Online Book Reader

Home Category

Intelligence_ From Secrets to Policy - Mark M. Lowenthal [204]

By Root 801 0
external troops to restore and then maintain peace. Peacekeeping operations are a direct reflection of the failed states issue discussed in the previous chapter. The external troops have customarily been formed into multinational units. Although many of these nations have experience in allied operations—at least training operations—the participants tend to cross the boundaries of old alliances. United Nations-mandated forces in Bosnia, for example, included North Atlantic Treaty Organization (NATO) allies (Britain, France, Italy, Spain, and the United States) and their former Warsaw Pact foes (Russia, Ukraine), along with other nations. A similar array has been formed in Afghanistan. Successful military operations require strong intelligence support; multinational operations require intelligence sharing. But even in the aftermath of the cold war, some U.S. policy makers and intelligence officials are reluctant to share intelligence with former foes, nonallies, and even some allies. Responsible civil and military officials may find themselves torn between the need to keep peacekeeping partners well informed to carry out successful operations and the recognition that sources and methods may be compromised even beyond the limited peacekeeping theater of operations.

The use of peacekeeping or other internationally sanctioned operations for unilateral intelligence purposes became an issue in 1999. A former member of the United Nations Special Commission (UNSCOM)—which was responsible for monitoring Iraqi destruction of its WMD—alleged that the United States used a UNSCOM inspection team to plant intelligence collection devices. Some saw the U.S. action as a necessary precaution against a hostile state: others believed it violated the basis of the UNSCOM mission.

NETWORK WARFARE (INFORMATION OPERATIONS)


Network warfare, formerly called information operations, deal with the use of computer technology to wage war and also to protect the United States from similar attacks. The first Gulf War gave a great boost to this operational concept. Intelligence officers find that network warfare allows them to be combatants, not just combat supporters.

The parameters of information operations have yet to be fully defined. The technology to disrupt communications and infrastructure, send false messages, and destroy vital information exists; firm operational concepts for using the technology do not. The same was true of virtually every other military technology—firearms, tanks, airplanes, and so on. Only through operations do military and intelligence officials learn the best ways to employ, and defend against, new technologies.

The widespread use of computers and the increasing dependence on them by all nations and their militaries underscore the appeal and the threat of information operations, which can weaken an opponent and lessen the chance of U.S. casualties in combat.

The doctrinal questions outnumber the accepted precepts. Should information operations be used preemptively, before hostilities begin? This would tend to preempt potential diplomatic solutions, which depend on the ability of leaders and diplomats to communicate authoritatively between capitals. One can easily envision heated debates between diplomats seeking to forestall information operations to keep lines of communications open and military officers arguing about the need to begin preparing the electronic battlefield. However, a broad and successful information operation might induce a hostile state to agree to end a crisis. It would not entail civilian casualties, as would a classic military attack. But is this the way the United States wants to behave? Would U.S. leaders feel compelled, for legal reasons, to regard an information operation as a covert action, launched with a presidential finding, instead of as a military operation? The agency largely responsible for information warfare, the National Security Agency, is both an intelligence agency and a combat support agency, so it bridges the gap. But this fact does not answer the question.

Battle damage

Return Main Page Previous Page Next Page

®Online Book Reader