Intelligence Operations

See the source image

Definition. Intelligence is information of value to a mission; the goal of intelligence operations is to collect such information. The focused collection of information, the transformation of that information into intelligence, the analysis of that intelligence and its dissemination to the correct people at the correct time is an art, the function of which is to facilitate understanding of the operational environment.

General. Accurate and timely intelligence is essential to the conduct of any form of warfare, and the ultimate success or failure of insurgent missions depends on the effectiveness of the intelligence effort in collecting and analyzing said information. When planning actions, covert intelligence operatives must provide the assault elements with maximum available intelligence of the operational environment—the target; its strong and weak points; local state forces able to intervene; the civilian population in the vicinity of the target; the terrain to be traversed en route to and returning from the target area; alternate targets and possible contingency plans; insurgent strengths and weaknesses.

The Operational Environment. The operational environment is a composite of the forces, circumstances, and influences that affect tactical missions. Operational environments may be relatively static, but people and information flow through them continuously. Operational environments sometimes cut across physical lines of transportation, as well as areas that are economically and culturally distinct. Operatives must be aware of these links to other regions that affect the people in the operational environment. Furthermore, an awareness of the culture, grievances, institutions and political-economic composition of the operational environment is vital for political strategy. Truly grasping the operational environment requires us to devote as much effort to understanding culture and political-economy as we do to understanding the enemy and its material dynamics. What makes revolutionary intelligence operations so distinct and challenging is the amount of historical, economic, political and cultural information that must be gathered and analyzed alongside more technical information.

Intelligence Characteristics. All echelons of insurgent operations should collect, produce, and consume intelligence. This should result in a bottom-up flow of intelligence. This pattern also means that operatives require a lot of support for both the collection and analysis of information, as their organic intelligence capabilities are often inadequate. Effective intelligence operations require:

  1.  Planning. Planning is needed well before any deliberate assault is undertaken. Planning ensures that the intelligence requirements are meet.
  2. Time. The adage “Time spent on planning is never wasted” holds true. Time is required to ensure that the following actions can be achieved: identification, recruitment and training of covert intelligence agents; tasking of agents; deployment and positioning of agents; collection of information; feedback and reporting process; the interpretation and analysis of information; the dissemination of intelligence.
  3. Relevancy. The collection effort must be relevant to the intelligence requirements. This will ensure that time, effort and resources are not wasted. Furthermore, irrelevant information and intelligence can mislead strategists and planners.
  4. Control. The collection effort must be carefully controlled to ensure economy of effort and to avoid compromising the operation.
  5. Access. Without access, there can be no collection. Access needs to be well-planned in advance with back-up access points positioned in case a covert intelligence agent is compromised.
  6. Flexibility. Flexibility will allow the collection effort to rapidly switch from one location to the next if necessary. However, without planning and access, there can be no flexibility – or at best, only limited flexibility.

Intelligence Network. To understand the dynamics of their operational environmental, insurgents require an effective intelligence network made up of auxiliary forces who serve as the eyes and ears of the insurgency. Insurgents must create and maintain secure intelligence networks while neutralizing the counterintelligence capabilities of the enemy (their attempt to collect information that can be used against the revolutionary movement).

Open-Source Intelligence. Open-source intelligence is information of intelligence value that is available to the general public. In many cases, background information about the geo-spatial terrain, culture, history, politics and economics of a particular area of operation is available in open sources. Open sources, such as newspapers, books, journal articles, magazines, encyclopedias, web sites, and Google maps, are valuable for understanding the dynamics of the operational environment.

Forms of Collection. While insurgents seldom have the capacity to collect intelligence via covert listening devices, intercepting electronic communications, or by having access to government computers and databases, crucial intelligence can be acquired by:

  1. Direct Observation. Intelligence can be obtained by observing and following the target in person. This is most effective when carried out by several coordinated teams, for at least a continuous 24 hours, so as to understand the target’s routine and patterns. Intelligence agents engaging in direct observation of a target should camouflage themselves in order to fit in to the operational environment.
  2.  Trash. Trash is an easily accessible yet highly valuable source of information. Acquiring someone’s trash can reveal their routines, their records, their habits, the status of their family, home, career, etc. Make sure to acquire trash shortly before trash collection arrives so as to not create suspicion.
  3.  Social Engineering. People can be tricked into divulging valuable information. This can happen over the phone or in person by posing as postal delivery worker, exterminator, sanitation worker, technical support, non-profit canvasser, etc. Another example of social engineering is contacting the target on a social networking or online dating site and starting a conversation with the target in order to gain the trust of the target and then using that trust to get access to sensitive information.

Intelligence Collaboration. Effective intelligence collaboration organizes the collection and analysis of information collected by various units into a coherent, mutually supportive intelligence effort. A common database founded on intelligence reporting is a prerequisite for effective intelligence fusion. While revolutionary struggles are localized,  most have national and international aspects to them, which complicates large-scale intelligence collaboration.

Counterintelligence. There is a distinction between revolutionary intelligence and revolutionary counterintelligence. Intelligence is the work of actively collecting and analyzing information about the enemy and even influencing the internal dynamics of enemy organizations. Counterintelligence, on the other hand, is the defense with which enemy intelligence functions are foiled. This is the work of monitoring, tracking, identifying, and minimizing the potential and real threats posed by enemy intelligence activities. The foundation of counterintelligence, like intelligence, lies in the shared critical thinking skills of individuals and units. The essential foundation of defense against state infiltration and repression is an educated, security conscious membership who are equipped to tackle the problems raised by enemy intelligence efforts at all organizational levels, including leadership.