ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

How to Catch a High Value Target Part III

Updated on December 19, 2011

Phase 3

The following operation plan is an original concept in which origins date back to October 2008. Please be advised that this is the third phase of the subsequent counter-terrorism operation plan. The second phase was introduced in October 2010; with the purpose of infusing the counterintelligence element.Thus allowing the operation plan to become more effective via ferreting out any potential security risk during the developmental stages of the operation.

Moving forward this document represents the third phase of the operation; with the goal being to properly implement the intelligence elements of HUMINT, ELINT, OSINT while discerning what would be considered Strategic Intelligence needs as well as the Tactical Intelligence needs as it relates to the probability of mission success in regards to the hypothetical operation.

In the event that a United States Military and Intelligence Community
led multi-national covert plan of action would be formulated; the following strategy could be implemented. Implement a Military and Intelligence Community strategic partnership with the nation of Israel, which would include the planning, training, and formulation of mutual mission objectives that would serve the purpose of insuring the security and well-being of the United States of America, Israel, Western Civilization along with all nations of the world that strive to exist in peace, and are working towards genuinely developing a Democratic society.The targets would be the heads of major international terrorist organizations; the goal arrest and or elimination of targets. Furthermore the type of terrorist leader that may be susceptible to the following operation may exist within the somewhat high profile “pseudo-political” Islamic organizations such as Hamas and Hezbollah. Also the new era threat posed by American born Islamic leader, recruiter, organizer, and traitor to the United States of America, radical cleric Anwar Al Awlaki would be considered a high payoff target-(HPT).

Close coordination between CI elements within the United States and Israel will be imperative. Selection of participating nations will be thoroughly scrutinized as to which nations would be willing to commit to mission objectives. Leaders of Counterintelligence elements within the U.S. and Israel would need to make contact with leaders within Intelligence Communities worldwide to conduct pre-mission briefs. The goal being to discuss the severity of the operation plan and the subsequent backlash via the international media should a breach in OPSEC were to take place. Also in such meetings the reality of retaliation from terrorist organizations should be discussed and countermeasures developed to thwart the inevitable attacks from terrorist cells that already exist within most nations of Western Civilization.

The HUMINT Factor:
“CI Force Protection Source Operations (CFSO)- Tactically- oriented, overt collection program that uses human sources (informants) on the battlefield to identify potential and actual threats to deployed U.S. and coalition forces and to answer intelligence requirements. Sources can provide early warning of imminent danger to deployed U.S. and coalition forces and provide information that helps in the decision-making process.”(1) The following mission objectives would be put in place, however with the addition of proactive counterintelligence taking an offensive position in the mission preparation stage increases the probability of mission success. Due to the critical and sensitive nature of the subsequent mission objectives, CI elements will need to run thorough background investigations on all operatives recommend for this mission irregardless from which nation they represent. Moving forward prior to mission objectives being implemented CI placed technical surveillance will need to be utilized in an effort to insure that proposed points of attack or secure and operational prior to placing HUMINT collectors in the field.

“(Liaison)-Liaison is the gaining of rapport with and elicitation of information from host country and allied military and civilian agencies. Agents conduct liaison with host nation military and law enforcement U.S., coalition, and host nation law enforcement and security personnel. Liaison can answer collection requirements, coordinate activities, and foster cooperation.”(2) HUMINT collectors will be assigned to work with Middle East regional allies such as key figures within the Kingdom of Jordan and its General Intelligence Department (GID), Egypt's General Directorate for State Security Investigations (GDSSI), as well as formulating a pivotal, and strategic working relationship with relevant personnel within Saudi Arabian Intelligence & Security. Regional partnerships will be paramount to offer a genuine opportunity to achieve overall operational success. Therefore HUMINT liaison duties would be critical.

“Document Exploitation (DOCEX) -The systematic extraction of information from documents to aid in HUMINT collection operations and to obtain information in response to collection requirements.”(3) Collectors would target the extraction of such vital information as subject aliases, documented travel itinerary, (private jet) flight plans, hotel arrangements, maritime assets (yachts) also dining and meal preparation information would be sought out.

“Surveillance- Observation of a facility, activity, or individuals to answer collection requirements, support the commander’s decision-making processes, or support a CI program.”(4) HUMINT personnel would be dispatched to observe and document movement in around the subject’s home and or compound. The collector would utilize the obtained information as a focal point in which to determine the strength of the subject’s security detail, daily travel arrangements, business meetings”, and possible speaking engagements etc..

“Screening Operations- Operations to identify sources that may be able to answer collection requirements, serve as CFSO sources, or be a part of a base or area security program. This operation is both a tactical HUMINT and CI operation.”(5) Due to the hostile nature in the Middle East region that stands in opposition to American and Israeli forces; the screening process that would disseminate information, thus “separating the wheat from the tares”(6) regarding intelligence collected. The screening process may be considered the most critical HUMINT factor within the operation.

“Interrogation and Detainee Operations- The systematic questioning of large numbers of enemy prisoners of war or detainees in response to collection requirements. This usually occurs at a military police- or other agency-operated collection facility.” (7) The interrogation phase may be look upon as the second phase of the screening operation; as the screening process may lead to the uncovering of security risk that pose a genuine threat to the operation as a whole. The security risk would need to be interrogated and if deemed appropriate detained.

The ELINT Factor:
“ELINT is information derived primarily from electronic signals that do not contain speech or text (which are considered COMINT).It is divided into major branches. One branch is Technical ELINT (TechELINT), which describes the signal structure, emission characteristics, modes of operation, emitter functions, and weapons systems associations of such emitters as radars, beacons, jammers, and navigational signals. A main purpose of TechELINT is to obtain signal parameters which can define the capabilities and the role that the emitter plays in the larger system, such as a ground radar locating aircraft, and thus lead to the design of radar detection, countermeasure, or counterweapons equipment. The overall process, including operation of the countermeasures, is part of electronic warfare. Another major branch is Operational ELINT (OpELINT), which concentrates on locating specific ELINT targets and determining the operational patterns of the systems. These results are commonly called Electronic Order of Battle (EOB). OpELINT also provides threat assessments, often referred to as “tactical ELINT.” OpELINT intelligence products support military operational planners and tactical military commanders on the battlefield.”(8) The technology provided via ELINT would prove to be an asset that could be utilize as an invaluable source of information. Reality dictates that the enemies of the United States that would be targeted in the operation may possess advanced weapons systems up to and including access to WMD. Therefore the information collected via ELINT would be vital as it indicates what retaliatory methods and capabilities of the enemy after the success of the operation. This would give the United States and Israel a clear indication on what weapon systems would need to be disabled and or neutralized in the embryo stage of the operation.

The OSINT Factor:
“Open source information (OSINT) is derived from newspapers, journals, radio and television, and the Internet. Intelligence analysts have long used such information
to supplement classified data, but systematically collecting open source information has not been a priority of the U.S. Intelligence Community (IC). In recent years, given changes in the international environment, there have been calls, from Congress
and the 9/11 Commission among others, for a more intense and focused investment in open source collection and analysis.”(9) The effective use of OSINT could be of high value due to the arrogant, demagogue nature of al Qaeda Head of Foreign Operations the American traitor, Anwar al-Awlaki. “Awlaki who was born in New Mexico, and was the Muslim Chaplain at George Washington University and an Imam at a mosque in northern Virginia before leaving the United States to coordinate al-Qaeda's outreach to U.S. Muslims. Awlaki was in direct communication with the men arrested for the Ft. Hood shootings and Times Square Bombings. Remember the Underwear Bomber? Awlaki trained him. The parcel bombs were Awlaki's work too.”(10) OSINT would provide the tools to track a target such as Awlaki who boldly states his agenda in publications such as “in the latest issue of the group's English-language magazine Inspire, an article signed "Head of Foreign Operations" takes credit for the recent parcel bomb plot and outlines in great detail the planning and thinking behind it. The article is almost certainly written by Awlaki. We know this because the article references obscure figures from the history of Muslim Spain, a pet subject of Awlaki's, and because it mentions Charles Dickens' Great Expectations, a book he reviewed on his blog in 2008. Moreover, Awlaki is a personal friend of the editor of Inspire, Samir Khan, and has published in the magazine in the past.”(11)

Moving forward OSINT would further expose Anwar al-Awlaki rantings via Islamic Extremist Dar Al Murabiteen Publications as “he has repeatedly declared his support for mass-casualty attacks on U.S. civilians and is, by all accounts, playing an active role in the planning of international terrorist attacks. His removal will not destroy AQAP, but it will reduce the group's ability to strike in the West.”(12) To reiterate Awlaki would prove to be a high payoff target-(HPT) worth acquiring and or eliminating.

In closing the Strategic Intelligence element of the operation is represented by the overall goal of the operation which is to strike a major blow at the leadership mechanism of terrorism. The Tactical Intelligence element would include all of the aformentioned factors that would follow a logical course of action-(COA) that would raise the probability of operational success.



(2) ibid

(3) ibid

(4) ibid

(5) ibid

(6) The Bible: Matthew chapter 13 verse 30


(8) Center for Cryptologic History National Security Agency

(9) Open Source Intelligence (OSINT): Issues for Congress, December 5, 2007 prepared by Richard A. Best, Jr. & Alfred Cumming





    0 of 8192 characters used
    Post Comment

    No comments yet.


    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at:

    Show Details
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the or domains, for performance and efficiency reasons. (Privacy Policy)
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)