ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel
  • »
  • Politics and Social Issues»
  • Crime & Law Enforcement

How to Catch a High Value Target Part III

Updated on December 19, 2011

Phase 3

The following operation plan is an original concept in which origins date back to October 2008. Please be advised that this is the third phase of the subsequent counter-terrorism operation plan. The second phase was introduced in October 2010; with the purpose of infusing the counterintelligence element.Thus allowing the operation plan to become more effective via ferreting out any potential security risk during the developmental stages of the operation.

Moving forward this document represents the third phase of the operation; with the goal being to properly implement the intelligence elements of HUMINT, ELINT, OSINT while discerning what would be considered Strategic Intelligence needs as well as the Tactical Intelligence needs as it relates to the probability of mission success in regards to the hypothetical operation.

In the event that a United States Military and Intelligence Community
led multi-national covert plan of action would be formulated; the following strategy could be implemented. Implement a Military and Intelligence Community strategic partnership with the nation of Israel, which would include the planning, training, and formulation of mutual mission objectives that would serve the purpose of insuring the security and well-being of the United States of America, Israel, Western Civilization along with all nations of the world that strive to exist in peace, and are working towards genuinely developing a Democratic society.The targets would be the heads of major international terrorist organizations; the goal arrest and or elimination of targets. Furthermore the type of terrorist leader that may be susceptible to the following operation may exist within the somewhat high profile “pseudo-political” Islamic organizations such as Hamas and Hezbollah. Also the new era threat posed by American born Islamic leader, recruiter, organizer, and traitor to the United States of America, radical cleric Anwar Al Awlaki would be considered a high payoff target-(HPT).

Close coordination between CI elements within the United States and Israel will be imperative. Selection of participating nations will be thoroughly scrutinized as to which nations would be willing to commit to mission objectives. Leaders of Counterintelligence elements within the U.S. and Israel would need to make contact with leaders within Intelligence Communities worldwide to conduct pre-mission briefs. The goal being to discuss the severity of the operation plan and the subsequent backlash via the international media should a breach in OPSEC were to take place. Also in such meetings the reality of retaliation from terrorist organizations should be discussed and countermeasures developed to thwart the inevitable attacks from terrorist cells that already exist within most nations of Western Civilization.

The HUMINT Factor:
“CI Force Protection Source Operations (CFSO)- Tactically- oriented, overt collection program that uses human sources (informants) on the battlefield to identify potential and actual threats to deployed U.S. and coalition forces and to answer intelligence requirements. Sources can provide early warning of imminent danger to deployed U.S. and coalition forces and provide information that helps in the decision-making process.”(1) The following mission objectives would be put in place, however with the addition of proactive counterintelligence taking an offensive position in the mission preparation stage increases the probability of mission success. Due to the critical and sensitive nature of the subsequent mission objectives, CI elements will need to run thorough background investigations on all operatives recommend for this mission irregardless from which nation they represent. Moving forward prior to mission objectives being implemented CI placed technical surveillance will need to be utilized in an effort to insure that proposed points of attack or secure and operational prior to placing HUMINT collectors in the field.

“(Liaison)-Liaison is the gaining of rapport with and elicitation of information from host country and allied military and civilian agencies. Agents conduct liaison with host nation military and law enforcement U.S., coalition, and host nation law enforcement and security personnel. Liaison can answer collection requirements, coordinate activities, and foster cooperation.”(2) HUMINT collectors will be assigned to work with Middle East regional allies such as key figures within the Kingdom of Jordan and its General Intelligence Department (GID), Egypt's General Directorate for State Security Investigations (GDSSI), as well as formulating a pivotal, and strategic working relationship with relevant personnel within Saudi Arabian Intelligence & Security. Regional partnerships will be paramount to offer a genuine opportunity to achieve overall operational success. Therefore HUMINT liaison duties would be critical.

“Document Exploitation (DOCEX) -The systematic extraction of information from documents to aid in HUMINT collection operations and to obtain information in response to collection requirements.”(3) Collectors would target the extraction of such vital information as subject aliases, documented travel itinerary, (private jet) flight plans, hotel arrangements, maritime assets (yachts) also dining and meal preparation information would be sought out.

“Surveillance- Observation of a facility, activity, or individuals to answer collection requirements, support the commander’s decision-making processes, or support a CI program.”(4) HUMINT personnel would be dispatched to observe and document movement in around the subject’s home and or compound. The collector would utilize the obtained information as a focal point in which to determine the strength of the subject’s security detail, daily travel arrangements, business meetings”, and possible speaking engagements etc..

“Screening Operations- Operations to identify sources that may be able to answer collection requirements, serve as CFSO sources, or be a part of a base or area security program. This operation is both a tactical HUMINT and CI operation.”(5) Due to the hostile nature in the Middle East region that stands in opposition to American and Israeli forces; the screening process that would disseminate information, thus “separating the wheat from the tares”(6) regarding intelligence collected. The screening process may be considered the most critical HUMINT factor within the operation.

“Interrogation and Detainee Operations- The systematic questioning of large numbers of enemy prisoners of war or detainees in response to collection requirements. This usually occurs at a military police- or other agency-operated collection facility.” (7) The interrogation phase may be look upon as the second phase of the screening operation; as the screening process may lead to the uncovering of security risk that pose a genuine threat to the operation as a whole. The security risk would need to be interrogated and if deemed appropriate detained.

The ELINT Factor:
“ELINT is information derived primarily from electronic signals that do not contain speech or text (which are considered COMINT).It is divided into major branches. One branch is Technical ELINT (TechELINT), which describes the signal structure, emission characteristics, modes of operation, emitter functions, and weapons systems associations of such emitters as radars, beacons, jammers, and navigational signals. A main purpose of TechELINT is to obtain signal parameters which can define the capabilities and the role that the emitter plays in the larger system, such as a ground radar locating aircraft, and thus lead to the design of radar detection, countermeasure, or counterweapons equipment. The overall process, including operation of the countermeasures, is part of electronic warfare. Another major branch is Operational ELINT (OpELINT), which concentrates on locating specific ELINT targets and determining the operational patterns of the systems. These results are commonly called Electronic Order of Battle (EOB). OpELINT also provides threat assessments, often referred to as “tactical ELINT.” OpELINT intelligence products support military operational planners and tactical military commanders on the battlefield.”(8) The technology provided via ELINT would prove to be an asset that could be utilize as an invaluable source of information. Reality dictates that the enemies of the United States that would be targeted in the operation may possess advanced weapons systems up to and including access to WMD. Therefore the information collected via ELINT would be vital as it indicates what retaliatory methods and capabilities of the enemy after the success of the operation. This would give the United States and Israel a clear indication on what weapon systems would need to be disabled and or neutralized in the embryo stage of the operation.

The OSINT Factor:
“Open source information (OSINT) is derived from newspapers, journals, radio and television, and the Internet. Intelligence analysts have long used such information
to supplement classified data, but systematically collecting open source information has not been a priority of the U.S. Intelligence Community (IC). In recent years, given changes in the international environment, there have been calls, from Congress
and the 9/11 Commission among others, for a more intense and focused investment in open source collection and analysis.”(9) The effective use of OSINT could be of high value due to the arrogant, demagogue nature of al Qaeda Head of Foreign Operations the American traitor, Anwar al-Awlaki. “Awlaki who was born in New Mexico, and was the Muslim Chaplain at George Washington University and an Imam at a mosque in northern Virginia before leaving the United States to coordinate al-Qaeda's outreach to U.S. Muslims. Awlaki was in direct communication with the men arrested for the Ft. Hood shootings and Times Square Bombings. Remember the Underwear Bomber? Awlaki trained him. The parcel bombs were Awlaki's work too.”(10) OSINT would provide the tools to track a target such as Awlaki who boldly states his agenda in publications such as “in the latest issue of the group's English-language magazine Inspire, an article signed "Head of Foreign Operations" takes credit for the recent parcel bomb plot and outlines in great detail the planning and thinking behind it. The article is almost certainly written by Awlaki. We know this because the article references obscure figures from the history of Muslim Spain, a pet subject of Awlaki's, and because it mentions Charles Dickens' Great Expectations, a book he reviewed on his blog in 2008. Moreover, Awlaki is a personal friend of the editor of Inspire, Samir Khan, and has published in the magazine in the past.”(11)

Moving forward OSINT would further expose Anwar al-Awlaki rantings via Islamic Extremist Dar Al Murabiteen Publications as “he has repeatedly declared his support for mass-casualty attacks on U.S. civilians and is, by all accounts, playing an active role in the planning of international terrorist attacks. His removal will not destroy AQAP, but it will reduce the group's ability to strike in the West.”(12) To reiterate Awlaki would prove to be a high payoff target-(HPT) worth acquiring and or eliminating.

In closing the Strategic Intelligence element of the operation is represented by the overall goal of the operation which is to strike a major blow at the leadership mechanism of terrorism. The Tactical Intelligence element would include all of the aformentioned factors that would follow a logical course of action-(COA) that would raise the probability of operational success.



(2) ibid

(3) ibid

(4) ibid

(5) ibid

(6) The Bible: Matthew chapter 13 verse 30


(8) Center for Cryptologic History National Security Agency

(9) Open Source Intelligence (OSINT): Issues for Congress, December 5, 2007 prepared by Richard A. Best, Jr. & Alfred Cumming





    0 of 8192 characters used
    Post Comment

    No comments yet.