Intelligence: Lost and Found Opportunities

Archives

November 26, 2007: The revelation that American forces had discovered a map drawn by terrorist leader Abu Musab al Zarqawi, prior to the surge offensive, provides part of the explanation for the success of the surge. This story not only has important implications for the war in Iraq, but it also is a good explanation for why intelligence methods and sources need to be protected from exposure.

In essence, the surge succeeded because the United States was able to keep quiet that they had seized this valuable map. If the terrorists knew that this material was in American hands, they would have changed their plans, and positions. Instead, they had no clue that the Americans knew where they were, and were rounded up and taken down.

In the larger-scale war on terror, there have been leaks that have compromised intelligence. Perhaps the most famous of these leaks was the New York Times article concerning the NSA's efforts to listen in on terrorist conversations. The result was a major firestorm. While some were upset that a classified program was revealed, others were upset that the NSA was listening in on phone conversations (never mind that there was no credible evidence of abuse). The result was lawfare targeting technical intelligence, and very heated debate.

The problem with that is that leaks – and the ensuing controversy – tend to let people know they are being listened to. Once a person, group, or country find out that they are of interest to an intelligence agency, two things happen. First, they tend to become very careful with regards to communications – they take steps to throw off surveillance efforts, and they will even shift to means that cannot be intercepted (like couriers or flying for face-to-face meetings). Al Qaeda has done this in the past. Second, they begin to wonder how the information is acquired – and try to cut off the flow. If they find out enough of what an intelligence agency knows (usually through a process of elimination), they will have an idea of who might be a source. If the intelligence service is lucky, they can extract the compromised source, but they lose the ability to get future information. If said source is caught, he is in for a very unpleasant end if he gets caught.

In the case of the map, this was one case where that calculus wasn't in play as much. The "Zarqawi map" was acquired in a raid. It's not the first time a document that fell into enemy hands created problems – in 1862, a misplaced order compromised Robert E. Lee's first invasion of the north and led to the Battle of Antietam. In other cases, captured documents have provided information on a tactical or operational level (like minefield locations, the position of artillery units, or codebooks).

Still, this incident demonstrates what can be done if intelligence programs are kept secure. The results can be amazing. On the other hand, the price of compromised intelligence will be paid down the road in the lives of people who just happen to be around when the next attack hits, which could be an ambush of troops on an operation. The intelligence advantage is a huge one, and the United States needs to maintain it. In this case, the advantage has done significant damage to the insurgency. – Harold C. Hutchison ([email protected])

 

X

ad

Help Keep Us From Drying Up

We need your help! Our subscription base has slowly been dwindling.

Each month we count on your contributions. You can support us in the following ways:

  1. Make sure you spread the word about us. Two ways to do that are to like us on Facebook and follow us on Twitter.
  2. Subscribe to our daily newsletter. We’ll send the news to your email box, and you don’t have to come to the site unless you want to read columns or see photos.
  3. You can contribute to the health of StrategyPage.
Subscribe   Contribute   Close