Riding the Red Horse (26 page)

Read Riding the Red Horse Online

Authors: Christopher Nuttall,Chris Kennedy,Jerry Pournelle,Thomas Mays,Rolf Nelson,James F. Dunnigan,William S. Lind,Brad Torgersen

BOOK: Riding the Red Horse
9.35Mb size Format: txt, pdf, ePub

Not many organisations have the funding and resources to set up analysis shops of sufficient size to deal with what is collected, and those that do often find that many of the folk they employ are not well-suited to their duties, whether from a lack of inclination (they’d rather be operational types, engaged in collection), lack of aptitude (they’re “differently clever”), lack of skill (they’re junior and as soon as they get a promotion they’re away to operational duties, where the guts and glory are), or from a lack of integrity (two words here: “Manning” and “Snowden”).

Much of the material collected, of course, is going to be in a foreign language or in a visual form which requires extensive specialist training to understand. This is also a bit of a bottleneck, especially with regards to languages. It’s very hard to react quickly to a change in strategic posture, and for example, the British found the switch from Russian to Arabic, Pashto and Farsi as their primary foreign language for intelligence exploitation quite challenging, even though their extant Arabic capability in 1990 or so was actually rather good.

Specialist training, whether in languages, visual interpretation, intelligence analysis, cryptology, all requires extensive investment in identification, recruitment, security clearing, training and deploying of the analysts, linguists and specialists. It also takes your key personnel, who will be the ones actually delivering the training, off the road. There is no merit in using lesser performers in training roles, you need your best and best-regarded types, who will typically be the only ones who can train new recruits to standard.

So, even assuming that there is a machine in place which can assess, discriminate and analyse however much of the product they can manage, the problems still aren’t over. What you have is a stack of single-source reports. They may be accurate, they may not. You will have an idea—essentially subjective—of accuracy and reliability, based on a number of metrics, but no real idea of how it all fits together or where any of the ideas which emerge from the reports are connected.

So, the next step is
fusion
, the integration of multiply-sourced reporting into a single intelligence picture and assessment of what it all means. This is historically a weakness of intelligence organisations, which tend, understandably enough, to want to protect their sources and methods from everyone else, including other intelligence agencies and even competing departments within the same service. Even the closest and most cordial allies don’t forget that people like Kim Philby have existed and will continue to pop up.

Fused intelligence, where corroboration of multiply-sourced information is achieved, tends to be pretty good and is useful, provided some interpretation of context is supplied. Generally, customers are busy people and don’t have the time, the skills, or the inclination, to study intelligence reports. It is a truism that most senior customers never read more than three bullet points, or past the executive summary. Writing end product reports on this basis is therefore a very specific skill, and the reporter must walk a tightrope between flat, uninformative recounting of what may seem like unconnected facts, and exercising too much imagination and creative flair and thus skewing the intelligence. He must write and brief very clearly and make it absolutely plain what is known to be a fact, what is strongly suspected (“probably”) and what is merely suspected or uncorroborated (“possibly”). It is also his responsibility to ensure that the customer understands exactly what he means by the use of certain terms and turns of phrase—and he must be unambiguous. The point of the intelligence is to inform the customer, not show off to him, and care should be taken to ensure that material which is interesting but not fully relevant to the IRs is also clearly flagged as such.

One of the key activities is the collection of feedback from the customer on the intelligence product he has been supplied. The customer must be fully engaged in the process and must understand that, if he is unhappy with the product, it is up to him to deliver this feedback in order to improve it. It is equally important for the delivering agency to hear about it when he is happy with it.

A customer should look at intelligence in terms of its relevance to his IRs, the format in which it is delivered, the depth of the comments applied to it, the frequency of receipt and the timeliness and accuracy of the content. He should also give feedback concerning what he has heard on the same subject from other sources.

That's how it generally works. There are, of course, many wrinkles and variations, with Commonwealth nations tending to follow the British model of a Joint Intelligence Committee, which takes in all the product coming from the various agencies and integrates it into a considered, and consensus strategic view. This has historically worked well, although it can skew out of balance, such as in 2003, when, for whatever reason, much dubious support was given by one agency to some political assertions emerging from Downing Street concerning the idea that an attack on Iraq was justified by a direct threat to UK interests. In the interest of avoiding ambiguity, it may be noted that this intelligence proved not to be altogether accurate.

[Editor’s Note:
“Not altogether accurate appears to be code for, “Oh, my Gawd, what the Hell were they thinking?”
]

This brings us rather neatly to another problem with intelligence. It can be massively tempting for an intelligence service or agency to provide its customer with what it wants, not just material on the IRs, but material which directly supports whichever policy or interest the IRs are developed to support. At its most vicious, this temptation can lead an agency to behave like the KGB in the 1980s, when, in response to Politburo suspicions, the agency actively sought to promote the view that the West was contemplating a first strike against the USSR and its allies. This sort of thing leads to circular reporting, where intelligence reporting and confirmation of internal prejudices drives the IRs further from reality, which then turns up the wick on the reporting and it is both unprofessional and dangerous. Every nation has suffered from this at one time or another. It can also lead to self-fulfilling prophecies, where the skewed reporting leads to unwise and inappropriate actions, which themselves drive the opponent to do precisely what is feared.

Another major elephant trap for an intelligence agency or service is maintaining its credibility. Schooled by popular culture and often star struck by proximity to all the cool stuff, new political customers often place inordinate faith in the product they are given by their intelligence services and are massively disappointed when, as is often the case, intelligence subsequently proves to be wrong, or at least not fully right. This often leads a customer to discount, automatically, future service from that source, or to prefer more attractive service from another source. Here, a strength of the JIC system is that the end customer is isolated from the source and hears only the collegiate view, which is fine, of coruse, as long as the collegiate view is broadly accurate.

The customer gets a vote as well. He is generally a senior political or military figure and these tend not to be people who are unsure in their opinions, and moroever, who often have significant experience in their fields. They will have faith in their judgement and, if faced with a direct contradiction between their thinking and the intelligence they receive, will not usually prefer the intelligence over their own interpretations. Incidentally, this is part of the reason why it is a really bad idea for any agency to give its customers raw product, as they will usually subject it to personal analysis, not necessarily fully informed, and will draw conclusions which are both subjective and immediate.

If the customer has come to have less-than-complete faith in his intelligence provider, he will also tend to ‘aim off’, which is to say he will assume a lack of accuracy or reliability and insert his own, potentially even less accurate, narrative that differs from that developed in the intelligence. That’s his privilege, of course, and it is often the case that senior political and military figures do actually know more, have better judgement, or even their own sources, which can lead them to superior assessments.

Ultimately, of course, it comes down to judgement. A lot of time and effort goes into the collection, processing, analysis and dissemination of intelligence, and generally it’s a process which works well. However, the product, unless it’s absolutely unique and incredibly surprising—which is very rare indeed in the real world—is of most value when it supports or illuminates the ground truth, which is often the simple and obvious explanation. There are few successful conspiracies, and human behavior is far better explained through incompetence, cowardice and inefficiency than through the suspicion of devilish plans.

This last point leads directly on to the big elephant trap for any intelligence agency – the temptation to focus on the counter-intelligence struggle against the opposing intelligence agency – the struggle at the heart of millions of words of novels and films about the epic East-West confrontation between the KGB and its allied services and the West. With double agents, moles, defectors, all the trappings of spy fiction, this is an epic, romantic, and ultimately futile story. There were tactical successes on both sides. The KGB managed to plant Kim Philby on the British, the British managed to recruit a number of high-ranking Soviet officers, the CIA had successes against the KGB and vice versa, and strategically, none of this it made any particular difference.

Of course, it is possible to view this sort of service-service rivalry and conflict as a means of communication and mutual reassurance, and it was certainly used as such during the Cold War, when the stakes were terrifyingly high and both sides had an enormous vested interest in not allowing unplanned or unintended events to lead to an abrupt interruption in the human gene pool on a global scale. There were a number of mechanisms used for generating this sort of mutual assurance, such as permission for the four military missions in Germany—SOXMIS in the Federal Republic, BRIXMIS, the US Military Liaison Mission and the French Military Liaison Mission in the Democratic Republic—to operate in uniform in enemy territory, or the quiet toleration of Sigint overflights by both sides to make current defence postures explicit, but the actual benefits of these activities, together with other, less publicised undertakings, were almost exclusively diplomatic rather than intelligence-related.

Intelligence agencies also engage, from time to time, in what the Russians term
dezinformatsiya
, the passage of fake or flawed intelligence to an opposing agency. This has many manifestations, from Operation Mincemeat during World War II (a rather appealingly naïve operation which saw a Welsh tramp’s corpse dressed in Royal Marine officer’s uniform, equipped with utterly fake despatches and allowed to fall into German-friendly hands), to the frankly bizarre KGB attempts to poison defector intelligence by releasing a steady stream of follow-up defectors with contradictory intelligence. This actually appeared to work, to the extent that one famous internal security figure at the CIA became convinced that everything was fake and that both the CIA and SIS had been thoroughly penetrated by the Russians.

There is also a tendency to want to engage in direct action, the Boys’ Own Paper stuff of squalid gunfights in exotic foreign locales, assassinations, blackmail, and that kind of thing. Now, blackmail has a place, a useful place, in the recruitment of sources, although, generally, bribery gets you a much more committed and useful source than either fear or ideology. But blackmail is a very rare thing since the potential exposure of a highly-trained and knowledgeable operational intelligence officer is generally too much of a risk to contemplate this sort of action. This means it will usually be carried out by an agent at arm’s length, and hence with unpredictable efficacy. Assassination has, allegedly, had its place as well and some of the more muscular and robust agencies have, in the past, routinely behaved like the Mafia, but it’s expensive and difficult to do without leaving fingerprints all over it and it exposes a national government to all sorts of risk. Unless, that is, it is an agency working for a government which couldn’t care less about its reputation, or which actively values a reputation as a badass rogue state.

So much for strategic, national-level activities. There is also military intelligence, a whole sphere of activity which covers what is nowadays sexily known as C4iSTAR: Command, Control, Communications, Computers, Intelligence, Surveillance, Target Acquisition and Reconnaissance. This activity, carried out by air, land, sea and joint forces, develops intelligence for the use of commanders in times of peace as well as war. Military intelligence also feeds into the national strategic picture, but being concerned primarily with the minutiae of Order of Battle, current activities, capabilities and intentions, it naturally tends to be a trifle detailed for the strategic analyst and harder to interpret for implication to anyone not already a subject matter expert.

The sheer range of military intelligence collection activities is huge, from tactical-to-strategic communications interception, through assessment of enemy radars, through armoured reconnaissance troopers in armoured cars lurking in treelines, to special forces lurking in carefully-constructed hides miles behind the front line on the enemy side. All of these activities are vital and all inform the commander and allow him to make better decisions. In theory. In actual fact, as with strategic intelligence, it’s all about the reporting and being confident that what is being reported is what is needed and wanted, as opposed to what is available. A modern commander tends to finds himself “drinking from the firehose” and it is entirely possible for the military intelligence organisation to produce gigabytes of intelligence through which someone has to trawl in search of the vital nugget, which may not even be there.

This puts particular pressure on the military intelligence organisation. As with strategic intelligence, collection is actually the easy part. Collation, discrimination, analysis and reporting are hard, and require not just advanced intelligence skill sets, but also the insight and knowledge into a commander’s intent and requirements in order to produce intelligence which is timely, accurate, and germane. This implies a degree of professional command or staff skill, as well intelligence-specific skill, which means that good military intelligence officers and specialists are a very rare breed especially since they will often find that their own inclinations and the needs of their service will push them into a commander’s or staff officer’s career track, rather than the poorly-regarded and poorly–promoted intelligence officers’ track.

Other books

Mr Mulliner Speaking by P. G. Wodehouse
Silent Scream by Karen Rose
Nick: Justice Series by Kathi S. Barton
The Shells Of Chanticleer by Patrick, Maura
Charlotte's Web by E. B. White
Promise Me Forever by Lorraine Heath
Death on the Rocks by Deryn Lake
Two Tall Tails by Sofie Kelly
Act V by Ansley Adams