Intelligence in War: The Value--And Limitations--Of What the Military Can Learn About the Enemy (50 page)

BOOK: Intelligence in War: The Value--And Limitations--Of What the Military Can Learn About the Enemy
6.66Mb size Format: txt, pdf, ePub
ads

The last large war of the twentieth century, that in the Gulf against Iraq by the American-led coalition, was conducted within an intelligence environment far more favourable to the intervening force than that conditioning the Falklands War nine years earlier. The coalition was served with, besides copious and continuous sigint, frequent overflying missions yielding high-resolution photography and much electronic and sensory data, as well as satellite surveillance in all its forms. Because the Iraqis had deployed their forces beyond their own borders, in Kuwaiti territory, the coalition also had access to plentiful and exact cartography of the operational area; the combatants made no complaints at all about the quantity or quality of strategic intelligence available to them.

The acquisition of tactical intelligence in real time proved much less satisfactory. Because the Iraqi air force took refuge at an early stage in Iran, there was no need for early warning of air attack. What was required was warning of the launch of Iraqi Scud missiles, aimed at coalition forces, their Saudi bases and the territory of Israel; even more desirable was information about the Scud launchers’ whereabouts. Early warning worked well, allowing the destruction of Scuds in flight on several occasions. Location of the launchers—a variant of the Meillerwagen that had made the V-2s so difficult to attack in 1944–45—proved effectively impossible. Despite the insertion of numbers of special forces teams into Iraqi territory, no Scud launcher was found and none destroyed. Iraqi ability to hide and protect its weapons of highest value from detection by both external and internal intelligence-gathering means underlay the international crisis that began in 2002 and persists at the time of writing.

Saddam Hussein’s defiance of the authority of the United Nations, by his refusal to co-operate with its weapons inspectors as required under Resolution 1441 of the Security Council, exemplifies the difficulties of obtaining intelligence about modern weapons systems even under conditions amounting to those of authorised espionage. The inspectors, though present in considerable numbers—at least a hundred—on Iraqi territory, and ostensibly enjoying unfettered freedom of movement and access, were consistently frustrated, as late as March 2003, in their efforts to uncover stocks of chemical and biological warfare materials which they had good reason to believe had not been destroyed, as was required by UN resolution, and remained hidden at a number of locations. The search for the components of nuclear warheads, which it was also strongly believed Saddam was attempting to construct, proved equally unavailing. The senior weapons inspector, Dr. Hans Blix, complained that he and his team were unable to fulfil their task—to report that Iraq had fully complied with the provisions of Resolution 1441—because they were refused full co-operation by the Iraqi authorities, particularly the freedom to interrogate in private Iraqi scientists known to be working on the weapons programme. Neither Dr. Blix nor Western anti-war protestors, who demanded more time for the inspectors to continue, seem to have made any allowance for the possibility that the objects of their search were so well concealed that whatever the apparent co-operation furnished by the Iraqis and however long investigations were protracted, his mission was bound to fail. The situation was unprecedented. A potential international law-breaker had been obliged to open his borders to officially sponsored investigators of his suspected wrongdoing and yet they remained unable to dispel the uncertainties surrounding his intentions and capabilities. In absolutely optimum conditions, in short, intelligence had failed.

Intelligence operations in the parallel “war against terror” were equally frustrated, though for different reasons. The war was misnamed, for it was so one-sided as to deprive the opponents of terrorism of any of the usual means by which one party to a conflict normally exerts pressure on the other. Al-Qaeda, the movement which had taken control of and given leadership to the diffuse forces of Islamic fundamentalist terror, has, though it means “the base” in Arabic, no identifiable base and, after the defeat of the Taliban in Afghanistan at the beginning of 2002, no territory. It is outlawed in many Muslim states, where autocratic governments fear the threat it offers, through accusations of their less than perfect adherence to the fundamentalists’ conception of Islam, to established authority. The size and composition of its membership is unknown, as is the identity of its leadership, a few self-declared though elusive figureheads apart, and the structure of its command system, if one exists; it is a strength of al-Qaeda that it appears to be a coalition of like-minded but separate groups rather than a monolithic entity. Its finances, although it is known to possess large monetary resources, are mysterious, since it apparently conducts transactions by informal yet secure word-of-mouth agreements traditional within Muslim societies. It does not possess large armouries of conspicuous weapons, preferring to improvise—as by its hijacking of civilian airliners on 11 September 2001—or to make use of readily concealed means of terrorist outrage, such as plastic explosive. Like all post-1945 terrorist organisations, it appears to have learnt a great deal from the operations of the Western states’ special forces during the Second World War, such as SOE and OSS, which developed and diffused most of the modern techniques of secret warfare among the resistance groups of German-occupied Europe during 1940–44; the copious literature of secret warfare against the Nazis provides the textbooks. Among the techniques described is resistance to interrogation by captured operatives, which often failed against the Gestapo, since it was prepared to use torture, but succeeds against today’s Western counterterrorist organisations, culturally indisposed to employ torture and anyhow inhibited from so doing by domestic and international law. Despite the arrest and detention of hundreds of al-Qaeda operatives, reports suggest that they have successfully overcome American efforts to break down their resistance to questioning.

The only point of penetration into the world of al-Qaeda appears to have been found in its necessity to communicate. Intercommunication, as this book suggests, has almost always proved the weak link in undercover systems, whatever the methods used to make it secure. Al-Qaeda has apparently thus far trusted to the difficulty presented to Western monitoring organisations by the sheer volume of mobile and satellite telephone transmissions, seemingly hoping that its person-to-person messages will be lost among the daily billions of others. It has, fortunately, proved a false hope. Modern methods of scanning and point-targeting of transmissions allow the Western interception agencies to isolate and overhear an increasingly large number of significant messages and so to identify suspects and locate where they operate.

In the last resort, however, attacks on al-Qaeda and other fundamentalist networks will be made successful only by recourse to the oldest of all intelligence methods, direct and personal counter-espionage. Brave individuals, fluent in difficult languages and able to pass as native members of other cultures, will have to befriend and win acceptance by their own societies’ enemies. It is a technique perfected by the Israelis, whose intelligence agencies enjoy the advantage of being able to recruit agents among refugees from ancient Jewish communities in Arab lands, colloquial in the speech of the countries from which they have fled but completely loyal to the state in which they have found a new home. Western states will find such recruitment more difficult. Islam imposes a powerful bond over fellow believers; even Muslim immigrants of the second or third generation, loyal to their Western countries of adoption in every other way, feel a strong aversion to what seems betrayal of co-religionists by reporting them to the authorities for religious zealotry. The problem of recruitment is acute in the United States, which lacks both Muslim communities of large size or antiquity and non-Muslim citizens with a knowledge of the appropriate languages. It may prove easier in the old imperial countries, such as Britain and France, whose intelligence agencies, particularly the British, actually have their roots in the nineteenth-century need to police their colonial dissidents and which retain a significant residue of language and other ethnographic skills.

A strange task confronts them. It diverges widely from that of Bletchley and OP-20-G, which required the highest intellectual power and rigorous dedication to the routines of radio monitoring, interception and decipherment. The masters of the new counter-intelligence will not resemble the academics and chess champions of the Enigma epic in any way at all. They will not be intellectuals, nor will they overcome their opponents by power of reason or gifts of mathematical analysis. On the contrary: it will be qualities of empathy and dissimulation that will equip them to identify, penetrate and win acceptance by the target groups. Their work will resemble that of undercover police agents who attempt to become trusted members of criminal gangs, with all the dangers and moral compromises that such a life requires. Undercover work within the terrorist groups of Northern Ireland, republican and loyalist alike, has equipped British security and specialist police bodies to understand how such undercover operations are best conducted, but the practice is always more difficult than theory and will prove particularly so with religious fanatics. Even ideological terrorists, such as the extreme nationalists of the Irish republican tradition, are sometimes susceptible to temptation or threat; republican fund-raising by blackmail and extortion has drawn the movement into crime, with corrupting effect, while its “military” ethos excludes the taking of risks that threaten the lives of “volunteers.” Muslim puritans, by contrast, seem resistant to financial temptation, have demonstrated their readiness to commit suicide in furtherance of their violent aims, are committed to a code of total silence under interrogation and are bound by ties of brotherhood which have religious strength. No organisation, of course, is impervious to penetration or indestructible. All have their weak spots and weak members. It may, however, take decades for Western intelligence agencies to learn how to break in to the mysterious and alien organisations and even longer to marginalise and neutralise them.

The challenge will cast the agencies back onto methods which have come to appear outdated, even primitive, in the age of satellite surveillance and computer decryption. Kipling’s Kim, who has survived into modern times only as the delightful literary creation of a master novelist, may come to provide a model of the anti-fundamentalist agent, with his ability to shed his European identity and to pass convincingly as a Muslim message-carrier, Hindu gallant and Buddhist holy man’s hanger-on, far superior to any holder of a Ph.D. in higher mathematics. Buchan’s Scudder, sniffing from clue to clue along a trail leading from fur shop in Buda to the back streets of Paris, shedding and adopting new disguises on the way, seems better adapted to the future world of espionage than any graduate student in regional studies. It will be ironic if the literature of imagination supplies firmer suggestions as to how the war against terrorism should be fought than academic training courses in intelligence technique provide. Ironic but not unlikely. The secret world has always occupied a halfway house between fact and fiction, and has been peopled as much by dreamers and fantasists as by pragmatists and men of reason.

The Western powers may come to count themselves fortunate that, in their time of troubles during the two world wars, the central targets of intelligence-gathering, enemy communications and secret weapons were susceptible to attack by concrete methods: overhearing, decryption and visual surveillance, together with deception in kind. They have already learnt to regret the emergence of new intelligence targets that lack any concrete form: aggressive belief systems not subject to central authority, shifting alliances of dangerous malcontents, stateless migrants disloyal to any country of settlement. It is from those backgrounds that the agents of anti-Western terrorism are recruited. Their recruiting grounds, moreover, are confusingly amorphous, disguised as they are within communities of recently arrived immigrants, many of them young men without family or documented identity, often illegal border-crossers who take on protective colouring within the large groups of “paperless” drifters merely seeking to avoid the attention of the authorities.

The United States, protected as it is by its wide oceanic frontiers and its strict and efficient border services, is certainly not impervious to terrorist penetration, as the awful events of 11 September 2001 demonstrated. The Western European states, physically contiguous to countries which hundreds of thousands of young men energetically seek to leave and constrained by their own civil rights legislation from returning illegals to their jurisdictions of origin, even if the facts can be established, are much less well defended. The security problem by which the Western European states are confronted is not only without precedent in scale or intensity but defies containment. The suspect communities grow continuously in size, the nuclei of plotters and would-be evil-doers they conceal thereby acquiring greater anonymity and freedom to prepare outrages. Financial support is not a problem, since the terrorists enjoy access to funds extracted in their countries of origin by blackmail in many forms, including straightforward protection money but also donations represented as contributions to the cause of holy war. The “war on terrorism” may be a misnomer, but it would be foolish to pretend that there is not a historic war between the “crusaders,” as Muslim fundamentalists characterise the countries which descend from the kingdoms of western Christendom, and the Islamic world. It has taken many forms over more than a thousand years, and fortunes in the conflict have ebbed and flowed. A century ago it appeared to have been settled for good in favour of the West, when the region’s technological superiority seemed to have reduced Islam to an irreformably backward and feeble condition. Allah, Muslims might say, is not mocked. Their certitude in the truth of their beliefs has driven those Muslims who see themselves as religious warriors to seek ways of waging holy war that outflank mere technology and promise to bring victory by the power of anti-materialist forces alone. Muslim fundamentalism is profoundly unintellectual; it is, by that token, opposed to everything the West understands by the idea of “intelligence.” The challenge to the West’s intelligence services is to find a way into the fundamentalist mind and to overcome it from within.

BOOK: Intelligence in War: The Value--And Limitations--Of What the Military Can Learn About the Enemy
6.66Mb size Format: txt, pdf, ePub
ads

Other books

La bruja de Portobello by Paulo Coelho
Taxi by Khaled Al Khamissi
Sunset Sunrise Sun by Chanelle CleoPatra
Shadows of the Nile by Jo Franklin
Guilty as Sin by Tami Hoag
RockHardHeat by Cristal Ryder
Just A Little Taste by Selena Blake
Notorious by Michele Martinez
Purity of Heart by Søren Kierkegaard