Unintended Intelligence Consequences: How Yesterday’s Proxy Insurgents turned into Today’s Terrorists

Introduction

During the Cold War, nations were increasingly sponsoring and/or supporting insurgencies. For instance, the United States of America supported Afghan-Mujahedin, Nicaraguan Contras, and Tibetan Buddhist fighters. The Soviet Union supported communist guerrillas in Angola, Greece, and South Africa. China supported insurgents in Vietnam. India supported Sri Lankan Tamil rebels. In fact, Trends in Outside Support for Insurgent Movements by Daniel, Chalk, Hoffman, Rosenau, and Brannan (2001) discusses how 74 operational guerrilla movements and/or insurgencies were supported. This is why the term proxy, the authority to represent someone else, became very common in discussions of the Cold War.

As such, this essay will examine how proxy insurgencies of the Cold War and post-Cold War have transformed into modern terrorist organizations. Firstly, the essay will examine the implications of proxy war and the subsequent transformation of state-sponsored terrorism. Secondly, it will discuss the modus operandi, tradecraft, structure, and anatomy of these terrorist cells. Finally, the essay will conclude by addressing the byproducts of proxies, the threat that stems from these actors, and responsive and preventative measures vis-à-vis the global war on terror.

The Implications of Proxy Wars

A proxy war is one that is instigated by a significant power, but that power does not itself become involved. Proxies, and the consequence of proxy wars, have presented severe dangers in our modern world. Intelligence agencies must learn to understand the implications of post-Cold War support for insurgents. Proxies and their support for insurgencies have transformed into a process of sponsorship for terrorism. Although it is understood that great powers were seeking spheres of influence in the global arena during the Cold War and used proxies to advance their influence, it is less understood that this practice slowly transformed into state-sponsored terrorism.

For instance, it is understood that Iran sponsored Hezbollah in Lebanon. In response, Pakistan supported al Qaeda and the Taliban in Afghanistan to destabilize regional powers politically, economically, and militarily. It is understood that the United States of America sponsored anti-Baathist groups in Iraq and Syria. At the same time, Russia, on the other hand, provided support to opposition groups in the broader Middle Eastern region. It is less understood that these situations worsened when state-sponsored insurgencies worldwide became monsters against their masters. To illustrate, during the Cold War, the world’s strongest democracy, the United States of America, armed, trained, and funded Osama bin Laden who led the Afghan-Mujahedin to fight against the Soviet Union. Eventually, bin Laden turned against the United States and transformed into the enemy. A similar analogy appears when the world’s largest democracy, India, armed, trained, and funded Veluppillai Prabhakaran, who led the Tamil Tigers to fight against the Sri Lankan government. Eventually, Prabhakaran made a “U-turn” and ordered his cadres to fight against the Indian troops. India lost over 1000 troops as a result; moreover, this resulted in the assassination of the Indian Prime Minister Rajiv Gandhi. All in all, insurgencies transformed into terrorist organizations as a result of the support and sponsorship of proxies.

Proxies are particularly concerning because interference is often motivated by a nation’s self-interest, absent of regard for future implications. For example, the Tamil Tigers were armed, trained, and funded by the Research and Analysis Wing (RAW), India’s foreign intelligence agency, in the early 1980s. India’s proxy rationale was governed by the hope that, in controlling the insurgency, they would be able to pressure the Sri Lankan government into making concessions for Tamils and be able to pressure the Tamil militants into accepting the concessions (Richards, 2014:15). Later, the Tamil Tigers were trained by the Israeli secret service Mossad. Mossad’s nexus to the Tamil Tigers was further corroborated by ex-Mossad intelligence officer Victor Ostrovsky and his book “By Way of Deception” published in September 1990. In her paper “An Institutional History of the Liberation Tigers of Tamil Eelam (LTTE),” Richards provides a detailed account of the historical institutionalization of the Tamil Tigers as one of the most sophisticated groups ever assembled. Overall, proxies do not offer sincere aid.

For example, the present-day Islamic State in Iraq and Levant (ISIL) is an offspring of al Qaeda; and al Qaeda is an offspring of Afghan Mujahedin and Taliban. As noted earlier, as a proxy, the United States of America created the Afghan Mujahedin to fight the Soviet Union in Afghanistan. Therefore, what happened on 9/11 and the subsequent wars on terror in Afghanistan and Iraq are interconnected and ultimately a devastating byproduct and extension of the post-Cold War proxy wars.

According to various defectors and seized al Qaeda documents, all terrorist organizations have learned their tactics and techniques from their masters. Waldman (2010), from Harvard University, explains that the relationship between nations’ security agencies and insurgents moves far beyond contact and co-existence. In fact, nations’ support and sponsorship sustain and strongly influence the movement, and this “is as clear as the sun in the sky” (Waldman 2010: 1).

In 2011, the New York Times reported that Navy Admiral Mike Mullen, chairman of the USA Joint Chiefs of Staff, and Army General David Petraeus, previously head of the U.S. Central Command and new director of the Central Intelligence Agency (CIA), demanded that the Pakistani military intelligence agency, Inter-Service Intelligence (ISI) must discontinue their support to the Taliban and al Qaeda. This illustrates the United States’ perseverance to interfere. ISI support had already influenced al Qaeda beyond repair, as they learned valuable intelligence operations and tradecraft. This demonstrates how quickly and effectively support and sponsorship impact insurgencies.

The following is a more recent example of how nation-state support for insurgencies produces terrorist organizations. The International Center for the Study of Violent Extremism at George Mason University reported that the “Emni,” the intelligence apparatus of ISIL, learned its modus operandi and inner workings from the former Iraqi Security forces of Saddam Hussein. The report explains that “one of the many things that multiple defectors described were the many Iraqi former Baathists leading the organization, even in Syria, who had brought with them the tradecraft and totalitarian intelligence operations they had practiced in Saddam Hussein’s government” (2016: 3). This illustrates the degree of threat and danger involved in training insurgents. The following paragraphs will describe the modus operandi of many terrorist organizations, and it will become evident how they emulate state military and intelligence agencies.

The Anatomy of a Terrorist Cell

Many have argued that to fight in the war, the most basic and essential asset is that of a secret service or organization specifically dedicated to intelligence-gathering operations. It may be a government agency or the military, but this is also relevant to non-state actors or terrorist groups. Thus, it is vital to analyze the anatomy and structure of terrorist cells to better understand the modus operandi of terrorist organizations. Simply put, a terrorist cell is the systematic network of the organization’s members. Even though the Terms of Engagements and/or the Rules of Engagements differ from a conventional force, a terrorist network’s secret mission and/or operation remain well-organized and professional. It was once understood that terrorist networks were not well structured; however, after incurring heavy losses, such as losing valuable agents and informants to arrest and identification by nation-states’ security and intelligence agencies, terrorist organizations came to realize that they must establish a professional intelligence unit.

Because terrorist organizations don’t have the same resources as government intelligence agencies, they mostly rely solely on Human Intelligence as opposed to more sophisticated Signal Intelligence, Electronic Intelligence, Imagery Intelligence, Technical Intelligence, etc. However, because terrorist organizations were once state-sponsored, they emulate and resemble professional military and intelligence agencies, thereby demonstrating how terrorist organizations adopt and apply the tradecraft training and intelligence they received from nation-states. To illustrate, the Principal Agent Handler (PAH) and his team consist of an Agent Handler, a Deputy Agent Handler, and more than a dozen Principal Agents. See the following diagram for a visual representation of the structure of the agent handling model. The PAH directs Agent Handler, Deputy Agent Handler, and Principal Agents within the organization’s controlled areas. They work from inside offices and are known as “Desk Agents.” There is a second set of agents directed by PAH who work in the field (hostile area) controlled by the enemy. They are known as “Field Agents”. A middleman always works as a “contact” or “go-between” for Desk Agents and Field Agents. He is known as the Intermediary or Cut-Out.

The Hierarchical Order of Terrorist Agent Handling Model

Intelligence-gathering is, by its very nature, a difficult task but of utmost importance. Terrorist organizations are extremely cautious when recruiting their agents and informants. Most of the time, they tend to cultivate personnel from the same religious or ethnic-nationalist groups who show potential for accessing enemy targets. For every member hired, each must undergo an extensive background check. The organization focuses on the individual’s profile, including his/her character, vulnerabilities, and motivation, to assess if he/she is the right person for the job.

Recruits must undergo a particular training period to acquire the skills necessary to perform assigned tasks. These include specific techniques in the trade of espionage, which is called “tradecraft” and could include such specialties as agent-handling, covert communication, counter-interrogation, reconnaissance, coding and decoding, drawing maps, photography, martial arts, linguistic skills, and so on. Once a recruit completes the tradecraft and skill training period, the handlers assess each recruit, keeping the individual’s potential and background in mind, to confirm whether he/she is fit to become an agent or informant. This recruitment process dramatically resembles that of professional military and intelligence agencies, thereby illustrating how terrorist organizations adopt and apply the training and intelligence they have received from nation-states.

Before spies and informants are assigned to a mission, they are instructed on every single detail of the target. The target could be soft or hard, such as a VIP member or a football stadium –whatever it may be, the handlers brief every detail and then debrief for further intelligence. Informants must learn about the specific physical environment beforehand to quickly provide updates on selected targets. To make this task easier, many organizations prefer to hire refugees, students, and government employees working in the area, selecting them carefully after identifying and confirming their potential usefulness, because they have already spent years within that environment and have become a part of that environment. Their social and human capital is recognized as valuable human resources.

All these agents work together to analyze, assess, and exploit the intelligence they have gathered. The final intelligence product is sent to the decision-makers, the top leader such as Abu Bakr al-Baghdadi, who decides whether or not to take advantage of the information for tactical, operational, or strategic purposes. Whether the decision makers take action or not, the Principal Agent Handler and his staff make weekly assessments to update the Data Bank.

Once all intelligence has been gathered, it must be centralized in the Data Bank: a large repository of data on a particular topic that is only accessible by a limited number of users. The Principal-Agent Handler oversees the Data Bank. He is provided with thousands of situational briefing reports every day from various sources, including intelligence wing operatives (spies) who operate all over the world; foreign fighters, students, and government employees (informants) across the world; special reconnaissance teams; local-patrolling and open-source intelligence-gathering.

Successful intelligence gathering depends on secure and covert communication. Without security, there is no intelligence; therefore, it is of utmost importance that an organization protect its human assets. This can only be done if there is a systematic way for intelligence to flow from hostile areas to the organization’s Data Bank. The Principal Agent Handler is responsible for ensuring that his sources are safe and secure. State military agencies also adopt This ranking and communication protocol structure.

Within hostile areas, well-established agents working for the PAH, known as Resident Agents (RA), organize and direct compartmentalized “cells” that are operating in the field. Each RA deals with a maximum of 4-5 Agents (e.g., A, B, C, D, E) who are cultivated, hired, and trained by those Desk Agents. See the diagram below for a visual representation of the cells. Since agents work under considerable risk, they are proactively given a cover story to ensure their security. For instance, the perfect cover story for an RA would be a well-known journalist who lives in the area, sending and receiving information from all parts of the country. A marine engineer working in a harbor would be the perfect cover story for an informant. 

The Networked Order of Compartmentalized Terrorist Cells

When an RA contacts one of his agents and/or informants to exchange information, he must be extremely careful to avoid exposing or compromising them to anyone. The RA would, therefore, meet with them in different Safe Houses, and afterward, the Intermediary would meet with the RA in a separate Safe House to pass the information on further to the Desk Agents.

In exceptional cases, an Agent might contact the PAH directly without going through the RA and/or the Intermediary. The Agent would use covert communications and code sheets to pass along the information in such instances. These kinds of cells are not only used for transferring information but are also used to transfer other resources such as weapons and personnel. For example, when al Qaeda planned an attack on the World Trade Center in New York City, they commenced with the acquisition of field blueprints. To acquire these blueprints, al Qaeda members would identify themselves as employees at the facility. This Agent/Informant is then instructed to contact the RA or a separate cell on a regular basis to provide contemporary intelligence. An Intermediary would contact the RA to obtain the information in order to pass it along to the Principal Agent or mail the information in segments directly to him.

Terrorist organizations also hire other agents who work, for example, as a cleaner, to provide technical information such as storage, electric boards, the number of employees in the building, opening and closing hours, and so on. He/she would give the information to the RA or mail it directly to the Principal Agent or even the Principal Agent Handler. Throughout this intelligence gathering, the Data Bank provides information to the Intelligence Wing for the building of a model of the target. At the same time, another cell becomes engaged in training personnel to execute the mission, using the same process of agent handling.

Finally, the attack squad would be trained, briefed about the plan, and sent to different locations using different routes. Since 9/11 was an airborne attack in which civilian aircraft were used as weapons, the RA would’ve coordinated the hijackers. Since many suicide bombers would be required for such a coordinated attack, they would have been pre-emptively cultivated as “sleepers” to be used in the long term. A sleeper is an inactive undercover agent cultivated over a long period to be used over such time. Sleepers would be contacted by the Principal Agent Handler to be briefed on the plan and provided with instructions and resources through different cells. Under any circumstance, the Principal Agent Handler would not expose or compromise the sleeper to the rest of the cells or vice versa to ensure everyone’s security. Overall, the complexity of the modus operandi of terrorist organizations illustrates the value that nation-state training offers. Unfortunately, the damage has already been done, so we must focus on addressing the byproducts of proxies. 

Addressing the Byproducts of Proxies

How do we prevent refugees and foreign fighters from entering and targeting open democratic nations? We must allow refugees to escape and settle in our countries, thereby showcasing nations’ soft power. This will allow the NATO-led hard power strategy to unfold. That is the bombing of ISIL targets in Iraq and Syria. This highlights a long-term strategic advantage. The new challenge and threat to law enforcement agencies are about distinguishing between refugees’ motives. As influxes in European and North American immigration occur, nations face an overwhelming security concern. This forces us to consider how to identify and weed out potential members of ISIL who may infiltrate nations as disguised civilians.

The best way to prevent and deter future terrorist attacks is to separate or isolate the terrorists from the general populace. By weeding the insurgents out of legitimate refugees, we can eventually apply Mao Zedong’s theory, “Insurgents are like fish in an ocean of people.” By separating the “ocean” (the general populace) from the “fish” (insurgents), we will be able to determine the survival of the enemy insurgents/terrorists. So, how does one separate the populace ocean from the insurgent fish?

We can achieve separation through the core strategy of the COIN doctrine: if we can win the hearts and minds of the general populace, then the general populace will do the job for us. Thus, we have to win the hearts and minds of the people. This is where soft power comes into play. Although hard power is vital to safeguard a nation’s interests, when we are confronted by an enemy with many different faces, we must explore other tools to combat the enemy through non-military means. As Sun Tzu reminds us, the supreme art of war is to subdue the enemy without fighting; eliminating the will to fight and destroying the spirit of the enemy’s potential to fight is paramount.

Against this backdrop, we must devise a strategy on how law enforcement agencies can prevent terrorists from infiltrating and/or exfiltrating cleared areas of operation. Decisively, there is a method called “Spotter Force Multiplier Theory” (SFMT), which is a successful tradecraft in human intelligence (HUMINT), also known as “Link Analysis.” In any organization, albeit police, intelligence, military, or even non-state organizations such as gangs, mafia, drug cartels, or terrorist organizations, you can only identify the members by using the organization’s very own members. As we confront terrorist organizations, state security organizations come across and identify at least one genuine member. This member must be utilized as a “spotter” for governments to identify others. In other words, the member who is arrested and/or defected must undergo a brief rehabilitation process – instilling them with compassion and indoctrinating them with soft power contrary to aggressive interrogation techniques – and work for the state’s security agencies. As more individuals are found, the “spotter force multiplier” emerges and continues until the “big fish” is caught. The advantage of using SFMT is that we would have a complete picture and understanding of insider information regarding enemy organizations- valuable tactical intelligence. 

Conclusion

The global powers, including, but not limited to, American, Russian, Chinese, and Indian governments and their intelligence agencies, supported and sponsored insurgencies around the world. This ultimately transformed insurgencies into terrorist organizations. Global powers must come to understand the implications of supporting insurgencies and learn from the consequences of past proxies – especially in a globalized world that is experiencing an increase in the number and severity of terrorist attacks. Therefore, global powers should be held accountable and adopt the COIN doctrine and SFMT as responsive and preventative measures.

Image credit: Ahram online

References

Bumiller, E., & Perlez, J. (2011, September 22). Pakistan’s Spy Agency Is Tied to Attack on U.S. Embassy. Retrieved March 05, 2017, from http://www.nytimes.com/2011/09/23/world/asia/mullen-asserts-pakistani-role-in-attack-on-us-embassy.html

Criminal Intelligence. (2011) Manual for Analysts. United Nations Office on Drugs and Crime. Vienna. United Nations, New York, Retrieved March 05, 2017, from https://www.unodc.org/documents/organized-crime/Law Enforcement/Criminal_Intelligence_for_Analysts.pdf

Daniel. B, Chalk. P, Hoffman. B, Rosenau. W and Brannan. D. (2001) Trends in Outside Support for Insurgent Movements: National Security Research Division, RAND Corporation, Washington. D.C, Retrieved March 05, 2017, from http://www.rand.org/content/dam/rand/pubs/monograph_reports/2007/MR1405.pdf

Krebs, V. E. (2002) Mapping Networks of Terrorist Cells: Connections 24(3): 43-52, INSNA,   Retrieved March 05, 2017, from http://ecsocman.hse.ru/data/517/132/1231/mappingterroristnetworks.pdf

Ostrovsky, V., & Hoy, C. (1991). By Way of Deception: The Making and Unmaking of a Mossad Officer: New York, NJ: St. Martin’s Paperbacks.

Richards, J. (2014) An Institutional History of the Liberation Tigers of Tamil Eelam (LTTE): The Centre on Conflict, Development, and Peacebuilding, The Graduate Institute Geneva. Retrieved March 05, 2017, from http://repository.graduateinstitute.ch/record/292651/files/CCDP-Working-Paper-10-LTTE-1.pdf

Speckhard, A., & Yayla, A. S. (2016) The ISIS Emni: The Origins and Inner Workings of ISIS’s Intelligence Apparatus: Retrieved March 05, 2017, from http://www.terrorismanalysts.com/pt/index.php/pot/article/view/573/html

Waldman, M. (2010) The sun in the sky: the relationship between Pakistan’s ISI and Afghan insurgents: Kennedy School of Government, Harvard University, Retrieved March 05, 2017, from https://www.thebaluch.com/documents/SIS%20FINAL.pdf

16 Comments

  1. I have witnessed that intelligent real estate agents just about everywhere are starting to warm up to FSBO Marketing. They are noticing that it’s more than merely placing a poster in the front area. It’s really pertaining to building human relationships with these traders who someday will become consumers. So, if you give your time and efforts to encouraging these retailers go it alone : the “Law associated with Reciprocity” kicks in. Good blog post.

    Like

  2. An impressive share! I have just forwarded this onto a co-worker who has been conducting a little research on this. And he actually ordered me breakfast due to the fact that I found it for him… lol. So allow me to reword this…. Thanks for the meal!! But yeah, thanks for spending some time to discuss this matter here on your website.

    Like

  3. I am not sure where you are getting your info, however good topic. I must spend a while learning much more or figuring out more. Thank you for the wonderful info. I was in search of this info for my mission.

    Like

  4. Hi there! Someone in my Myspace group shared this site with us, so I came to look it over. I’m definitely enjoying the information. I’m bookmarking and will be tweeting this to my followers! Outstanding blog and brilliant style and design.

    Like

  5. Hello there, simply became aware of your weblog through Google and located that it is really informative. I am going to watch out for Brussels. I will be grateful when you continue this in the future. Lots of folks will be benefited out of your writing. Cheers!

    Like

  6. Thanks for discussing your ideas in this article. The other factor is that every time a problem occurs with a computer system motherboard, individuals should not risk repairing themselves. If it is not done correctly, it can lead to irreparable damage to the entire laptop. However, it will always be safe to approach a laptop dealer to repair the motherboard. They’ve got technicians with expertise in laptop computer motherboard complications and can get the right diagnosis and carry out repairs.

    Like

  7. I wish to show my thanks to the writer for rescuing me from this particular challenge. Right after scouting through the web and getting opinions that were not pleasant, I assumed my entire life was gone. Being alive without the answers to the problems you have sorted out through your post is a critical case and the kind that may have negatively affected my entire career if I hadn’t encountered your website. Your own mastery and kindness in maneuvering all the details were crucial. I don’t know what I would have done if I hadn’t encountered such a step like this. I can now look forward to my future. Thanks so much for this expert and results-oriented guide. I won’t be reluctant to propose the sites to any individual who requires recommendations on this subject matter.

    Like

  8. Throughout the great pattern of things, you’ll secure an A+ concerning effort. Where exactly you actually confused me personally was first in the specifics. You know, they say, details make or break the argument. And it couldn’t be much more accurate at this point. Having said that, permit me to say to you what did give good results. Your text is pretty powerful, which is possibly why I am making an effort to opine. I do not really make it a regular habit of doing that. Secondly, while I can easily see the jumps in reason you come up with, I am not sure of how you appear to connect the details, which in turn help to make the actual conclusion. For right now, I will, no doubt, subscribe to your issue; however, trust shortly, you actually link your facts much better.

    Like

  9. Hi, I do believe this is an excellent website. I stumbled upon it 😉 I may return yet again since I saved it as a favorite. Money and freedom is the greatest way to change, may you be rich and continue to help others.

    Like

  10. We absolutely love your blog and find almost all of your posts to be just what I’m looking for. Do you offer guest writers to write content for you personally? I wouldn’t mind writing a post or elaborating on a lot of the subjects you write regarding here. Again, awesome weblog!

    Like

  11. What I don’t understand is actually how you’re no longer much more popular
    than you may be right now. You are so intelligent. You already know therefore considerably about this matter, which made me in my opinion believe it from numerous varied angles. It’s like men and women are not involved until it is something to do with Lady gaga! Your stuff is great. All the time deal with it up!

    Like

  12. Greetings from Idaho! I’m bored to tears at work so I decided to browse your website on my iphone during lunch break. I love the knowledge you present here and can’t wait to take a look when I get home. I’m amazed at how fast your blog loaded on my mobile .. I’m not even using WIFI, just 3G .. Anyhow, superb site!

    Like

Leave a comment