Twenty-Four Theses on Intelligence (Notes for OSS '02, 10 May 2002) by Martin van Creveld

Similar documents
General Assembly First Committee (International Security and Disarmament) Addressing fourth generation warfare MUNISH

TERRORISM Fervour is the weapon of choice of the impotent. FRANZ FANON, B l a c k S k i n, White Ma s k s (1952)

Modern Terrorism and Counter-Terrorism Strategies

Transcript: Condoleezza Rice on FNS

Intelligence and Prediction in an Unpredictable World Part of the U.S Army s Eisenhower National Security Series

UNIT SIX: CHALLENGES OF THE MODERN ERA Part II

Recognizing the problem/agenda setting: ormulating the policy: Adopting the policy: Implementing the policy: Evaluating the policy: ECONOMIC POLICY

National Security Policy. National Security Policy. Begs four questions: safeguarding America s national interests from external and internal threats

1/13/ What is Terrorism? The Globalization of Terrorism. What is Terrorism? Geography of Terrorism. Global Patterns of Terrorism

10/15/2013. The Globalization of Terrorism. What is Terrorism? What is Terrorism?

SET UP YOUR NEW (LAST!) TOC

Dr. John J. Hamre President and CEO Center for Strategic and International Studies Washington, D. C.

Negotiating with Terrorists an Option Not to Be Forgone

Chapter 8: The Use of Force

Fear, Patriotism, Secrets, Propaganda, Control

Closed and Banned Visits. Easy Read Self Help Toolkit

NBER WORKING PAPER SERIES DESIGNING INSTITUTIONS TO DEAL WITH TERRORISM IN THE UNITED STATES. Martin S. Feldstein

Foro de Seguridad XXV Foro Económico. Krynica (Polonia) 8-10 de septiembre de 2015

Course Descriptions Political Science

A Step-by-Step Guide to Help You Quickly & Easily Obtain Your Child s Passport (Minor Child Under Age 14)

Objectives To explore the meanings of conflict and war. To make deductions and practise reasoning skills.

Statement of Dennis C. Blair before The Senate Select Committee on Intelligence United States Senate January 22, 2009

Guantánamo and Illegal Detentions

President Bush Meets with Spanish President Jose Maria Aznar 11:44 A.M. CST

Warm ups *What is a key cultural difference between Ireland and Northern Ireland? *What is a key political difference between the two?

HOW TO APPLY FOR ASYLUM, WITHHOLDING OF REMOVAL, AND/OR PROTECTION UNDER ARTICLE 3OF THE CONVENTION AGAINST TORTURE

Introduction. Peter Berkowitz

Opinion adopted by the Working Group on Arbitrary Detention at its sixty-ninth session (22 April-1 May 2014)

<91- J,-/--, CLAUSEWITZ,,NUCLEAR WAR AND DETERRENCE. Alan W. Barr. Military Thought and National Security Strategy. National War College 1991

Most Support Allied Attack Even Without U.N. Support

Media-Prior Restraint

THE NUCLEAR REVOLUTION AND WORLD POLITICS

Human Rights: A Global Perspective UN Global Compact U.S. Network Meeting Business and Human Rights 28 April 2008, Harvard Business School

If President Bush is so unpopular, in large part because of the war in Iraq,

Program on the Geopolitical Implications of Globalization and Transnational Security

Running Head: THREAT OF TERRORISM 1. Threat of Terrorism from the Russian Nuclear Stockpile. Thomas N. Davidson

The Image of China in Australia: A Conversation with Bruce Dover

Safeguarding Equality

The Nazi Retreat from the East

Be afraid of the Chinese bearing gifts

Combating Human Trafficking and Illicit Trade: a Systemic Approach

Title of Presentation. Global Threat Brief President / CEO Global Guardian

Drug Lords and Domestic Terrorism in Afghanistan [NAME] [DATE]

WCAML Forum. The Challenges of Terrorist Financing in 2014 and Beyond. May 7, Dennis M. Lormel President & CEO DML Associates, LLC

Global Development of Law Enforcement Officers. Ashley N. Shannon. April 30, New Mexico State University

The Cold War History on 5/28/2013. Table of Contents You know how the superpowers tried to cooperate during and at the end of World War II...

Preemptive Strikes: A New Security Policy Reality

u.s. policies. a. Were the policy's effects on the USA and U.S. interests good or bad? Consider four U.S. interests:

Mini Lesson Part I: Reading

Speech on the 41th Munich Conference on Security Policy 02/12/2005

RADICALIZATION: A SUMMARY

EMR: complementing or substituting for market processes?

Weapons of Mass Destruction and their Effect on Interstate Relationships

Ekspertmøte om helsepersonellkrisen, Soria Moria, 24 February 2005.

Issue: American Legion Statement of U.S. Foreign Policy Objectives

The National Security Agency s Warrantless Wiretaps

Voting Corruption, or is it? A White Paper by:

ADMINISTRATION OF JUSTICE HOMELAND SECURITY

Unit 5: World War I and the Great Depression

FYI: 70s/80s Test Wednesday April 11 Agenda: Reagan Guided Notes: Conservative Resurgence

The changing character of organized violence

STATEMENT STEVEN G. BRADBURY ACTING ASSISTANT ATTORNEY GENERAL OFFICE OF LEGAL COUNSEL DEPARTMENT OF JUSTICE

Modern World History Spring Final Exam 09

Divided into 4 zones of occupation; Berlin also divided

Second Interim Report of the National Commission on Terrorist Attacks Upon the United States. Thomas H. Kean, Chair, and Lee H. Hamilton, Vice Chair

Terrorism in Africa: Challenges and perspectives

The Decision to Drop the Atomic Bomb on Hiroshima and Nagasaki

Ahimsa Center- K-12 Teacher Institute Lesson Plan

Prospects for U.S. Russian relationship during D. Trump s presidency (pre)viewed through the prism of the two countries vital national interests.

and the United States fail to cooperate or, worse yet, actually work to frustrate collective efforts.

Globalization and Shifting World Power

Nbojgftup. kkk$yifcdyub#`yzh$cf[

NATO s tactical nuclear headache

THE PRESIDENT: My fellow Americans, tonight I want to talk to you about Syria -- why it matters, and where we go from here.

SSUSH25 The student will describe changes in national politics since 1968.

POL 3: International Relations Winter 2006 Final Examination

Chapter 8: Power in Global Politics and the Causes of War

Section #1 NATO and the Warsaw Pact

STRATEGIC LOGIC OF NUCLEAR PROLIFERATION

Confidence in U.S. Foreign Policy Index

History. Year 9 Home Learning Task

Contractual management(economic) responsibility system

In George Orwell s 1984, the entire book is about a time in Oceania when a group has

Testimony for Hearing of the HASC Subcommittee on Terrorism, Unconventional Threats and Capabilities

INVESTIGATION OF ELECTRONIC DATA PROTECTED BY ENCRYPTION ETC DRAFT CODE OF PRACTICE

7 Ways to Solve US Border Problems

3/2/2017. Dwight Eisenhower & The Cold War. Election of Adlai Stevenson Democratic Candidate. Dwight D. Eisenhower Ike Republican Candidate

David Hicks and Guantanamo Bay

BACKGROUND: why did the USA and USSR start to mistrust each other? What was the Soviet View? What was the Western view? What is a Cold War?

The Growth of the Chinese Military

Unit 11: The Cold War B A T T L E O F T H E S U P E R P O W E R S :

ISTANBUL SECURITY CONFERENCE 2016

THE rece,nt international conferences

STATEMENT OF WALTER F. MONDALE

GRADE 5. United States Studies: 1865 to the Present

CONVENTIONAL WARS: EMERGING PERSPECTIVE

The College Board Advanced Placement Examination. AMERICAN HISTORY SECTION I1 (Suggested writing time-40 minutes)

WRITING FOR TRIALS 1

Unit 7 Station 2: Conflict, Human Rights Issues, and Peace Efforts. Name: Per:

Al Qaeda Now: Understanding Today s Terrorists Karen J. Greenberg (Editor), Cambridge University Press, 2005, 282 pp.

Transcription:

Twenty-Four Theses on Intelligence (Notes for OSS '02, 10 May 2002) by Martin van Creveld The purpose of these notes is to provide a brief, schematic, comparison between the problems facing intelligence in the old, state-centered world and the ones that arise from the new, increasingly globalized and increasingly diffuse, world in which we live today. The notes are divided into five sections. They are, 1. The nature of the threat; 2. The intelligence organization; 3. The implications that the changing threat has for intelligence; 4. Some things that have not changed; and 5. A few concluding remarks. Finally, the notes attempt to present a "global" view as far as possible. In other words, they do not focus on the problems facing this intelligence organization or that. 1. The Nature of the Threat. Old The main threat was overt and came from the uniformed military. Compared to the three and a half million strong Red Army, for example, everything else that the U.S faced during the Cold War was trivial. The enemy organization was highly centralized and disciplined. The enemy had a clear territorial base, marked in the form of a colored patch on the map. As a result, there was a sharp distinction between internal and external threat. New As 9-11 showed, the threat is often covert and comes from people who do not identify themselves by wearing uniform. To make things worse, people and organizations will often claim responsibility for actions they did not commit; as happened in the case of kidnapped Wall Street Journal journalist Daniel Pearl. The enemy organization is decentralized and relatively undisciplined. Often it displays a very strong tendency to splinter and form shifting alliances as well as rivalries. A good example of this may be seen in Israel's recent operations against the Palestinians; as the "official" Palestinian security organizations took a beating, their place tended to be taken by the Tanzim which is not as dependent on Arafat. The enemy has no clear territorial base, or else he has one that is capable of being rapidly moved from one place to another. Al Qaeda, which is said to have cells in sixty countries, is a very good example of this. As 9-11 showed with particular clarity, the distinction between an external threat and an internal one has become largely blurred. Lucifer ante portas has been

Generally there was a close link between the size of the opponent and the extent of the threat he posed. Also, for most states, other things equal the closer an enemy the more dangerous he was. The opponent tended to grow incrementally. The threat was deliberately created as continuation of policy by other means. replaced by Lucifer inter nos! Technological developments have made a big difference in this field. At present, small opponents may sometimes be able to inflict vast damage by using weapons of mass destruction or, perhaps, information warfare. The latter in particular makes distance irrelevant. A hardly-known opponent may appear out of the blue (and disappear just as fast). As a result, analysts are forced to think of what has been called "potential imaginary threats". As often as not, the threat is a by-product of other activities, such as drug smuggling, or migration, or destruction of the environment. In other words, the Clausewitzian model does not necessarily apply; nobody is out to commit an act of policy. As likely as not, the threat is produced by poor devils who do what they do not because of evil intent but because they have no other way to make a living. 2. The Intelligence Organization. Intelligence operations were directed by the state. Each state had its own intelligence organization or organizations. A "go it alone", approach made sources relatively easy to control and verify. The state's monopoly over intelligence gathering is being lost very rapidly. Intelligence is more likely to come from mix of public and private organizations. Given the diffuse nature of the threat, cooperation with other organizations is vital. However, this makes sources much harder to control and verify; it also means less control over the information one already has. 3. Implications for Intelligence. Since the enemy was operating in the open, he was relatively easy to identify and find. Although there were always exceptions, normally the enemy's intentions were focused in his leadership which laid down The enemy has become much harder to identify and find. Owing partly to his decentralized structure, partly to the mobility made possible by modem transportation, very often one only finds part of him. The intentions of the enemy's leadership are not necessarily decisive in regard to what lower leadership is doing. In

3 policy. extreme cases, they may not even be relevant. The enemy's capabilities were focused in Many of the enemy's capabilities are the hands of his leadership, which diffused throughout the organization. The decided whether and how to activate latter's parts may often use them as they them. see fit and not as they are instructed. A broad-area approach to intelligence Intelligence must be much more focused was often useful, as in mapping, finding in space. If you are planning to take out a military formations, etc. terrorist in his hiding place, even the precise location of the knob on the door may be vital; and the more precise the ~~ weapons you have, the more true this is. The distinction between intelligence The distinction between intelligence gathering and use of force was usually gathering and use of force is sometimes clear. blurred. Since it operated abroad against a Partly because the distinction between declared enemy, intelligence did not have internal and external does not apply in the to take cognizance of the existing legal same form, partly because the framework. Clausewitzian framework does not apply and the "enemy" are just poor devils, keeping within legal framework is vital. Ignoring it risks alienating public opinion and creating more enemies; it may, indeed, be the highway to defeat. The fact that they kept within the legal framework, more or less, is a major reason behind the success of the British in Northern Ireland. Unless one was caught, the courts were If one is to operate at home as well as almost irrelevant to intelligence work. abroad, the courts are going to be involved. A much higher standard of evidence may become necessary. Not for nothing is LIC (Low Intensity Conflict) sometimes said to stand for Lawyer Infested Conflict; see the tussle over the rights of El Qaeda prisoners currently being held at Guantanamo. As a result of the above, intelligence was Intelligence and police work converge. usually quite different from police work. Even before 9-11 organizations that used to be almost totally separate, such as FBI and CIA, were beginning to come together; swapping information, exchanging personnel, and so on. Intelligence was often the sole source of In a world is flooded by information, information about an issue or a intelligence is likely to be but one of development. many sources competing for the attention of decision makers. This has the effect of downgrading analysts and turning decision makers into their own analysts.

4. Some Things That Have Not Changed. 1. In theory, now as ever, the objective of intelligence is to get at "the truth". In practice, now as ever, "the truth" will often be shaped as much by cultural factors, mirror-imaging, wishful thinking, groupthink, and bureaucratic politics as by "objective" intelligence collection and analysis; a good example is the failure of the CIA to forecast the Indian nuclear test in 1998. 2. Reading the enemy's mind is as important as assessing his capabilities, perhaps more so. Again the Indian nuclear test is a very good point in case. 3. Raw data without analysis and evaluation means very little. In other words, the overall theoretical framework is at least as important as the "facts". 4. How to interest busy decision-makers in intelligence was, and remains, a major question facing intelligence. If the analysis agrees with the decision maker's views he or she is likely to say it contains nothing new; if it doesn't, that it is plain wrong. To solve the dilemma there will be an emphasis on "secrets". 5. The OODA (Observation, Orientation, Decision, Action) loop remains as critical as ever. Success depends on speed; old intelligence stinks. Get there half an hour late, and your terrorist-suspect is gone. Speeding-up the loop depends partly on technology, partly on organization. 6. Finally, too much intelligence can be as bad as not enough intelligence, or worse. Three weeks passed from the moment an American satellite took a picture of the massacre of Srebrenica until, alerted by other sources, anybody took a look at it. It is said that each and every citizen of London is photographed 300 times a day on the average; this would mean 3 billion pictures a day, over a trillion a year. 5. Conclusions. As always, the world is changing in some ways, but remains the same in others which ate at least as important. As always, the essence of wisdom is learning to distinguish between the two. What applies to the world in general applies equally well to intelligence. Finally: he (or she) who ignores change and puts his head into the sand will end up by being kicked in the ass.

OSS '02 PROCEEDINGS "The New Craft of Intelligence: Brainpower, Webpower, & Ground Truth" - Link Page Previous Citizen Advocacy in the Information Age Return to Electronic Index Page