Clandestine human intelligence is intelligence collected from human sources using clandestine espionage methods. These sources consist of people working in a variety of roles within the intelligence community . Examples include the quintessential spy (known by professionals as an asset or agent ), who collects intelligence; couriers and related personnel, who handle an intelligence organization's (ideally) secure communications ; and support personnel, such as access agents, who may arrange the contact between the potential spy and the case officer who recruits them. The recruiter and supervising agent may not necessarily be the same individual. Large espionage networks may be composed of multiple levels of spies, support personnel, and supervisors. Espionage networks are typically organized as a cell system , in which each clandestine operator knows only the people in his own cell, perhaps the external case officer, and an emergency method (which may not necessarily involve another person) to contact higher levels if the case officer or cell leader is captured, but has no knowledge of people in other cells. This cellular organization is a form of compartmentalisation , which is an important tactic for controlling access to information, used in order to diminish the risk of discovery of the network or the release of sensitive information.
104-527: Counterterrorism (alternatively spelled: counter-terrorism ), also known as anti-terrorism , relates to the practices, military tactics , techniques, and strategies that governments, law enforcement , businesses, and intelligence agencies use to combat or eliminate terrorism . If an act of terrorism occurs as part of a broader insurgency (and insurgency is included in the definition of terrorism ) then counterterrorism may additionally employ counterinsurgency measures. The United States Armed Forces uses
208-657: A bomb shelter in every building and school, but also deploying active protection systems such as the Arrow ABM , Iron Dome and David's Sling , which intercept the incoming threat in the air. Iron Dome has successfully intercepted hundreds of Qassam rockets and Grad rockets fired by Palestinians from the Gaza Strip. A more sophisticated target-hardening approach must consider industrial and other critical industrial infrastructure that could be attacked. Terrorists do not need to import chemical weapons if they can cause
312-429: A policy of not making comment on this. In addition to utilizing agencies within a government many also employ private companies to collect information on their behalf such as SCG International Risk and others. Not all clandestine human sources change their loyalties to the country to which they were born, or owed their first allegiance. In this section we are talking of the classical and actually rare "spy", who really
416-494: A 2008 Defense Department study, financial incentives and external coercion have played diminishing roles in motivating Americans to spy against the United States, but divided loyalties are increasingly evident in recent espionage cases. The study said, "Two thirds of American spies since 1990 have volunteered. Since 1990, spying has not paid well: 80% of spies received no payment for espionage, and since 2000 it appears no one
520-542: A federal judge to throw out the conviction, on the basis that prosecutors "deliberately deceived the court", in the words of the judge, "America will not defeat Libyan terrorism by double-crossing a part-time, informal government agent." A double agent is, from the start, a trained intelligence asset. They may be a low level agent with only the most basic amount of training, not a full case officer, but their original agency places some degree of trust in them. Double agent cases, like all intelligence operations, are run to serve
624-542: A large infantry force. In both the European and Oriental traditions of warfare, the advent of gunpowder during the late Medieval and Early Modern periods created a relentless shift to infantry firepower becoming "a decisive, if not dominant" arm on the battlefield, exemplified by the significant impact of massed arquebusiers at the Battle of Nagashino in 1575. The synchronisation of the various fighting arms to achieve
728-636: A low-level worker in the CIA Watch Center, sold, for a small sum, the critical operations manual on the KH-11 reconnaissance satellite. To an interviewer, Kampiles suggested that if someone had noted his "problem"—constant conflicts with supervisors and co-workers—and brought in outside counseling, he might not have stolen the KH-11 manual. Other than the dangled moles described above, moles start out as loyal to their own country A. They may or may not be
832-522: A major industrial accident such as the Bhopal disaster or the Halifax Explosion . Industrial chemicals in manufacturing, shipping, and storage thus require greater protection, and some efforts are in progress. Equipping likely targets with containers of pig lard has been used to discourage attacks by suicide bombers. The technique was apparently used on a limited scale by British authorities in
936-686: A mole is a false flag recruitment of a penetrator: False flag recruitments, admittedly for covert action rather than pure HUMINT, were reported as a technique used by Edwin P. Wilson , who left CIA in 1971, and then went to work for a Navy HUMINT unit, Task Force 157 until 1976, when he went private. During his time working for CIA, he was both officially and unofficially involved in arms sales. "His assignments sometimes required him to establish and use 'front' companies to gain access to information and to support CIA operations here and abroad commercially." Three men, found dead under mysterious circumstances, had believed they had been recruited by Wilson, "under
1040-444: A more complete list Espionage is usually part of an institutional effort (i.e., governmental or corporate espionage), and the term is most readily associated with state spying on potential or actual enemies, primarily for military purposes, but this has been extended to spying involving corporations , known specifically as industrial espionage . Many nations routinely spy on both their enemies and allies, although they maintain
1144-624: A national response might be required for a nuclear, biological, radiological, or significant chemical attack. Fire departments , perhaps supplemented by public works agencies, utility providers, and heavy construction contractors, are most apt to deal with the physical consequences of an attack. Again under an incident command model, local police can isolate the incident area, reducing confusion, and specialized police units can conduct tactical operations against terrorists, often using specialized counterterrorist tactical units. Bringing in such units will typically involve civil or military authority beyond
SECTION 10
#17328007169261248-412: A press report about Project Slammer and Congressional oversight of counterespionage, one fairly basic function is observing one's own personnel for behavior that either suggests that they could be targets for foreign HUMINT, or may already have been subverted. News reports indicate that in hindsight, red flags were flying but not noticed. In several major penetrations of US services, such as Aldrich Ames ,
1352-637: A section on confronting terrorism in the recommendations in the Madrid Agenda arising from the Madrid Summit on Democracy and Terrorism (Madrid March 8–11, 2005): Democratic principles and values are essential tools in the fight against terrorism. Any successful strategy for dealing with terrorism requires terrorists to be isolated. Consequently, the preference must be to treat terrorism as criminal acts to be handled through existing systems of law enforcement and with full respect for human rights and
1456-709: A security-cleared Independent Reviewer of Terrorism Legislation , whose often influential reports are submitted to Parliament and published in full. One of the primary difficulties of implementing effective counterterrorist measures is the waning of civil liberties and individual privacy that such measures often entail, both for citizens of, and for those detained by states attempting to combat terror. At times, measures designed to tighten security have been seen as abuses of power or even violations of human rights. Examples of these problems can include prolonged, incommunicado detention without judicial review or long periods of 'preventive detention'; risk of subjecting to torture during
1560-448: A senior officer already in place when he started reporting, for ideological reasons, to service B (actually two B's, SIS and CIA), was Col. Oleg Penkovsky . Recruitment can be done through personal relationships, from casual sex and blackmail to friendship or romance Personnel in sensitive positions, who have difficulty getting along with peers, may become risks for being compromised with an approach based on ego. William Kampiles ,
1664-442: A shifting balance between the four tactical functions, generally based on the application of military technology, which has led to one or more of the tactical functions being dominant for a period of time, usually accompanied by the dominance of an associated fighting arm deployed on the battlefield, such as infantry , artillery , cavalry or tanks . Beginning with the use of melee and missile weapons such as clubs and spears,
1768-500: A trained intelligence officer. Note that some intelligence professionals reserve the term mole to refer to enemy personnel that personally know important things about enemy intelligence operations, technology, or military plans. A person such as a clerk or courier (e.g., Jack Dunlap , who photographed many documents but was not really in a position to explore enemy thinking), is more generically an asset. To be clear, all moles are assets, but not all assets are moles. Another special case
1872-492: Is a "deep cover" or "sleeper" mole, who may enter a service, possibly at a young age, but definitely not reporting or doing anything that would attract suspicion, until reaching a senior position. Kim Philby is an example of an agent actively recruited by the British Secret Intelligence Service while he was already committed to Communism. Philby, at first, concentrated on doing a good job for
1976-489: Is a great challenge with the security of cell-based systems, since the ideal, but the nearly impossible, goal is to obtain a clandestine source within the cell. Financial tracking can play a role, as a communications intercept . However, both of these approaches need to be balanced against legitimate expectations of privacy. In response to the growing legislation. Since 1978 the UK's terrorism laws have been regularly reviewed by
2080-567: Is a loyal citizen of country A but obtains information from country B, either through informal means (e.g., fake news reporting) or actually going to work for country B. A special case is of the Country B loyalist who controls agents or provides other supporting or managerial functions against Country A. Richard Sorge was a Soviet citizen (i.e., country A), who posed as a German (country C) journalist in Tokyo, to report on Japan (country B) back to
2184-456: Is an example of a US CIA officer who came to the belief that he was working on behalf of an ideology he had come to hate. Eventually, he resigned, and clandestinely went to Cuba , telling their intelligence service everything he knew, with the stated goal of damaging the CIA. Agee claims the CIA was satisfied with his work and did not want him to leave, although the author, John Barron, claims that he
SECTION 20
#17328007169262288-399: Is as much a psychological function of tactics as a physical one, and can be significantly enhanced by the use of surprise. It has been provided by charging infantry, and as well as by chariots , war elephants , cavalry and armoured vehicles which provide momentum to an assault. It has also been used in a defensive way, for example by the drenching flights of arrows from English longbowmen at
2392-447: Is sometimes directed to specific ethnic or religious groups, which are the sources of political conversy. Mass surveillance of an entire population raises objections on civil liberties grounds. Domestic terrorists , especially lone wolves , are often harder to detect because of their citizenship or legal status and ability to stay under the radar. To select the effective action when terrorism appears to be more of an isolated event,
2496-422: Is that the agent may be hard to control. In most operations the case officer's superior training and experience give him so decided an edge over the agent that recognition of this superiority makes the agent more tractable. However, added to the fact that the experienced double agent may have been in the business longer than his case officer, his further advantage in having gained a first-hand comparative knowledge of
2600-423: Is the uncertainty of the future: the threat of terrorism may increase, decrease or remain the same, the type of terrorism and location are difficult to predict, and there are technological uncertainties. A potential solution is to incorporate engineering flexibility into system design, allowing for flexibility when new information arrives. Flexibility can be incorporated in the design of a counter-terrorism system in
2704-461: Is to directly engage terrorists and prevent terrorist attacks. Such units perform both in preventive actions, hostage rescue, and responding to ongoing attacks. Countries of all sizes can have highly trained counterterrorist teams. Tactics, techniques, and procedures for manhunting are under constant development. These units are specially trained in military tactics and are equipped for close-quarters combat , with emphasis on stealth and performing
2808-445: Is to place hostile vehicle mitigation to enforce protective standoff distance outside tall or politically sensitive buildings to prevent car bombings . Another way to reduce the impact of attacks is to design buildings for rapid evacuation. Aircraft cockpits are kept locked during flights and have reinforced doors, which only the pilots in the cabin are capable of opening. UK railway stations removed their garbage bins in response to
2912-445: Is very large in physical terms and in other dimensions, such as type and degree of terrorist threats, political and diplomatic ramifications, and legal concerns. Ideal counterterrorist systems use technology to enable persistent intelligence , surveillance and reconnaissance missions, and potential actions. Designing such a system-of-systems comprises a major technological project. A particular design problem for counterterrorist systems
3016-596: The Battle of Agincourt in 1415 which caused the horses of the French knights to panic. During early modern warfare , the use of the tactical formations of columns and lines had a greater effect than the firepower of the formations alone. During the early stages of World War II, the combined effects of German machine gun and tank gun firepower, enhanced by accurate indirect fire and air attack, often broke up Allied units before their assault commenced, or caused them to falter due to casualties among key unit leaders. In both
3120-630: The Burma Campaign but unsuccessful for the Germans at the Battle of Stalingrad . Following World War II, rotary-wing aircraft had a significant impact on firepower and mobility, comprising a fighting arm in its own right in many armies. Aircraft, particularly those operating at low or medium altitudes, remain vulnerable to ground-based air defence systems as well as other aircraft. Parachute and glider operations and rotary-wing aircraft have provided significant mobility to ground forces but
3224-694: The Department of Justice (DOJ) and the Department of Homeland Security (DHS), house most of the federal agencies that are prepared to combat domestic and international terrorist attacks. These include the Border Patrol , the Secret Service , the Coast Guard and the FBI . Military tactics Military tactics encompasses the art of organizing and employing fighting forces on or near
Counterterrorism - Misplaced Pages Continue
3328-922: The Malayan Emergency , the Mau Mau uprising , and most of the campaigns against the IRA during the Irish Civil War , the S-Plan , the Border Campaign , and the Troubles in Northern Ireland. Although military action can temporarily disrupt a terrorist group's operations temporarily, it sometimes does not end the threat completely. Repression by the military in itself usually leads to short term victories, but tend to be unsuccessful in
3432-797: The Provisional IRA threat, as convenient locations for depositing bombs. Scottish stations removed theirs after the 7 July 2005 London Bombings as a precautionary measure. The Massachusetts Bay Transportation Authority purchased bomb-resistant barriers after the September 11 attacks. Due to frequent shelling of Israel's cities, towns, and settlements by artillery rockets from the Gaza Strip (mainly by Hamas , but also by other Palestinian factions) and Lebanon (mainly by Hezbollah ), Israel has developed several defensive measures against artillery, rockets, and missiles. These include building
3536-453: The battlefield . They involve the application of four battlefield functions which are closely related – kinetic or firepower , mobility , protection or security, and shock action . Tactics are a separate function from command and control and logistics . In contemporary military science , tactics are the lowest of three levels of warfighting, the higher levels being the strategic and operational levels. Throughout history, there has been
3640-652: The 18th and 19th centuries, personal armour had been largely discarded, until the re-introduction of helmets during World War I in response to the firepower of artillery. Armoured fighting vehicles proliferated during World War II, and after that war, body armour returned for the infantry, particularly in Western armies. Fortifications , which have been used since ancient times, provide collective protection, and modern examples include entrenchments , roadblocks , barbed wire and minefields . Like obstacles, fortifications are often created by military engineers. Shock action
3744-470: The 1940s. The approach stems from the idea that Muslims perpetrating the attack would not want to be "soiled" by the lard in the moment before dying. The idea has been suggested more recently as a deterrent to suicide bombings in Israel. However, the actual effectiveness of this tactic is likely limited. A sympathetic Islamic scholar could issue a fatwa proclaiming that a suicide bomber would not be polluted by
3848-707: The 20th and 21st centuries are listed below. See list of hostage crises for a more extended list, including hostage-takings that did not end violently. Sea , south of the French coast ; subsequently Mogadishu International Airport , Somalia March 30, the Manawan Police Academy in Lahore attack – 8 gunmen, 8 police personnel and 2 civilians killed, 95 people injured, 4 gunmen captured. Plaza Cinema Chowk attack – 16 police officers, an army officer and unknown number of civilians killed. As many as 251 people injured. The scope for counterterrorism systems
3952-493: The British, so he could rise in trust and authority. Philby was motivated by ideology before he joined SIS. An individual may want to leave their service at once, perhaps from high-level disgust, or low-level risk of having been discovered in financial irregularities and is just ahead of arrest. Even so, the defector certainly brings knowledge with him, and may be able to bring documents or other materials of value. Philip Agee
4056-547: The Soviet Union. Sorge was eventually caught and executed by the Japanese, who generally honored his bravery. Especially in wartime, while a country may need to execute an agent, they sometimes respect them. It is a truism that a live captured spy has more potential value than a dead one, since a live one can still be interrogated, or perhaps turned into a double agent . There have been cases where countries have announced
4160-558: The US. Kalugin accused Koecher of being a US double agent. Koecher retired from the CIA and went to work in academia, but was subsequently reactivated by the KGB and went to work, part-time, for the CIA. During this period, he was discovered by the FBI, who attempted to double him against the KGB, but the FBI considered him unreliable and eventually arrested him. The arrest was legally tainted, and Koecher
4264-640: The United Kingdom and elsewhere. The International Conference of Rome for the Social Defense Against Anarchists has been identified as the first international conference against terrorism. The first tactical counterterrorist unit was GSG 9 of the German Federal Police , formed in response to the 1972 Munich massacre . Counterterrorist forces expanded with the perceived growing threat of terrorism in
Counterterrorism - Misplaced Pages Continue
4368-592: The United Kingdom, the United States, and Russia have taken this approach, while Western European states generally do not. Another major method of preemptive neutralization is the interrogation of known or suspected terrorists to obtain information about specific plots, targets, the identity of other terrorists, whether or not the interrogation subjects himself is guilty of terrorist involvement. Sometimes more extreme methods are used to increase suggestibility , such as sleep deprivation or drugs. Such methods may lead captives to offer false information in an attempt to stop
4472-568: The United States. While Yurchenko also identified Ronald Pelton as a Soviet defector-in-place working in the NSA , Yurchenko himself re-defected back to the USSR within a few months. It is possible that Yurchenko was acting as a double agent , sent by the Soviets to sacrifice less important Soviet assets in order to protect the more important CIA defectors in place, e.g. Aldrich Ames . A special case of
4576-617: The Walker ring or Robert Hanssen , the individual showed patterns of spending inconsistent with their salary. Some people with changed spending may have a perfectly good reason, such as an inheritance or even winning the lottery, but such patterns should not be ignored. By 1997, the Project Slammer work was being presented at public meetings of the Security Policy Advisory Board. While a funding cut caused
4680-445: The above-mentioned Munich massacre. Most counterterrorism strategies involve an increase in policing and domestic intelligence gathering. Central techniques include intercepting communications and location tracking . New technology has expanded the range of military and law enforcement options for intelligence gathering. Many countries increasingly employ facial recognition systems in policing. Domestic intelligence gathering
4784-480: The agent's overall wellbeing. When making predictions, the most important factor is the nature of a double agent's original or primary affiliation: its duration, intensity, and whether it was voluntary. Years of clandestine association with the adversary can have deep but subtle effects. Ethnic or religious ties in particular can run deep, even if the agent hates the government or organization they are turning against. Another result of lengthy prior clandestine service
4888-415: The ambiguity between defense vs. offense, as well as the ambiguity between peace-keeping vs. war effort. Clandestine human intelligence Black's Law Dictionary (1990) defines espionage as: "gathering, transmitting, or losing ... information related to the national defense ." In the UK, "Under the 1911 Act, a person commits the offence of 'spying' if he, for any purpose prejudicial to
4992-538: The appropriate government organizations need to understand the source, motivation, methods of preparation, and tactics of terrorist groups. Good intelligence is at the heart of such preparation, as well as a political and social understanding of any grievances that might be solved. Ideally, one gets information from inside the group, a very difficult challenge for human intelligence operations because operational terrorist cells are often small, with all members known to one another, perhaps even related. Counterintelligence
5096-589: The changes since 9/11: "We then centralized coordination of our counterterrorism program. Unlike before, when investigations were managed primarily by individual field offices, the Counterterrorism Division at Headquarters now has the authority and the responsibility to direct and coordinate counterterrorism investigations throughout the country. This fundamental change has improved our ability to coordinate our operations here and abroad, and it has clearly established accountability at Headquarters for
5200-501: The development of combined arms tactics has been dogged by costly and painful lessons. For example, while German commanders in World War II clearly understood from the outset the key principle of combined arms tactics outlined above, British commanders were late to this realisation. Successful combined arms tactics require the fighting arms to train alongside each other and to be familiar with each other's capabilities. Beginning in
5304-744: The development of types of soldiers or warriors through history: Greek hoplite , Roman legionary , medieval knight , Turk-Mongol horse archer , Chinese crossbowman , or an air cavalry trooper. Each – constrained by his weaponry, logistics and social conditioning – would use a battlefield differently, but would usually seek the same outcomes from their use of tactics. The First World War forced great changes in tactics as advances in technology rendered prior tactics useless. "Gray-zone" tactics are also becoming more widely used. These include "everything from strong-arm diplomacy and economic coercion, to media manipulation and cyberattacks, to use of paramilitaries and proxy forces". The title "gray-zone" comes from
SECTION 50
#17328007169265408-528: The dominance between unarmoured and armoured forces and highlight tactical trends in each period. Massed volley fire by archers brought infantry firepower to the fore in Japanese warfare in the second half of the 13th century, preceding the rise of the English longbowman. The mobility and shock action of the Oirat Mongol army at the Battle of Tumu in 1449 demonstrated that cavalry could still defeat
5512-419: The early modern and World War II examples, the cumulative psychological shock effect on the enemy was often greater than the actual casualties incurred. The development of tactics has involved a shifting balance between the four tactical functions since ancient times, and changes in firepower and mobility have been fundamental to these changes. Various models have been proposed to explain the interaction between
5616-484: The effective inclusion of human rights protection as a crucial element in that cooperation. They argue that international human rights obligations do not stop at borders, and a failure to respect human rights in one state may undermine its effectiveness in the global effort to cooperate to combat terrorism. Some countries see preemptive attacks as a legitimate strategy. This includes capturing, killing, or disabling suspected terrorists before they can mount an attack. Israel,
5720-549: The enduring underlying inequalities which fuel terrorist activity. Causal factors need to be delineated and measures implemented which allow equal access to resources and sustainability for all people. Such activities empower citizens, providing "freedom from fear" and "freedom from want". This can take many forms, including the provision of clean drinking water, education, vaccination programs, provision of food and shelter and protection from violence, military or otherwise. Successful human security campaigns have been characterized by
5824-671: The exception of penetration moles, other human sources start out as highly trusted by their services. What causes an individual to betray service A, typically his country of birth? The most common shorthand for changing allegiance is MICE , an acronym for: Sometimes more than one factor applies, as with Robert Hanssen , an FBI counterintelligence agent who was a "write-in" to the KGB. While he received large amounts of money, he apparently felt unappreciated in his own service and spying on it satisfied his ego. Psychological factors can apply to people changing allegiance for reasons other than coercion or ideology. To go beyond slogans, Project Slammer
5928-412: The execution of people who are actually alive. Dangled moles start out being loyal to one country B, but go to work for another service A, reporting back to their original service. Such operations can become "infinities of mirrors" as the mole may be detected and the service by which they are employed tries to double them, which may or may not work. One of the best-known, and apparently most successful,
6032-569: The form of options that can be exercised in the future when new information is available. While some countries with longstanding terrorism problems have law enforcement agencies primarily designed to prevent and respond to terror attacks, in other nations, counterterrorism is a relatively more recent objective of law enforcement agencies. Though some civil libertarians and criminal justice scholars have criticized efforts of law enforcement agencies to combat terrorism as futile and expensive or as threats to civil liberties, other scholars have analyzed
6136-661: The illusion that his activities had the sanction of the CIA—an illusion crucial to keeping his false flag attractive." Wilson was involved in then-banned arms sales to Libya, and it is unclear who actually sponsored these sales. In 1982, while based in Libya, he traveled to the Dominican Republic where he was arrested for illegal arms sales. In 1984, at age 55, he was sentenced to 52 years in prison. Continuing Freedom of Information Act and other research by his attorney caused
6240-818: The intelligence officers in an embassy, so the initial interviews are, unless there is a strong reason to the contrary, conducted by low-level staff. Serov points out that even if some walk-ins have no material of value, "Some are ideologically close to us and genuinely and unselfishly anxious to help us; some are in sympathy with the Soviet Union but want at the same time to supplement their income; and some, though not in accord with our ideas and views, are still ready to collaborate honestly with us for financial reasons." A genuine sympathizer without useful material still may become useful as an access agent, courier, or support agent. Other walk-ins simply are trying to get money, either for nonsense information or for real information with which they have been entrusted. Physical walk-ins are not
6344-430: The interests of national security. Principally, they do so by providing current counterintelligence about hostile intelligence and security services, and about clandestine subversive activities. A service must weigh the risks and benefits of maintaining what is essentially a condoned channel of communication with a hostile foreign government or organization. Managing a double agent requires skill and sophistication at both
SECTION 60
#17328007169266448-521: The introduction of the rifled musket , used in the Crimean War and American Civil War , meant flatter trajectories and improved accuracy at greater ranges, along with higher casualties. The resulting increase in defensive firepower meant infantry attacks without artillery support became increasingly difficult. Firepower also became crucial to fixing an enemy in place to allow a decisive strike. Machine guns added significantly to infantry firepower at
6552-481: The kinetic or firepower function of tactics has developed along with technological advances so that the emphasis has shifted over time from the close-range melee and missile weapons to longer-range projectile weapons. Kinetic effects were generally delivered by the sword, spear, javelin and bow until the introduction of artillery by the Romans . Until the mid 19th century, the value of infantry-delivered missile firepower
6656-615: The late 20th century. After the September 11 attacks , Western governments made counterterrorism efforts a priority. This included more extensive collaboration with foreign governments, shifting tactics involving red teams , and preventive measures. Although terrorist attacks affecting Western countries generally receive a disproportionately large share of media attention, most terrorism occurs in less developed countries. Government responses to terrorism, in some cases, tend to lead to substantial unintended consequences, such as what occurred in
6760-407: The latter stages of World War I, airpower has brought a significant change to military tactics. World War II saw the development of close air support which greatly enhanced the effect of ground forces with the use of aerial firepower and improved tactical reconnaissance and the interdiction of hostile air power. It also made possible the supply of ground forces by air, achieved by the British during
6864-419: The latter years of World War I when the advent of the tank improved mobility sufficiently to allow decisive tactical manoeuvre. Despite this advance, full tactical mobility was not achieved until World War II when armoured and motorised formations achieved remarkable successes. However, large elements of the armies of World War II remained reliant on horse-drawn transport, which limited tactical mobility within
6968-479: The local agency, or even from a third country false-flag provocation. "Persons wanting to make money usually produce a large quantity of documents and talk much and willingly about themselves, trying to make a favorable impression. Extortioners and blackmailers usually act impudent, making their offer in the form of an ultimatum and even resorting to open threats." Another method is to directly recruit an intelligence officer or terrorist organization member from within
7072-635: The local level. Emergency medical services are capable of triaging, treating, and transporting the more severely affected individuals to hospitals, which typically have mass casualty and triage plans in place for terrorist attacks. Public health agencies , from local to the national level, may be designated to deal with identification, and sometimes mitigation, of possible biological attacks, and sometimes chemical or radiological contamination. Many countries have dedicated counterterrorist units trained to handle terrorist threats. Besides various security agencies , there are police tactical units whose role
7176-559: The local/case officer level and central levels. A service may keep physical controls on its double agents, such as those in the Double-Cross System during WWII (few of whom were highly trained intelligence officers, but rather opportunists) who were coerced by threat of execution. In the absence of any such controls, managing double agents becomes much complex. The interpersonal dynamic between an agent and case officer can also be complex, with some officers developing concern for
7280-475: The long run (e.g., the French doctrine used in colonial Indochina and Algeria ), particularly if it is not accompanied by other measures. However, new methods such as those taken in Iraq have yet to be seen as beneficial or ineffectual. Whatever the target of terrorists, there are multiple ways of hardening the targets to prevent the terrorists from hitting their mark, or reducing the damage of attacks. One method
7384-411: The loss of impetus in the mid-nineties, there are research data used throughout the security community. They emphasize the "essential and multi-faceted motivational patterns underlying espionage. Future Slammer analyses will focus on newly developing issues in espionage such as the role of money, the new dimensions of loyalty and what seems to be a developing trend toward economic espionage." According to
7488-453: The mission with minimal casualties. The units include assault teams, snipers , EOD experts, dog handlers, and intelligence officers. Most of these measures deal with terrorist attacks that affect an area or threaten to do so, or are lengthy situations such as shootouts and hostage takings that allow the counterterrorist units to assemble and respond; it is harder to deal with shorter incidents such as assassinations or reprisal attacks, due to
7592-581: The most important dimensions of the policing of terrorism as an important dimension of counter-terrorism, especially in the post-9/11 era, and have discussed how police view terrorism as a matter of crime control. Such analyses highlight the civilian police role in counterterrorism next to the military model of a war on terror . Pursuant to passage of the Homeland Security Act of 2002 , federal, state, and local law enforcement agencies began to systemically reorganize. Two primary federal agencies,
7696-486: The nineteenth century, many military tactics were confined to battlefield concerns: how to maneuver units during combat in open terrain. Nowadays, specialized tactics exist for many situations, for example for securing a room in a building. Technological changes can render existing tactics obsolete, and sociological changes can shift the goals and methods of warfare, requiring new tactics. Tactics define how soldiers are armed and trained. Thus technology and society influence
7800-422: The only kind of volunteer "well-wisher," who may communicate through the mail, by telephone, or direct contact. If, for example, contact is made with someone who really is an intelligence officer, there is immediate reason to believe the person does have intelligence contacts—but further investigation is necessary to see if they are real or if they are provocateurs from counterintelligence . A provocateur can be from
7904-430: The overall force. Tactical mobility can be limited by the use of field obstacles, often created by military engineers . Personal armour has been worn since the classical period to provide a measure of individual protection, which was also extended to include barding of the mount. The limitations of armour have always been weight and bulk, and its consequent effects on mobility as well as human and animal endurance. By
8008-409: The participation of a diverse group of actors, including governments, NGOs , and citizens. Foreign internal defense programs provide outside expert assistance to a threatened government. FID can involve both non-military and military aspects of counterterrorism. A 2017 study found that "governance and civil society aid is effective in dampening domestic terrorism, but this effect is only present if
8112-477: The pretense that he was still a CIA executive." According to Epstein, "Wilson maintained a close association with two of the agency's top executives—Thomas G. Clines, the director of training for the clandestine services, and Theodore G. Shackley, who held the No. 2 position in the espionage branch. Both of these men sat in on meetings that Wilson held with his operatives and weapon suppliers and, by doing so, helped further
8216-422: The problems with double agent operations in the US, run by the FBI , is that the FBI culture has been very decentralized to the field office level. This is, perhaps, an overreaction to the extremely centralized culture under J. Edgar Hoover. Prior to 9/11, information in one field office, which might reveal problems in a HUMINT operation, is not necessarily shared with other offices. FBI Director Robert Mueller cited
8320-420: The questions of how best to deploy and employ forces on a small scale. Some practices have not changed since the dawn of warfare: assault , ambushes , skirmishing , turning flanks , reconnaissance , creating and using obstacles and defenses, etc. Using ground to best advantage has not changed much either. Heights, rivers, swamps, passes, choke points, and natural cover, can all be used in multiple ways. Before
8424-405: The ranks of the adversary service or group, and having them maintain their normal duties while spying on their parent service or organization; this is also referred to as recruiting an "agent" or defector in place. As mentioned, Oleg Penkovsky was a key US-British agent, apparently detected through Soviet counterintelligence work. Adolf Tolkachev , an electronic engineer working on Soviet radar,
8528-412: The recipient country is not experiencing a civil conflict." Terrorism has often been used to justify military intervention in countries where terrorists are said to be based. Similar justifications were used for the U.S. invasion of Afghanistan and the second Russian invasion of Chechnya . Military intervention has not always been successful in stopping or preventing future terrorism, such as during
8632-536: The reduced mobility, protection and firepower of troops delivered by air once landed has limited the tactical utility of such vertical envelopment or air assault operations. This was demonstrated during Operation Market Garden in September 1944, and during the Vietnam War , in the latter case despite the additional firepower provided by helicopter gunships and the ability quickly to remove casualties, provided by aeromedical evacuation . Military tactics answer
8736-549: The rule of law. We recommend: (1) taking effective measures to make impunity impossible either for acts of terrorism or for the abuse of human rights in counter-terrorism measures. (2) the incorporation of human rights laws in all anti-terrorism programs and policies of national governments as well as international bodies." While international efforts to combat terrorism have focused on the need to enhance cooperation between states, proponents of human rights (as well as human security ) have suggested that more effort needs to be given to
8840-552: The safety or interests of the State; The US defines espionage towards itself as "The act of obtaining, delivering, transmitting, communicating, or receiving information about the national defense with an intent, or reason to believe, that the information may be used to the injury of the United States or to the advantage of any foreign nation. Espionage is a violation of 18 United States Code 792–798 and Article 106, Uniform Code of Military Justice. " See List of intelligence agencies for
8944-517: The short warning time and the quick exfiltration of the assassins. The majority of counterterrorism operations at the tactical level are conducted by state, federal, and national law enforcement or intelligence agencies . In some countries, the military may be called in as a last resort. For countries whose military is legally permitted to conduct domestic law enforcement operations, this is not an issue, and such counterterrorism operations are conducted by their military. Some counterterrorist actions of
9048-475: The swine products. For a threatened or completed terrorist attack, an Incident Command System (ICS) may be invoked to control the various services that may need to be involved in the response. ICS has varied levels of escalation, such as might be required for multiple incidents in a given area (e.g. 2005 London bombings or the 2004 Madrid train bombings ), or all the way to a National Response Plan invocation if national-level resources are needed. For example,
9152-488: The tactical functions and the dominance of individual fighting arms during different periods. J. F. C. Fuller proposed three "tactical cycles" in each of the classical and Christian eras. For the latter epoch, he proposed a "shock" cycle between 650 and 1450, a "shock and projectile" cycle 1450–1850, and a "projectile" cycle from 1850, with respect to the Western and North American warfare. During World War II, Tom Wintringham proposed six chronological periods, which alternate
9256-423: The tactical mission is known as combined arms tactics. One method of measuring tactical effectiveness is the extent to which the arms, including military aviation, are integrated on the battlefield. A key principle of effective combined arms tactics is that for maximum potential to be achieved, all elements of combined arms teams need the same level of mobility, and sufficient firepower and protection. The history of
9360-716: The term " foreign internal defense " for programs that support other countries' attempts to suppress insurgency, lawlessness , or subversion , or to reduce the conditions under which threats to national security may develop. The first counterterrorism body to be formed was the Special Irish Branch of the Metropolitan Police , later renamed the Special Branch after it expanded its scope beyond its original focus on Fenian terrorism. Various law enforcement agencies established similar units in
9464-494: The term "well-wisher" may be positive, in Serov's view, he does not assume a well-wisher has value to offer. The majority actually turn out to be offering material of no significant value. The first task is to determine if they are random sympathizers who fail to understand the subject they propose to discuss, or are active provocations being run by foreign counterintelligence. Provocateurs obtain some value if they can simply identify
9568-621: The transfer, return and extradition of people between or within countries; and the adoption of security measures that restrain the rights or freedoms of citizens and breach principles of non-discrimination. Examples include: Many argue that such violations of rights could exacerbate rather than counter the terrorist threat. Human rights activists argue for the crucial role of human rights protection as an intrinsic part to fight against terrorism. This suggests, as proponents of human security have long argued, that respecting human rights may indeed help us to incur security. Amnesty International included
9672-601: The treatment, or due to the confusion caused by it. In 1978 the European Court of Human Rights ruled in the Ireland v. United Kingdom case that such methods amounted to a practice of inhuman and degrading treatment , and that such practices were in breach of the European Convention on Human Rights Article 3 (art. 3). The human security paradigm outlines a non-military approach that aims to address
9776-404: The turn of the 20th century, and the mobile firepower provided by tanks , self-propelled artillery and military aircraft rose significantly in the century that followed. Along with infantry weapons, tanks and other armoured vehicles, self-propelled artillery, guided weapons and aircraft provide the firepower of modern armies. Mobility, which determines how quickly a fighting force can move,
9880-499: The workings of at least two disparate services, and it is obvious that the case officer's margin of superiority diminishes, vanishes, or even reverses. One facet of the efforts to control a double agent operation is to ensure that the double agent is protected from discovery by the parent intelligence service; this is especially true in circumstances where the double agent is a defector-in-place. Double agent operations must be carefully planned, executed, and above all, reported . One of
9984-631: Was an effort of the Intelligence Community Staff, under the Director of Central Intelligence, to come up with characteristics of Project Slammer, an Intelligence Community sponsored study of espionage. It "examines espionage by interviewing and psychologically assessing actual espionage subjects. Additionally, persons knowledgeable of subjects are contacted to better understand the subjects' private lives and how they are perceived by others while conducting espionage. According to
10088-540: Was another defector in place for the US, who was exposed by the CIA defector, Edward Lee Howard , who fled to the KGB before being arrested. Penkovsky and Tolkachev, both motivated by ideology, were executed by the Soviets. To give a sense of the "infinity of mirrors" involved in agent work, Howard was exposed by an apparent Soviet walk-in defector, Vitaly Yurchenko , who walked into the US Embassy in Rome and defected to
10192-555: Was close to being discharged for improper personal conduct. In Russian intelligence gathering, initially Soviet, the term "defector" is rejected due to its negative connotations. Instead they use the Russian word dobrozhelatel , or "well-wisher," in this context essentially functioning as a synonym for "walk-in." This term has a positive connotation, and may reflect how the service views such people, as described by Ivan Serov , former chief of GRU (Soviet military intelligence) While
10296-483: Was eventually exchanged for Soviet prisoners, both sides apparently not wanting the affair to be in a public court. The US used Katrina Leung as a dangled mole to the PRC, although the true loyalty of Leung, who came to the US on a Taiwanese passport, is not known with certainty. She may have had a long-term allegiance to the PRC, been loyal to the US and then been turned by the PRC, or primarily been loyal to herself. With
10400-413: Was for most of human history limited by the speed of a soldier on foot, even when supplies were carried by beasts of burden. With this restriction, most armies could not travel more than 32 kilometres (20 mi) per day, unless travelling on rivers. Only small elements of a force such as cavalry or specially trained light troops could exceed this limit. This restriction on tactical mobility remained until
10504-528: Was loyal to the Czechoslovakian intelligence service (service B1), while Czechoslovakia was a Soviet (i.e., service B) satellite state. Koecher became a CIA translator and a good source of information to the Czechs and Soviets. While, as far as is known in public sources, still loyal to his original agency, Koecher was ordered to report to Moscow by Oleg Kalugin , longtime legal resident of the USSR in
10608-431: Was not high, meaning that the result of a given battle was rarely decided by infantry firepower alone, often relying on artillery to deliver significant kinetic effects. The development of disciplined volley fire , delivered at close range, began to improve the hitting power of infantry, and compensated in part for the limited range, poor accuracy and low rate of fire of early muskets . Advances in technology, particularly
10712-412: Was paid. ... Offenders since 1990 are more likely to be naturalized citizens, and to have foreign attachments, connections, and ties, and therefore they are more likely to be motivated to spy from divided loyalties." Despite this trend, the report says that the majority (65%) of American spies are still native born. Ames seems to have been motivated primarily by money. Among the most important moles,
10816-474: Was the early Soviet recruitment of Kim Philby (i.e., service B), who was then dangled to the British Secret Intelligence Service (i.e., service A), for whom Philby went to work and rose to high rank. Philby is discussed further below. As far as is known from public sources, the only mole, already loyal to a foreign service, who went to work for the CIA (i.e., in the service A role) was Karl Koecher , who actually
#925074