Академический Документы
Профессиональный Документы
Культура Документы
The recent spate of terrorism and the pattern with which it is unfolding whole over the world makes this issue one of the top concerns of states and requires equally resilient efforts to counter it. This deep rooted menace today presents unique challenge with a global network of clandestine cells linked with each other. The complexity involved and lack of a comprehensive and holistic approach to effectively counter it further aggravates the situation. From the offensive military operation to the consequence management after any disastrous terrorist attack the tool which seems to be neglected, if not out rightly ignored, is of intelligence. Counter terrorism, as the word denotes, is to take offensive action against terrorist organizations, personnel and facilities. Essentially an offensive action against a clandestine phenomenon requires highly effective and accurate intelligence. If a RAND study, titled How Terrorist Groups End, is to be believed then effective police and intelligence work, rather than the use of military force, deliver better counterterrorism results.1 It is the intelligence which can make sure the preemptive neutralization of terrorists. However intelligence in the struggle against terrorism poses some new and difficult demands. Acquiring information about the composition, location, capabilities, plans, and ambitions of terrorist groups is an enormous challenge for intelligence agencies, meeting this challenge requires different skills than were needed to keep informed about the capabilities and intentions of conventional enemies that were usually governments. Observers point to several major challenges that the Intelligence Community will likely encounter in supporting the counter terrorist effort.2 First is a renewed emphasis on human agents. Signals intelligence and imagery satellites have their uses in the counterterrorism mission, but intelligence to counter terrorism depends more on human intelligence (HUMINT) such as spies and informers. Any renewed emphasis on human intelligence necessarily will involve a willingness to accept risks of complicated and dangerous missions, and likely ties to disreputable individuals
1
How Terrorist Groups End: Lessons for Countering al Qaida (Santa Monica, Calif.: RAND Corporation, MG741-1, 2008). Available at: www.rand.org/pubs/monographs/2008/RAND_MG741-1.pdf. 2 Ken Adelman. Facing the Enemy, Washingtonian, November 2001, 33.
who may be in positions to provide valuable information. Time and patience will be needed to train analysts in difficult skills and languages. Second, terrorist activities pose significant analytical challenges. In addition to acquiring analysts with esoteric language skills, intelligence agencies must develop expertise in many backward areas that had been of peripheral concern in recent past. Much of the data available will be in open, unclassified sources that intelligence agencies have often neglected. Third is the closer relationship between intelligence and law enforcement agencies. In counterterrorism efforts, intelligence agencies have to work alongside law enforcement agencies that have far different approaches to gathering evidence, developing leads, and maintaining databases. Laws and policies should be modified to facilitate a closer relationship between the two sets of agencies. Finally, military operations against terrorists will reinforce requirements for collecting and transmitting precise intelligence to military commanders or operators. It is this importance of and challenges to intelligence community in counter terrorism which stimulated this research. Lets first comprehend the nature of terrorism.
Thomas Mockaitis, The New Terrorism Myths and Reality (London: Pentagon Press, 2007), 1.
Terrorism is (1) an intentional and (2) rational (3) act of violence to (4) cause fear (5) in the target audience or society (6) for the purpose of changing behavior in that audience or society. Terrorism is a political act, the goal of which is to make a change. The terrorist is not driven by personal desires or ambitions. Further more terrorism is about impact on society. There are three types of terrorist attacks:4 (1) Attacks that involve weapons of mass destruction, (2) Weapons of mass casualty and (3) Weapons of mass disruption. While terrorism is goal centered in creating fear in a society to achieve a political goal, a terrorist act can be placed in one of two general groupings. The act is either objective driven or terror driven.5 (1) Object Driven An objective driven act of terrorism is committed in order for the terrorist group to get certain demands met by a government. Hostage taking is an example. (2) Terror driven Terror driven acts are committed as retaliation for a perceived wrong or as a warning of future acts of terror if the government does not change its policies.
4
5
Daniel Benjamin and Steven Simon, The Age of Sacred Terror (New York: Random House, 2002), 103. Ibid.
Counterterrorism intelligence is of three categories:6 1. Strategic 2. Tactical 3. Psychological Strategic: Intelligence about the organization of the terrorist organizations, leadership, intentions, aims, modus operandi, sources of funds, weapons and means at their disposal, contacts with external elements, including foreign intelligence agencies, etc. Tactical: Intelligence which relates to the specific plans of terrorist action, also called preventive and indications-and-warning intelligence, which would enable the state to preempt terrorist action, prevent attacks, and frustrate terrorist plans. Psychological: Intelligence which covers details of psychological warfare propaganda of the terrorists against the state that need to be countered, and data relating to the terrorists, which enable the state to mount its own psychological warfare against them. Indicators of discontent against the leadership in terrorist organizations, coercive methods in the recruitment of volunteers, and misuse of children and women for terrorist operations are examples of such data. While the coverage of strategic and psychological intelligence by the intelligence services in general seems to be satisfactory, the collection of tactical, preventive, and indications and warning intelligence has left much to be desired. This is due largely to the difficulties in penetrating terrorist organizations for collection of human intelligence and their communications for the collection of signals intelligence. While strategic and psychological intelligence can be collected from open sources, peripheral secret sources, interrogation of captured or surrendered terrorists, analysis and exploitation of captured documents, IT hardware and software, precise preventive and indications and warning intelligence can generally be obtained only from moles in key positions in the terrorist organizations and through interception of communications.
6
James W. Harris, Building Leverage in the Long War, Policy Analysis, no. 439 (Washington D.C: Cato Institute, May 2002), 14.
Elements of combating terrorism can be identified as:8 1. Anti-terrorism to protect important installations and places from terrorist attack. 2. Consequence management to mitigate the effects of an actual terrorist attack. 3. Counterterrorism to take offensive action against terrorist organizations, personnel, and facilities. Anti terrorism includes the specific objectives to secure places from attack, consequence management consists of all measures taken to local, state, and national levels to prepare for and, when necessary, respond to an actual terrorist attack. Counterterrorism refers to offensive military and law enforcement operations against terrorist organizations, networks, and individuals along with economic, social, and diplomatic measures to attack the root causes of unrest that encourage terrorist activity. Intelligence, the difficult task of gathering, analyzing, and sharing information, lies at the center of all three and helps tie them together.
7 8
Pictorial placement of intelligence in elements of combating terrorism Thomas Mockaitis, The New Terrorism Myths and Reality (London: Pentagon Press, 2007), 91-93.
Kleanthis Kyriakidis, 21st Century Terrorism: Wrong Diagnosis, Inadequate Remedy (Naval Postgraduate School Thesis, June 2005), 17 10 (James W. Harris 2002, 17)
Blair was later to comment over the deployment of troops that to this day we dont know if it was correct and we foiled it or if it was wrong. 12 However, the intelligence source was regarded as a strong one and the counter-terrorism policy priority was to protect the public. The attack on Madrid in March 2004 was a large scale multi-location attack without any apparent prior signs of terrorist activity but with some relevant intelligence available but not fully shared. One expert has commented on terrorism intelligence that the bulls eye of this intelligence target an individual terrorist plot lacks the size and signatures of most other targets, from nuclear weapons programs to political instability and that intelligence specific to terrorist plots is often unattainable.13 It would appear that the quote above can also be applied to the London bombings of 7 July 2005. Those attacks are a stark reminder of the inherent problems of counterterrorism intelligence. For any kind of pre-emptive or prevention action there must exist at least one of the following: some form of target or time-specific threat, a person or persons whose activity has suspicious characteristics (perhaps purchases of explosives related components) or communications intercept data. One of the key factors affecting the ability to effectively prosecute counter terrorism operations is the linkages between and among the different security, military and intelligence agencies involved. Often equal partners and stakeholders in the same fight, each agency will nevertheless carry its own legacy of operating procedures, cultural biases and bureaucratic inertia that can make an inter-agency operation difficult and frustrating. The disadvantage is of course is that each unique agency has its particular strengths, distinct specializations and core skills that bring a huge amount of added value to the operation. The trick is to leverage these advantages in a framework that retains the distinct talents and strengths of each partner and minimizes disruption to the mission goal.14
11
James Risen, In Hindsight, C.I.A. See Flaws that Hindered Efforts on Terror. New York Times, October 7, 2001. 12 The Times, March 29, 2004. 13 Paul R. Pillar, Intelligence, in A.K. Cronin and J.M. Lendes, eds., Attacking Terrorism Elements of a Grand Strategy (Washington, DC.: Georgetown UP, 2004) , 115-139. 14 The Road to Sept. 11, Newsweek, October 1, 2001, 38.
An important role for intelligence in counterterrorism is acquiring information concerning the terrorists plans, that is, where they are likely to strike next.15 Unlike in conventional operations where discerning enemy plans amounts to evaluating alternative courses of action, discerning enemy plans in terrorism can be almost impossible at times because the enemy generally seizes opportunities to strike as they occur and because decisions occur at low levels and operations involve relatively few people and pieces of equipment. Predictive analysis aims at forecasting where, and sometimes when the enemy will strike next. In the absence of data on friendly behavior, these techniques invariably depend on some statistical analysis of past behavior. The predictions are therefore based solely on what the terrorists have done in the past. Most assume an underlying randomness associated with terrorists behavior. For example, an examination of past terrorists attacks might reveal that the interarrival time of the attacks is exponentially distributed, leading to a Poisson distribution of the number of attacks per time interval. This is also true of the location of the attack. Thus we get an underlying bivariate Poisson distribution for the time and location of attacks.16
15
Richard K. Betts, Analysis, War and Decision: Why Intelligence Failures Are Inevitable, World Politics (October 1978). 34 16 (James Risen, October 7, 2001)
To be effective, predictive methods should possess the following characteristics: 1. They should recognize that terrorists attacks are nonrandom. Terrorist attacks are anything but random in time and location. Terrorists attack where forces, civilians or static targets are, or will be located and when they anticipate they will be at that location. For example terrorists emplace IEDs along roadways where it is anticipated that forces will travel. Consequently any algorithm or mathematical process that purports to examine inter-arrival times or spacing of attacks is more likely to fail. The reason is that these lead to Poisson processes that are inherently random, even if they are described by a known distribution. 2. They must account for an enemy that adapts. If forces are successful at predicting where the terrorists will strike next and they act on that intelligence, we would expect the enemy to react in some way so as to blunt the adverse effects of the friendly action. One way to counter this likely phenomenon is to examine more-recent historical events. Typically, analysts like to examine all the data possible to support whatever study they are conducting. When examining insurgent attacks, this means looking at all attacks that have taken place. However, what occurred six months ago may have no relevance to what will occur tomorrow. By shortening the time horizon, we are much more likely to capture enemy adaptations.
both a matter of quality and quantity. Technology, seen by some as the panacea for translation, is not highly regarded by real linguists or analysts who need high-end translations. Language is an art as well as a science, and the current needs, with respect to terrorism, require an elusive mix of formal language, slang, codes, and multilingual capabilities.17 Al Qaeda, for example, contains many nonnative speakers of Arabic, poorly educated South Asians, and Muslims of very different countries; attention to perfect grammar is not the issue. And there remains the problem of how language skilled employees and the broader regional knowledge they often possess is used in the intelligence process. Some elements of intelligence services know how to treat language officers as a vital part of the organization. In other parts of the intelligence community, language is more often considered a secondary skill, and is not valued sufficiently in recruitment or promotion of regional experts. Linguists should also not be physically separated from all-source analysts, and should be integrated to the maximum extent possible into the career development track of analysts. In the case of the classical battlefield, knowledge of enemy capabilities is the focal point of interest at the tactical level, while knowledge of the enemys intentions is paramount at the strategic level. The need for this knowledge has been translated into criteria and procedures aimed at producing essential elements of information, other intelligence requirements, and, more comprehensively and systematically, order of battle intelligence. With regard, in particular, to the imminence of aggression and the avoidance of surprise, indications and warning intelligence criteria and procedures have likewise been developed. These are not entirely or indiscriminately applicable to the counterterrorist effort. Nevertheless, if domestic as well as international terrorism is to be countered, it is precisely the capabilities and intentions of the various terrorist groups and their supporting networks that must be identified and dissected early on from an intelligence perspective. The skillful adaptation, as opposed to the direct adoption, of time tested classical intelligence methods, foremost indications and warning intelligence, constitutes and essential step in this direction.
17
10
What follows is a frame of reference for developing a specific set of indicators for terrorist threat assessment in terms of both terrorist strengths and weaknesses, in other words indications and warning intelligence.18 If properly adapted to the different geopolitical settings, it may serve as a substantive element in planning terrorist counteraction. Both components of terrorist counteraction, antiterrorism and counterterrorism, are predicated upon the collection, evaluation, and analysis of timely and accurate intelligence. Though this collection evaluation analysis process is the main task of intelligence services, it should also be conducted by other government agencies and the private sector. Identify exploitable societal conditions. These are historical, political, economic, social, and religious. Terrorism does not develop in isolation but feeds upon and exploits a wide variety of societal conditions present in a given community, country, or broader geographical area. Determine the presence of one or more radical subculture. While societal conditions strongly influence the birth and viability of domestic as well as transnational terrorist groups, particular attention should be devoted to a dominant factor, the presence of one or more radical subcultures. These draw their inspiration from well-defined or even hazy ideologies corresponding to leftist, rightist, ethnic, theocratic, or mixed schools of thought. Subversive agitation is the offspring of a environment directly traceable to a radical subculture. Monitor subversive agitation, revolutionary publications and propaganda as well as anti institutional demonstrations and activities. Because subversive agitation constitutes the operational cradle of terrorism, it is imperative that it be closely monitored. Subversive agitators typically recruit additional subversive cohorts, incite the population to disobey the laws, create civil disorders, and resort to street violence. Since groups of subversive agitators who have not reached the terrorist stage often coexist with ideologically kindred terrorist groups, the former can provide recruitment and support pools for the latter, thus reinforcing the terrorist ranks. In turn, the presence of subversive agitators belonging to different radical subcultures increases the potential emergence of
18
11
terrorist groups with contrasting ideological or political orientations, thus producing more sources of terrorism. Analyze terrorist ideological tracts and responsibility claims to identify ultimate goals and intermediate objectives. Terrorist literary production, though often untruthful or based upon an ideologically biased perception of society, furnishes nonetheless valuable insights regarding the mindset, self-image, aims, and preferential targets of a given terrorist group. Terrorist manifestoes and declarations can also indirectly provide data to assess a given groups organization and capabilities. Record systematically all terrorist incidents to establish modus operandi and to understand behaviors. Modus operandi, whose sophistication varies according to group, includes recruitment, training, and employment of personnel, targeting, (selective or indiscriminate); tactics (weaponry selection, ambushes, attacks, raids, abductions, hijackings, hostage taking); patterns (time element, coordination, target clusters, major and complementary actions); internal security and communications; logistics and finances, responsibility claims; and captivity rules. Modus operandi reflects both current and potential capabilities of specific groups. The fact that two or more groups issue from the same radical subculture is not necessarily indicative of shared operational methods and practices. Modus operandi is also subject to modifications over time. Track and analyze group behaviors for early detection of potential threats. Determine the structure of terrorist groups to assess capabilities. Identify relationships by uncovering interactions and relationships between terrorist groups and their members, link group members to understand formal and informal organizational structures. The structure is indicative of immediate as well as longer-term potential. Unicellular or multi cellular and compartmentalized terrorist groups are rigidly or loosely structured with centralized or decentralized leadership. In some cases they can also serve as an umbrella for lesser aggregations. Militants are part-timers, full-timers, or mixed. Structure and size will affect not only security, discipline, training, command & control, communications, planning, operations, and logistics, but also a groups life span. Groups belonging to the same radical subculture do not necessarily, and in fact often do not, adopt the same structure.
12
Identify support organizations, movements, and networks. Connect networks to expose connections between group members, other organizations, outside individuals, locations, facilities and communication networks. These aggregations of external supporters facilitate terrorist propaganda, recruitment, logistics, and intelligence. Some of them are institution based: in schools, factories, labor unions, unemployed societal strata, extra-parliamentary political circles, refugee camps, or extremist religious congregations. Others may be area-based, particularly where ethnic or separatist terrorism is active. In some cases, terrorist groups are flanked by political parties, usually extra parliamentary but with certain notable exceptions. Some groups are further supported by unlawful finance gathering networks and charities totally dedicated to the terrorist cause. Verify the presence of possible international linkages with kindred foreign groups and/or sponsor states. Expose group operations by showing shared assets, materials, and supplies for carrying out terrorist missions. When present, these linkages are precarious, generally range from ideological solidarity to logistical cooperation, and occasionally entail operations. Nonetheless, they constitute a clear threat since they broaden the terrorist support base and sphere of action. State sponsorship, which is a notable exception and not the rule, is more readily available to terrorist groups having a dual structure: an overt one for sociopolitical action and a covert one for terrorism itself. State sponsorship for sub-national terrorist groups is generally self-serving and predicated upon plausible denial. Probe exploitable terrorist structural and operational weaknesses and failures. Assess vulnerabilities by evaluating funding resources, recruiting methods, communication networks, storage facilities and other resources to uncover potential vulnerabilities. Terrorist groups thrive primarily on the elements of initiative and surprise, both highly dependent upon clandestine structures and dynamics. At the same time, these groups are subject to constraints exploitable by terrorism counteraction agencies. The necessarily clandestine nature of terrorist aggregations is a double-edged sword. Living hidden requires discipline, commitment, and the ability to cope with stress. The application of security rules, particularly compartmentalization, must be constant: there is no room for exceptions or relaxation. Terrorist groups must also foreclose internal dissent and schisms. Indiscriminate recruitment can also constitute a fatal flaw. 13
Personnel renewal is a challenge. Finally, failure to achieve its ultimate radical or revolutionary goal within the expected time frame can prove to be devastating to any terrorist group. Terrorism counteraction agencies must be prepared to exploit all of these factors. Although conceptually sequential, the above outlined steps in practice usually require nearly concurrent application, particularly if multiple and separate actors account for subversive agitation, terrorism, or both. Moreover, it should not be forgotten that even after the emergence of terrorism, when prevention has obviously failed for political or technical reasons, indications and warning intelligence can still play a major role in the containment and repression phases of terrorist counteraction.
Gregory F. Treverton, Reshaping National Intelligence for an Age of Information (New York: Cambridge University Press, 2001), 152-157.
14
be justified, the scope of the actions required to deal with the problem, especially the protection of computer networks in the private sector, would necessarily exceed the roles and capabilities of intelligence agencies. Collecting information about information warfare threats posed by terrorists organizations to systems is, however, a legitimate mission for the intelligence community. Indeed, it is a mission that has grown and will become increasingly important.
15
out the edicts of Osama bin Laden and his call to kill Americans. But the magnitude of the target and the destruction sought by the attackers suggest broader objectives.20 Second, terrorists go after high profile targets because of their groups relative weakness. Although terrorists assume that large numbers of people share their righteous anger and aspirations, in fact, they usually command few resources and even fewer followers. And in the wake of extraordinarily deadly terrorist attacks, they often lose the tacit support of silent people as people recoil from the loss of innocent life and what appears to be a senseless political agenda.
James Wirtz, Surprise and Intelligence Failure, Strategic Insight (September 2006). Ibid.
16
guaranteeing defeat. Likewise, the notion of "suicide bombing" is so alien to the American, indeed the Western, outlook that they find it difficult to fathom the mindset of enemies prepared to conceive of an operation of such horrific proportions.
17