To Wage War by Withdrawing into the Interior of One’s Country

Russia is not known for brilliant generalship or first class armies.  Carl Von Clausewitz once labeled the Russian Army as “probably the least advanced” in Europe.  Yet historically, while most of Europe has fallen to countries such as France and Germany, Russia has not only survived, but even destroyed vast armies set forth to conquer her.  How could more advanced countries with better-led and equipped armies fail to stop such juggernauts as La Grande Armée or the Wermarcht, while a nation as backward as Russia with ill-trained and disorganized forces destroy them?  It is because the Russian Army did not really defeat them, the vastness of Russia itself did.  An effective way of defeating a significantly stronger enemy is luring it into the interior of one’s country.

Despite military rhetoric, there are situations in warfare when standing one’s ground and fighting the enemy is unwarranted and foolish.  Hitler’s decision to forbid the German 6th Army from retreating from Stalingrad and Custer’s Last Stand come to mind.  As Sun Tzu once remarked, “one must know when to fight, and when not to fight.”  Sometimes the only sensible option open to a commander is to retreat.  After all an orderly retreat is preferable to the complete destruction of one’s force.  If an army stood its ground and was destroyed, the best that could be hoped for would be to hurt the enemy sufficiently to force it to temporarily halt, which is extremely unlikely.  However, when an army retreats it can fall back on its own lines of communication while luring the enemy away from its Base of Operations.

In such a case, the advantage usually lies with the defender.  While the defender usually grows stronger by falling back and procuring more reinforcements and supplies, the attacker grows weaker from leaving troops behind to secure his communications, as well as to garrison fortresses and cities.  Additionally, the more the enemy advances, the further he will be from his Base of Operations and his Lines of Communication will be continuously stretched.  Eventually he will suffer from shortages and all they entail.  Therefore the attacker will likely suffer more casualties from sickness and noncombat injuries than the defender, and with fewer reinforcements and supplies, more equipment will likely be written off as well.  Also, the attacker will probably have to deal with partisans, who will harass them whenever they can.  Finally, as Clausewitz constantly reminds us “the defensive form of warfare is intrinsically stronger than the offensive,” which means more likely than not, the attacker will have higher combat injuries and deaths than the defender.  When all these factors are taken into account, it is not difficult to see how at the end of a long advance into the heart of an alien country, the attacker, who likely held a comfortable superiority at the beginning, will in many cases be significantly weaker than the defender.

Once the invader has reached the culminating point of his offensive and failed to destroy his adversary, he will be in a very vulnerable position indeed.  He will probably be weaker than the defender and have vulnerable Lines of Communication.  Meanwhile the defender, assuming he has retreated in an orderly fashion and has suffered less casualties and hardships and has been constantly reinforced with men and supplies, will be in a very advantageous position.  Now would be the obvious time for him to counterattack.

With his new-found superiority, the defender’s success in a counterattack is almost guaranteed.  However, if in spite of all the advantages the defender failed to score a significant victory, imagine what would have been the result against the enemy at the beginning of the campaign when the defender had none of the advantages, yet decided to fight instead of retreating?  However, it is more likely that the invader will lose the engagement and have to retreat.  How much men and equipment he will lose and how far he will have to retreat will of course depend on the circumstances.

Either way, as Clausewitz points out “There is an enormous difference between losing a battle on one’s frontier and losing it in the very heart of enemy territory.”  While losing a battle on the frontier is bad enough, at least you can retreat into friendly territory where you will have easy access to reinforcements and supplies.  However, losing a battle deep inside enemy territory is much more dangerous.  Not only would it be harder to procure reinforcements and supplies, but you would also be far away from your base of operations, the populace would probably be against you, and the subsequent retreat would be much more painful than had it been made on the frontier.  Of course, while it goes without saying that if the attacker managed to decisively defeat the defender in the heartland of his own country he would probably win the war the whole premise of this paper implies that the best chance of defeating a vastly superior invading army is to let it wear itself down until its superiority wanes.

While luring a superior enemy into your heartland can be a very successful strategy, there is no guarantee that it will work.  As Winston Churchill once told Field Marshal Wavell, “no one can guarantee success in war, but only deserve it.”  Like any situation in warfare, the circumstances and the resources one has at their disposal will probably dictate what course of action is taken more so than vague and often contradicting rules written down by theorists.  Therefore it is necessary to look at some limiting factors which could either limit the effectiveness of the strategy, or render it impractical.

Firstly, it is obvious that a small country could never adopt such a strategy.  The whole country would probably be occupied and its army would no longer have the means left to sustain it.  Even if the enemy did not occupy the whole country, it is probable that he would not suffer enough hardships to wear him down to give the defender a chance of defeating him, assuming that was the defender’s goal.

Secondly, the strategy would also be ineffective if the retreating army had to leave behind areas which were vital to its nation’s continuation of the war.  Such areas would include a capital city, vital industries, or a significant amount of one’s population.  Some good examples would be Paris to the French and the Ruhr to the Germans.  Not only is Paris the capital of France, but it also has a big proportion of France’s population, and at least during both world wars, most of its war production.  The Napoleonic Wars, the Franco-Prussian War and World War 2 demonstrate that the fall of Paris inevitably leads to the fall of France.  As for Germany, while the Ruhr does not house the German capital, or a significant portion of the country’s population, it was undoubtedly the most important industrial area in Germany during both world wars as well.  Once the allies seized it in early 1945 Germany simply lacked the potential to significantly produce weapons from then on, not that it would have made much of a difference by then anyway.

Finally, the strategy might not work if a nation’s populace was not loyal.  In a grave situation where your army must evacuate large portions of your country, it is vital that the people are on your side.  A retreat never bodes well for public opinion, as it implies that the war is going badly.  If the populace was dissatisfied with their leaders and sensed that their demise was inevitable, they would certainly question their legitimacy to rule.  For example, one of the principle reasons Marshal Kutuzov fought Napoleon against his better judgment at Borodino was that the Russian people were angry the Russian army kept retreating instead of fighting the French.  Also, during the Second Punic War, the Roman peoples’ dismay at the delaying tactics used by Fabius Maximus Cunctator to buy time for the Republic against Hannibal’s forces eventually led to the slaughter of perhaps 50,000 Roman soldiers at Cannae.  It is bad enough fighting another country without having to constantly appease public opinion.

Therefore, there are at least three prerequisites for a country to be able to adopt the strategy in question.  1)  The country must be fairly large, or at least big in relation to the enemy’s nation.  2)  The Army can retreat far enough to wear down the enemy without sacrificing areas which are necessary to continue the war.  3)  The populace must remain loyal.

While the conditions above have to be available in order to enact the strategy, other conditions are necessary to ensure that the strategy is implemented effectively.  After all, it is not simply a matter of retreating and assuming the enemy will just waste away.

To begin with, a retreat does not have to be a passive and disorderly affair.  It can be calculated and aggressive.  Obviously a retreat by an undefeated and organized force is much different than a retreat by an army that has just been routed in battle.  The former can inflict much damage on the pursuer, while the latter would be lucky to avoid losing the war.  That is why it is better to retreat than to fight a battle you have little hope of winning.  The retreating army controls the terrain and if he is skilful he can set up traps and ambushes.  As Frederick the Great showed many times during the 7 Years’ War, it is possible for the defender to be more aggressive than the attacker.

Therefore, it is vital that the rearguard of the retreating army inflict as much damage as possible without risking open battle.  A strong and active rearguard can make the difference between the invader surging arrogantly ahead in contempt of his enemy, or cautiously pursuing him out of fear or respect.  In the case of the latter, the invader would advance slowly and buy the defender more time.

It is not only vital to be aggressive while you are retreating in the face of a superior enemy, it is just as important to be aggressive once the enemy has reached the culminating point of his offensive.  If one managed to defeat the enemy in battle and the enemy retreated, the only plausible course of action would be a forceful pursuit.  This is necessary, for as Clausewitz noted “it is usually only then that the trophies tend to be taken which will embody the victory.” In other words, it is during the pursuit, and not the battle itself, that the enemy usually disintegrates.  This is when the winner will really amass the prisoners and equipment that represent victory.  While both sides usually fight hard and brave during the battle itself, once it has been decided the victor will likely be emboldened while the loser will probably lose faith and start to collapse.  However, if the loser is not pursued vigorously he can often regain order in a relatively short amount of time.  That is why it is absolutely necessary to pursue the enemy as fast and as strong as possible.  It is the only way to reap all the benefits from the battle, as well as routing the enemy.

Another crucial condition for the successful execution of the strategy in question is enacting a scorched earth policy.  Put simply, a scorched earth policy involves destroying or removing anything that could help the enemy during his advance.  Whatever resources and supplies that can be saved are withdrawn when the army retreats, and whatever remains is destroyed.  Cities are evacuated, and along with crops, they are usually burned.  Wells and lakes may be poisoned, and what is left of the livestock will be butchered.  Munitions and supplies should be destroyed before they fall into the enemy’s hands.  Roads can be damaged and bridges should be blown up.  If there is a case in war where there is a fine line between military necessity and barbarism, it is not here.

Scorched earth is very costly to any nation that implements it.  The populations of the abandoned cities become refugees, valuable crops and resources are destroyed, and infrastructure is severely damaged.  Not only that, but the people become embittered.  Even if they would not rebel, the pressure they would put on the government would be considerable.  They would question the strength and will of both the government and the army.  They would wonder why their soldiers were retreating before the enemy instead of standing their ground and protecting the nation.

Given their plight, it would be hard not to sympathize with their view.  However, given their situation they would not see the necessity of the decisions made by those in charge.  They probably would not realize, or care, that their army would be no match for the enemy’s, nor that to defeat the opposing army it would be necessary to first wear it down, and that scorched earth would be a very important means to that end.  While it is easy to sympathize with civilians who are innocent and should never have to deal with the harsh realities of war, such emotions should not obstruct what has to be done in order to defeat the enemy.

This leads to the final condition that makes withdrawing into the interior of the country a viable and effective strategy.  The Government and the Army, or more specifically the Head of State and the Field Commander must have the courage, the resolution and above all the stubbornness to adopt this strategy and see it through to the end.  Countless politicians, soldiers and civilians will criticize the plan and try to derail it every time something goes wrong.  The resulting pressures coupled with such enormous responsibility can easily push any leader to change the plan.  Therefore, it is up to those in charge to ignore all criticism, stomach every setback, inspire confidence where needed, and to stick to the plan no matter what.

When Napoleon invaded Russia in 1812 he led an army that had conquered nearly all of Europe and numbered more than half a million men.  Not only did he vastly outnumber his opponent, but in general his troops were of superior quality as well.  However, the more he advanced and suffered from casualties, shortages and disease, the more the Russians retreated and gained more reinforcements and supplies.  Although Napoleon eventually defeated the Russians in the Battle of Borodino and took Moscow, the Russian Army managed to recover and Napoleon’s strength had been so abated that he had little choice but to halt his advance at Moscow.  Soon afterwards he was forced to retreat, during winter, and in the debacle that followed only a small shadow of La Grande Armée eventually crossed the Berezina River back to safety.

Ironically the Russians had not planned to retreat, or at least to withdraw as far as they did, but their involuntary withdrawal into the interior of their country can be seen as a near perfect example of how to implement the strategy in question.

Luring a superior army into the interior of one’s country can be a very effective strategy during wartime.  A retreating army can get more reinforcements and supplies by falling back on its lines of communication while an attacking army usually gets weaker due to severe casualties, having to garrison cities and forts and the continuous stretching of its communications.  In order to enact such a strategy one’s country must be relatively big, can afford to sacrifice a considerable amount of its territory, and its populace must remain loyal.  To make this strategy work one would need an aggressive vanguard, adopt a scorched earth policy, and firm resolution by the country’s leaders to ignore every hardship and see the strategy through to the end.  In the case of a relatively weak, but big, country threatened by a relatively small, but strong, country, this strategy is often the only realistic option.

Bibliography
Churchill, Winston.  The Second World War:  Their Finest Hour.  Boston:  Houghton Mifflin Company, 1985.
Clausewitz, Carl Von.  On War.  New York:  Everyman’s Library, 1993.
Clausewitz, Carl Von.  The Campaign of 1812 in Russia.  Washington D.C:  Da Capo Press, 1995.
Goldsworthy, Adrian.  The Fall of Carthage.  London:  Cassell, 2004.
Marston, Daniel.  The Seven Years’ War.  Oxford:  Osprey Publishing, 2001.
Rothenberg, Gunther.  The Napoleonic Wars.  London:  Cassell, 1999.
Tzu, Sun.  The Art of War.  Boston:  Shambhala Publishing, 1991.
Warner, Philip.  World War Two:  The Untold Story.  London:  Cassell, 2002.

The Art of Intelligence

Sun Tzu wrote in the “Art of War” that foreknowledge is “the reason the enlightened prince and the wise general conquer the enemy whenever they move.”  Another word for foreknowledge is intelligence.

The art of intelligence refers to the collecting, analyzing, and packaging of useful information for policy makers.  These actions are typically performed by intelligence agencies for the benefit of governments and militaries.  However, other organizations, such as corporations, police departments, criminal networks, insurgencies, and/or other interested parties can also have their own intelligence networks, or enlist the services of private ones.

The focus on what information is being gathered can be varied, but usually depends upon the nature of the organization itself.  Typically governments have foreign intelligence agencies that seek information on other countries, specifically their political and diplomatic outlooks, and economic and industrial capabilities.  Governments also have domestic intelligence agencies to protect against terrorism, criminal elements, potentially dangerous separatists, and in the case of oppressive countries, to watch and control its own populace.

Militaries naturally focus their attention on hostile, and potentially threatening, enemy armed forces.

Corporations tend to spy on other corporations and business leaders, and in the case of multinational companies, on political elites in other countries who can help them increase business.

These are simple illustrations; in reality any of these organizations, and countless others, engage in many other forms of information gathering and other dark methods.

Intelligence can be divided roughly into four categories.  These include:
1)      Intelligence Gathering
2)      Analysis
3)      Covert Operations
4)      Counter-Intelligence
Intelligence gathering is the process of collecting information.  The three chief methods of intelligence gathering are:  A) Human Intelligence.  B) Technical Intelligence.  C) Open Source Intelligence.

Human intelligence refers to any information obtained via human sources.  The means and sources can include moles infiltrating targeted organizations, deserters from other countries, interrogation, or interviewing of knowledgeable suspects, military, and diplomatic attaches, etc.  In the case of recruiting assets, everything from bribery, blackmail, threats, and exploiting human weaknesses are used.

Technical intelligence is information gathered by technical means.  Some examples would be satellite and video camera feed, spy planes such as the American U-2 during the Cold War, interception of radio waves, phone calls, emails, the gathering of telemetric data, etc.

Open sources are information that is publicly available.  These include the Internet, libraries, newspapers, magazines, government records, and other publications.

The general worth of these methods depend on the circumstances.  While technical intelligence tends to be more useful for defeating armies and for corporate espionage, human intelligence is better at projecting long-term goals and defeating insurgencies.  This is true because of the following reason:  Whereas armies are heavily dependent upon technology (which can be tracked easily by technology), insurgents, at least the smart ones, tend to limit their use of electronics and are much more susceptible to moles and infiltrators.  Open sources are generally underrated; while classified information is seldom found by digging through such sources, patient research can reap considerable benefits.  Some intelligence officers admit that the majority of information they obtain is from open sources.

Analysis is the process of turning raw data into the final intelligence product that is presented to policy makers.  This can be very tedious and time consuming.  Much information, especially that taken via radio intercepts, has to be decoded or decrypted.  In the case of satellite and camera feed and spy planes, thorough photo analysis is necessary.  Also, irrelevant, or outdated, information has to be sorted from useful data.  Perhaps even more daunting is the prospect of weeding out false information (or if you prefer, disinformation) purposely planted by hostile elements.

After the raw intelligence has been processed, what is left is typically reduced to a relatively small intelligence report, or update, for the interested policymaker(s) in question.  All of this has to be done in a timely fashion before the intelligence becomes out of date.  To top it off, intelligence officers often have to deal with pressures from policymakers.

Typically such pressure involves encouraging intelligence officers to find information that reinforces the policymaker(s) preconceptions, rather than the objective truth per se.  History is not short of examples; while it cannot be proven that President George Bush Junior told the C.I.A. to lie about Iraq’s supposed weapons of mass destruction, it is not unrealistic to suggest that he encouraged them to exaggerate Iraq’s capabilities.  Even worse was Stalin’s refusal to see the obvious preparations the German Army was making to attack Russia in 1941.  Undoubtedly, his analysts had more interest in staying alive, than in telling the truth.

Covert operations are acts committed by intelligence agencies to further the interests of their respective masters.  These operations are typically organized in a way to reduce, as much as possible, any direct links between the policy makers (including the intelligence agency itself) and the act in question.  This is what is referred to as “plausible deniability.”

Most of the time policy makers will give the agency general goals, and ask it to work out the details.  As such, it is rare that a policymaker will know about specific operations in advance.  Therefore, in the event that an operation is foiled, or produces links to the government, the policy maker can realistically say he/she knew nothing about it.  Needless to say, plausible deniability is necessary given the inherently illegal, and often immoral, aspects of covert operations.  Politics does not get any more cynical than this.

Covert operations are varied and can be as sedate as spreading propaganda, and as sinister as overthrowing foreign governments.  They can include trying to influence other countries or peoples, actively supporting foreign armies and insurgents, assassinations, sabotage, etc.

In the case of influencing other countries or peoples, journalists can be bribed, pamphlets can be distributed, radio programs (like Radio Free Europe during the Cold War) can be encouraged, and increasingly, electronic assets like Facebook, and Twitter, can be manipulated.  Just to show what is possible, one should remember how effectively the C.I.A. influenced the Italian election in the late 1940s to prevent a communist victory, and its success at overthrowing Arbenz in Guatemala in the early 1950s.

Supporting foreign armies or insurgencies is also quite typical.  Leading up to the Six Day War, the Syrians supported Palestinians launching terrorist attacks against Israel, which were mounted mostly through Jordan so Syria could claim “plausible deniability.”  The Russians and Chinese gave more obvious aid to Ho Chi Minh to fight the French, and later the Americans, in Vietnam.  Perhaps the best-known example of the later 20th century would be the massive aid given to the Mujahideen in Afghanistan by the C.I.A. to help them fight the Soviets.

Assassinations are used mostly during wars or counter-insurgency to kill important targets, or in the case of oppressive governments, notable dissidents.  As a rule for assassinations, a suicide looks better than a murder; and an accident looks better than a suicide.

Examples of assassinations include the British operation that almost killed Rommel in Libya during World War 2.  Also, the Israelis have used targeted killings extensively, notably to avenge the massacre of Israeli athletes at Munich in 1972, and to weaken the Palestinian Intifadas.  The effects of these methods are debatable.

One could argue that the weakening of the P.L.O. has allowed more dangerous organizations like Hezbollah and Hamas to gain more influence.  Certainly, in the case of counter-terrorism, some have argued it is more effective to take out middle tier operatives, rather than high profile targets or low foot soldiers.  The higher profile targets tend to be relatively removed from operations, and the terrorists on the ground are dependent upon the middle tier that supplies bombs, finances, and other logistical support for operations.  This approach has been used to good effect by the U.S. army in Iraq.

Regarding oppressive governments, Stalin’s assassination of Trotsky in Mexico, and Ayatollah Khomeini’s fatwa against Saldam Rushdie, are examples of what dictators are willing to do to silence critics.

As for sabotage, there is no lack of examples, but interesting ones would include the Norwegian resistance efforts to delay the German atomic program, the Siberian Pipeline explosion engineered by a C.I.A. logic bomb in 1982, and the recent havoc the Stuxnet worm has reaped on the Iranian nuclear reactor at Bushehr.

Counter-intelligence refers to the practices used by intelligence agencies, the government, and the military to protect the nation and its interests from infiltration and exploitation by hostile entities.  The role of counter-intelligence is essentially security whether by passive, or active means.

Passive means include physical security, communications and electronic security, and personnel security.

Physical security refers to means that physically deny access to information or other sensitive assets.  These means include locks, safes, alarm systems, fences, cameras, guards, etc., and they are typically employed to guard vital installations like military bases, intelligence complexes, governmental and corporate buildings, industrial areas, etc.  Border areas are another example:  Usually to keep people out, although in the case of oppressive regimes mostly to keep people in (for example, the Berlin Wall).

Communications and electronic security is a relatively new phenomenon.  In the case of sending radio transmissions, the obvious solution for protecting information would be to encode it.  However, given the resources rival intelligence agencies put into decoding, and the risk of agents or codebooks falling into the wrong hands, it is wise to make the codes as hard to break as possible, and to change them as often as is realistic.  Having faith in technology is likewise foolish; the German Army’s misplaced faith in its Enigma machines is sufficient proof.

Phone calls are another potential security risk.  Secure phones are a rarity, and unless landlines are made from fiber optic cables, they are relatively easy to tap (provided someone has access to them, like the Americans did to tap into the Soviet Army H.Q. in Berlin by tunnelling under the ground).  As for cell phones, unless they are pre-paid or stolen, they are easily tracked, and when they are not, institutions like the NSA or GCHQ can often find someone if they have enough information to make a voice print.

However, if the priority is not to prevent detection, but to pass on information, then once again speaking in code, and changing the code when necessary, is often enough.  If one is overly paranoid, one can simply use the more time-consuming methods of sending messages via a trusted courier or diplomatic pouch, or talking face to face (though obviously this is not always realistic).

Electronic security refers to computers mostly.  E-mails generally have the same risks and benefits as phone calls, though in some ways e-mail maybe more secure.  Certainly the tactic used by Don Cheadle in “Traitor” where he typed e-mails but saved, rather than sent them, and then gave his contacts the e-mail addresses and passwords, is a noteworthy example.

The biggest threats to computers are hackers, viruses, and sabotage.  Here, a combined effort on many fronts is necessary to succeed.  Multiple firewalls are a must, passwords, finger and retinal scans can be introduced, as little information as possible should be put on any computer, and no one without proper clearance should have access to any console.  Additionally, as many hackers get access to computers by (or malware is installed through) USB sticks, or CD’s, all of these should be checked beforehand.  Often an unwitting employee has had his USB stick switched with a malware one.

Needless to say, the loss of information via electronic means is not the only risk.  Given the rise of cyber-warfare during the last decade, much more is at stake, including government services, military systems, nations’ power grids, traffic systems, banking, etc.  A team of technical security advisors is necessary in the modern age.  Those who do not take the threat of cyber warfare seriously should note the Russian uses of it in Estonia in 2007 and in Georgia in 2008, the likely use of it against the Syrians by the Israelis when they bombed a suspected nuclear facility in Syria in 2007, and the Stuxnet worm that recently affected Iran’s nuclear reactor at Bushehr.

Other electronic assets like telemetric data (that is used between ground stations and things like missiles and predator drones) can be safeguarded by encryption, jamming the enemy, switching frequencies, or ceasing operations when in range of enemy collection capabilities.

Personnel security involves screening employees, allies, and potential associates for security risks.  Given the greatest intelligence coups are generally facilitated by double agents, it is wise to assume that “there is always a mole.”  Trust is an overrated luxury in the intelligence world.  The damage one double agent can do to the entire intelligence establishment in any country is terrifying.  Kim Philby compromised operations against the Soviet Bloc for ten years, and Aldrich Almes and Robert Hanssen by themselves nearly crippled the C.I.A.’s and F.B.I.’s efforts against the Soviet Union, and later, Russia.

There are several ways to identify moles, or at least minimize the potential damage they can cause.  The obvious first steps are THOROUGH background checks, periodic polygraph tests (though these are not foolproof, as Aldrich Almes easily passed them), and constantly checking personnel’s performances.  If there is a pattern of failures, or information is constantly going missing, this could be a clue (or incompetence).  A more effective method, though bordering on police state mentality, method would be surveillance of prime suspects, and monitoring their spending habits, people with whom they engage, and communications.  For example, Aldrich Almes was clearly found to be living way beyond his means.

However, it is obvious that intelligence personnel are trained to be careful, and it can be extremely difficult to catch a mole, as the case with Robert Hanssen shows.  Unlike Almes, Hanssen did not request a lot of money from the Russians, and did not spend it extravagantly.  The major break to find him was not any mistake he made, but when the F.B.I. bribed a former member of the K.G.B. for information.

Often all an organization can do is to limit the potential damage a mole can create.  The first rule here is the compartmentalization of information.  This is the so-called “need to know” basis; people should know only what is necessary to do their jobs, not what other people in other departments are doing, and often not even what people in their own department are doing.  A policy that severely discourages work-related gossip is probably necessary, as friends at work may feel they can trust each other enough to talk about their jobs.  Physical security also has a place; people should not be allowed into areas that do not concern them, and there should be multiple layers of security (locks, passwords, retinal scans, etc.) to access important rooms, safes, computers, etc.  Finally, as far as is realistically possible, objects taken from the outside world should be checked on the way in, and the same should apply when objects are taken out.

Also, at least in the case of foreign embassies, trade missions, vital installations, etc., all personnel should be staffed by people from your own country, not by locals.  Additionally, if people are contracted to do work inside these buildings, including mundane tasks like installing cable or plumbing, they should be constantly monitored.  The Soviets often took advantage of this when the Americans staffed much of their personnel in oversees missions with locals.  These people are typically easier to bribe (especially in poorer countries) or threaten, as they do not have diplomatic immunity, and also have no real loyalty to the country of the mission where they are working.

There are also active measures for safeguarding the nation’s interests.  The most obvious option is to mount surveillance and other operations against hostile intelligence elements.  The first step is identifying actual agents.  As they are usually trained to evade detection, this can prove difficult.  Agents working under official cover at Embassies, trade missions, or other governmental institutions are easier to find and track than agents using non-official cover.

Some typical examples of non-official cover agents include journalists, businessmen, tourists, and students.  For example, Eli Cohen was a Mossad agent, posing as a businessman, who gained much valuable information from the Syrian hierarchy before he was caught and executed.  Also, China has made notable use of students, sending perhaps thousands of them en masse to other countries to collect information.

Needless to say, much manpower and a great deal of discipline are needed to track, let alone find out what these agents are doing.  Typically they are meeting contacts, passing on information, going to and from safe houses, mounting surveillance operations of their own, etc.

It is also necessary to spy on rival intelligence agencies themselves.  As seen by the damage inflicted by Kim Philby, Aldrich Almes, and Robert Hanssen, planting a mole or hiring an insider as a double agent is probably the most effective means.  However, it is arguably the most difficult.  Identifying and enlisting intelligence assets used by rival intelligence agencies can also be helpful.  While the assets will not be able to give much information regarding the agencies themselves, they will help determine its goals, as well as helping you to pass on disinformation.

Technical means can also be invaluable if you are lucky enough to discover potential meeting places, or if the agents under observation are careless in their use of electronics.
Disinformation is a vital part in limiting the influence of rival intelligence agencies.  Usually this involves either telling them what they want to know, or drowning them in false information to waste their time.

Deception and disinformation go hand in hand.  Deception is more effective in wartime, under conditions of great secrecy and control.  Deception involves fabricating fake signals to show the enemy what they want to know and hiding real signals you want to keep secret.

For example, one could look at what was arguably the greatest deception plan in modern history: the ruse developed to fool the Nazis into believing the allies would invade the Pas de Calais region of France, rather than Normandy, in 1944.

The allies kept radio traffic in south-west England, where the invasion was launched from, to a minimum, while they sent out much fake traffic originating from south-east England.  Also, military assets such as tanks, trucks, barracks, etc, were camouflaged and hidden in the former area, while the Germans were allowed to see fake equivalents in the latter area.  Also, the British used German spies captured early on in the war to feed disinformation to the German army to suggest the Allies would invade around Calais.

How successful a deception plan will be depends on the relative amount of fake signals versus real signals the enemy receives, the faith they put in the different sources, and the extent to which they are willing to believe what they are seeing.

Needless to say, there are more ruthless methods such as killing or kidnapping intelligence officers or assets, using honey traps to seduce and then blackmail operatives, or planting false information to encourage suspicion among their ranks.  However, much of this is typically done in warfare, or desperate situations, and is not always the norm (it should be noted that intelligence officers who work in official government capacities have diplomatic immunity, while ones working under non-official cover are either executed or traded for other captured personnel).  Also, at least in the case of democratic countries, there is the potential for domestic outrage if such foul practices are uncovered.

The foregoing are only some ideas and methods; needless to say, in the real word security is always contingent on circumstances.

While intelligence agencies are often seen as omnipotent organizations, there are several factors that can limit their effectiveness.

As stated earlier, political interference can limit objective analysis, which can be relatively harmless in peacetime, but potentially dangerous in wartime.  Besides the usual tendency of policy makers to pressure analysts into producing intelligence that reinforces their preconceptions, policy makers can also mess things up by demanding immediate results in intelligence collection, or by authorizing covert operations that are ambitious but impractical.  The former is more forgivable (at least during crises, as politicians are expected to act quickly), but generally produces the same effects as when politicians push analysts to find information that reinforces what they already want to know.

Again we can cite the countdown to war against Iraq in 2002-2003 as an example.  In the rush to war, President Bush Junior clearly wanted the C.I.A. to produce quick results regarding Iraq’s supposed weapons of mass destruction.  Whether or not the Americans would have confirmed, or even believed, that Iraq possessed no such weapons is debatable, but certainly they would have lost less credibility in world opinion had they waited.

As for examples of ill-advised covert operations, recent history is not short on them.  The Bay of Pigs invasion of 1961, the abortive attempt to rescue American hostages in Iran in 1980, and the Israeli attempt to assassinate Khaled Mashal in 1997 were all mounted under considerable political pressure and were sloppily planned and poorly executed.

Another common flaw is when allies, or even intelligence agencies in the same country, fail to properly communicate, or coordinate, with each other.  This is typically the result of professional pride, petty rivalries, or even a lack of trust among differing agencies.  It usually takes a disaster to see how small these concerns are compared to the greater good of the nation.  The lack of cooperation between the C.I.A. and F.B.I. before September 11, 2001 is an obvious example.  Unfortunately such institutional squabbles are relatively normal.  Even in Canada (which has a mostly undeserved reputation of being less close-minded than America), CSIS and the RCMP have had a generally unimpressive working history.  Needless to say, relations among allied intelligence agencies are even more suspect, considering nations’ differing interests.  It is quite normal for allies to spy on each other, with corporate espionage being particularly common.

The predominant focus on one method of intelligence gathering, at the expense of others, is also a common error.  The typical example is a country that focuses too much effort on technical intelligence at the expense of human intelligence.  Usually rich countries, such as the United States, which has the indisputably best technical intelligence gathering capabilities in the world, do this.  As mentioned earlier, this gives these nations advantages in conventional and electronic warfare, but leaves them relatively vulnerable to insurgents or other elements that do not rely heavily on technology.

Besides the previously mentioned examples of Afghanistan and Iraq, there is an interesting story about a conversation between the head of the C.I.A. and the Mossad.  The C.I.A. chief had impressive footage of a meeting between Arafat and some of his P.L.O. cronies, obtained via technical means, and showed it to the head of the Mossad.  When the Mossad chief asked what was being discussed, the head of the C.I.A. admitted he had no idea.  Thereupon the Mossad chief produced a report of the conversation that he had obtained via a human source.

The cultural bias of intelligence analysts can also have negative consequences.  Quite simply, even if an analyst has found accurate data, he can still draw wrong conclusions on the enemy’s likely behaviour if he does not take into account the enemy’s background.  Two people from the same society and background can easily have different values and do things differently, so it is plausible that someone from a completely different society or background will be even more likely to.

The above was the case regarding the Israeli intelligence failure to predict the Egyptian attack in 1973.  The Israeli analysts, realizing the Egyptians were not fully prepared for war, did not believe they would attack.  However, they underestimated the extent to which the Egyptians were under pressure from the Arab world, and the extent to which Egyptian pride demanded they go to war, despite the risks.  Saddam Hussein’s actions in the early 1990s and before the “Iraq War” are similar instances.  In both cases, many believed Saddam would give in rather than fight a hopeless war against the Americans.  However, they did not calculate the importance that pride and not losing face have in the Arab world.

A culture of caution, lack of funding, and bureaucratic interference are also potential pitfalls.  Caution is often necessary as intelligence operations may take a long time to cultivate, but can fall apart rather quickly.  However, calculated risks are needed to recruit potential informants, mount effective intelligence gathering, or enact covert operations.  This is another reason why some agencies prefer technical means; it limits the risk to their agents, and relies less on potentially untrustworthy assets.  One reason the Americans’ information on Iraq’s Weapons of Mass Destruction program was so abysmal was their reluctance to send agents into the country.

Lack of funding and bureaucratic interference is self-explanatory, as most people have dealt with these effects in their workplaces at one point or another.  Intelligence operations are expensive; assets are generally “gold diggers” and surveillance equipment is anything but cheap.  Bureaucratic procedure and rules are also inherently damaging to intelligence operations that rely on innovation and adaptation.

Lastly, we have the effects of duplication of effort.  This is where different intelligence operations produce the same data or results.  This is common when a country has too many intelligence agencies (for example the U.S. has something like 17), there is lack of communication among the agencies, or when individual agencies themselves have similar components that compete towards the same results.  Of course it is necessary to state that usually it is wise to have several sources confirm many pieces of information.  Duplication of effort is bad when it is clearly wasting limited resources.  Sometimes the fault is with policy makers, who are either vague on goals, or ask several agencies to do exactly the same thing.  As well, a similar situation usually exists regarding allied countries with the same interests.

Duplication of effort is common in warfare.  For example, a military intelligence agency and a country’s foreign intelligence service will likely duplicate efforts to gauge the composition of enemy forces, especially elusive ones such as insurgents.  Duplication of effort is also typical of technical intelligence gathering, given how easy it is to track people with technology.  In the case of a cunning adversary, it is probably necessary to pull out all the stops, but in the case of a relatively careless target, a few means are usually sufficient.

Undoubtedly there are many other factors that potentially limit the effective use of intelligence.

One of the great dilemmas regarding intelligence, at least in a democracy, is finding the right balance between oversight and security.  On one extreme, some worry about the potential abuses of unrestrained intelligence organizations, while others are concerned about placing intelligence agencies under too much scrutiny.  Both of these views have some merit.  The lack of effective oversight almost always leads to dark places, even in democracies.  The C.I.A.’s considerable surveillance of American citizens during the 1960s and 1970s, as well as some of its sinister projects like MKULTRA, are chilling examples.

However, too much openness is also a liability.  As a rule in intelligence, the more people who know about something, the more likely it is to be compromised.  There are many examples in modern democracies where after a meeting between intelligence personnel and policy makers, and only a few officials have received classified information, they make several copies and pass it to their subordinates, who in turn make copies for their respective departments.  If during these many exchanges there is at least one person (and inevitably there is) who either talks too much, or feels motivated to leak the information, it becomes compromised.

Needless to say, because of the haphazard means of distributing the information, and the fact that no one wants to be blamed for the resulting security breach, it is often hard to find out whose fault it is.  To show the damage that even someone in a low position can do, one can cite the information passed on to the founders of Wikileaks by Private Bradley Manning of the U.S. Army.  Despite his low rank, Manning had access to the Secret Internet Protocol Router Network that allowed him to view sensitive military and diplomatic information.  This is one of the prices the U.S. Army pays for giving its soldiers so much access to information.  While it certainly gives the army an unparallel advantage in military operations, it comes with significant security risks.

This is why the classification of information, illustrated by the “need to know” basis, is so important.  The only people who should know about sensitive information are the policymakers, the intelligence personnel who are supposed to act on it, and for the sake of oversight, some public representatives not linked to the country’s executive branch.  To facilitate the latter’s involvement, the most common approach is to set up a committee of representatives, from the government’s legislative body, that receives access to classified information and knowledge of covert operations.  For example, the U.S. congress has access via the “House of Representatives Permanent Select Committee on Intelligence” and the “Senate Select Committee on Intelligence.”  These are descended from the various oversight committees that were set up by the Church Committee that probed into alleged abuses committed by the C.I.A. from the 1940s to the 1970s.

These committees see classified information, and are informed in advance of every covert operation.  While they serve mostly in an observer role, they can bring issues to the attention of Congress if they find anything extremely unsavoury.  While it could be suggested that bringing classified information to the attention of a public body such as congress is an obvious security breach, it should be pointed out that this is typically only done in the cases of potentially immoral actions that do nothing to serve national security.  Whether or not the members of these committees are likely to condemn immoral actions that serve national interest is debatable.

But to prove that these committees are not just toothless organizations designed to appease public opinion there is the precedent where the American Congress voted to limit aid to the notorious Contras in Nicaragua.  While the U.S. administration found a way around that restriction that resulted in the Iran-Contra affair, which finally sealed the operation’s fate, it still shows that the spooks, and eventually even the executive, cannot always do whatever they want.

Whatever potential risk intelligence agencies could pose to democratic nations is generally removed by the practice of not allowing them police powers.  While critics could argue that organizations like the F.B.I. and the Canadian R.C.M.P. have police powers, it should be pointed out that these are predominantly law enforcement agencies.  They have intelligence gathering capabilities, but these are primarily used to collect information to solve crimes, uncover external espionage, or pre-empt terrorist attacks.  In any case, these organizations are easier to restrain given their considerable exposure to the public and the media, considering they interact with society on a vastly greater scale than foreign intelligence organizations do.

Ultimately, even though there is no way to tell how effective these checks and balances are, it is not too much to say that for the most part, intelligence agencies in stable democracies are not a significant threat to liberty, and generally do not impact the daily lives of the vast majority of citizens.  Any restrictions of freedom due to foreign espionage or terrorist threats, as well as questionable methods such as rendition, holding terrorist suspects indefinitely without trial and harsh interrogation practices, were all sanctioned by democratic governments, not by rogue elements of intelligence.

Finally there is the question as to the necessity of intelligence agencies at all.  Undoubtedly there are naïve idealists who typically believe their governments are inherently evil and either downplay the threat of terrorism and other countries (whose governments are seemingly never as wicked as theirs are), or are completely oblivious to any threat at all.  These people think that no information should be classified, that all covert operations are immoral, and that with the rise of open sources and information technology, including the Internet, Facebook, and Twitter, that intelligence agencies have become obsolete.

Such delusions are dangerous.  Whatever the flaws of intelligence agencies, they are critical to the nations’ interests, and the safety of their people.  Bad intelligence management has led to some of the worse disasters in history, including the German invasion of Russia in 1941, the Japanese attack at Pearl Harbour, the Egyptian and Syrian attack against Israel in 1973, and September 11th, 2001.  While none of these surprises resulted in the collapse of its intended victim, something like a nuclear bomb going off in London, or a pre-emptive full scale cyber attack against American infrastructure, potentially could.

It is absurd to suggest that no information should be classified.  Would it really be wise to publish military secrets, vital economic or infrastructure data, or the location of, and detonation codes of, nuclear weapons for the benefit of terrorists, separatists, or foreign elements?  Hypocritically, it is likely that people who do not believe in the classification of knowledge would not be happy if all their personal secrets were common knowledge.

Likewise, covert operations are not always stupid exercises in bravado.  Some are necessary to gather vital information, or pre-empt potential threats.  For example, during the Cold War, the Americans and Israelis bribed several Russian MiG pilots to defect, along with their fighter aircraft, which gave them a decisive superiority over Russian- made planes.  Also, the Israeli raid on Osirak in 1981 denied Saddam Hussein the potential to make nuclear weapons, and the Stuxnet worm was most likely designed by the Americans or the Israelis to delay Iran’s Nuclear Weapons Program.  Finally, with hindsight, no rational person would have disapproved of assassinating Hitler to prevent the Second World War.

These three points – that there are real threats to society, that critical information should be classified, that covert operations are often necessary – all dismiss the final silly suggestion that increased access to open sources and the rise of information technology has made intelligence agencies obsolete.  A relatively secret organization, which advises, and is answerable to, the government, is necessary to address these concerns.  Information gathering, analysis, covert operations, and security, should be left to an organization of professionals, not a mob of amateurs.  They have the resources, the experience, and the necessary structures in place, to do a relatively good job.  Intelligence operations are simply too complex to be run in a disorganised fashion.

Intelligence operations are necessary to further nations’ interests, and at least in the case of democracies, protect their societies.  This is done by the collecting and analysing of information for the benefit of policymakers so they can make informed decisions.  Covert operations are useful to pre-empt threats without going to war, and counter-intelligence is necessary to safeguard critical information.  Several factors, such as political interference and the lack of cooperation among rival agencies, can limit the effects of intelligence operations.  A key dilemma in intelligence is the balance between oversight and security.  Intelligence operations are too complicated to be left to amateurs.

However, if intelligence agencies are necessary, they need not be necessarily evil.  Like military power, intelligence operations are vital to safeguard liberty, but can also be used to subvert it.  It is no coincidence that every wicked regime in history has used both military power and intelligence operations to consolidate, and then hold on to, power.  As with all power, there need to be checks and balances.  It is up to the people, the media, and even government employees who are not connected to the executive branch, to provide the checks and balances.

At the end of the movie “The Good Shepherd,” the newly appointed Director of the C.I.A. tells the protagonist about a conversation he had with a U.S. Senator:

“I remember a senator once asked me. ‘When we talk about “C.I.A.” why do we never use the word “the” in front of it?’  And I asked him, ‘do you put the word “the” in front of “God”?’”

Such sentiment was probably the norm in Stalin’s NKVD and Hitler’s Gestapo.

Bibliography
Andrew, Christopher.  The Defence of the Realm:  The Authorized History of MI5.  London:  Penguin Group, 2009.
Crowdy, Terry. The Enemy Within:  A History of Espionage.  Oxford:  Osprey Publishing, 2006.
Kilcullen, David.  Counterinsurgency.  New York:  Oxford University Press, 2010.
Shulsky Abram, and Gary Schmitt. Understanding the World of Intelligence.  Washington D.C:  Potomac Books, 2002.
Thomas, Gordon.  Gideon’s Spies:  The Secret History of the Mossad.  New York:  St. Martin’s Press, 2007.
Wikipedia Article on Intelligence Assessment: [Online] http://en.wikipedia.org/wiki/Intelligence_%28information_gathering%29 [2011, February]