http://www.energypublisher.com/article.asp?id=43435
Using human intelligence to stem terrorist networks Wednesday, November 17, 2010 by Siddhartha Ramana <http://www.energypublisher.com/print.asp?idarticle=43435> Print article Print The uncovering of recent terror plots, including the arrests in Europe and the detection of letter bombs targeting synagogues in the US can be credited to human intelligence or humint. Humint is a category of intelligence derived from information collected and provided by human sources. Humint is an indispensable source of intelligence gathering, which has grown in importance after the limitations of technological intelligence gathering systems, electronic intelligence and signals intelligence have revealed themselves. Historical narratives on war and strategy are replete with stories of spies. Chinese strategist Sun Tzu had said that "dispositions of an enemy are ascertainable through spies and spies alone;" while Indian philosopher Chanakya wrote that "The ruler should act upon the information given to him by his secret spies about every effort, initiative, political desire and treaties of his enemies." More recently, humint's importance was highlighted by the fact that nearly all terror plots in France have been foiled thanks to it, according to a member of France's main counter-terrorism force. The modern day terrorist is adept at counter-surveillance skills, and the efforts made into training terrorists to cover their tracks have paid rich dividends. It is important to note here that while terrorists may be ingenious in their usage of modern tools, they are essentially low-level technicians, with only a minority engaging in communication systems which can be traced and monitored. The difficulties faced by law enforcement agencies in relying on modern intelligence gathering methods was admitted by US Defense Secretary Robert Gates in 2009 when he stated that it was years since he received useful intelligence on the whereabouts of bin Laden. This is traceable to bin Laden's judicious use of modern communication technology, relying more on human couriers. It is reported that bin Laden stopped using his satellite phone as early as 1998 when he realized that his conversations about the African embassy bombings were being monitored. In uncovering recent plots, intelligence was garnered through interrogations of captured suspects. But intelligence services have also infiltrated or bought up members of terrorist groups.The infiltration of terrorist cells has helped counter-terrorism officials to gain good intelligence on the activities and membership of a group, and they have also been used in the execution of terrorist leaders. For example, the Israeli security agencies used a local contact to replace Hamas bomb-maker Yahya Ayyash's phone with an explosive device which killed him in 1996. One of the problems with using human intelligence sources is the difficulty in infiltrating a terrorist organization due to obvious fears of detection and murder of the asset. In one instance, Egyptian security forces blackmailed their assets in an attempt to assassinate Aymaan al-Zawahiri, the leader of the Egyptian Islamic Jihad. The plan backfired with Zawahiri surviving and executing his betrayers. Gaining assets in jihadist groups is particularly difficult owing to their allegiance to a larger community based on faith rather than a solitary-cause movement. For example, the member of a pan-Islamic jihadist group owes allegiance to the Ummah (Islamic community) beyond the group. Under these circumstances getting him/her to betray the cause becomes even more difficult. The fear of being double-crossed by an asset also plays on the minds of his/her handler. A member of a terrorist group used as an asset by intelligence agencies can cause significant damage because of his/her ability to play both sides. This was most effectively demonstrated in the case of Humam Khalil Abu Mulal al-Balawi, a Jordanian doctor, who was recruited by the CIA to infiltrate al Qaeda in Pakistan. Balawi scheduled a meeting with his CIA handlers in an American base in Afghanistan, and when he arrived he blew himself up, killing seven Americans. Significantly, the attack killed senior veterans of the CIA, and has been described as a serious blow to the agency's efforts in the region. The setbacks faced in using human intelligence tools should not come in the way of expediting their recruitment for intelligence gathering. Human intelligence should not be limited to intelligence and counter-terrorism agencies, but adopted at the grassroots levels of policing. Cooperative community policing being adopted worldwide is indicative of this trend. A key element to bolstering the intelligence apparatus should be developing cooperation between the different security wings. Human intelligence should be shared quickly and followed up with equal speed, as this could be the game changer in a ticking time bomb situation. The example of the Nigerian bomber's father, who tried to warn the authorities about his son before he attempted to bomb a plane bound for the United States, is a case in point. The need to further develop India's human intelligence capabilities is acutely felt with increasing concerns of religious extremism gaining momentum in the country. With technical and signals intelligence being boosted in recent years, the focus of attention should be on human intelligence for the security of the country. Siddharth Ramana is an analyst at the Institute of Peace & Conflict Studies, based in India. [Non-text portions of this message have been removed] ------------------------------------ -------------------------- Want to discuss this topic? Head on over to our discussion list, [email protected]. -------------------------- Brooks Isoldi, editor [email protected] http://www.intellnet.org Post message: [email protected] Subscribe: [email protected] Unsubscribe: [email protected] *** FAIR USE NOTICE. This message contains copyrighted material whose use has not been specifically authorized by the copyright owner. OSINT, as a part of The Intelligence Network, is making it available without profit to OSINT YahooGroups members who have expressed a prior interest in receiving the included information in their efforts to advance the understanding of intelligence and law enforcement organizations, their activities, methods, techniques, human rights, civil liberties, social justice and other intelligence related issues, for non-profit research and educational purposes only. We believe that this constitutes a 'fair use' of the copyrighted material as provided for in section 107 of the U.S. Copyright Law. If you wish to use this copyrighted material for purposes of your own that go beyond 'fair use,' you must obtain permission from the copyright owner. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtmlYahoo! Groups Links <*> To visit your group on the web, go to: http://groups.yahoo.com/group/osint/ <*> Your email settings: Individual Email | Traditional <*> To change settings online go to: http://groups.yahoo.com/group/osint/join (Yahoo! ID required) <*> To change settings via email: [email protected] [email protected] <*> To unsubscribe from this group, send an email to: [email protected] <*> Your use of Yahoo! Groups is subject to: http://docs.yahoo.com/info/terms/
