The Lashkar-e-Taiba in South Asia
SGT Michael T. Monroe
ALC Class 15-008
Author Note
SGT Michael T. Monroe, A Co., 24th MI Bn, 66th MI Bde, INSCOM
SGT Michael T. Monroe is at 14th Platoon, ALC Class 15-008, NCOA.
Correspondence concerning this article should be addressed to SGT Michael T. Monroe, ALC Class 15-008, NCOA, Fort Huachuca, AZ 85613.
Contact: michael.t.monroe11.mil@mail.mil
Abstract
This paper discusses how political, military, economic, social, information, infrastructure, physical environment and time factors affect human intelligence operations within Pakistan against the terrorist group Lashkar-e-Tabia. This paper goes on to identify the conditions, effect and response of previously mentioned factors while conduction human intelligence operations. By developing specifically tailored human intelligence responses to the conditions and effects a human intelligence team will be able to use the environment and population to amplify any existing advantage. When no advantage exists to the human intelligence collector the response will dictate how the human intelligence team will be able to reduce any disadvantage or if possible turn that disadvantage into the collector’s advantage.
The Lashkar-e-Taiba in South Asia
Introduction
This paper analyzes the human intelligence (HUMINT) application in Pakistan and the disputed area of Kashmir as it relates to collection against the Pakistani based terrorist group Lashkar-e-Taiba. Factors
The three great conflicts of the twentieth century: World Wars I and II and the Cold War impacted the progression of the intelligence revolution. During these conflict the United States leadership “looked to intelligence as a weapon of defense and as an aid to victory. ”1 Further, it was the pressures of these wars that the intelligence community expanded, moving closer to the inner circle of the government.2 Furthermore, as the intelligence community expanded, and intelligence professionals developed their skills in conducting threat assessment. In view of, a need to expand the intelligence community it began the rise of the intelligence community in the 20th century.3
The Intelligence Community is a cooperative federation of sixteen separate United States government agencies that worked separately and together on matters of foreign relations and national security. One of these agencies is the Central Intelligence Agency which is to collect, analyze, evaluate, disseminate foreign intelligence to assist the President and senior US government policymakers in making decisions relating to national security. Therefore this paper will discuss Central Intelligence Agency history and the role it plays in combating acts of terrorism.
As we have seen throughout the entire history of warfare, ancient world terrorism, political intrigue and elitist terrorism of the middle ages, and into modern terrorism, intelligence is of vital importance on both sides. Armed forces have always used intelligence of some form be it sneaking up a hill and scouting what is on the other side to the use of modern platforms such as
Intelligence is the knowledge that provides security for our country; experience comes from our analysts and ability is derived from our freedoms. Over many decades all of this has been accomplished without the use of advanced technology, mainly through highly trained operatives who have infiltrated and obtained information from both foreign and homeland enemies. The current advancements have provided options that ensure the safety and efficiency of intelligence operations, surveillance being a
After World War II American intelligence had the need to be transformed. The inexperience along with bureaucracy and poor coordination among American intelligence officers obligated the United States intelligence community to change dramatically in order to confront the new challenges that emerged after the end of WWII. From Early America through WWI the intelligence system of the United States of America was involved in operations in which they had to construct intelligence systems virtually from scratch (Andrew 1995). Human intelligence was already developed, but with certain limitations and other intelligence disciplines were underdeveloped and very seldom sophisticated. After WWI America recessed and settled in a period of peace. The
Various factors like the nature of bureaucratic organizations, unsuccessful diplomacy, lack of military actions, legislators, the uneven structure of the Federal government, advances in technology, backdrops of police surveillance, and policy formation promote organizational problem s in U.S intelligence communities. Intelligence officials and law enforcement experts have made conscious effort in handling terrorist threats before 9/11 attack. Unsuccessful diplomacy and the uneven structure of the Federal government accelerated organizational problems and absence of information sharing among the intelligence agencies. U.S Intelligence strategies have failed to recognize their new enemy and intelligence agencies lacked resources and manpower. U.S Intelligence agencies like CIA, FBI, and National Security Agency have faced organizational crisis from the side of Federal government and bureaucrats, and this organizational crisis contributed failure in their activities.
Crimes are the result of individuals that do not follow established laws of the land. Criminals can either be individuals or they can be organized groups. The best way for law enforcement to handle the challenges of criminal element is to understand their strategies and then counter them. The purpose of this paper is to review domestic terrorism-related intelligence and how it is related to criminal intelligence. Using criminal intelligence is the first step in dealing with criminal elements. The data is compiled, analyzed, and then sent out in an
Further research regarding the sociological and psychological effects of Counterinsurgency Human Intelligence operations, and how a compulsory may change intelligence guidelines and procedures to modify motivation structures and reduce civilian violence associated with foreign Human Intelligence agent networks. What authority approves recruiters to operate outside the scope of intelligence gathering?
Intelligence in this day in age is a vital component of a countries security. The newest proposal increases intelligence spending between 2 and 3 billion dollars, a total adding to nearly $35 billion. In addition to military enhancement, the FBI and other law enforcement/intelligence agencies will also be included in this proposal. A new system has been proposed by President Bush that all information be shared among all agencies. DoD, FBI, and the Department of Counterterrorist Center have drawn closer together to create a Terrorist Threat Integration Center to evaluate information blended from all sources associated with terrorism and to act upon those findings accordingly.
This paper talks about the Ansar al-dine terrorist organization, giving a brief background on how the group was formed, the leader of the terrorist organization, the tactics, techniques & procedures and the goals & objectives. The primary area that Ansar al- dine conducts their operations is in Mali, Africa. The primary focus of this paper is how Ansar Al-Dine functions within Mali. Throughout the paper we will identify the condition and effects of the Political, Military, Economics, Social, Information, Infrastructure, Physical Environment, and Time (PMESII-PT) variables in Mali. The paper will also explain Human Intelligence (HUMINT) response to the effects of each category of (PMESII-PT), in order to overcome issues and successfully conduct HUMINT Intelligence Operations in Mali. At the end of the paper an overall summery explaining if human intelligence operations will work in Mali, where Ansar Al dine operates. A reference page is also provided for further research.
Central to threat assessment is intelligence to help develop our own targets to deter or punish state sponsors. In this regard, the development of long-term human source intelligence [HUMINT] is often cited as a vital component in building our ability to preempt attacks. Critical to threat assessment is the need to get smarter, not just in protecting against the threat from outsiders, but smarter about the threat posed by people with legitimate access. This includes acts of carelessness by insiders. A chain is only as strong as its weakest link. We need to continue our efforts to enhance our vigilance to minimize any potential threats posed by third country nationals- for example, threats posed by outsiders working at U.S. embassies and military installations overseas.
Terrorism has become a main threat to the peace and development in the U.S and the world as a whole. Past experiences of terrorism such as the September 11th attack in the United States has a created the need to have a functioning counters intelligence which will effectively deal with terrorism. However, for the counter intelligence to be effective, other basic functions have to be played out. The basic functions are collection and analysis. The other function is the execution of covert actions and the major role is the counterintelligence. The Intelligence agents combine all roles and place them under the umbrella of intelligence.
The United States Intelligence community draws on advanced technology and analytical techniques. An intelligence process that sets objectives, collects, analyzes, and report findings, with feedback loops integrated throughout. Explicitly, the intelligence community advantages technology and tradecraft within a proscribed process. However, estimation of threats and decision-making are outcomes of human thinking. Analysts and policymakers create mental models, or short cuts to manage complex, changing environments. In other words, to make sense of ambiguous or uncertain situations, humans form cognitive biases. Informed because of personal experience, education, and specifically applied to intelligence analysis, Davis
Just how can the IC improve its collection and analytical efforts against the monitoring and analysis of the high value targets related to ISIL movements? These movements are mainly individual human in nature, so the most plausible collection that can be used is the employment of Human Intelligence (HUMINT). This can be accomplished by covert or overt means. However, entry or recruitment in these secular arenas has been, and continues to be extremely challenging. The
In most cases these INTs community compete among each other to provide needed intelligence information to policy makers to justify their budgetary allocations (Lowenthal, 2014). However, intelligence collection can be divided into five main categories referred to as “intelligence collection disciplines” or the “INTs”. These include Human Intelligence (HUMINT), Signals Intelligence