prohibitive. Even unmanned aerial vehicles (UAVs), which boast much longer "orbital times" (airborne time on station), are incapable of lingering forever. In a limitation similar to the need to position SIGINT assets within proximity of a signal in order to capture it, GEOINT assets must be above a position of interest in order to capture events there; by way of illustration, an orbital observation platform passing over Severomorsk at 13:00 UTC is incapable of observing a ballistic missile test launch at Tonghae at 13:05. The result is a complex and imperfect dance in which GEOINT platforms overlap in their routes as well as possible, otherwise leaving gaps in coverage.

    GEOINT products also tend to be time-sensitive. In some ways, this can be helpful: for example, GEOINT products showing the aforementioned Syrian site on 05 September 2006 might be useless on their own, but would become substantially more relevant when compared to imagery from the same location on 05 September 2007 (the day before the Israeli air strike), 07 September 2007 (immediately following the strike), and six months thereafter. By contrast, however, GEOINT products showing the location of a Taliban encampment on Monday might be worthless if planning a military strike on the same location for Wednesday. While significant investment in GEOINT resources since their rise to prominence has allowed for a substantial improvement in the capacity for maintaining strategic, operational, and tactical situational awareness, limitations endure.

    Another historic strength of GEOINT platforms - their relative invulnerability - may also be coming to an end. Three nations (the United States, the Soviet Union, and China) have worked to develop anti-satellite technology. To date, the United States has destroyed two satellites in what amount to proof-of-concept tests: a U.S. Air Force F-15 Eagle destroyed the P78-1 Solwind satellite using an ASM-135 ASAT missile on 13 September 1985, and the U.S. Navy cruiser USS Lake Erie destroyed the USA-193 satellite using a modified RIM-161 SM3 missile on 21 February 2008. The second event is believed by some to have been carried out in part as a response to China's own 11 January 2007 test of a modified DF-21 ballistic missile repurposed as a kinetic kill vehicle, which was used to destroy the Chinese FY-1C weather satellite. Given that USA-193 and FY-1C could both have been considered GEOINT assets (USA-193 by design, FY-1C by overall capability), the prospects for the future targeting of GEOINT-dedicated satellites for destruction by hostile rivals is obvious.

    GEOINT also suffers from a sort of ad hoc dichotomy: while photographs do not lie, their interpretation can indeed misinform the GEOINT analyst tasked with deciding what a photograph entails. By way of illustration, one virtue of orbital photography is that it prevents a covert agent from having to infiltrate an enemy ballistic missile base to count delivery vehicles; but this separation could potentially allow said enemy to fabricate false "Quaker Missiles" in the same vein as the American Civil War practice of creating so-called "Quaker Guns" by painting logs black to make them appear to be artillery pieces. An amusing real world example of this phenomenon is a former building at the center of the courtyard within the Pentagon that Soviet intelligence once speculated may have been the entrance to an underground bunker, but which was actually the Ground Zero Cafe, a snack bar for Pentagon employees.[3.08] Although GEOINT platforms include additional capabilities, such as infrared, thermal, and radar, the added capabilities of these systems are not entirely capable of eliminating the fog of war. Not unlike reading the Bible, GEOINT products require careful interpretation, and misinterpretation can be extremely costly.

    GEOINT, like SIGINT, is exceptionally costly. Reconnaissance satellites are among the most sophisticated machines ever created by man, and their launch alone can cost billions of dollars. According to some estimates, launching a satellite costs between $10,000 and $13,000 per pound, and the aforementioned orbital reconnaissance satellite USA-193 was reputed to be as large as a bus. When one factors the cost of the satellite itself, plus fuel, infrastructure to operate the platform, and staffing costs, the overall cost of operating a single satellite comes into stark focus. (That having been said, some overlap is likely - for example, operators and infrastructure are likely used for multiple satellites operating as a network of surveillance assets, vice independently.) Given the cost of such programs, one can only assume that intelligence agents and lawmakers alike are keen to rely on such resources to justify their overwhelming cost. Such reliance on any method, discipline, or function of intelligence gathering will prove necessarily problematic.



    4 HUMINT


    SIGINT and GEOINT can be compared and contrasted with HUMINT by breaking the aforementioned strengths and weaknesses of the two selected technical collection methods down into a simplified list, and addressing each item in relation to HUMINT.
    1) SIGINT exploits the inherent vulnerability of signals: signals must be accessible/vulnerable in order to be useful to the recipient, putting them at risk for interception.
    HUMINT displays corresponding strengths and weaknesses. The virtue of signals is that they allow two parties to communicate without physical proximity to one another - an advantage lost when conditions require two people to meet in person. However, by meeting and dispensing with the use of signals altogether, an added degree of security can sometimes be gained, particularly if two parties (for example, an intelligence officer and an asset) employ tradecraft to preclude the possibility of being monitored. If tradecraft is impossible or neglected, the two parties could still be vulnerable to clandestine monitoring by opposing agents or adjacent recording devices.
    2) SIGINT can be defeated by security measures such as technical or procedural encryption; however, SIGINT practitioners can gain an advantage because maintaining perfect signals tradecraft is difficult, repetitive, and contrary to human nature.
    The same strengths and weaknesses exist in HUMINT, although in different forms. Excellent and meticulously executed tradecraft can theoretically protect intelligence officers and their agents from security risks, though tradecraft is often difficult, repetitive, contrary to human nature, and sometimes time-consuming. As with SIGINT, HUMINT security tradecraft may still be unable to deter the efforts of a similarly meticulous opposing force, or one that is well resourced.
    3) SIGINT can triangulate signals to determine their point of origin.
    Although no legitimate corollary exists within HUMINT, humans are vulnerable to counterintelligence and clandestine observation efforts by opposing forces.
    4) SIGINT requires large networks covering a wide geographic area, or else large gaps in coverage will limit its effectiveness.
    In a similar fashion, HUMINT can be challenging based upon the existence and mobility of billions of human beings worldwide. This can be both an advantage and a challenge to HUMINT practitioners. The fact that, once found, each human responds to a unique set of motivations and values further complicates HUMINT efforts.
    5) SIGINT assets tend to intercept unrelated signals in the process of looking for relevant ones; this high "wheat-to-chaff ratio" is sometimes referred to as the "Vacuum Cleaner Problem".
    HUMINT practitioners are unlikely to encounter an exact corollary of this problem: the entire point of running HUMINT assets is that they will be recruited in the first place due to their special access to a program or location of interest to the presiding intelligence officer - in other words, the fact that a particular city may boast fifty thousand residents does not require an intelligence officer to hear from every individual resident. However, this does not preclude supposed insider agents from providing inflated credentials, nuanced or exaggerated information, or pure fabrications to the HUMINT practitioner. HUMINT practitioners may find themselves obligated to bestow unwarranted trust on their assets for lack of any capacity to corroborate their assets' reports.
    6) GEOINT is difficult for targets to escape from; conversely, parties expecting to be observed by GEOINT are likely to adjust their operations accordingly.
    Again, a corollary from the world of HUMINT is difficult to derive. In the event that an agent is voluntarily meeting with an intelligence officer, the two must employ careful tradecraft at all times in order to avoid compromise by opposing forces. Conversely, if an potential asset does not want to provide information - for example, a terrorist being pursued by HUMINT agencies for the purpose of detention and interrogation will likely employ strong operational security measures to avoid detention. In the event that the subject is eventually detained, information may still be difficult to obtain, particularly if the agency in question is restricted in its conduct by regulations or laws governing the treatment of detainees.
    7) SIGINT and GEOINT assets have a massive geographic area to cover, resulting in challenges for the positioning of listening assets and the timing of overflight and observation.
    HUMINT practitioners likely encounter similar challenges. The world is a big place, and coordinating location and timing to secure the desired results is likely challenging for HUMINT practitioners.
    8) GEOINT products tend to produce time-sensitive data that can be useful for trend analysis, but may be limited in utility for long-term mission planning. GEOINT is also vulnerable to potentially flawed interpretation despite the objectivity of actual images - for example, the Ground Zero Cafe. Despite the additional GEOINT capabilities of infrared, thermal, radar, and others technologies, these can not eliminate the fog of war entirely.
    The same can be said of intelligence data produced from HUMINT sources: information is likely to be time-sensitive, or in some cases incomplete. While GEOINT assets have the virtue of presenting an objective picture that must then be interpreted, HUMINT assets are capable of either providing false information of their own volition, providing false information as a result of external counterintelligence and deception operations, or providing incomplete information owing to limited or flawed knowledge of the situation in question.
    9) The traditional invulnerability of GEOINT platforms may be coming to an end.
    HUMINT assets are inherently vulnerable - in fact, even excellent tradecraft may fail to protect HUMINT assets in the event that their exploits are discovered by hostile opposing forces. In this case, the advantage goes to GEOINT platforms.
    10) SIGINT and GEOINT are both exceptionally costly in terms of equipment deployment, maintenance, collection, and analysis. Intelligence professionals and lawmakers may subsequently be motivated to rely on technical platforms in order to to justify continued expenditure for their maintenance.
    When available as an option, HUMINT tends to be considerably less costly than technical methods, as demonstrated by several cases involving payment for intelligence information. One example of this is the Robert Hanssen case, in which an FBI counterintelligence officer was convicted of having accepted payment of $1.4 million in cash and diamonds over the course of twenty-two years - an average of only about $64,000 per year[4.01], substantially less than the annual operating cost of most SIGINT assets and considerably less than the cost of a single GEOINT asset. Similarly illustrative is the case of Ronald William Pelton, who betrayed Operation Ivy Bells - the U.S. Navy's operation to tap unencrypted Soviet communications cables in the Sea of Okhotsk - for a mere $40,000.[4.02] Assets from developing nations with low per capita income might be motivated by far less money, and those assets providing intelligence due to personal motivation of one sort or another might be willing to provide that information at cost, or even without compensation.

    Worthy of note, and similar in nature to limitations inherent to SIGINT, is the potential language barrier. As organizations such as the NSA and GCHQ employ translators to convert intercepted visual and audio signals into comprehensible English, HUMINT-oriented agencies such as the CIA and SIS employ both interpreters and case officers with foreign language capabilities.



    5 Conclusion: Combined Arms


    These comparisons gain from an examination of how intelligence operations work under real world circumstances. In warfare, the concept of "combined arms" unifies infantry capabilities with other methods of fire and maneuver, such as armor, artillery, mortars, air support, and naval fires. The subsequent result is that forces employing combined arms, particularly in symmetrical operations against similar forces, are likely to prevail by, in essence, trapping the enemy through the limitation of his options for fire and maneuver. In a similar manner, the intelligence community employs a system similar to combined arms known as all-source intelligence or all-source analysis. The result is a system whereby multiple assets and disciplines are combined to overcome the limitations of each individual asset and/or discipline. The recent history of intelligence provides two prominent examples: the pre-2003 assessment of Iraq is an object lesson in the failure of intelligence, while Operation Neptune Spear is an object lesson in its success.

    In February of 2003, Secretary of State Colin Powell, himself a retired U.S. Army general and the former Chairman of the Joint Chiefs of Staff, addressed the United Nations Security Council on the topic of Iraq. Secretary Powell's remarks addressed a number of topics relating to Iraq: weapons of mass destruction (WMD) programs; denial and deception operations aimed at UN inspection and verification teams; WMD delivery systems; ties to terrorist groups; and human rights violations. Secretary Powell's remarks, built on the best available all-source intelligence derived in large part from a number of controversial Iraqi informants or defectors, reflected the best available estimation of the CIA, SIS, and the rest of the intelligence community. This estimation was used to demonstrate the Iraqi government's material breach of multiple United Nations resolutions requiring it to disarm, and submit to verification procedures to demonstrate the disarmament process to the international community.[5.01]

    While much of the evidence provided about WMDs was legitimate, it suffered from both falsifications and incorrect interpretations. Of particular note was one source, Rafid Ahmed Alwan al Janabi (pseudonym "Curveball"), who provided now-discredited intelligence about mobile biological weapons laboratories. Other information, such as SIGINT intercepts, were misinterpreted by SIGINT practitioners. Once coalition forces had occupied Iraq and conducted comprehensive inspections of the country, the original estimates of the strength and maturity of the regime's WMD programs were found to be incorrect. When he was captured in December of 2003 and subsequently interrogated, Saddam Hussein revealed that although his WMD programs were in a precursor state, he had considered Iran a greater threat than the international community and orchestrated the deception operation in an effort to keep his long-time Persian enemies at bay.[5.02] In the case of the intelligence estimates of Iraq prior to the 2003 invasion, the best information available from HUMINT sources combined with technical platforms failed to provide intelligence professionals and policy-makers with the information they needed to make an appropriately informed decision regarding military intervention.

    The converse example is that of Operation Neptune Spear, the May 2011 operation in Abbottabad, Pakistan to kill Osama bin Laden. Operation Neptune Spear represented the culmination of years upon years of all-source intelligence exploitation, but the trail began with a single piece of HUMINT data:
    The name Abu Ahmed al-Kuwaiti was first mentioned to authorities in Mauritania by an al-Qaida operative, Mohamedou Ould Salahi. It was obviously a pseudonym. The name meant "the Father of Ahmed from Kuwait". It was just one name among thousands that were daily being entered into what would become the Terrorism Information Awareness database.[5.03]
    HUMINT sources, particularly a series of high-ranking al Qaeda leaders who were detained and interrogated by American intelligence professionals, proved indispensible in providing the leads necessary to refine the search for bin Laden. These included Abu Faraj al Libi, and Khalid Sheikh Mohammed. According to Marc Thiessen, speaking at The Heritage Foundation in February of 2012 on the topic of enhanced interrogation:
    Leon Panetta, the then-CIA Director confirmed, quote, "Obviously there was some valuable intelligence that was derived through those kinds of interrogations." Now, if intelligence from CIA interrogations was not critical to the greatest achievement of the Obama administration, don't you think they'd be shouting it from the rooftops? Of course. Panetta's predecessor, Mike Hayden, was more explicit. He said, "Let the record show, when I was first briefed in 2007 about the brightening prospects for pursuing bin Laden through his courier network, a crucial component of the briefing was information provided by three CIA detainees, all of whom had been subjected to some form of enhanced interrogation." [...] And he... moreover said, "It's nearly impossible for me to imagine any operation like the May 2 assault on bin Laden's compound that would have not made substantial use of the trove of information derived from CIA detainees, including those on whom enhanced interrogation techniques have been used", unquote.[5.04]
    These quotes from Leon Panetta and Michael Hayden indicate the criticality of HUMINT to the successful raid. However, HUMINT alone would have been useless. In order to complete the picture, SIGINT was required to locate and track "Abu Ahmed al Kuwaiti" (whose real name was Ibrahim Said Ahmed), and to identify that the compound was itself conspicuously bereft of signals since its residents did not have amenities like cable television or Internet access. This was combined with GEOINT from satellites and UAV platforms, which allowed analysts to determine the peculiar traits of the compound. The pseudonymous "Mark Owen", one of the U.S. Navy DEVGRU personnel involved in the raid, makes note of analysts who studied UAV footage of "The Pacer", a figure meeting bin Laden's description who would pace in circles in one of the compound's courtyards.[5.05]

    The natural conclusion is that technical intelligence collection provides unprecedented capabilities to policy-makers, military personnel, and intelligence practitioners. However, despite the increasing reliance on technical collection methods, HUMINT will continue to provide capabilities that SIGINT, GEOINT, and other technical methods are incapable of replicating. Because intelligence is an inherently human endeavour, HUMINT will continue to be the core of successful intelligence operations for the foreseeable future. In the same way that combined arms ultimately assists the infantryman with boots on the ground, technical intelligence will continue to provide ultimate assistance to the HUMINT core, rather than becoming an independent alternative.



    Citations:


    2.01 BACK Lambert, Andrew; The Crimean War; BBC; London; 2011; http://www.bbc.co.uk/history/british/victorians/crimea_01.shtml

    2.02 BACK Westwood, James T., Lieutenant Commander, USN; Electronic Warfare and Signals Intelligence at the Outset of World War I; NSA; Fort Meade, Maryland; http://www.nsa.gov/public_info/_files/cryptologic_spectrum/electronic_warfare.pdf

    2.03 BACK Schneier, Bruce; Intercepting Predator Video; Schneier on Security blog; 2009; http://www.schneier.com/blog/archives/2009/12/intercepting_pr.html

    2.04 BACK Sokol, Brett; Espionage Is in the Air; Miami News Times; 2001; http://www.miaminewtimes.com/2001-02-08/kulchur/espionage-is-in-the-air/

    2.05 BACK Poundstone, William; William Morrow; Big Secrets; New York City, New York; 1983

    2.06 BACK Grabow, Ryan; Long Island University; Numbers Stations; Brookville, New York; 2003; http://www.egrabow.com/media/pro/bdst491m.pdf

    2.07 BACK le Carré, John; The Looking Glass War; William Heinemann; 1965

    2.08 BACK Shachtman, Noah; Insurgents Intercept Drone Video in King-Size Security Breach (Updated, with Video); Wired.com; 2009; http://www.wired.com/dangerroom/2009/12/insurgents-intercept-drone-video-in-king-sized-security-breach/

    2.09 BACK Ackerman, Spencer and Shachtman, Noah; Almost 1 In 3 U.S. Warplanes Is a Robot; Wired.com; 2012; http://www.wired.com/dangerroom/2012/01/drone-report/

    2.10 BACK Strategy Page; Israeli UAVs Encrypt The Signal; 2010; http://www.strategypage.com/htmw/htiw/articles/20101201.aspx

    3.01 BACK Kristensen, Hans M.; New Chinese Ballistic Missile Submarine Spotted; Federation of American Scientists Strategic Security Blog; Washington, D.C.; 2007; http://www.fas.org/blog/ssp/2007/07/new_chinese_ballistic_missile.php

    3.02 BACK Hutcheon, Stephen; Oops, another top secret exposed; The Age; Melbourne; 2007; http://www.theage.com.au/articles/2007/09/04/1188783202402.html

    3.03 BACK Broad, William J. and Mazzetti, Mark; Photos Show Cleansing of Suspect Syrian Site; The New York Times; New York City, New York; 2007; http://www.nytimes.com/2007/10/26/world/middleeast/26syria.html

    3.04 BACK 06 September 2007 Airstrike; GlobalSecurity.org; Alexandria, Virginia; http://www.globalsecurity.org/military/world/war/070906-airstrike.htm

    3.05 BACK Kristensen, Hans M.; New Chinese SSBN Deploys to Hainan Island; Federation of American Scientists Strategic Security Blog; Washington, D.C.; 2008; http://www.fas.org/blog/ssp/2008/04/new-chinese-ssbn-deploys-to-hainan-island-naval-base.php

    3.06 BACK Geens, Stefan; Hunting for Iran’s secret nuclear plant near Qum on Google Earth; Ogle Earth blog; Stockholm; 2009; http://ogleearth.com/2009/09/hunting-for-irans-secret-nuclear-plant-near-qum-on-google-earth/

    3.07 BACK Swaine, Jon; Iran suspected of clean-up operation at nuclear site; The Telegraph; Washington, D.C.; 2012; http://www.telegraph.co.uk/news/worldnews/middleeast/iran/9253558/Iran-suspected-of-clean-up-operation-at-nuclear-site.html

    3.08 BACK Smith, Steven Donald; Pentagon Hot Dog Stand, Cold War Legend, to be Torn Down; American Forces Press Service; Washington, D.C.; 2006; http://www.defense.gov/news/newsarticle.aspx?id=1049

    4.01 BACK Wise, David; Spy: The Inside Story of How the FBI's Robert Hanssen Betrayed America; Random House; New York City, New York; 2003

    4.02 BACK Drew, Christopher and Sontag, Sherry and Annette Lawrence Drew; Blind Man's Bluff: The Untold Story of American Submarine Espionage; PublicAffairs; New York City, New York; 1998

    5.01 BACK Powell, Colin L.; Remarks to the United Nations Security Council; GlobalSecurity.org; United Nations, New York City, New York; 2003; http://www.globalsecurity.org/wmd/library/news/iraq/2003/iraq-030205-powell-un-17300pf.htm

    5.02 BACK de Sola, David; FBI interviews detail Saddam Hussein's fear of Iran, WMD bluff; CNN; 2009; http://articles.cnn.com/2009-07-02/world/fbi.saddam.hussein.interview_1_fbi-interviews-saddam-hussein-united-nations-weapons-inspectors?_s=PM:WORLD

    5.03 BACK Bowden, Mark; The death of Osama bin Laden: how the US finally got its man; The Guardian; London; 2012; http://www.guardian.co.uk/world/2012/oct/12/death-osama-bin-laden-us

    5.04 BACK Thiessen, Marc; The Obama Doctrine at Year Three: An Assessment; The Heritage Foundation; Washington, D.C.; 2012; http://www.heritage.org/events/2012/02/obama-doctrine

    5.05 BACK Owen, Mark and Maurer, Kevin; No Easy Day: The Firsthand Account of the Mission that Killed Osama bin Laden; Dutton Penguin; 2012

  • Thursday, October 24, 2013

    Bold Brigand: Revisiting the Isle of Wight

    The Isle of Wight is located south of Portsmouth, across a body of water known as The Solent - not to be confused with "Soylent Green", which is allegedly people. To the best of my recollection, I first became aware of the Isle of Wight in 2003 while doing intensive research into the Roman conquest of Britannia. During the first century invasion of southern Britannia as ordered by Emperor Claudius, the Isle of Wight - "Vectis" - was conquered by a Roman officer named Vespasianus, who would later become Titus Flavius Caesar Vespasianus Augustus, the ninth emperor of the Roman Empire. Suetonius records:
    "In the reign of Claudius he was sent in command of a legion to Germania, through the influence of Narcissus; from there he was transferred to Britannia, where he fought thirty battles with the enemy. He reduced to subjection two powerful nations, more than twenty towns, and the island of Vectis [The Isle of Wight], near Britannia, partly under the leadership of Aulus Plautius, the consular governor, and partly under that of Claudius himself. For this he received the triumphal regalia."
    - Suetonius, The Life of the Deified Vespasian, ch. IV
    Being the Roman history aficionado that I was back in 2004, I determined to visit the Isle of Wight. In early August, I arranged digs for a couple of days and took first the train, then the ferry, then another train, to get to a town called Shanklin on the southeast end of the island. One of the fascinating things about the rail line on the Isle of Wight - a mere shadow of its former self - is that it uses retired coaches from the London Underground. So, if you love the Tube, but hate London, then the Isle of Wight is the place for you!

    As in 2004, I stayed at the Avenue Hotel. It's fairly centrally located, only about ten minutes walk from all of the "action" in Shanklin. Not that there's actually much "action" in Shanklin. While it's theoretically a big tourist destination, it doesn't seem that much actually happens there - as evidenced by the fact that the Bon Jovi concert from the 16th of June was still being advertised on buses in late September. That's part of Shanklin's charm, I suppose; and it's allegedly part of what drew the likes of Charles Darwin, among others, to the island during the nineteenth century. At any rate, the Avenue was just how I remembered it: friendly staff, comfortable rooms, big disused rear courtyard, and a great breakfast.

    One big difference was that, in 2004, the Isle of Wight was about ten degrees cooler than the weather where I was living (and working with Pockets). That was quite a welcome change, as it was wayyyyyy too hot where I was staying. This time around it was really warm and humid - not thrilling. I wandered around a bit more this time around than I did the last time, but didn't wander all the way down to the Esplanade - I got a look at it from above, which was quite sufficient. On the other hand, I wandered entirely by chance into a pub called Indy's, operated by Emilee, better known as "Indy" owing to her longstanding obsession with Indiana Jones; and her mother, Lorraine. I enjoyed a couple of long chats with Lorraine, and a couple of regulars named Mark and John.

    After a couple of nights in Shanklin, it was time to return to my island paradise. The time spent in Shanklin was bittersweet, as I remembered some good times I had there, as well as some of the less fortunate fallout that followed my departure from the United Kingdom. I'd wanted to revisit the Isle of Wight, sure; but in some ways, I wanted to overwrite some of those memories from 2004. Even though I visited some of the same places where I'd wandered all those years ago, I think that the new memories will prevail... To include a great memory of an Isle of Wight beer called Undercliff Experience from the Yates Brewery. Thanks, Avenue Hotel and Indy's for making my repeat trip to the Isle of Wight one to remember. As to whether I ever wind up making it back... I suppose only time will tell.

    Wednesday, October 23, 2013

    Around Aberdeen: IRN BRU Advert

    Many moons ago, I wrote about IRN-BRU. I've posted about how hilarious IRN-BRU adverts are... Twice! My buddy the Man of Steel caught wind that I was in Scotland, and begged that when I go home, I bring him as much IRN-BRU as I possibly can. (That's going to take some work.) A few weeks ago, during my waning days in Aberdeen, I saw this graphic on the back of a weathered delivery truck. I posted it to the Man of Steel's Facebook page, of course; but I also wanted to share it with you, my valued readership. I'll miss IRN-BRU, but more than that, I'll miss its advertising campaign.