Read the attached articles. For each article do the following:
Include the full reference for the article using APA writing format.
State the main goal(s) of the study
Summarize the research design, and discuss the research method(s) used to answer the research question or assess the hypothesis.
Summarize the results of the study.
Discuss the advantages and disadvantages of the study’s research design.
Provide a discussion on how the study can be moved forward.
Include two well phrased research questions that could be used in follow-on studies to the one reviewed.
Format: You should have 1-inch margins on all 4 sides of your papers; your title page should include your name and date; you should use 12-point times new roman font throughout.
Avoid using the first person in formal writing and instead write with an academic voice throughout. Academic voice is usually written in the third person (he, she, it), not first person (I, we) or second person (you). Be consistent in voice and person. See Grammar Girl, “First, Second, and Third Person,” Quick and Dirty Tips for Better Writing, January 20, 2011, http://grammar.quickanddirtytips.com/first-second-and-third-person.aspx/. Furthermore, the academic voice avoids abbreviations, contractions, jargon, and slang. Even informal academic discussions are more formal than causal chat among friends.
The body of your work should be made up of no more than 20% direct quotes.
The assignment for each article needs to be between 1-2 pages SINGLE SPACED per article.
Full Terms & Conditions of access and use can be found at
http://www.tandfonline.com/action/journalInformation?journalCode=fint20
Intelligence and National Security
ISSN: 0268-4527 (Print) 1743-9019 (Online) Journal homepage: http://www.tandfonline.com/loi/fint20
Counterinsurgency agent networks and
noncombatant-targeted violence
Britta Stime
To cite this article: Britta Stime (2017) Counterinsurgency agent networks and
noncombatant-targeted violence, Intelligence and National Security, 32:1, 107-125, DOI:
10.1080/02684527.2016.1210770
To link to this article: https://doi.org/10.1080/02684527.2016.1210770
Published online: 26 Jul 2016.
Submit your article to this journal
Article views: 1074
View related articles
View Crossmark data
http://www.tandfonline.com/action/journalInformation?journalCode=fint20
http://www.tandfonline.com/loi/fint20
http://www.tandfonline.com/action/showCitFormats?doi=10.1080/02684527.2016.1210770
https://doi.org/10.1080/02684527.2016.1210770
http://www.tandfonline.com/action/authorSubmission?journalCode=fint20&show=instructions
http://www.tandfonline.com/action/authorSubmission?journalCode=fint20&show=instructions
http://www.tandfonline.com/doi/mlt/10.1080/02684527.2016.1210770
http://www.tandfonline.com/doi/mlt/10.1080/02684527.2016.1210770
http://crossmark.crossref.org/dialog/?doi=10.1080/02684527.2016.1210770&domain=pdf&date_stamp=2016-07-26
http://crossmark.crossref.org/dialog/?doi=10.1080/02684527.2016.1210770&domain=pdf&date_stamp=2016-07-26
IntellIgence and natIonal SecurIty, 2017
Vol. 32, no. 1, 107–125
http://dx.doi.org/10.1080/02684527.2016.1210770
ARTICLE
Counterinsurgency agent networks and noncombatant-targeted
violence
Britta Stime
School of Politics, International Studies and Philosophy, Queen’s university Belfast, Belfast, uK
ABSTRACT
In counterinsurgency, agent networks are double-edged swords. They are
useful tools for degrading insurgent influence and protecting the population.
However, they also endanger the population in some ways, as we have
seen with mass executions of suspected agents and agent misdirection of
raids. Identifying how/why this occurs is critical for developing intelligence
practices to more effectively implement COIN strategies. This exploratory
study uses three recent counterinsurgency cases – for which significant
secondary open-source agent network documentation is available – to
identify, describe, organize and analyse patterns of noncombatant-targeted
violence associated with human intelligence networks. Identified cases
of noncombatant-targeted violence in Operation Enduring Freedom –
Afghanistan, Operation Iraqi Freedom, and the – Israeli–Palestinian conflict
are used to develop a theoretical framework that models intelligence-related
violence incentivization, which also draws from theoretical literature on
human intelligence, civil war violence, police states, community policing,
and the sociology of betrayal.
Agent networks are an essential feature of counterinsurgency (COIN) operations. They are extremely
important tools for disrupting and degrading insurgent networks and protecting the population.
However, they are double-edged swords. Agent networks may also inadvertently motivate corollary
violence against noncombatants. For example, intelligence officers lament that, in Afghanistan and Iraq,
they lose noncombatants ‘all the time’ whom they recruit to act as agents;1 on 22 August 2014, HAMAS
carried out a summary execution of 18 Palestinian noncombatants on suspicions of spying;2 and the
Islamic State has repeatedly released videos of beheadings of alleged agents.
Thousands of noncombatants have been severely injured or killed by coercive recruitment tactics,
covert and clandestine activities, unauthorized criminal conduct by agents, targeting operations based
on poorly validated human intelligence (HUMINT), counterintelligence preventive violence and pun-
ishment violence.
Surprisingly, despite the evident dangers of agent networks in COIN and their double-edged effects
on securing populations, discussion of agent network-associated violence in the intelligence literature is
extremely limited. Most literature on this topic is prescriptive, dealing with how to expand and improve
HUMINT collection.3 Normative literature on the subject evaluates human rights dilemmas involving
security forces and their agents.4 The literature does not, however, investigate the broader, systemic
incentives of agent networks that may inadvertently induce noncombatant casualties.
© 2016 Informa uK limited, trading as taylor & Francis group
CONTACT Britta Stime stimebritta@gmail.com
mailto:stimebritta@gmail.com
http://www.tandfonline.com
108 B. STIME
Agent network-associated noncombatant casualties have likely eluded academic investigation
because they are often not visible, or viewed as arbitrary, incidental, or necessary evils of wartime
intelligence collection that are not directly attributable to the incumbent government. Additionally, the
individuals killed tend to be citizens of marginalized groups, such as foreigners and those considered
traitors. This depoliticizes and deprioritizes their deaths.
This research shows that agent network-associated noncombatant casualties occur in patterns, cor-
relating with systemic incentives induced by agent network recruitment and operation. Agent networks
motivate all categories of actors in a conflict (i.e., the incumbent government, agents, noncombatants,
and insurgents) to use violence to promote or neutralize agent acquisition5 and handling.6 These incen-
tive structures7 for noncombatant-targeted violence8 follow an intelligence war framework as actors
compete for access. This theoretical framework is presented in the proceeding sections.
Due to the lack of access to classified data, the assertions herein are based on open sources. This may
limit the reliability and generalizability of the conclusions of this research;9 however, the importance
of opening this subject to unclassified academic discussion compels the researcher to meet these
methodological challenges with research that provides a preliminary examination of agent networks
and noncombatant casualties.
Agent networks
The literature uses a diverse array of terms to refer to agents: informants, informers, sources, human
sources, local sources, assets, national security assets, spies, collaborators, contributors, and local
national employees, inter alia. These terms are commonly used interchangeably, even though they
sometimes refer to different categories of actors. For example, informant and spy are often used inter-
changeably; however, spy usually refers to a person who provides information10 to a foreign intelligence
service, while informant generally refers to someone who provides information to a domestic intelli-
gence/investigative or law enforcement organization. The use of the terms source and asset have grown
increasingly common, because of a conscious effort by intelligence and law enforcement agencies to
employ more neutral or positive labels. This study uses the word agent, because agent and asset are the
most widely-used terms by foreign intelligence services. Agent also denotes one of the most common
terms used to describe a broader collection of these individuals: agent network.
While the term agent networks (also referred to as human source networks and informant networks)
is routinely used in intelligence manuals, it is not explicitly defined. Based on the information in these
manuals,11 agent networks can be described as a subcategory of collaborators or denouncers12 (general
terms referring to people who give information to the incumbent government along a formality contin-
uum running from people who volunteer information,13 to people who are recruited, trained and paid
by intelligence collectors).14 Intelligence organizations intentionally develop agent networks through
multiple contacts with individuals they identify, target, recruit, and handle. While here the primary focus
is on incumbent-developed networks, many other actors develop agent networks.15
Political-military utility
Agent networks are critical political-military tools in COIN. They serve as low-cost force multipliers –
relative to the average trained, salaried soldier – that mirror insurgent advantages and combat insurgent
strategies. A single intelligence officer operating in a new Area of Operation (AO) may expand his/her
coverage through networks of agents who, like insurgents, hide among civilian populations; operate
agilely, transnationally, in decentralized networks, and with few to no bureaucratic procedures; leverage
local knowledge and relationships; and are less restricted by the laws of war.16
These unique capabilities help government security forces build a detailed pattern of life picture,
locate high-profile insurgents (referred to as high-value targets), receive alerts of the presence of mines
INTELLIgENCE AND NATIONAL SECURITy 109
or improvised explosive devices and ambushes, monitor local populations, and characterize the oper-
ational environment.17
State security forces often use agents as targeting scouts in neighborhoods, captive lineups, and raids.18
The rumored presence of agents has a psychological impact on civilian populations, aiding separation of
insurgents from their civilian support base, the first key tenet of COIN.19 The known presence of agents
sows suspicion and demoralization within organizations.20 It can also create the perception of popular
support for the incumbent government while simultaneously delegitimizing the insurgent’s cause.21
Finally, agents are also used as agents provocateurs to conduct covert and clandestine activities (e.g.,
torturing suspects, placing homing devices for drone strikes, committing extra-judicial killings, sabo-
taging insurgent operations, entrapping conspirators in law enforcement-monitored crimes, provoking
internal dissension, and swaying insurgent decisions).22
Noncombatants vs. insurgents vs. agents
For the purposes of this paper, noncombatants refers to law-abiding civilians who are not integrally
involved in the insurgent movement. The term insurgents is used to refer to those civilians who are
unlawful combatants, actively involved in the insurgent movement. Agents operating on behalf of the
incumbent, like insurgents, are also civilians who are unlawful combatants. They may not wield weapons
or directly partake in violence, but they actively deal in lethal information. Agents are recruited from
within insurgent groups and noncombatant civilian communities. Insurgents and agents use the civilian
population as a cover. They hide among and endanger a particular population, group or demographic
by exposing them to violence used for intelligence, targeting, and counterintelligence purposes.
It is important to note the clear distinction between recruiting an insurgent versus a noncombatant
to work as an agent. The recruitment of an insurgent only exposes an existing combatant (and the insur-
gent group that is his/her cover) to additional possibilities of intelligence-, targeting-, and counterintel-
ligence-related violence. Conversely, the recruitment of a noncombatant as an agent transforms him/
her into an unlawful combatant, making the individual a legitimate target of violence, and potentially
exposing the individual’s noncombatant community or demographic to intelligence, targeting, and
counterintelligence-related violence.23 For this reason, while the theory presented in this study focuses
only on modeling violence targeted at noncombatants, it also sometimes includes violence targeted
at noncombatants-turned-agents, as these targets often overlap.
Intelligence war framework
Intelligence is a competition for access, commonly referred to as an intelligence war, in which actors
struggle to gather intelligence while preventing their opposition from doing the same through coun-
terintelligence strategies and tactics. In the context of COIN HUMINT, this is manifested as the struggle
to access the population (who possesses valuable information) through the development and oper-
ation of agent networks. Agent network development refers to agent recruitment (acquisition). Agent
network operation refers to agent handling (i.e., the use of agents for intelligence collection, insurgent
identification and location, covert and clandestine activities, and population control). This HUMINT war
framework is illustrated in Figure 1.
This paper focuses on the left side of Figure 1: incumbent HUMINT gathering and insurgent counter-
intelligence activities.24 In this context, as the incumbent vies to develop and operate agent networks
(illustrated with the light gray downward-pointing arrow on the left), the insurgents and civilian pop-
ulations sympathetic to their cause struggle to counter the development and operation of incumbent
agent networks (illustrated with the dark gray, upward-pointing arrow).
Actors may use violence against noncombatant populations for intelligence and counterintelligence
purposes according to the logic of this intelligence war framework.
110 B. STIME
Violence against noncombatants in the intelligence war framework
Available evidence suggests that the competition for access to HUMINT may incentivize all categories
of actors in an insurgency setting to employ violence to promote and to counter the development and
operation of agent networks within the population.
All actors in a COIN conflict – the incumbent, agents, noncombatants, and insurgents – are both
instigators and targets of violence. Literature often misinterprets political violence based on the false
premise that only the traditional state and insurgent actors actively participate in a conflict, while
noncombatants simply get caught in the middle of the fighting. However, Stathis Kalyvas’ theory25 of
violence in civil war shows how political violence in civil conflict is a joint venture involving the incum-
bent, the insurgents, the noncombatants and the agents alike (which he generalizes as ‘denouncers’).
When we analyse violence against noncombatants associated with the incumbent’s agent networks,
we see that, in accordance with Kalyvas’ theory, all the categories of actors in the conflicts use violence
(among many other methods of influence) to drive intelligence and counterintelligence. The incumbent
uses violence against noncombatants to develop and operate agent networks. The incumbent’s agents
use violence while they are being recruited and handled. The noncombatants use violence to counter
the development and operation of agents within their communities.26 And, finally, the insurgent group
and its agents (groups which are combined, because they are indistinguishable in the literature) employ
violence to counter the development and operation of incumbent agent networks.
This research indicates that the development and operation of agent networks by the incumbent
motivates six patterns of violence, categorized as: coercion, covert and clandestine activities, unau-
thorized crime, misdirected targeting, preventive violence, and punitive violence. Figure 2 provides a
theoretical framework for conceptualizing these six patterns of violence. Each pattern correlates with
the actor and its incentive (developing and operating agent networks vs. countering the development
and operation of agent networks).
These six patterns of violence against noncombatants follow a systemic logic of incentives; each is
described and analysed below, using open-source literature on intelligence incidents from the three
selected case studies previously mentioned.
Research design and cases
The presented theory of noncombatant-targeted violence associated with COIN agent networks (shown
in the previous diagram) was developed through an analysis of three high-profile COIN cases that
Figure 1. Human intelligence war framework.
INTELLIgENCE AND NATIONAL SECURITy 111
exhibit significant documentation of casualties associated with intelligence practices: OEF-A, OIF and
the Israeli–Palestinian conflict.
Israeli military and intelligence assets in the Israeli-Occupied Territories and the allied coalition forces
involved in Iraq, Afghanistan, and the Federally Administered Tribal Areas (FATA) between Afghanistan
and Pakistan have developed extensive agent networks. These agent networks, comprised mostly
of noncombatants-turned-agents and minimal insurgents-turned-agents (due to a lack of access to
insurgents), have functioned as crucial HUMINT collection resources, insurgent identifiers and locators,
proxies for covert and clandestine activities, and social control mechanisms.
In OEF-A and OIF, specially-trained HUMINT collectors (as part of HUMINT collection teams HCTs)27
were forward deployed to the peripheries of hostile AOs to develop agent networks.28 Through daily
close contacts with locals and refugees,29 cordon-and-search operations,30 block-by-block neighborhood
searches, traffic checkpoints, and official liaison with a few trusted host nation law enforcement and
intelligence organizations,31 soldiers identified potential contacts for intelligence officers to recruit as
agents.32 In many cases, HUMINT collectors also used trusted local civilians as handlers (or principal
agents) of their own sub-agent networks33 to augment their recruitment efforts. Similar to the Israeli
internal security service’s (SHABAK) Palestinian agent networks, these agent networks helped the
intervening forces collect HUMINT, identify insurgents within lineups of detainees and locate them in
neighborhoods, prevent ambushes, and implement neighborhood systems of block control.34
The SHABAK uses elaborate agent networks of Palestinians from all spheres of public life in the
occupied territories. These networks originated from mass arrests prior to and during the 1967 Six-Day
War. The SHABAK has since greatly expanded these agent networks to include informers within the
Palestine Liberation Organization (PLO) and other designated terrorist organizations, but also civilians
in universities, unions, councils, and other realms of civil society. The SHABAK uses Palestinian agent
networks to gather intelligence on Palestinian underground cells and their activities to predict and
thwart potential terrorist attacks, to prevent the Palestinian population from consolidating around the
PLO, and to disrupt nation-building processes.35
For each of these three selected cases, instances of violence against noncombatants associated
with HUMINT were identified, described, actor-attributed, and traced to their purported purpose. As
illustrated in Figure 2, these patterns of violence, across all three cases, have been collated by actor and
purpose. In the following six sections, each pattern of violence identified is (1) described, (2) explained
according to systemic incentive structures induced by agent network recruitment, and (3) illustrated
using select examples from the three analysed cases. Each section is labeled according to the pattern’s
typology (Actor, Type, Purpose): the Actor(s) directly implementing the violence; the Type of violence
Figure 2. actors and agent network development/operation violence framework.
112 B. STIME
targeting noncombatants; and the Purpose of the violence (agent network development, operation,
counter-development, or counter-operation).
Incumbent coercion in network development
In order to develop agent networks, the incumbent sometimes uses coercion: violence, the threat of
violence, deception, and the promotion of conditions that restrict access to basic needs.36 States use
coercion to recruit noncombatants and insurgents who would not otherwise voluntarily agree to act as
agents;37 coercion changes the individuals’ circumstances and decision calculus in favor of spying. The
incumbent may also use coercion to compel an already-recruited agent to perform certain espionage
and covert or clandestine operations that he/she would not otherwise agree to do.38 Through coercion,
the incumbent converts an individual into an unlawful combatant (or into a more involved unlawful
combatant) against his/her will. This study includes deception in the coercion definition, because this,
too, turns a noncombatant into an unwitting or unwilling agent, thus exposing the individual to punitive
violence for an action to which he/she had not knowingly consented. For example, the case of Alan
Bani Odey in the Israeli–Palestinian conflict: the SHABAK tricked him into murdering his cousin; he was
subsequently sentenced to death.39 Finally, while this study does not discuss morality in spying, it is
important to note a moral distinction between the coercive recruitment of a noncombatant versus an
insurgent; transforming a noncombatant into an agent and potential target of violence against his/her
will is of greater moral significance than exposing an insurgent combatant to additional possibilities
of violence as an agent.
As one would expect, volunteer agents are widely considered more reliable than agents who are
coerced into their role.40 However, voluntary agents can be scarce, especially when insurgent organi-
zations adeptly deter spying with extremely violent methods. The highly-volatile nature of COIN and
high strategic utility of agents incentivizes the incumbent to use coercive recruitment methods to build
its networks in the absence of other viable options.41
As of this date, there are no publicly-available data to estimate the frequency of such coercive
practices in COIN. However, this study found many confirmed instances of incumbent use of coercive
methods to recruit and run agents, similar to the cases described above. This is consistent with findings
of earlier studies, such as Marx’s 1974 survey of US police agent recruitment, which is very similar to COIN
agent recruitment. Marx showed that six of 15 agents (40%) were recruited through coercive methods
(only legally-acceptable coercive methods – threat of imprisonment and deception through agent
provocateurs – not violence or threat of violence, as this is prohibited in liberal Western democracies).42
There is significant evidence suggesting that incumbents in OEF-A, OIF, and the Israeli–Palestinian
conflict have used coercion to recruit and run agents. Israel has used and threatened recruitment targets
and/or the targets’ families with violence, imprisonment, torture, blackmail, misleading rumors con-
demning individuals as agents, and the confiscation of travel permits required for work and medical care.
According to Morad Jadalah, a researcher with ADDAMEER, a prisoners’ rights organization in the
West Bank, Palestinians are coerced through arrests, at checkpoints, and during raids. Cook reports:
Long jail terms and the use of administrative detention – imprisonment on secret charges – are the most obvious
threats, but there are other ways to pressure Palestinians in detention, says Jadalah … The interrogators may beat
them, or threaten to beat or rape their mother or sister, or arrest a close relative … They may even threaten to spread
rumours that the family are already acting as agents.43
There have also been reports of Israeli military and intelligence assets blackmailing homosexual
Palestinians into working as agents, since this revelation could result in their murder.44 In addition,
Jadalah and co-authors Cohen and Dudai describe how the SHABAK has leveraged access to work
permits and medical care to recruit agents. Jadalah explains:
They usually already know something about the family, so they can threaten, for example, to revoke the father’s
work permit … In other cases, the Israeli security services may offer inducements. Israel controls most people’s lives,
including their ability to work and move around. Between 30 and 40 per cent of adults are unemployed. That gives
Israel the leverage it needs to recruit collaborators.45
INTELLIgENCE AND NATIONAL SECURITy 113
Coalition intelligence assets in OEF-A and OIF are reported to have used similar forms of coercive
recruitment. Highly-valued potential agents (both insurgent and noncombatant) were threatened with
detention in guantanamo Bay or with transfer to foreign security services with a history of human rights
abuses. These individuals were sent to these locations to be further coerced if they initially declined
to inform.46
Incumbent covert and clandestine activities in network operation
State security forces sometimes use agents for covert and clandestine activities: un-attributable, unpop-
ular, or illegal violent acts, colloquially referred to as ‘dirty tricks’ or ‘dirty work’. Here, the focus is on the
use of agents for covert and clandestine paramilitary operations and lethal action, although covert and
clandestine operations encompass all operations meant to be plausibly deniable or conducted in secret.
A few examples of the use of agents for covert and clandestine activities involving violence include
sabotaging insurgent operations, provoking internal dissension, swaying insurgent decisions, torture,
extra-judicial killings, and placing homing devices for drone strikes.47 There is significant evidence of
Israeli, Afghan- and Iraqi-directed covert and clandestine operations by agents, especially for the place-
ment of electronic homing devices for drone strikes and for torturing insurgent suspects and sources.
Incumbents use agent networks for covert and clandestine operations because they are plausi-
bly deniable. The incumbent can ‘obfuscate responsibility of the state for certain types of operations’
through agent networks.48 It is important to note that covert and clandestine activities include forms
of violence with a greater potential to generate noncombatant casualties, because the incumbent is
initiating operations that it would not be inclined to – or would be unable to – perform overtly for fear
of political and/or legal ramifications.
While government agencies do not confirm their use, there is significant reported evidence of intelli-
gence agencies employing agents to place electronic homing beacons, nicknamed patrai in the Middle
East, to direct predator drone strikes on insurgent targets.49 Increased reliance on HUMINT for targeting
will likely increased in use due to insurgent measures to counter signals intelligence (SIgINT)-driven
targeting.
Israeli military and intelligence assets have allegedly used Palestinian informers to torture terrorist
subjects; Cohen and Dudai write:
A common practice in Israeli police, military and SHABAK interrogation facilities is using informers, known as ‘birds.’
These informers introduce themselves as activists and force them [the terrorist subjects] to prove that they are not
collaborators by telling who they are, what they did and who were the people that sent them on their missions …
‘[B]irds’ also torture the detainees that refuse to disclose information.50
The use of agents to torture is evidenced in a 2013 case involving Palestinian prisoner Arafat Jaradat.
Mr. Jaradat died while in detention at Megiddo prison in central Israel. His relatives claim his death
resulted from harsh interrogation tactics carried out by the SHABAK and by Palestinian prisoners work-
ing as agents.51
The SHABAK has also used agents to carry out extra-judicial killings. Returning to an example used in
the Coercion section, the SHABAK booby-trapped the car of Palestinian agent Bani Odeh and requested
that he lend it to his cousin. Unsuspecting, Odeh did so, and his cousin was killed in the explosion.52
By employing an agent for this operation, the SHABAK was attempting to portray it as an apolitical
murder, thus obfuscating its political nature and sidestepping Israel’s legal and political responsibility.
Agent unauthorized crime in network development
The incumbent sometimes must protect agents from sanction for their criminal activities in order to keep
the agents operating in the field. This indirectly precipitates casualties by subjecting noncombatants
(as well as insurgents on occasion) to violence that might have been prevented had the perpetrator
not been informing for the incumbent and thus been detained according to legal, law enforcement
procedures upon his/her first criminal offense. Agents sometimes commit three general categories
114 B. STIME
of crimes: (1) low-level authorized crimes legally deemed essential for the maintenance of their cover
as participating informers,53 (2) unauthorized crimes that are permitted by the handlers through the
obstruction of justice, and (3) unauthorized crimes that are not permitted by their handlers.54
Around the world, agents have committed extrajudicial killings and torture without the consent or
directive of their handlers. This is often mislabeled in the news media as collusion (which is a component
of violence through covert and clandestine activities), because unauthorized crime can mix with covert
and clandestine operations on a continuum of security force awareness of and complicity with such
acts (i.e., when they further national political objectives).
The available sources did not indicate evidence of unauthorized crimes in OEF-A, OIF, and the
Israeli–Palestinian conflict. However, the existence of this pattern of violence against noncombatants
is probable, because the use of immunity is a commonly-practiced and generally-accepted recruitment
technique in these cases. People with privileged access who have committed a crime are targeted,
turned, and released into the public with the possibility of – and, often, tendency to – commit further
crimes. Documentation of unauthorized crime in the selected cases is scarce because these intelli-
gence wars are recent and ongoing; thus intelligence and legal documentation is still closely guarded
to protect sources and methods. Unauthorized crimes, however, proved to be extremely prevalent in
the Northern Ireland Troubles, a case with similar actors and HUMINT collection practices.55 Further
research on this pattern of violence is warranted.
Agent-misdirected targeting in network operation
Agents sometimes provide false information about their targets. Conspiratorially and unwittingly, they
misidentify individuals as targets who, in actuality, are not. As a result, the incumbent carries out tar-
geted violence against people whom it would not have necessarily targeted had the information been
validated.
Most, though not all,56 intelligence acquired from agents is cross-checked against other intelligence
sources before the incumbent acts upon it. Intelligence packages for kinetic57 targeting are usually
composed of at least a combination of SIgINT and HUMINT; satellite imagery, drone surveillance, and
communications matrices (such as the National Security Agency’s (NSA) geo Cell program)58 inform and
validate HUMINT collection and agent operations (agent identification of insurgents, descriptions of
relationships, and location of targets).59 However, HUMINT is very difficult to verify at times, and SIgINT
can falsely appear to confirm agents’ claims.60 Marx explains this in theoretical terms: ‘[the secrecy of
the agent’s role] gives the [agent] an advantage over his employer, who in any given instance may
find it hard to assess the accuracy of the information he gets’.61 This of course, must take into account
intelligence agencies’ use of source and content ratings that, over time, help handlers assess the validity
of each source’s information.
Informing is a component of noncombatant ‘denunciation’, which Kalyvas theorizes is often done
‘maliciously’ (self-servingly) and not just ‘politically’ (pursuing only the same political purposes as the
political actor to which the information is supplied).62 In his theory of political violence and noncom-
batant involvement as information sources, Kalyvas theorizes: ‘denunciation turns the production of
selective violence into an outcome jointly produced by political actors and noncombatants’.63 He also
notes that false denunciations are common: ‘individuals are tempted to settle private and local conflicts’
by supplying the incumbent with false or misleading information.64
Agents misdirect targeting by supplying misinformation (unintentionally false information) and
disinformation (intentionally false, misleading information) to the incumbent, which informs kinetic
targeting. Often, agents just want to collect their compensation without supplying real or certain infor-
mation, or they have personal, local tribal, or political motives to intentionally mislead the incumbent
to attack their own targets.
Agents intentionally mislead their handlers for political motives driven by the goals of the insurgent
or by local, tribal power competitions. Sometimes, agents act as triple and re-doubled agents. Agents
that have been doubled pretend to act as agents for the incumbent when, in fact, they are actually
INTELLIgENCE AND NATIONAL SECURITy 115
working for the insurgent. They supply information meant to deceive the incumbent in order to afford
the insurgent a political or strategic advantage.
Agents also act on behalf of their tribes and tribal leaders, falsely accusing members of rival tribes
as ‘insurgents’. Intelligence practitioners in OEF-A and OIF have expressed frustration that agents (tribal
leaders included) are commonly using this tactic. For example, in Mosul, Iraq, American forces asked
their Shia agent to identify insurgents from a lineup; all chosen were Sunni.65 Finer quotes two American
soldiers in Afghanistan who acknowledge this form of disinformation: ‘they want to get everyone who’s
not in their tribe’ and ‘we almost never get anything good from them [the agents] … I think they just
pick people from another tribe or people who owe them money or something’. As the second soldier
notes, agents also supply disinformation in order to carry out violence through the incumbent that
would fulfill a personal vendetta.
Intelligence personnel have expressed concern about agents providing false information about
potential targets simply to reap the monetary rewards from the incumbent and/or to direct incumbent
violence at personal enemies. As Callam observes: ‘the lack of multiple intelligence sources also inhibits
the ability of drones to accurately identify targets. Local agents are notoriously unreliable and can exploit
the attacks for personal gain by pointing drone attacks toward personal rivals’.66 Malicious information
supplied by agents is not always false; it may also be true, even though it was divulged with ulterior
motives. For example, a 13-year-old Iraqi, whom American soldiers nicknamed ‘Steve-O’, informed on
his father who had been abusing him and became an American war ‘hero’.67
Evidence suggests that disinformation is pervasive in the OEF-A, OIF, and Israeli–Palestinian conflict
cases. Said Riegle, who runs a private intelligence firm that worked in Iraq and Afghanistan, observed
that only ‘about half’ of the information from agents was reliable.68 Israel also reports extremely low
reliability of Palestinian agent tips, attributed to HAMAS’ strategy of flooding the system with disinfor-
mation to obscure true information and provoke the government to commit politically costly errors.
Mayer writes that Israel’s unmanned airstrikes in the Palestinian territories are ‘more exacting’ than
the US’ in Iraq and Afghanistan. Despite this, an Israeli news agency notes that Israeli airstrikes are often
misguided by faulty intelligence:
In the past, Israel has blamed HAMAS for civilian casualties, saying the group uses schools, mosques and residen-
tial areas for cover while carrying out attacks. But cases of mistaken identity or faulty intelligence have also been
known to result in civilian casualties.69
Human Rights Watch also reports70 that attacks included bombings of noncombatant locations (e.g.,
homes and farm groves). For example, a strike on 21 November 2013 killed a 48-year-old farmer, Talal
al-Asaly and two of his children, Ayman, 19, and Abeer, 11, in northern gaza while working in their
garden. Another drone strike two days earlier killed Ibrahim al-Astal, 48, and his nephew, Omar al-Astal,
14, in the southern area of Khan younis. In each case, residents said they did not observe Palestinian
militants trying to fire missiles nearby, the usual target of such Israeli strikes.71 On 22 August 2014, an
Israeli airstrike aimed at the chief of HAMAS’ military wing killed the leader’s wife and two of his children.
Analysts assert that, based on the accuracy of this airstrike, Israel’s military would almost certainly have
needed HUMINT to direct it.72
There is a significant number of accounts suggesting that incumbent raids and airstrikes in OEF-A
and OIF have been executed using poorly validated HUMINT. Writing on OIF, Kahl observes:
Too often, raids have been based on dubious intelligence gleaned from agents seeking to settle scores. And when
soldiers and marines have encountered armed resistance from families seeking to defend their homes, they have
sometimes responded [in hindsight] with disproportionate force.73
Finer also records an instance in which American forces rounded up hundreds of villagers identified as
insurgents by a Shia agent in Mosul, Iraq. He quotes a student who was among those detained: ‘your
source is not good, these are all innocent men … we are all Sunnis. That is why he [the agent] chose
us. He is Shia’.74 In an interview with Semple, a member of the US Army’s Tactical HUMINT Team in Iraq,
acknowledged that they needed to ‘rein in’ their agents, because they were ‘fingering, like, 25, 30 at a
time … they want to get everyone who’s not their tribe’.75 Declassified US Army records also describe
116 B. STIME
a case in 2006, in which US forces killed an Iraqi noncombatant when they raided the wrong house
identified by two agents as the home of a member of an explosively formed penetrator (EFP) cell.76
Airstrikes in OEF-A have been similarly misguided. Mayer explains: ‘the strikes are only as accurate
as the intelligence that goes into them. Tips from agents on the ground are subject to error, as is the
interpretation of video images … local agents, who also serve as confirming witnesses for the airstrikes,
are notoriously unreliable’.77 This claim is echoed by Callam78 and demonstrated in a number of unofficial
‘close calls’ and botched cases. A former CIA officer recalls a time when he barely held off an airstrike
directed by his superiors and based on the HUMINT supplied by his Afghan agent:
They scrambled together an élite team … We caught hell from headquarters. They said ‘Why aren’t you moving on
it?’ when we insisted on checking it out first. It turned out to be an intentionally false lead.79
Mayer also records cases in which airstrikes on invalid targets were actually carried out:
In September [2009], a NATO air strike in Afghanistan killed between seventy and a hundred and twenty-five peo-
ple, many of them civilians, who were taking fuel from two stranded oil trucks; they had been mistaken for Taliban
insurgents. (The incident is being investigated by NATO.) According to a reporter for the guardian, the bomb strike
… left such a tangle of body parts that village elders resorted to handing out pieces of unidentifiable corpses to
the grieving families, so that they could have something to bury. One Afghan villager told the newspaper, ‘I took
a piece of flesh with me home and I called it my son’.80
In addition, it is estimated that the campaign to kill Baitullah Mehsud took 16 missile strikes, resulting
in 207–321 additional deaths over 14 months.81 Amnesty International also records a number of cases
in which only noncombatants were killed in drone strikes.82 Based on the organization’s investigation, it
is unclear what source(s) of intelligence led to these cases, although it is highly probable that HUMINT
was a significant element.
On the other hand, it should be noted that a recent survey of FATA residents found that approximately
64 per cent of locals living with drone strikes believe that they accurately target militants, and greater
than 66 per cent believe that most of the non-militant civilians who do die in drone strikes are militant
sympathizers or radicalized collaborators.83
Insurgent and noncombatant-led preventive violence for network counter-development
Insurgents and noncombatant civilian communities publicly maim and kill suspected agents with the
expressed purpose of deterring others from informing. The primary target of counterintelligence vio-
lence is a particular demographic population (usually a civilian community or the insurgent’s own per-
sonnel) that identifies with the secondary target, the violently punished suspected agent. This strategy
incorporates especially brutal tactics, as it inflicts suffering for a broader psychological effect to advance
counterintelligence objectives. It sends a clear message to the primary audience: do not inform.
Incumbent agent network development motivates counter-network violence by noncombatant
civilian communities and insurgents. It is extremely difficult to identify agents once they are turned.
Thus, it is strategically favorable to deter people from becoming agents in the first place. According to
Kalyvas’ theory of the political economy of denunciation, the supply of denunciations is constrained
by: ‘the likelihood of retaliation faced either by the denouncer or by the local committee that vets
denunciations’.84 It is in the interest of the actors that would be threatened by the presence of agents
to publicize the high likelihood of retaliation against agents. They employ excessively violent measures
to discourage would-be informers. The victims of counterintelligence violence often have nothing to
do with incumbent agent networks. Not only does this not detract from the strategy’s effectiveness,
it actually enhances it. People are deterred from providing any sort of information to any incumbent
representative for fear of being used as a violent propaganda example against spying. This strategy
deters spying, makes it easier to identify agents talking to authorities, and further separates the pop-
ulation from the incumbent.
Preventive violence analysed in the three cases indicates that both insurgents and local communities
deter informing. In the literature, preventive violence is often labeled ‘terrorism’ when performed by
INTELLIgENCE AND NATIONAL SECURITy 117
insurgents and ‘public executions’ or ‘demonstrations’ when performed by noncombatant communities.
Why is it in the interest of communities to deter informing? They, too, often consider agents a threat
for largely three reasons: (1) the community may be sympathetic to the insurgent influence, (2) the
presence of agents may be viewed as a liability that exposes the community to misdirected incumbent
targeting driven by agents’ personal motives, and (3) agent presence may be feared to provoke insur-
gent counterintelligence preventive and punishment violence against innocent community members
misidentified as agents.
Numerous examples of preventive violence (by both civilian communities and insurgent groups)
exist in each case study. For example, on 2 December 2012, HAMAS killed six suspected civilian collab-
orators, in addition to the convicted agent Fadel Shalouf, and paraded their bodies through the streets
of gaza City.85 More recently, on 22 August 2014, HAMAS executed at least 18 Palestinians suspected
of informing for Israel. They were executed in public with warnings to the public scrawled on the walls
to the effect that these people were ‘traitors’ who had ‘given information to the enemy’.86 HAMAS also
posted graphic photos of their executions and the aftermath online.
Counterintelligence units in North Waziristan, called the Haqqani Khurasan, cover their faces with
balaclavas and wear black tunics with Khorasan Mujahedin in Urdu scrawled across the back. They travel
in slow-moving caravans of cars with tinted windows weeding out suspected agents.87 Reports indicate
that they abduct and torture suspected agents, often with scalding, boiling water and iron rods; bodies
are usually dumped on roadsides with scraps of paper that warn civilians against the consequences
of spying for Western forces.88 Between 2009 and 2011, the Khurasan have carried out at least 250
public executions of Pakistani civilians declared agent suspects.89 This number is a minimum estimate,
because evidence suggests that civilians are so scared of the Khurasan that everyone refrains from
reporting public executions to state authorities. For example, no one reported a daylight execution
of three men in a bazaar in the village of Maktab, in which one man was shot 10 times in the face and
chest and a Khurasan operative yelled to the crowd, ‘Whoever tries to help the Americans and spies
for them will face this!’90 State authorities became aware of this incident four months later when they
captured a videotape of it.
The Khurasan broadcast warnings to Pakistani civilians, telling them that they will fight agents ‘before
we fight the Americans’.91 A Western reporter described videos of sham trials and executions of sus-
pected agents:
Accused tribesmen are abducted from homes and workplaces at gunpoint and tortured. A sham religious court
hears their case, usually declaring them guilty. Then they are forced to speak into a video camera … [O]ne accused
agent says into a video camera: ‘I am a spy and I took part in four attacks’, said Sidinkay, a young tribesman who
said he was paid US$350 to help direct CIA drones to their targets in Pakistan’s tribal belt. Sweat glistened on his
forehead; he rocked nervously as he spoke. ‘Stay away from the Americans’, he said in an imploring voice. ‘Stay
away from their dollars’. The videos end in execution by hanging, beheading or firing squad … ‘Spies, your days
are numbered because we are carrying out raids’, chants the video soundtrack.92
Al Qaeda’s sister organization in Afghanistan, Ittehad-e-Mujahedeen Khorasan,93 has also filmed and
published these sorts of sham trials online, in which the accused are found guilty and beheaded.94
Civilian communities also use methods of intimidation to prevent locals from informing. For exam-
ple, Shadid reports on a case in Iraq in 2003, in which a village required a father to publicly execute
his son for being an informant.95 His son’s information had led to the detainment of 400 residents by
US forces. The boy, Kurbul, had a bag over his head while he pointed out guilty parties in a line-up for
American forces, but the villagers recognized him by his hand and sandals. Shadid writes that even
local children chanted rhymes about him: ‘masked man, your face is the face of the devil’. Another
example from the National Public Radio (NPR)96 describes how HAMAS had widespread community
support for removing Khulud Badawi’s husband, a suspected agent, from prison in gaza City before his
final court appearance that day to appeal the spying charges. Badawi, along with five other suspected
spies, were somehow taken from prison without a trial, shot in broad daylight, and dragged through
the street behind motorcycles.
118 B. STIME
Insurgent and noncombatant-led punitive violence for network counter-operation
Insurgents and noncombatant civilian communities counter agent operations through punitive vio-
lence. Punitive violence and preventive violence (from the previous section) often overlap, since
punishment of suspected agents (no matter how inaccurate) usually also serves to deter those who
witness the event.97 As in preventive violence, both noncombatants and insurgents perform punitive
violence.
Frequently, agents have been killed for their role as betrayers, an especially stigmatized activity.98 In
nearly every culture, death is considered the proper punishment for informing, like treason. For exam-
ple, a senior Pakistani Taliban commander explains: ‘in every civilized society, the penalty for spying is
death’.99 Similarly, an Iraqi noncombatant asserts: ‘It’s justice … in my opinion, he deserves worse than
death’.100 In the Israeli-occupied territories, Cohen and Dudai observe that agents are targets of commu-
nity anger and punishment ‘because they are a serious threat to collective social values and interests,
binding the community and establishing a sense of sovereignty’.101 Palestinian agents are often killed in
mob beatings, their families are usually forced to disown them, and communities shun their families.102
US military intelligence personnel in OEF-A and OIF have reported extremely high rates of agent
mortality. ‘We are losing agents all the time’, lamented one anonymous senior Western intelligence offi-
cial, speaking with a reporter.103 Just how frequently agents have been killed in these theatres has not
been disclosed, however, not only because of the sensitivity of the information, but (disconcertingly)
also because security services often do not know how many have been killed.104
According to one US intelligence officer, in 2010 the Taliban discovered that a group of recent high
school graduates in Afghanistan’s ghazni province had been feeding information to the Americans. The
youths were arrested, and around 10 of them were hanged.105 In another instance, in 2007, the Taliban
discovered a US-paid agent – a poppy farmer – was acting as a handler for several other Afghan agents.
The Taliban demanded that he summon all of his agents together and said that if they repented, their
lives would be spared; instead, everyone in the vicinity was killed.106
Insurgents and civilian communities often kill noncombatants who are suspected, but actually inno-
cent, of informing. This phenomenon is due to the problem of identification of unlawful combatants.
Additionally, the inaccuracy of punitive violence simultaneously serves a deterrent purpose; punishing
a suspected agent not only eliminates the threat, it also scares witnesses from acting in any way that
even vaguely resembles spying for fear of false accusation. For this reason, it is noted that preventive
and punitive violence overlap.
Evidence in all three cases indicates that noncombatants are often killed without proper investigation/
trials because of insurgent and community suspicion. This was the case with Rabhi Badawi (described
in the Preventive Violence section), who was taken from prison prior to his trial and executed.107 Human
Rights Watch condemned HAMAS for conducting a ‘summary execution’ of 18 suspected agents on 22
August 2014.108 Hughes and Tripodi observe that suspicion killings are also extremely common in OEF-A
and OIF cases. They write: ‘the experience in Iraq or Afghanistan would suggest that if a Western soldier
stops to talk to a local, he may easily arouse suspicions that leads to the latter’s murder’.109
Fearing that paid agents direct NATO strikes, the Taliban in Afghanistan has repeatedly performed
violent purges of suspected spies without trial or using sham trials.110 They have performed summary
executions of tens of agents at a time. For example, one Taliban commander in Afghanistan claimed:
‘we have arrested about 60 or 70 spies, and we killed many of them’.111 Other insurgents claimed to
have hanged 17 suspected spies in just the previous week.112 It is estimated that the counterintelli-
gence Khurasan unit in the FATA has performed at least 250 assassinations and public executions of
suspected spies.113 An American military official observed: ‘when we conduct a raid on a Haqqani leader
… [the Khurasan] go in and massacre people’.114 The danger of mistaken punitive violence is reflected
in Waziri public opinion; Frau observed that there is a pervasive fear among Waziri civilians of being
falsely accused of spying by local Taliban.115
Notably, an Iraqi mayor describes the problem of community-driven inaccurate elimination of agents,
while speaking with Washington Post reporter Shadid:
INTELLIgENCE AND NATIONAL SECURITy 119
Sitting in a chair and holding a cup of sweet tea, the mayor expressed frustration. Suspicions have become so
common that more than 100 Muslim clerics met last week and issued a statement that not all Iraqis working with
US forces should be considered informers. ‘Whenever somebody talks to the Americans’, he said shaking his head,
‘they think he’s an agent’.116
Residents were carrying out punitive killings of suspected agents with unsettling inaccuracy in his town.
The inaccuracy of punitive violence caused by the ‘identification problem’ of agents is a common theme
across all three cases, among both insurgent organizations and civilian communities.
Through an exploratory analysis of COIN HUMINT activities in OEF-A, OIF, and the Israeli–Palestinian
conflict, this research has identified six patterns of violence against noncombatants associated with
COIN agent networks – coercion, covert and clandestine activities, unauthorized crime, misdirected
targeting, preventive violence, and punitive violence – that follow an incentive structure embedded
in the intelligence war framework.
While agent networks are essential tools for COIN operations, in some ways they indirectly motivate
corollary violence against the civilian population. In OEF-A, OIF and the Israeli–Palestinian conflict, agent
networks have functioned as crucial HUMINT collection resources, insurgent identification and location
tools, proxies for covert and clandestine activities, and social control mechanisms. At the same time,
they have inadvertently incentivized all the conflict actors – the incumbent, agents, noncombatants,
and insurgent group – to employ violence against noncombatants in the competition for access and
intelligence.
Collateral damage is an unfortunate, unavoidable necessary evil in COIN operations, particularly in
a complex civil war environment in which the civilians are often peripherally or integrally involved in
the conflict. HUMINT operations are necessary to build a detailed intelligence picture and find, fix and
finish the insurgents, but operations in pursuit of this political objective do not always align with the
principle of civilian protection. HUMINT collection is an ugly business that sows mistrust within pop-
ulations, generating first, second, and third degree effects that must be carefully identified, assessed,
and balanced against strategic advantages of agent network use.
This research provides a theoretical foundation for better understanding these direct and indirect
effects on civilians, focusing on the issue of violence. There is an urgent need for further research into
the sociological and psychological effects of COIN HUMINT operations, and how an incumbent (along
with intervening militaries) may tailor intelligence policies and practices to alter incentive structures
and diminish noncombatant-targeted violence associated with agent networks.
1. Riechmann, “Coalition Informant Plays Both Sides.”
2. Lynfield, “Israel–gaza Crisis.”
3. See Costa, “Phoenix Rises Again”; Miska, “Protecting Soft Networks”; Macgaffin, “Clandestine Human Intelligence”;
Hung, “Optimization-Based Selection of Influential Agents”; gallagher, “Human Intelligence in Counterinsurgency”;
Beall, “The HUMINT Heresies”; Baker, “HUMINT-Centric Operations”; Berman et al., “Can Hearts and Minds be
Bought?”; Butler, “Killing Cells.”
4. Moran, “Evaluating Special Branch”; Moran, From Northern Ireland to Afghanistan; Cohen and Dudai, “Human Rights
Dilemmas in Using Informers.”
5. Intelligence term for agent recruitment.
6. Intelligence term for running (training, financing and operating) an agent after he/she has been recruited.
7. Defined as systems of motivating influences.
8. In this paper, the product of noncombatant-targeted violence is noncombatant casualties, defined as killed and
injured noncombatants and noncombatants-turned-agents.
9. In this way, this research confronts the same research challenge faced by the first academic to study political
informers, gary Marx. See Marx, “Thoughts on a Neglected Category.”
10. For the purposes of this paper, information refers to raw data (unanalysed, unprocessed, and unvalidated) from
any source. Intelligence refers to analysed, processed and validated information from any source. Additionally,
120 B. STIME
intelligence is generally classified due to the nature of collection methods, security of the source, and the potential
impact on national and local security.
11. See greer, Supergrasses; Hewitt, Spying 101, 33; US Army, Human Intelligence Collector Operations; UK Army,
Counterinsurgency Operations; UK Ministry of Defense, Joint Doctrine Publication (JDP) 2–0.
12. See Kalyvas, The Logic of Violence in Civil War.
13. ’Single-event’, ‘one-time contact’ or ‘volunteer’.
14. ’Multiple-event’, ‘formal contact’, ‘developed source’ or ‘long-term penetration source’.
15. Including, inter alia: insurgent groups, criminal groups, and foreign governments.
16. galula, “Counter-Insurgency Warfare,” 1–12; Kalyvas, The Logic of Violence in Civil War, 89–91; Tomes, “Relearning
Counterinsurgency Warfare,” 17–18; Duyvesteyn and Angstrom, Rethinking the Nature of War, 101; Kitson, Low
Intensity Operations, 71.
17. US Army, Human Intelligence Collector Operations, s.3–1; UK Army, Counterinsurgency Operations, s.B-6–12;
Mumm, “Crowdsourcing,” 59; US Army, Intelligence and Electronic Warfare Support, s.5–1; McFate, “Anthropology
and Counterinsurgency,” 37; Hoffman, “The Logic of Suicide Terrorism,” 6–7; gallagher, “Human Intelligence in
Counterinsurgency,” 1.
18. See Khatchadourian, “The Kill Company”; youssef, “Fear of Informants has Stoked Climate”; Finer, “Informants Decide
Fate of Iraqi Detainees”; Shadid, “For an Iraqi Family”; Ware, “Chasing the ghosts.”
19. See ‘block control’ strategy in US Army, Counterinsurgency Operations, s.204:3–31, 3–7; Israeli agent networks in
Cohen and Dudai, Human Rights Dilemmas in Using Informers, 231–3; Hughes and Tripodi, “Anatomy of a Surrogate,”
8; Hewitt, Snitch!, 6, 95–122.
20. UK Army, Counterinsurgency Operations, s.10–30; Kirk-Smith and Dingley, “Countering Terrorism in Northern Ireland,”
565; Moloney, A Secret History of the IRA, 315.
21. Hewitt, Snitch!, 98.
22. Marx, “Thoughts on a Neglected Category,” 402–42; Kirk-Smith and Dingley, “Countering Terrorism in Northern
Ireland,” 556, 564–5; Hewitt, Snitch!, 7–18, 33–4; UK Army, Counterinsurgency Operations, s.A-4–9; Moran, “Evaluating
Special Branch,” 20; Burds, “Agentura,” 129–30; Cohen and Dudai, “Human Rights Dilemmas in Using Informers,” 237.
23. See Bellaby, “What’s the Harm?,” 115–16.
24. Focusing only on the left side of this framework does not imply that insurgents are only reactive to incumbent
activities, nor does it imply a moral justification of insurgent activities as such. As depicted in the diagram, the
incumbent and insurgent group(s) alike act both proactively and reactively.
25. Kalyvas, The Logic of Violence in Civil War.
26. The reason for this will be explained in the Punitive Violence section.
27. For a full description of HCTs, see US Army, Human Intelligence Collector Operations. HCTs are part of Special Forces
and intelligence units from groups such as the British Joint Support group (JSg) (an elite group within the British
Army Intelligence Corps and the successor of the FRU in Northern Ireland), the American Joint Special Operations
Command (JSOC), and the Central Intelligence Agency (CIA).
28. See Elite UK Forces, “Elite Intelligence Operatives, Joint Support group”; Central Intelligence Agency, “On the Front
Lines”; US Army, Human Intelligence Collector Operations, s.3–21.
29. This was one of the primary purposes of ‘Operation Close Encounters’ and census conduction in Iraq. See Crider,
“Inside the Surge”; Keirsey, “Reflections of a Counterinsurgency Company Commander,” 74.
30. See Clark, “The Vital Role of Intelligence in Counterinsurgency Operations”; Hoffman, “The Logic of Suicide
Terrorism”; Crider, “Inside the Surge,” 8.
31. A common theme in the literature is concern over insurgent infiltration of HN law enforcement and intelligence
agencies. This endangers agents and creates supply lines of misinformation that decreases overall HUMINT
reliability and endangers SSFs. See gallagher, “Human Intelligence in Counterinsurgency”; Otterman, “IRAQ.” In such
circumstances, intervening forces set up new, reliable intelligence organizations and identified locations for new
police outposts. See Kitson, Low Intensity Operations, 74; Clark, “The Vital Role of Intelligence in Counterinsurgency
Operations.”
32. Agent recruitment operations are referred to as agent networks ‘human source contact operations’ (SCOs) or
‘source operations.’ See US Army, Human Intelligence Collector Operations; US Army, Tactics in Counterinsurgency.
33. For example, see the poppy farmer anecdote in the Punitive Violence section of this chapter. Also, Crider writes: ‘this
man was already running a network of 10 other individuals in Doura and areas south of Baghdad … this source
provided information to us … even better, the information that he and his sub-sources provided allowed us to
detain 10 targets.’ See Crider, “Inside the Surge,” 13.
34. Block Control: dividing a community or populated area into zones where a trusted resident reports on the activities
of the population. See US Army, Counterinsurgency Operations FM (Interim) 3–07.22, 3–31.
35. Cohen and Dudai, “Human Rights Dilemmas in Using Informers,” 231–3.
36. See Cohen and Dudai, “Human Rights Dilemmas in Using Informers,” 233–4; Hewitt, Snitch!, 70–1, 133; Marx,
“Thoughts on a Neglected Category,” 414.
37. Coercive recruitment is widely considered ineffective for long-term agent management; thus, it is usually a last
resort, once other voluntary recruitment methods are deemed implausible.
INTELLIgENCE AND NATIONAL SECURITy 121
38. See Cohen and Dudai, “Human Rights Dilemmas in Using Informers,” 238; Perry, “Repugnant Philosophy.”
39. See Cohen and Dudai, “Human Rights Dilemmas in Using Informers,” 238. This case is further described in a
subsequent section of this paper: Incumbent Covert Action for Network Operation.
40. Burkett, “An Alternative Framework for Agent Recruitment,” 11; Marx, “Thoughts on a Neglected Category”; Charney
and Irvin, “A guide to the Psychology of Espionage.”
41. Security Awareness Division, “Security Awareness in the 1980s,” 13; Cohen and Dudai, “Human Rights Dilemmas
in Using Informers”; Perry, “Repugnant Philosophy.”
42. Marx, “Thoughts on a Neglected Category,” 414.
43. Cook, “Spotlight Shines on Palestinian Collaborators.”
44. O’Connor, “gay Palestinians are Being Blackmailed.”
45. Cook, “Spotlight Shines on Palestinian Collaborators.”
46. Hewitt, Snitch!, 133–4.
47. See Kirk-Smith and Dingley, “Countering Terrorism in Northern Ireland,” 556, 564–5; Hewitt, Snitch!, 7–18, 33–4;
UK Army, Counterinsurgency Operations, s.A-4–9; Moran, Evaluating Special Branch, 13–14, 20; Burds, “Agentura,”
129–30; Cohen and Dudai, “Human Rights Dilemmas in Using Informers,” 237.
48. Jamieson and McEvoy in Dudai, “Informers and the Transition in Northern Ireland,” 34.
49. See Walsh, “Drone War Spurs Militants”; Callam, “Drone Wars.”
50. Cohen and Dudai, “Human Rights Dilemmas in Using Informers,” 237.
51. Tait, “Family of Palestinian Man.”
52. Ibid.
53. i.e., insurgent informers who are actively involved in the crimes and/or war activities on which they themselves
are providing information.
54. Moran, “Evaluating Special Branch,” 12, 14.
55. See Stevens in Moran, “Evaluating Special Branch,” 13–15, 20; Brown, Into the Dark; Bamford, “The Role and
Effectiveness of Intelligence,” 600–2; Ingram and Harkin, Stakeknife, 82–93; Moran“Evaluating Special Branch,”
14;“Police Ombudsman for Northern Ireland.”
56. See, for example, the case recounted by the CIA officer in Afghanistan, recorded by Mayer in “The Predator War.”
57. As opposed to intelligence packages for non-kinetic targeting, such as for influence operations.
58. Scahill and greenwald, “The NSA’s Secret Role”; Rowley, Dirty Wars.
59. See Callam, “Drone Wars”; Major (Redacted) to the Commander of 1st BCT, 10th MTN, Camp Liberty, Iraq; Finer,
“Informants Decide Fate of Iraqi Detainees”; Mayer, “The Predator War”; Kahl, “How We Fight,” 83, 85; Walsh, “Drone
War Spurs Militants.”
60. Kalyvas, The Logic of Violence in Civil War, 174; gallagher, “Human Intelligence in Counterinsurgency,” 1–2; Bamford,
“The Role and Effectiveness of Intelligence,” 590; Mayer, “The Predator War”; Callam, “Drone Wars.”
61. Marx, “Thoughts on a Neglected Category,” 420.
62. Kalyvas, The Logic of Violence in Civil War, 178.
63. Ibid., 176.
64. Ibid., 173.
65. Finer, “Informants Decide Fate of Iraqi Detainees.”
66. Callam, “Drone Wars.”
67. “How a Boy Named Steve-O Became a Secret Weapon.”
68. Riechmann, “Coalition Informant Plays Both Sides.”
69. Myer, “The Predator War.”
70. Human Rights Watch, “gaza.”
71. Associated Press, “Rights group.”
72. King, “After Israeli Airstrikes.”
73. Kahl, “How we Fight,” 83
74. Finer, “Informants Decide Fate of Iraqi Detainees.”
75. Semple, “US Forces Rely on Local Informants.”
76. Major (Redacted) to the Commander of 1st BCT, 10th MTN, Camp Liberty, Iraq.
77. Mayer, “The Predator War.”
78. Callam, “Drone Wars.”
79. Mayer, “The Predator War.”
80. Ibid.
81. Ibid.
82. Amnesty International, Northern Ireland; Amnesty International, Will I Be Next?
83. Shah, “Drone Blowback in Pakistan.”
84. Kalyvas, The Logic of Violence in Civil War, 192.
85. Rudoren, “Collaboration in gaza Leads to grisly Fate.”
86. King, “After Israeli Airstrikes.”
87. Rodriguez, “Pakistani Death Squads.”
122 B. STIME
88. Ibid.
89. Rivera et al., “Militants Turn to Death Squads.”
90. Ibid.
91. Shadid, “For an Iraqi Family.”
92. Walsh, “Drone War Spurs Militants.”
93. Ibid.
94. youssef, “Fear of Informants has Stoked Climate.”
95. Shadid, “For an Iraqi Family.”
96. Harris, “In gaza, Hamas Targets Palestinian Informants.”
97. Walter, Terror and Resistance, 23.
98. See Akerström, Betrayal and Betrayers.
99. Walsh, “Drone War Spurs Militants.”
100. Shadid, “For an Iraqi Family.”
101. For a theory about community secrecy and identity that is commonly cited in literature on agents and betrayal,
see Simmel, “The Sociology of Secrecy,” 37.
102. Shirwood, “Palestinian Collaborator.”
103. Riechmann, “Coalition Informant Plays Both Sides.”
104. Riechmann, “Coalition Informant Plays Both Sides”; Shadid, “For an Iraqi Family.”
105. Moreau, “Taliban Seeks Vengeance in Wake of WikiLeaks.”
106. Smith, “Insurgents Blame Paid Informants.”
107. Harris, “In gaza, Hamas Targets Palestinian Informants.”
108. Lynfield, “Israel–gaza Crisis.”
109. Hughes and Tripodi, “Anatomy of a Surrogate,” 9.
110. youssef, “Fear of Informants has Stoked Climate.”
111. Smith, “Insurgents Blame Paid Informants.”
112. Ibid.
113. Rivera, “Militants Turn to Death Squads.”
114. Ibid.
115. Frau, “The ‘Living Under Drones’ Report.”
116. Shadid, “For an Iraqi Family.”
Special thanks to Dr. Jon Moran and Professor Mark Phythian of the University of Leicester, Dr. Andrew Thomson of Queen’s
University Belfast, Colonel James F. Powers Jr. (US Army, Retired) of the Joint Special Operations University, Dr. David
Spencer of the US National Defense University’s William J. Perry Center for Hemispheric Defense Studies, and the Oxford
Research group’s Remote Control Project.
Britta Stime is a defense and communications consultant with the Rendon group. This paper reflects her personal analysis
and research, and does not represent the work or opinions of the Rendon group or its clients. She holds a master’s degree
in Violence, Terrorism and Security from Queen’s University Belfast, and a bachelor’s degree in International Relations and
Spanish from gonzaga University.
Akerström, Malin. Betrayal and Betrayers. New Brunswick: Transaction, 1991.
Amnesty International. Northern Ireland: Time to Deal with the past. London, England: Amnesty International, September
12, 2013.
Amnesty International. Will I Be Next? US Drone Strikes in Pakistan. London, England: Amnesty International, October 22, 2013.
Associated Press. “Rights group: Israel Violated Laws of War in gaza.” Associated Press. Accessed February 13, 2013. http://
cnsnews.com/news/article/rights-group-israel-violated-laws-war-gaza
Baker, Ralph. “HUMINT-Centric Operations: Developing Actionable Intelligence in the Urban Counterinsurgency
Environment.” Military Review 87, no. 2 (2007): 12–21.
Bamford, Bradley. “The Role and Effectiveness of Intelligence in Northern Ireland.” Intelligence and National Security 20,
no. 4 (2005): 581–607. http://dx.doi.org/10.1080/02684520500425273.
http://cnsnews.com/news/article/rights-group-israel-violated-laws-war-gaza
http://cnsnews.com/news/article/rights-group-israel-violated-laws-war-gaza
http://dx.doi.org/10.1080/02684520500425273
INTELLIgENCE AND NATIONAL SECURITy 123
Beall, David. “The Humint Heresies: The Disposition of Human Intelligence Collection in Counterinsurgency.” Military
Intelligence Professional Bulletin (2009): 32–37.
Bellaby, Ross. “What’s the Harm? The Ethics of Intelligence Collection.” Intelligence and National Security 27, no. 1 (2012):
93–117. http://dx.doi.org/10.1080/02684527.2012.621600.
Berman, Eli, Jacob Shapiro, and Joseph Felter. “Can Hearts and Minds Be Bought? The Economics of Counterinsurgency in
Iraq.” Journal of Political Economy 119, no. 4 (2007): 766–819.
Brown, Johnston. Into the Dark: 30 Years in the RUC. Dublin: gill & Macmillan, 2005.
Burds, Jeffery. “Agentura: Soviet Informants’ Networks & the Ukrainian Underground in galicia, 1944-48.” East European
Politics & Societies 11, no. 1 (1996): 89–130. http://dx.doi.org/10.1177/0888325497011001003.
Burkett, Randy. “An Alternative Framework for Agent Recruitment: From MICE to RASCLS.” Studies in Intelligence 57, no. 1
(2013): 7–17.
Butler, Michael. “Killing Cells: Retooling Human Intelligence Collection for global Decentralized Terrorism.” Paper presented
at ISA’s 50th Annual Convention “Exploring the Past, Anticipating the Future”, New york City, February 15, 2009.
Callam, Andrew. “Drone Wars: Armed Unmanned Aerial Vehicles.” International Affairs Review 18, no. 3 (2010). http://www.
iar-gwu.org/node/144.
Central Intelligence Agency. “On the Front Lines: CIA in Afghanistan.” Accessed November 21, 2012. https://www.cia.gov/
about-cia/cia-museum/experience-the-collection/text-version/stories/on-the-front-lines-cia-in-afghanistan.html
Charney, David, and John Irvin. “A guide to the Psychology of Espionage.” Association of Former Intelligence Officers, August
28, 2014.
Clark, David. “The Vital Role of Intelligence in Counterinsurgency Operations.” USAWC Strategy Research Project (2008).
http://www.strategicstudiesinstitute.army.mil/pdffiles/ksil309 .
Cohen, H., and R. Dudai. “Human Rights Dilemmas in Using Informers to Combat Terrorism: The Israeli-Palestinian Case.”
Terrorism and Political Violence 17, no. 1–2 (2005): 229–243.
Cook, Jonathan. “Spotlight Shines on Palestinian Collaborators.” Al Jazeera. Accessed February 17, 2014. http://www.
aljazeera.com/indepth/features/2014/02/spotlight-shines-palestinian-collaborators-201421611151157762.html
Costa, Christopher. “Phoenix Rises Again: HUMINT Lessons for Counterinsurgency Operations.” Master’s diss., Naval War
College, 2006.
Crider, Jim. “Inside the Surge.” Center for a New American Security. Accessed June, 2009. http://www.cnas.org/files/documents/
publications/CNAS_Working%20Paper_Surge_CriderRicks_June2009_ONLINE
Dudai, Ron. “Informers and the Transition in Northern Ireland.” British Journal of Criminology 52, no. 1 (2011): 32. http://
dx.doi.org/10.1093/bjc/azr055.
Duyvesteyn, Isabelle, and Jan Angstrom. Rethinking the Nature of War. London: Frank Cass, 2005.
Elite UK Forces. “Elite Intelligence Operatives, Joint Support group.” 2014. http://www.eliteukforces.info/joint-support-
group/.
Finer, Jonathan. “Informants Decide Fate of Iraqi Detainees.” The Washington Post. Accessed September 13, 2005 http://
www.washingtonpost.com/wp-dyn/content/article/2005/09/12/AR2005091202040.html
Frau, Robert. “The ‘Living under Drones’ Report: A Critical Appraisal.” European University Viadrina Frankfurt. Accessed
October 9, 2012. http://chrgj.org/wpcontent/uploads/2012/10/Living-Under-Drones
gallagher, Michael. “Human Intelligence in Counterinsurgency: Persistent Pathologies in the Collector-Consumer
Relationship.” Small Wars Journal (2011): 1–12.
galula, David. “Counter-Insurgency Warfare: Theory and Practice.” The Journal of Politics 26, no. 4 (1964): 1–12.
greer, Steven. Supergrasses. Oxford: Clarendon Press, 1995.
Harris, Emily. “In gaza, Hamas Targets Palestinian Informants in Crackdown.” NPR News (Washington, DC). Accessed June
4, 2013. http://www.npr.org/blogs/parallels/2013/06/12/186975387/in-gaza-hamas-targets-palestinian-informants-in-
crackdown
Hewitt, Steve. Spying 101. Toronto: University of Toronto Press, 2002.
Hewitt, Steven. Snitch! New york: The Continuum International Publishing group, 2010.
Hoffman, Bruce. “The Logic of Suicide Terrorism.” The Atlantic Monthly Group 291, no. 5 (2003): 1–10.
Hughes, geraint, and Christian Tripodi. “Anatomy of a Surrogate: Historical Precedents and Implications for Contemporary
Counter-Insurgency and Counter-Terrorism.” Small Wars & Insurgencies 20, no. 1 (2009): 1–35.
Human Rights Watch. Gaza: Palestinian Rockets Unlawfully Targeted Israeli Civilians. New york: Human Rights Watch. December
24, 2012. https://www.hrw.org/news/2012/12/24/gaza-palestinian-rockets-unlawfully-targeted-israeli-civilians.
Hung, Benjamin. “Optimization-Based Selection of Influential Agents in a Rural Afghan Social Network.” Master’s diss.,
Massachusetts Institute of Technology, 2010.
Ingram, Martin, and greg Harkin. Stakeknife: Britain’s Secret Agents in Ireland. Madison, WI: University of Wisconsin Press, 2004.
Kahl, Colin. 2006. “How We Fight.” Foreign Affairs, Nov/Dec. https://www.foreignaffairs.com/articles/iraq/2006-11-01/how-
we-fight.
Kalyvas, Stathis. The Logic of Violence in Civil War. Cambridge: Cambridge University Press, 2006.
Keirsey, Jim. “Reflections of a Counterinsurgency Company Commander.” Company Command: Building Combat-Ready
Teams (July 2008): 67–74. http://cc.army.mil/pubs/armymagazine/docs/2008/CC_0807-Keirsey2 .
http://dx.doi.org/10.1080/02684527.2012.621600
http://dx.doi.org/10.1177/0888325497011001003
http://www.iar-gwu.org/node/144
http://www.iar-gwu.org/node/144
https://www.cia.gov/about-cia/cia-museum/experience-the-collection/text-version/stories/on-the-front-lines-cia-in-afghanistan.html
https://www.cia.gov/about-cia/cia-museum/experience-the-collection/text-version/stories/on-the-front-lines-cia-in-afghanistan.html
http://www.strategicstudiesinstitute.army.mil/pdffiles/ksil309
http://www.aljazeera.com/indepth/features/2014/02/spotlight-shines-palestinian-collaborators-201421611151157762.html
http://www.aljazeera.com/indepth/features/2014/02/spotlight-shines-palestinian-collaborators-201421611151157762.html
http://www.cnas.org/files/documents/publications/CNAS_Working%20Paper_Surge_CriderRicks_June2009_ONLINE
http://www.cnas.org/files/documents/publications/CNAS_Working%20Paper_Surge_CriderRicks_June2009_ONLINE
http://dx.doi.org/10.1093/bjc/azr055
http://dx.doi.org/10.1093/bjc/azr055
http://www.eliteukforces.info/joint-support-group/
http://www.eliteukforces.info/joint-support-group/
http://www.washingtonpost.com/wp-dyn/content/article/2005/09/12/AR2005091202040.html
http://www.washingtonpost.com/wp-dyn/content/article/2005/09/12/AR2005091202040.html
http://chrgj.org/wpcontent/uploads/2012/10/Living-Under-Drones
http://www.npr.org/blogs/parallels/2013/06/12/186975387/in-gaza-hamas-targets-palestinian-informants-in-crackdown
http://www.npr.org/blogs/parallels/2013/06/12/186975387/in-gaza-hamas-targets-palestinian-informants-in-crackdown
https://www.hrw.org/news/2012/12/24/gaza-palestinian-rockets-unlawfully-targeted-israeli-civilians
https://www.foreignaffairs.com/articles/iraq/2006-11-01/how-we-fight
https://www.foreignaffairs.com/articles/iraq/2006-11-01/how-we-fight
http://cc.army.mil/pubs/armymagazine/docs/2008/CC_0807-Keirsey2
124 B. STIME
Khatchadourian, Raffi. “The Kill Company.” The New Yorker. Accessed July 6, 2009. http://www.newyorker.com/
magazine/2009/07/06/the-kill-company?currentPage=all
King, Laura. “After Israeli Airstrikes, Hamas Kills 18 Suspected Informers.” Los Angeles Times (Los Angeles, CA), August 22, 2014.
Kirk-Smith, Michael, and James Dingley. “Countering Terrorism in Northern Ireland: The Role of Intelligence.” Small Wars &
Insurgencies 20, no. 3–4 (2009): 551–573.
Kitson, Frank. Low Intensity Operations: Subversion, Insurgency and Peacekeeping. London: Faber, 1971.
Lynfield, Ben. “Israel-gaza Crisis: Hamas Says 18 Suspected Collaborators Executed.” The Independent (London, England).
Accessed August 22, 2014. http://www.independent.co.uk/news/world/middle-east/israelgaza-crisis-hamas-says-18-
suspected-collaborators-executed-9686162.html
Macgaffin, John. “Clandestine Human Intelligence.” In Transforming U.S. Intelligence, edited by Jennifer Sims and Burton
gerber, 79–95. Washington, DC: georgetown University Press, 2005.
Major (Redacted). Major (Redacted) to the Commander of 1st BCT, 10th MTN, Camp Liberty, Iraq. US Army 14168-14206.
FOB Justice, Iraq. April 5, 2006.
Marx, gary. “Thoughts on a Neglected Category of Social Movement Participant: The Agent Provocateur and the Informant.”
American Journal of Sociology 80, no. 2 (1974): 402–442.
Mayer, Jane. “The Predator War.” The New Yorker. Accessed October 26, 2009. http://www.newyorker.com/
reporting/2009/10/26/091026fa_fact_mayer
McFate, Montgomery. “Anthropology and Counterinsurgency: The Strange Story of their Curious Relationship.” Military
Review 85, no. 2 (2005): 24–38.
Miska, Steve. “Protecting Soft Networks.” CTX Journal 3, no. 4 (2013): 5–11.
Moloney (ed.). A Secret History of the IRA. New york: W.W. Norton, 2002.
Moran, Jon. “Evaluating Special Branch and the Use of Informant Intelligence in Northern Ireland.” Intelligence and National
Security 25, no. 1 (2010): 1–23.
Moran, Jon. From Northern Ireland to Afghanistan. Burlington, VT: Ashgate, 2013.
Moreau, Ron. “Taliban Seeks Vengeance in Wake of WikiLeaks.”Newsweek (New york). Accessed August 1, 2010. http://www.
newsweek.com/taliban-seeks-vengeance-wake-wikileaks-71659?from=rss
Mumm, Nick. “Crowdsourcing: A New Perspective on Human Intelligence Collection in a Counterinsurgency.” Small Wars
Journal 3, no. 3 (2012): 1–10.
O’Connor, Nigel. “gay Palestinians are Being Blackmailed into Working as Informants.” Vice. Accessed February 19, 2013.
http://www.vice.com/en_uk/read/gay-palestinians-are-being-blackmailed-into-working-as-informants.
Otterman, Sharon. “IRAQ: Infiltration of Iraqi Forces.” Council on Foreign Relations. Accessed February 28, 2005. http://www.
cfr.org/iraq/iraq-infiltration-iraqi-forces/p7828#p5
Perry, David. “Repugnant Philosophy: Ethics, Espionage, and Covert Action.” Journal of Conflict Studies 15, no. 1 (1995):
92–115.
Riechmann, Deb. “Coalition Informant Plays Both Sides of Afghan War.” Associated Press. Accessed June 7, 2011. http://www.
cecildaily.com/news/article_d7944b54-9135-11e0-979b-001cc4c03286.html?mode=jqm
Rivera, Ray, Sharifullah Sahak, and Eric Schmitt. “Militants Turn to Death Squads in Afghanistan.” The New York Times (New
york). Accessed November 28, 2011. http://www.nytimes.com/2011/11/29/world/asia/haqqani-militants-use-death-
squads-in-afghanistan.html?pagewanted=all&_r=0
Rodriguez, Alex. “Pakistani Death Squads go after Informants to U.S. Drone Program.” Los Angeles Times (Los Angeles, CA).
Accessed December 28, 2012. http://articles.latimes.com/2011/dec/28/world/la-fg-pakistan-death-squads-20111228
Directed by Rowley, Richard. Dirty Wars. London, England: Serpent’s Tail. DVD, 2013.
Rudoren, Jodi. “Collaboration in gaza Leads to grisly Fate.” The New York Times (New york). Accessed December 2, 2012.
http://www.nytimes.com/2012/12/03/world/middleeast/preyed-on-by-both-sides-gaza-collaborators-have-grim-plight.
html?pagewanted=all&_r=0
Scahill, Jeremy, and glenn greenwald. “The NSA’s Secret Role in the US Assassination Program.” The Intercept. Accessed
February 9, 2014. https://firstlook.org/theintercept/2014/02/10/the-nsas-secret-role/.
Semple, Kirk. “U.S. Forces Rely on Local Informants in Ferreting Rebels in West Iraq.” The New York Times (New york).
Accessed December 10, 2005. http://www.nytimes.com/2005/12/10/international/middleeast/10protectors.
html?pagewanted=all&_r=2&
Shadid, Anthony. “For an Iraqi Family, ‘No Other Choice’.” The Washington Post. Accessed August 1, 2003. http://www.
washingtonpost.com/wp-dyn/articles/A10829-2003Jul31_3.html
Shah, Aquil. “Drone Blowback in Pakistan is a Myth. Here’s Why.” The Washington Post (Washington, DC). Accessed May
17, 2016. https://www.washingtonpost.com/news/monkey-cage/wp/2016/05/17/drone-blow-back-in-pakistan-is-a-
myth-heres-why/
Shirwood, Harriet. “Palestinian Collaborator: ‘I am a Traitor. I Sold My People. But for What?’” The Guardian (London, England).
Accessed May 17, 2011. http://www.theguardian.com/world/view-from-jerusalem-with-harriet-sherwood/2011/may/17/
israel-palestinian-territories
Simmel, georg. “The Sociology of Secrecy and of Secret Societies.” American Journal of Sociology 11, no. 4 (1906): 441–498.
Smith, graeme. “Insurgents Blame Paid Informants for Increasingly Accurate NATO Strikes.” Globe and Mail (Toronto, Canada).
Accessed February 28, 2007. http://army.ca/forums/index.php?topic=49908.245;wap
http://www.newyorker.com/magazine/2009/07/06/the-kill-company?currentPage=all
http://www.newyorker.com/magazine/2009/07/06/the-kill-company?currentPage=all
http://www.independent.co.uk/news/world/middle-east/israelgaza-crisis-hamas-says-18-suspected-collaborators-executed-9686162.html
http://www.independent.co.uk/news/world/middle-east/israelgaza-crisis-hamas-says-18-suspected-collaborators-executed-9686162.html
http://www.newyorker.com/reporting/2009/10/26/091026fa_fact_mayer
http://www.newyorker.com/reporting/2009/10/26/091026fa_fact_mayer
http://www.newsweek.com/taliban-seeks-vengeance-wake-wikileaks-71659?from=rss
http://www.newsweek.com/taliban-seeks-vengeance-wake-wikileaks-71659?from=rss
http://www.vice.com/en_uk/read/gay-palestinians-are-being-blackmailed-into-working-as-informants
http://www.cfr.org/iraq/iraq-infiltration-iraqi-forces/p7828#p5
http://www.cfr.org/iraq/iraq-infiltration-iraqi-forces/p7828#p5
http://www.cecildaily.com/news/article_d7944b54-9135-11e0-979b-001cc4c03286.html?mode=jqm
http://www.cecildaily.com/news/article_d7944b54-9135-11e0-979b-001cc4c03286.html?mode=jqm
http://www.nytimes.com/2011/11/29/world/asia/haqqani-militants-use-death-squads-in-afghanistan.html?pagewanted=all&_r=0
http://www.nytimes.com/2011/11/29/world/asia/haqqani-militants-use-death-squads-in-afghanistan.html?pagewanted=all&_r=0
http://articles.latimes.com/2011/dec/28/world/la-fg-pakistan-death-squads-20111228
http://www.nytimes.com/2012/12/03/world/middleeast/preyed-on-by-both-sides-gaza-collaborators-have-grim-plight.html?pagewanted=all&_r=0
http://www.nytimes.com/2012/12/03/world/middleeast/preyed-on-by-both-sides-gaza-collaborators-have-grim-plight.html?pagewanted=all&_r=0
https://firstlook.org/theintercept/2014/02/10/the-nsas-secret-role/
http://www.nytimes.com/2005/12/10/international/middleeast/10protectors.html?pagewanted=all&_r=2&
http://www.nytimes.com/2005/12/10/international/middleeast/10protectors.html?pagewanted=all&_r=2&
http://www.washingtonpost.com/wp-dyn/articles/A10829-2003Jul31_3.html
http://www.washingtonpost.com/wp-dyn/articles/A10829-2003Jul31_3.html
https://www.washingtonpost.com/news/monkey-cage/wp/2016/05/17/drone-blow-back-in-pakistan-is-a-myth-heres-why/
https://www.washingtonpost.com/news/monkey-cage/wp/2016/05/17/drone-blow-back-in-pakistan-is-a-myth-heres-why/
http://www.theguardian.com/world/view-from-jerusalem-with-harriet-sherwood/2011/may/17/israel-palestinian-territories
http://www.theguardian.com/world/view-from-jerusalem-with-harriet-sherwood/2011/may/17/israel-palestinian-territories
http://army.ca/forums/index.php?topic=49908.245;wap
INTELLIgENCE AND NATIONAL SECURITy 125
Tait, Robert. “Family of Palestinian Man Found Dead in Israeli Jail Claims He was Tortured.” The Telegraph (London, England).
Accessed February 25, 2013. http://www.telegraph.co.uk/news/worldnews/middleeast/israel/9893494/Family-of-
Palestinian-man-found-dead-in-Israeli-jail-claims-he-was-tortured.html
Tomes, Robert. “Relearning Counterinsurgency Warfare.” Parameters 34, no. 1 (2004): 17–18.
UK Army. Counterinsurgency Operations (Strategic and Operational Guidelines) . Volume 1, Part 10. London, England:
UK Ministry of Defense, 2007.
UK Ministry of Defense. Joint Doctrine Publication (JDP) 2–0: Understanding and Intelligence Support to Joint Operations.
Shrivenham, England: The Development, Concepts and Doctrine Centre, 2011.
United States Department of Defense Security Institute. Security Awareness Division. Security Awareness in the 1980s:
Feature Articles from the Security Awareness Bulletin, 1981 to 1989. Richmond, Virginia: Department of Defense Security
Institute, 1989.
US Army. Intelligence and Electronic Warfare Support to Low-Intensity Conflict Operations. Department of the Army. FM 34-7.
Washington, D.C.: Department of the Army, 1993.
US Army. Counterinsurgency Operations. FMI 3-07.22. Fort Leavenworth, Kansas: Department of the Army, 2004.
US Army. Counterinsurgency Operations FM (Interim) 3-07.22. Washington, DC: US Department of the Army, 2004.
US Army. Human Intelligence Collector Operations. Department of the Army. FM 2-22.3. Washington, D.C.: government
Printing Office, 2006.
US Army. Tactics in Counterinsurgency. Department of the Army. FM 3-24.2. Washington, D.C.: government Printing Office,
2009.
Walsh, Declan. “Drone War Spurs Militants to Deadly Reprisals.” The New York Times (New york), December 29, 2012.
http://www.nytimes.com/2012/12/30/world/asia/drone-war-in-pakistan-spurs-militants-to-deadly-reprisals.
html?pagewanted=all&_r=0.
Walter, Eugene Victor. Terror and Resistance. New york: Oxford University Press, 1969.
Ware, Michael. “Chasing the ghosts.” Time Magazine, September 18, 2005. http://reidreport.com/TIME-chasing_the_ghosts.
htm.
“Police Ombudsman for Northern Ireland.” Policeombudsman.org. Last modified 2014. http://www.policeombudsman.org.
“How a Boy Named Steve-O Became a Secret Weapon.” Age, October 5, 2004.
youssef, Nancy. “Fear of Informants has Stoked Climate of Fear in Baghdad.” McClatchy DC, February 24, 2006. http://www.
mcclatchydc.com/2006/02/24/13446/fear-of-informants-has-stoked.html.
http://www.telegraph.co.uk/news/worldnews/middleeast/israel/9893494/Family-of-Palestinian-man-found-dead-in-Israeli-jail-claims-he-was-tortured.html
http://www.telegraph.co.uk/news/worldnews/middleeast/israel/9893494/Family-of-Palestinian-man-found-dead-in-Israeli-jail-claims-he-was-tortured.html
http://www.nytimes.com/2012/12/30/world/asia/drone-war-in-pakistan-spurs-militants-to-deadly-reprisals.html?pagewanted=all&_r=0
http://www.nytimes.com/2012/12/30/world/asia/drone-war-in-pakistan-spurs-militants-to-deadly-reprisals.html?pagewanted=all&_r=0
http://reidreport.com/TIME-chasing_the_ghosts.htm
http://reidreport.com/TIME-chasing_the_ghosts.htm
http://www.policeombudsman.org
http://www.mcclatchydc.com/2006/02/24/13446/fear-of-informants-has-stoked.html
http://www.mcclatchydc.com/2006/02/24/13446/fear-of-informants-has-stoked.html
- Abstract
Agent networks in COIN
Agent networks
Political-military utility
Noncombatants vs. insurgents vs. agents
Incentives for violence
Intelligence war framework
Violence against noncombatants in the intelligence war framework
Patterns of violence against noncombatants and systemic motivation
Research design and cases
Incumbent coercion in network development
Incumbent covert and clandestine activities in network operation
Agent unauthorized crime in network development
Agent-misdirected targeting in network operation
Insurgent and noncombatant-led preventive violence for network counter-development
Insurgent and noncombatant-led punitive violence for network counter-operation
Conclusion
Notes
Acknowledgements
Notes on contributor
References
19
vol.36:2 summer 2012
The City as a System:
Future Conflict and
Urban Resilience
David J. Kilcullen
introduction
A decade of messy wars is creaking to a close. American troops have left
Iraq, Osama bin Laden is dead, and the conflict in Afghanistan is entering
a new phase. The U.S. Government’s attention is shifting away from these
wars, while many Americans—even some members of Congress—have
already checked out.
President Obama highlighted this shift in his strategic guidance to
the Defense Department in January 2012. “As we end today’s wars,” he
wrote, “we will focus on a broader range of challenges and opportunities,
including the security and prosperity of the Asia-Pacific:1
“In the aftermath of the wars in Iraq and Afghanistan, the United
States will emphasize non-military means and military-to-military
cooperation to address instability and reduce the demand for signifi-
cant U.S. force commitments to stability operations. U.S. forces will
nevertheless be ready to conduct limited counterinsurgency and other
stability operations if required, operating alongside coalition forces
wherever possible. Accordingly, U.S. forces will retain and continue
dr. david Kilcullen is a Non-Resident Senior Fellow at the Center for a New American
Security. He served in the Iraq War as Senior Counterinsurgency Adviser to General David
Petraeus during the 2007 “surge” and in Afghanistan as Counterinsurgency Adviser to the
NATO International Security Assistance Force during 2009-2010. He was also a member
of the White House review of the Afghanistan-Pakistan strategy in 2008, and served as an
advisor to the Bush and Obama administrations. His publications include The Accidental
Guerrilla (2009), Counterinsurgency (2010) and Out of the Mountains.
the fletcher forum of world affairs
vol.36:2 summer 2012
20
to refine the lessons learned, expertise, and specialized capabilities
that have been developed over the past ten years of counterinsurgency
and stability operations in Iraq and Afghanistan. However, U.S. forces
will no longer be sized to conduct large-scale, prolonged stability operations.
[emphasis in original]”2
Leaving aside the inconvenient reality that the Afghan war is far
from over, this guidance reflects a large dose of wishful thinking. It can be
summarized, only slightly unkindly, as saying that since Americans hated
the experience of military occupation in Iraq and Afghanistan—and hope
never to do it again—we don’t plan to engage or prepare for these types
of conflict. Instead, we will structure our forces for the wars we want to
fight—the military will be “smaller and leaner, but will be agile, flexible,
ready, and technologically advanced. It will have cutting edge capabili-
ties, exploiting our technological, joint and networked advantage.”3 This
sounds a little like the U.S. military that romped to an incomplete victory
in the 1991 Gulf War, yet proved ill-suited to irregular conflict in Iraq and
Afghanistan, a mismatch that cost many lives and dollars and demanded
heroic feats of adaptation under fire.
Of course, the policy shift makes fiscal and political sense given today’s
economic problems. But its projection of future needs ignores historical
patterns in U.S. overseas interven-
tions. On average, the United States
has conducted one major peacekeeping,
counterinsurgency, or stabilization
operation every 25 years, and a small
or medium-sized one every five to ten
years over the past century and a half.4
This pattern appears to be inde-
pendent of policymakers’ partisan affil-
iation or personal preferences. Indeed,
presidential desire (or lack thereof) to
undertake stability operations appears
to have no detectable impact on the
frequency of interventions. President Lyndon Johnson considered Vietnam
a distraction from his domestic goals, yet presided over an escalation
that drew almost 600,000 U.S. troops into the war at its peak in 1968.
President Bill Clinton came into office with a domestic focus and a desire
to avoid overseas nation-building entanglements. He delayed commit-
ting troops to the Balkans, and avoided a U.S. military commitment in
Rwanda altogether, scarred by a failed humanitarian operation in Somalia.
On average, the United States
has conducted one major
peacekeeping, counterinsurgency
or stabilization operation
every 25 years, and a small or
medium-sized one every five to
10 years over the past century
and a half.
21
vol.36:2 summer 2012
the city as a system: future conflict and urban resilience
Yet he ultimately sent troops to Bosnia, Kosovo, Macedonia, Haiti, Liberia,
and elsewhere. President George W. Bush, who as a presidential candi-
date opposed stability operations and “nation-building,” nevertheless led
the United States into its largest military intervention since Vietnam, its
largest nation-building effort since World War II, and the largest NATO
stabilization operation ever.
More broadly, we might ask how well President Obama’s stated
policy tracks with what is known about the future conflict environment,
the sorts of wars we might need to fight, and whether we want to or not.
To answer this, we must first examine that environment, and the threats we
might encounter.
the Future environment: urbAn, littorAl, And connected
Just as climate predictions say nothing about tomorrow’s weather,
predictions about the conflict environment say little about specific future
wars. However, they do suggest a range of conditions—a set of systemic
parameters—within which future conflict will arise, even though outliers
will still occur and specifics will be hard to predict. The available evidence
suggests that three main drivers (sometimes called “megatrends”) will
shape the conflict environment over the next few decades. These are:
n urbanization (the accelerating tendency for humans to live in cities),
n littoralization (the propensity for these cities to cluster on coast-
lines), and
n connectedness (the increasing connectivity—especially networked
connectivity—among populations, wherever they live).
None of these trends is new, but their pace is accelerating, they are
mutually reinforcing, and their intersection will influence not just conflict
but every aspect of life on Earth in coming decades.
Population Growth and Urbanization
More people are living in larger cities, and the greatest growth is in the underdevel-
oped areas of Asia and Africa that are least equipped to handle it.
At the start of the Industrial Revolution in 1750, the world’s popula-
tion stood at 700 million. This figure doubled 150 years later, reaching 1.5
billion people in 1900. The population had doubled again by 1960, this
time taking only sixty years to reaching 3 billion, despite the effects of both
World Wars. Population growth continued to accelerate, with the popula-
tion doubling again in thirty-nine years to 6 billion by 1999, and adding
the fletcher forum of world affairs
vol.36:2 summer 2012
22
another billion in just one decade to reach today’s total of 7 billion. The
United Nations currently predicts that there will be 9.1 billion humans on
the planet by 2050.5
As the world’s population has grown, the pace of urbanization has
been accelerating. In 1800 only three percent of people lived in a city of one
million or more; by the year 2000, it was forty-seven percent. In 1950 there
were only eighty-three cities worldwide with populations over one million;
by 2007 there were 468. In April 2008, the world passed the fifty percent
urbanization mark, and in December 2011 the world’s most populous
nation, China, announced it had reached a level of 51.3 percent urbaniza-
tion. Richard Saul Wurman estimates that “the world’s urban population
will double every 38 years … today’s urban population of 3.2 billion will
rise to nearly 5 billion by 2030, when three out of five people will live in
cities. By 2050 two-thirds of the world’s population will live in cities.”
Wurman argues that “the rise of supercities is the defining megatrend of
the 21st century.” Roughly 1.4 million people across the world migrate to
a city every week. 6
This unprecedented urbanization is concentrated in the least devel-
oped areas of Asia, Latin America, and Africa. The United Nations noted
in 2009:
“Between 2009 and 2050, the world population is expected to
increase by 2.3 billion, passing from 6.8 billion to 9.1 billion… At
the same time, the population living in urban areas is projected to
gain 2.9 billion, passing from 3.4 billion in 2009 to 6.3 billion [in]
2050. Thus, the urban areas of the world are expected to absorb all the
population growth expected over the next four decades while at the
same time drawing in some of the rural population. …Furthermore,
most of the population growth expected in urban areas will be concen-
trated in the cities and towns of the less developed regions. Asia, in
particular, is projected to see its urban population increase by 1.7
billion, Africa by 0.8 billion, and Latin America and the Caribbean
by 0.2 billion. Population growth is therefore becoming largely an
urban phenomenon concentrated in the developing world.”7
To put it another way, these data show that coastal cities are about to
be swamped by a human tide that will force them to absorb—in less than
40 years—almost the entire increase in population across the whole planet
in all of recorded human history up to 1960. Furthermore, virtually all of
this urbanization will happen in the world’s least developed areas, by defi-
nition the poorest equipped to handle it: a recipe for conflict, and crises in
health, education, governance, food, energy, and water scarcity.
23
vol.36:2 summer 2012
the city as a system: future conflict and urban resilience
Littoralization
These new cities are concentrated on the world’s coastlines.
This urban growth is not evenly spread. As we consider its geograph-
ical distribution, it is clear that urbanization is clustered in littoral (that is,
coastal) areas, within a few dozen miles of
the sea. Already, in 2012, eighty percent
of humans on the planet live within
sixty miles of a coast, while seventy-five
percent of large cities are on a coastline.8
In the Mediterranean basin alone,
between 1970 and 2000, the urban
coastal population grew by 40 million
people, with three quarters of that
growth occurring in North Africa and the
Middle East.9 This led to the “progres-
sive creation of megacities on a European
scale (Barcelona, Marseilles, Rome,
Athens, Genoa, Naples, Alexandria) or a
world scale (Cairo [with] 15-16 million
inhabitants, Istanbul [with] 13-14 million inhabitants). This should not
obscure the fact that the Mediterranean coast also harbors eighty-five cities
with a population of between 300,000 and 1 million inhabitants.”10 Olivier
Kramsch, the distinguished human geographer, has described this process
of urbanization and littoralization in the Mediterranean as one that has been
mirrored in many parts of the developing world:
“It is instructive to view the region itself as a highly urbanized area,
one currently [in 2006] flanked by thirty cities each containing over 1
million inhabitants. A prominent feature of this pattern of urbaniza-
tion, particularly accentuated in the recent period, is the heightened
concentration of cities and population along the strips of land directly
abutting the sea, as opposed to the hinterlands of nation-states (the
former commonly referred to as “littoralization”). Measured as a
percentage of national population, the countries of the Maghreb
in general demonstrate high rates of urban littoralization, striking
examples being Libya (eighty-five percent), Tunisia (seventy percent),
Morocco (fifty-one percent) and Turkey (fifty-two percent).”11
It is worth noting that the two most urbanized and littoralized of
Kramsch’s examples (Tunisia and Libya) were the most affected by popular
revolutions during the Arab Spring of 2010-2011, while the uprisings in
Egypt during the same period occurred almost entirely in the urban littoral
As we consider its geographical
distribution, it is clear that
urbanization is clustered in
littoral (that is, coastal) areas,
within a few dozen miles of
the sea. Already, in 2012, 80
percent of humans on the planet
live within 60 miles of a coast,
while 75 percent of large cities
are on a coastline.
the fletcher forum of world affairs
vol.36:2 summer 2012
24
triangle formed by the cities of Cairo, Alexandria and Port Said, all of which
lie within one hundred miles of the sea.
The use of cell phones, flash mobs, web-based social media, SMS
organizing tools, the leveraging of diasporas, and the international media
during the Arab Spring highlights the third driver of the future conflict
environment: the new coastal cities are highly connected and networked.
Connectedness
Coastal cities are networked internally, connected to the rural hinterland, and
linked with ethnic diaspora populations and global networks.
If you fly in a helicopter above any large coastal city in the developing
world—Mogadishu, Lagos, Karachi, Basra, or Tripoli; or above a slum
(like the enormous La Rocinha favela outside Rio de Janeiro, or the Tivoli
Gardens district in Kingston, Jamaica)—the most obvious rooftop feature
is the forest of satellite dishes, TV antennas and radio masts. This is just
the most prominent visual indicator of the connectedness of urban areas.
Indeed, in peri-urban areas (the slums and townships around the
margins of growing cities, which account for a high proportion of new
immigrants from the countryside) people can connect with national and
international information flows to an unprecedented degree, irrespective of
how effective their governments are in providing such services. For example,
a 2011 study found that Somalia, a country that has been experiencing near-
anarchy and state collapse for twenty years, has rates of cell phone usage
approximately equal to its neighbors, including well-administered Ethiopia:
“Market forces, particularly the thriving telecommunications
industry, are certainly the most influential factor—and the same is
true of the lively, privately owned radio sector… despite the ongoing
violence, there has been a remarkable proliferation of telecom compa-
nies, offering inexpensive and high-quality services in the areas
where they operate, including internet access, international calls, and
mobile connectivity. Some of them are closely connected with the
remittance industry, represented by companies such as Dahabshiil,
the owner of Somtel.”12
Connectivity between populations in cities like Mogadishu, Somalia’s
largest urban area, and the Somali diaspora (numbering 812,700 people world-
wide and representing almost 9.3 percent of the total Somali population)13
allows urban Somalis to tap into global and regional networks that pass money
and information, engage in trade, and pursue legitimate business. The same
networks enable illicit activity like the smuggling of people, weapons and
25
vol.36:2 summer 2012
the city as a system: future conflict and urban resilience
drugs, piracy, terrorism, and charcoal exporting (an environmentally devas-
tating activity banned by the United Nations in February 2012 due to its
connection with the Shabaab terrorist organization).14 Indeed, in a failed state
like Somalia, concepts like “illicit networks” are rather hollow—networks
themselves are neither licit nor illicit.
Rather, people self-organize in networks
and engage in a complex hybrid of illicit
and licit behavior that rides the connect-
edness of coastal urban areas.
But greater connectedness is just
the tip of the iceberg: the new urban
populations may appear marginalized
(they literally live on the city’s margins,
and may be sidelined in economic terms),
but cell phones, the internet, radio, tele-
vision and financial networks such as
banking and remittance systems connect
them with people in their home villages,
and with relatives and friends overseas.
And because large transportation nodes (airports, inter-modal logistics hubs,
container terminals, free trade zones, and sea ports) are often located in peri-
urban areas from which they draw their workforce, peri-urban populations
are closely connected with international trade, and with transportation and
migration both internally and externally.
This means that the apparently marginalized populations of the new
urban sprawl are not marginal at all, but rather central to key aspects of the
global system as we know it. At the level of the city itself, workers from
peri-urban areas often perform the menial, manual, or distasteful work that
keeps their city functioning, and they sit astride key communication nodes
that connect that city to the external world as well as to its food, energy, and
water supplies. Wealthy neighborhoods, often in city cores, rely on services
(public transport, cleaners, shopkeepers, food servers, maintenance staff,
police, firefighters, medical personnel, and ambulance drivers) from workers
who cannot afford to live where they work, and thus commute from peri-
urban areas. The same peri-urban areas represent social, connective tissue
between a country’s urban centers and its rural periphery, and connect that
rural periphery to international networks (much as, say, the port facilities in
the coastal city of Karachi connect Pakistan’s hinterland with the enormous
Pakistani diaspora). Similarly, at the global level, these areas play a connec-
tive role in patterns of transportation, migration, finance, and trade.
Indeed, in a failed state like
Somalia, concepts like “illicit
networks” are rather hollow—
networks themselves are neither
licit nor illicit. Rather, people
self-organize in networks and
engage in a complex hybrid
of illicit and licit behavior
that rides the connectedness of
coastal urban areas.
the fletcher forum of world affairs
vol.36:2 summer 2012
26
the city As A system
Rapid urbanization creates economic, social and governance chal-
lenges while simultaneously straining city infrastructure, making the
most vulnerable cities less able to meet
these challenges. The implications for
future conflict are profound, with more
people fighting over scarcer resources
in crowded, under-serviced, and under-
governed urban areas.
Consider, for example, the inter-
action between climate change and
coastal urbanization. Rural environ-
mental degradation prompts migration
to coastal cities, putting more people in
low-lying regions, where the slightest
rise in sea level can cause major disrup-
tion. Indeed, the Asian Development
Bank estimated in 2011 that drought,
desertification, and soil salinity, exacer-
bated by climate change, will prompt
millions of rural people across the Asia-Pacific region to migrate to cities
over the coming decades:
“Geography, compounded by high levels of poverty and population
density has rendered Asia and the Pacific especially vulnerable to the
impacts of climate change. The region is home to more than 4 billion
people and some of the fastest growing cities in the world. By 2020,
13 of the world’s 25 megacities, most of them situated in coastal
areas, will be in Asia and the Pacific. Climate change will likely exac-
erbate existing pressures on key resources associated with growth,
urbanization and industrialization.”15
The food security effects are equally severe, as pollution from coastal
urbanization imperils fish stocks, and peri-urban areas surround city cores
whose infrastructure is scaled for populations far smaller than they now
support. This newly settled peri-urban land was once used for farms, market
gardens and orchards, but as cities expand into this space, the distance
between the city core and its food sources increases significantly. Food must
now be produced further away and transported over ever-greater distances,
increasing transportation and refrigeration costs, raising fuel usage and
carbon emissions, exacerbating traffic problems, and creating “food deserts”
Rapid urbanization
creates economic, social and
governance challenges while
simultaneously straining city
infrastructure, making the
most vulnerable cities less able
to meet these challenges. The
implications for future conflict
are profound, with more people
fighting over scarcer resources
in crowded, under-serviced and
under-governed urban areas.
27
vol.36:2 summer 2012
the city as a system: future conflict and urban resilience
in urban areas. Likewise, many cities are running out of water, a problem
that will only increase as populations swell, and as urbanization covers rain-
fall catchment areas, pushing cities further from their water sources.
The growing size and complexity of cities also strains the infrastruc-
ture of governance and security; police, district administrators, courts,
hospitals, schools, and maintenance services. In particular, government pres-
ence can be extremely limited in peri-urban areas, allowing the emergence
of safe havens for criminal networks or non-state armed groups, or creating
a vacuum filled by local youth, who do not lack for grievances arising from
their new urban circumstances or from their home villages. Even in devel-
oped cities like Paris and London, rioting, youth unrest, and crime in peri-
urban districts reached significant levels on several occasions over the past
decade. In underdeveloped regions, the problem is even worse.16
It is useful to think of urban migration from the rural hinterland—
driven by rural environmental degradation, energy poverty or conflict—as
the supply side of a population-flow system whose demand side includes
the problems of urban overstretch, crime, scarcity, and conflict. The city is
a system which, in turn, nests within a larger national and global system,
with coastal cities functioning as an exchange mechanism that connects
rural hinterlands with urban populations, and with international networks.
We can represent this graphically, along with the key trends we have been
discussing, as follows:
the city As A system
the fletcher forum of world affairs
vol.36:2 summer 2012
28
In this model, the coastal city is the center of a larger system, with rural
factors in the city’s hinterland—including environmental degradation, poor
rural infrastructure, and rural conflict—prompting rapid urbanization.
This creates ad hoc peri-urban settlements where slums and shantytowns
displace land formerly used to provide food and other services to the city,
and cover the rainfall catchment area for the city’s water supply. The city’s
growth puts its infrastructure under stress so that both the old urban core
and the new peri-urban areas experience weak governance and increased
levels of crime, urban poverty, unemployment and conflict. Shortages of
food, fuel, electricity and water exacerbate these problems. In turn, the
city’s connectedness allows its population to tap into licit and illicit activi-
ties offshore, and to connect with global networks, including diaspora
populations, an interaction that affects
both local and international conflict
dynamics.
The data suggest that this is the
environment in which future conflict
will occur. This is not a futuristic
prediction, but rather a projection of
trends that are evident now, and an
assessment of their effects on cities as
they exist today. There will certainly be
outliers—wars in desert and mountain
terrain, and state-on-state “conven-
tional” war—but this analysis outlines
the system parameters within which future conflict is likely to occur
and suggests that the majority of such conflict seems likely to be urban,
networked, and littoral.
the Future threAt: irreGulAr, hybrid, And nested
Within this environment of connected, developing-world coastal
cities under stress, likely threats to the wellbeing of cities and communi-
ties across the planet can be summed up in three similarly broad concepts:
irregular actors and methods, hybrid threats, and nested networks.
Irregular actors and methods
The primary threat will be from irregular actors (non-state armed groups) and ir-
regular methods (those that avoid directly confronting our military strength).
The data suggest that this
is the environment in which
future conflict will occur. This
is not a futuristic prediction,
but rather a projection of trends
that are evident now, and an
assessment of their effects on
cities as they exist today.
29
vol.36:2 summer 2012
the city as a system: future conflict and urban resilience
Military planners use the term “irregular warfare” to describe conflict
against non-state armed groups: combatants who do not belong to the regular
armed forces of nation-states. More broadly, the term describes methods
(terrorism, guerrilla warfare, cyber war) that the international commu-
nity considers irregular. These methods typically call for avoiding direct
confrontation with the military power of governments. Instead, they pit the
irregular’s competitive advantages of stealth, small size, tactical initiative
and local knowledge against conventional militaries, which though large
and powerful, tend to lose their agility and situational awareness in the
complex environment of overcrowded, under-governed, urban coastal areas.
Non-state armed groups include insurgents, terrorists, pirates, smugglers,
gangs, bandits, and organized crime networks, but may also include the
state sponsors of such groups, or government organizations (usually special
forces and intelligence services) who adopt similar methods themselves.
Irregular threats are the most likely (though not necessarily the most
dangerous) in the future conflict environment. Irregular warfare, including
civil war, is the commonest and most
widespread form of conflict, accounting
for roughly eighty-three percent of wars
since 1815, and there is no reason to
suspect that this pattern will change in
the future.17 Non-state armed groups
will continue to choose asymmetric
methods to confront more militarily
powerful nation-states. The renewed
U.S. focus on conventional warfare
will only reinforce this tendency,
since America’s unprecedented mili-
tary supremacy means that no rational
enemy would choose to fight the United States using conventional means.
Moreover, networked and overpopulated coastal cities will experience
conflict among civil populations (ethnic groups, socio-economic classes, and
immigrant communities) and between those populations and state represen-
tatives (police, the military, emergency services, and local administrators).
Proxy groups, sponsored by foreign states or their representatives, will also
adopt irregular methods as formal interstate warfare continues to decline
and states use asymmetric methods to further their interests.
One recent example of this new pattern of conflict is the November
26, 2008, Mumbai attack in which members of a non-state armed group (the
Pakistani terrorist organization Lashkar-e-Taiba) carried out an appallingly
Irregular warfare, including
civil war, is the commonest
and most widespread form of
conflict, accounting for roughly
83 percent of wars since 1815,
and there is no reason to suspect
that this pattern will change
in the future.
the fletcher forum of world affairs
vol.36:2 summer 2012
30
effective seaborne raid on India’s largest city, killing 164 people and wounding
308 over a three-day period, in several widely dispersed locations. The raiders
exploited seaborne economic networks and legitimate traffic patterns by
inserting themselves into a coastal fishing fleet to cover their approach to
the target. They landed from the sea in the urban core of Mumbai city, but
allegedly received assistance from a reception party operating in the city’s
peri-urban areas. They drew on support from (allegedly “retired”) members
of the Pakistani Inter-Services Intelligence (ISI), who trained them prior to
the attack and continued to act as mentors, supporters, and coaches during
the raid. Handlers in Pakistan walked individual terrorists through specific
actions step by step over satellite phones, monitored Indian news channels
and the Internet, and used Google Earth for targeting. The terrorists and
their sponsors monitored the progress of the attack in real-time via Twitter.18
On the Indian side, overstretched police and counterterrorism units took a
long time to react to the size and complexity of a seaborne terrorist attack
targeting several locations simultaneously in a cluttered downtown coastal
area. They were also hampered by the need to seek bureaucratic approval from
distant officials in the capital city, New Delhi.
In Mumbai, then, a hybrid organization involving both state and
non-state actors, attacked national and international targets, and lever-
aged both local and remote networks for support. Combined with the diffi-
culties of an overstretched public safety and policing infrastructure in a
heavily populated, highly complex, networked urban littoral environment,
Mumbai may represent one future face of conflict.
Even under conditions of interstate war between major powers—
wars that might in theory be called “conventional”—the fact that such a
high proportion of the world population lives in coastal cities will tend to
push future conflict in an “irregular” direction, toward small unit hit-and-
run attacks, ambushing, sniping, bombings, and other tactics tradition-
ally used by non-state actors. This would very obviously be the case in the
event of war with Iran, given Iran’s use of proxies and irregular forces across
its region and beyond. Even the most stereotypically “conventional” cases,
such as a war on the Korean Peninsula or a hypothetical conflict between
the United States and China, would not remain conventional for long.
North Korea would almost inevitably be defeated in a conventional fight,
and could be expected to resort to guerrilla and irregular methods (as well
as weapons of mass destruction) almost immediately. Even in the event of a
rapid North Korean collapse, the requirement for stabilization and human-
itarian operations would be immense and protracted. And in the even more
unlikely case of war with China, a conflict that neither the United States nor
31
vol.36:2 summer 2012
the city as a system: future conflict and urban resilience
China appears to want, the war would also almost certainly take an irreg-
ular turn. China is now more than fifty-one percent urbanized, its largest
urban centers are clustered along its coastline, and Chinese officers literally
wrote the book on irregular tactics, defining the future of the country’s
national security strategy (the classic
1998 treatise Unrestricted Warfare by
Qiao Liang and Wang Xiangsui of the
Chinese People’s Liberation Army).19
In the future, non-state armed
groups—because of greater connect-
edness—will also draw on civilian
populations whose access to advanced
technologies greatly enhances their
military potential. These technologies
may include both weapons systems and
dual-use technologies (such as infrared
or radio remote control devices repurposed as triggers for roadside bombs,
or industrial chemicals repurposed as chemical weapons; both used in Iraq).
In addition, urban and peri-urban populations can access factories and
workshops where they can fabricate weapons and other technologies (as in
Libya in early 2011, when technically skilled but militarily inexperienced
rebels used workshops in coastal urban areas around Benghazi to build and
modify weapons and vehicles).
Hybrid Threats
Different threat categories—state and non-state, military and criminal, conven-
tional and asymmetric, local and global—will increasingly merge.
As mentioned in the previous section, because major powers are likely
to maintain their superiority in conventional conflict, all future adversaries
(whether states or non-state armed groups) will continue to have strong
survival-based incentives to adopt irregular and asymmetric methods.
But the future threat is not likely to be divisible into neat categories
(irregular versus regular, state versus non-state, domestic versus internal
,or military versus law enforcement). Like the Mumbai example, it will
be hybrid, including irregular actors and methods, but also state actors
who use irregulars as proxies, or adopt asymmetric methods to minimize
detection and avoid retaliation from other states. This is nothing new;
Pakistan’s use of the Afghan Taliban and groups like Lashkar-e Taiba,
Iran’s use of Hezbollah and the Quds Force, and the sponsorship of dozens
In the future, non-state armed
groups—because of greater
connectedness—will also draw
on civilian populations whose
access to advanced technologies
greatly enhances their military
potential.
the fletcher forum of world affairs
vol.36:2 summer 2012
32
of insurgencies and terrorist groups by regimes like Muammar Gadhafi’s
Libya, Saddam Hussein’s Iraq, and indeed the Soviet Union, go back over
many decades.
But besides the state/non-state overlap, the future hybrid threat will also
bring intersections between criminal and military actors and between domestic
and international threats. For example, there is evidence of strong connectivity
among piracy syndicates, organized crime networks in Europe, and Somalia’s
al-Shabaab insurgency.20 Clans and criminal networks, in Mogadishu and in
rapidly urbanizing Somali coastal areas
like Kismaayo and Haraadhere, draw
little distinction between their military
and political activities on the one hand,
and their business interests (both legiti-
mate and criminal) on the other. Conflict
entrepreneurs—like crime networks that
set up refugee camps around Mogadishu
to divert humanitarian assistance into
the black market or to Shabaab—operate
along a continuum ranging from legiti-
mate business, through illicit activity,
outright crime, terrorism, and insur-
gency.
Governments like the United
States that draw sharp legislative
distinctions between warfare and law
enforcement, and between domestic
and overseas authorities, cannot operate
with the same agility. Capabilities that combine policing, administration,
and emergency services with sufficient military capability to deal with
well-armed non-state adversaries—capabilities traditionally associated with
constabulary, Gendarmerie, Carabinieri, or coast guards—are likely to be more
effective against these hybrid threats than conventional armies or navies.
Nested Networks
Future threats will be nested in the complex urban littoral environment, illicit ac-
tivities will nest within licit networks, and local threat networks will be nested in
networks at the regional and global levels.
Under these circumstances, threat actors will be able to nest within
a complex environment, avoiding detection by remaining beneath the
Capabilities that combine
policing, administration
and emergency services with
sufficient military capability
to deal with well-armed
non-state adversaries—
capabilities traditionally
associated with constabulary,
Gendarmerie, Carabinieri
or coast guards—are likely
to be more effective against
these hybrid threats than
conventional armies or navies.
33
vol.36:2 summer 2012
the city as a system: future conflict and urban resilience
“clutter” of dense urban development and overpopulation. Because of the
connectedness among threat networks, peri-urban communities and the
broader systems on which the city runs, it will be virtually impossible to
target a threat network without also harming the community within which
it nests, and this will deter some governments while making it harder for
those who do act to eliminate these threats.
One recent example of this type of network was found in 2010 in
Kingston, Jamaica, where a transnational gang, the Shower Posse, headed
by Christopher “Dudus” Coke, operated from a stronghold in the overpopu-
lated and under-governed coastal urban slum of Tivoli Gardens. The gang is
responsible for offshore drug and weapons trafficking as far afield as Toronto,
New York, and New Jersey, and Mr. Coke was wanted for extradition by the
United States on narcotics conspiracy charges. However, his gang was so
deeply nested within its environment—providing community services and
benefits to the local population in Tivoli Gardens, and allegedly with allies
among the authorities in some parts of the Jamaican establishment—that
penetrating the district became a major military undertaking. In response,
the Jamaican Defence Force (JDF) conducted a detailed study of counter-
insurgency methods in Afghanistan,21 received training from Canadian and
U.S. specialists, and acquired advanced technologies such as surveillance
drones and communications intercepts.22 Beginning in May 2010, the JDF
mounted a major military effort, provoking significant community back-
lash and unrest, with the resulting state of emergency leading to over 500
arrests and 73 lives lost. The JDF engaged in over several weeks of intensive
stabilization and control operations before finally capturing and extraditing
Mr. Coke in June 2010.23 The connectedness of Tivoli Gardens with the
rest of Kingston, as well as with national and international financial, polit-
ical, business, and criminal networks, meant that the effort to extradite
a single crime boss from an urbanized, networked, littoral environment
quickly evolved into something more like counterinsurgency and stabiliza-
tion operations than law enforcement.
As well as nesting in the urban environment, networks can nest
within legitimate international and national systems, including interna-
tional transportation networks, financial networks such as the remittances
industry, and even humanitarian assistance programs. For example, as the
investigative journalist Matt Potter has uncovered from a range of official
and academic sources, as well as local and eyewitness accounts, some of the
very same air charter companies that operate humanitarian assistance flights
into drought-stricken or conflict-affected areas such as the Horn of Africa are
also involved in smuggling weapons, drugs, and other contraband for illicit
the fletcher forum of world affairs
vol.36:2 summer 2012
34
networks. Humanitarian aid workers and NGOs are well aware of this, but
both they and the governments involved in relief efforts are unable to shut
down these trafficking networks, since these are the very same networks on
which they rely in order to move their humanitarian cargo.24
imPlicAtions
This analysis of the future conflict environment suggests that the recent
U.S. shift away from protracted stabilization and counterinsurgency opera-
tions toward conventional conflict, conflict prevention and military-to-mili-
tary assistance, is somewhat unrealistic. American policymakers, not for the
first time, have expressed a strong pref-
erence for avoiding messy conflicts like
those of the past decade. Nonetheless,
as we have seen, policymakers’ prefer-
ences seem to have little effect on the
frequency of overseas interventions, a
historical pattern which suggests that
the United States is likely to undertake
one major stabilization or counterinsur-
gency operation (on the scale of Iraq,
Afghanistan, or Vietnam) every genera-
tion, and smaller operations (on the scale
of Bosnia or Kosovo) every five to ten
years, for the foreseeable future.
While this pattern is likely to
endure, the environment in which
such interventions occur is shifting.
The three megatrends of urbaniza-
tion, littoralization, and connectedness
suggest that conflict is increasingly
likely to occur in coastal cities, in
underdeveloped regions of the Middle
East, Africa, Latin America, and Asia,
and in highly networked, connected
settings. Adversaries are likely to be
non-state armed groups (whether crim-
inal or military) adopting asymmetric
methods. Even the most conventional hypothetical war scenarios will turn
out, when closely examined, to involve very significant “irregular” aspects.
American policymakers, not for
the first time, have expressed a
strong preference for avoiding
messy conflicts like those of the
past decade. Nonetheless, as
we have seen, policymakers’
preferences seem to have
little effect on the frequency
of overseas interventions,
a historical pattern which
suggests that the United
States is likely to undertake
one major stabilization or
counterinsurgency operation (on
the scale of Iraq, Afghanistan,
or Vietnam) every generation,
and smaller operations (on
the scale of Bosnia or Kosovo)
every five to ten years, for the
foreseeable future.
35
vol.36:2 summer 2012
the city as a system: future conflict and urban resilience
Whether irregular or state-based, adversaries in the future conflict
environment will exhibit hybrid characteristics (combining state and non-
state, domestic and international, military and criminal, and licit and illicit
elements) and will be able to nest within the complexity of urban environ-
ments, as well as within legitimate national and international systems.
The implications for the U.S. military are reasonably obvious,
although difficult to act upon in the current fiscal environment. Capabilities
such as Marine amphibious units and naval supply ships, as well as facili-
ties for expeditionary logistics in urbanized coastal environments, are fairly
obvious requirements, as are rotary-wing or tilt-rotor aircraft, precise and
discriminating weapons systems, and the ability to rapidly aggregate or
disaggregate forces to operate in a distributed, small-unit mode, while
still being able to concentrate their mass quickly against a major target.
Combat and construction engineers, civil affairs units, intelligence systems
capable of making sense of the clutter of urban areas, and constabulary
(gendarmerie) and coast guard capabilities are also likely to be important.
The ability to operate for a long period of time in a city without drawing
heavily on that city’s water, fuel, electricity, or food supply will also be
important.
Many of the implications for civilian agencies of government are also
obvious; the ability to expand social services, city administration, and rule
of law into peri-urban areas are clearly important, as are investments in
infrastructure to guarantee supplies of fuel, electricity, food, and water.
Less obvious, but equally important, are investments in governance and
infrastructure in rural areas, as well as efforts to mitigate the effects of
rural environmental degradation that cause unchecked and rapid urban
migration. Given the prevalence and increasing capability level of threat
networks, policing capabilities will need to embody a creative combina-
tion of community policing, constabulary work, criminal investigation and
special branch (or police intelligence) work, potentially in close collabo-
ration with the military. Local city managers, district-level officials and
ministry representatives may need capabilities that allow them to operate
in higher-threat, and opposed-governance environments.
The implications for business, civil society, and the general public go
well beyond either of these rather narrowly scoped considerations. In the
first place, the environmental shifts outlined above represent far more than
a future theory of conflict—indeed, they are a “theory of everything” in the
sense that the three key megatrends identified here (urbanization, littor-
alization, and connectedness) will affect every aspect of life on the planet
in the next few decades. Caerus Associates’ systems design approach for
the fletcher forum of world affairs
vol.36:2 summer 2012
36
developing urban resiliency and mapping conflict25 and the IBM Smarter
Cities project26 are two examples of businesses and civil society organiza-
tions taking a holistic approach to the city as a system, and thereby seeking
to anticipate and address the full range of future issues that cities will
confront.
More broadly, the city-as-a-system approach described earlier can
be applied as a methodology to identify how complex problems that may
appear unrelated—rural soil salinity, urban crime, piracy, and diaspora-
sponsored terrorism, for example—interact with each other in the context
of a given city or threat network. Taking this approach may allow planners
to identify emergent patterns within the complex system of a relevant city,
make sense of the system logic, and begin to design tailored interventions.
These would begin in a consciously experimental way, seeking to iden-
tify and reveal the complex interactions between different parts of systems,
and among systems nested in larger systems, but would rapidly increase in
effectiveness as each experimental intervention would generate new data
that would enhance the effectiveness of the next.
city-As-system intervention Points
As the diagram above shows, we might further break such interven-
tions down into supply-side interventions, (which ameliorate drivers of
rapid urbanization and thus relieve some of the pressure on the city and
its infrastructure), demand-side interventions (which improve the city’s
37
vol.36:2 summer 2012
resiliency and thus its ability to cope with the pressures on its systems),
and framing-system interventions (which seek to alter the context within
which the city develops, by changing its interaction with larger national
and transnational systems).
conclusions
In conclusion, given the difficult last decade of wars, stabilization,
and expensive nation-building efforts, it is perfectly natural that U.S. polit-
ical leaders and the public are turning away from these types of activities,
as shown by the recent policy shift toward conventional warfare capabili-
ties, and away from those needed for large-scale, long-term stabilization
and counterinsurgency. While there is an obvious and sensible political
and financial basis for the administra-
tion’s current approach, it neverthe-
less fails to account for the historical
pattern of frequent U.S. overseas inter-
ventions going back to the middle
of the nineteenth century or earlier.
Given the overwhelming conventional
military superiority of countries like
the United States, it seems likely that
any rational potential adversary (state
or non-state) will continue to pursue
irregular and asymmetric methods, so
that the demand for these types of operations is unlikely to diminish any
time soon. In any case, as we have seen, policymakers may or may not have
any particular desire to get involved in this messy form of intervention, but
this seems to have no impact on the frequency with which the military is
called upon to do it.
More broadly, the future conflict environment is likely to be charac-
terized by rapid population growth, increasing urbanization, accelerating
littoralization, and greater connectedness. Thinking of the city as a system
seems to make the most sense as a way to understand this environment,
and the irregular, hybrid, and nested threats that we are likely to encounter
within it. The implications for the military and for civilian government
are fairly obvious, but in broader terms a city-as-system approach may also
allow urban planners, city managers, businesses, and communities them-
selves to understand their environment and develop tailored interventions
to deal with it.
the city as a system: future conflict and urban resilience
… policymakers may or may
not have any particular desire
to get involved in this messy
form of intervention, but this
seems to have no impact on
the frequency with which the
military is called upon to do it.
the fletcher forum of world affairs
vol.36:2 summer 2012
38
We are still likely to experience wars between nation-states, and
conflict in remote areas such as mountains, jungles, and deserts will still
undoubtedly occur. But the trends are clear: more people than ever before
in history will be competing for ever-scarcer resources in poorly-governed
areas that lack adequate infrastructure. These areas will be more and more
closely connected to the global system, so that conflict will have imme-
diate and wider implications. The future is hybrid and irregular conflict
combining elements of crime, urban unrest, insurgency, terrorism, and
state-sponsored asymmetric warfare—more Mumbai, Mogadishu, and
Tivoli Gardens—and we had better start preparing for it. n
endnotes
1 United States Government, Sustaining U.S. Global Leadership: Priorities for 21st Century
Defense, Defense Strategic Guidance, January 2012, 3,
2 Ibid., 12 (emphasis in the original).
3 Ibid., 5.
4 Punctuated only by major conventional wars, large-scale interventions involving irregular
warfare, stability operations or counterinsurgency have occurred approximately once every
25 years in U.S. history since the Mexican War of 1846-48. They included the Indian Wars
against Native American peoples throughout the second half of the 19th Century, the
Philippine Insurrection of 1899-1902, the Banana Wars in the Caribbean in the 1920s and
1930s, the Vietnam War, and the wars in Iraq and Afghanistan. Even major “conventional”
wars during this period, including the Civil War, the First and Second World Wars, and
the Korean War involved significant elements of stability operations and nation building.
In terms of minor stability interventions, the Defense Science Board Summer Study of
2004 highlighted a long-standing five-to-seven-year cycle of intervention in stabilization
and reconstruction operations, imposing an increasing burden on the U.S. military. See
Defense Science Board, 2004 Summer Study on Transition To and From Hostilities,
5 This estimate represents the median prediction of the United Nations population
progression model, as reported in United Nations, Department of Economic and Social
Affairs, World Population Prospects: the 2010 Revision, online at
6 Casey Kazan, “Sprawl! Is Earth Becoming a Planet of Supercities?” The Daily Galaxy, June
24, 2009,
7 United Nations, Department of Economic and Social Affairs, World Urbanization Prospects:
the 2009 Revision, p. 1,
8 See United Nations Environment Program, Cities and Coastal Areas,
9 Olivier Kramsch, “Towards a Mediterranean Scale of Governance: Twenty-First Century
Urban Networks across the ‘Inner Sea,’” in Barbara Hooper and Olivier Kramsch, eds.,
Cross-Border Governance in the European Union (London: Routledge 2007), 200.
39
vol.36:2 summer 2012
10 French Republic, Parliamentary Office for Scientific and Technical Assessment, The pollu-
tion in Mediterranean: current state and looking ahead to 2030, Summary of the report by
M. Roland Courteau, Senator of Aude, online at
22, 2012).
11 Kramsch, loc. cit.
12 Iginio Gagliardone and Nicole Stremlau, Digital Media, Conflict and Diasporas in the Horn
of Africa, Mapping Digital Media Program of the Open Society Foundations, December
2011, 9-10.
13 World Bank, Migration and Remittances Factbook 2011, quoted in Gagliardone and Stremlau,
op. cit. 12.
14 See “UN Bans Trade in Charcoal from Somalia” in The East African, February 25, 2012,
15 See Asian Development Bank, Climate-Induced Migration in Asia and the Pacific,
September 2011,
16 Widespread rioting and civil unrest in outlying and peri-urban areas struck Paris (and
several other French cities) in 2005 and again in 2007 and 2010, while large-scale rioting
and looting occurred in parts of London in 2011.
17 See David J. Kilcullen, Counterinsurgency, (New York: Oxford University Press, 2010),
xi-xii.
18 Onook Oh, Manish Agrawal and H. Raghav Rao, “Information control and terrorism:
Tracking the Mumbai terrorist attack through twitter”, Information System Frontiers 13:
33-43 (2011),
19 Qiao Liang and Wang Xiangsui, Unrestricted Warfare (Beijing: PLA Literature and Arts
Publishing House, February 1999).
20 Matt Potter, Outlaws Inc.: Under the Radar and On the Black Market with the World’s Most
Dangerous Smugglers (New York: Bloomsbury, 2001).
21 See, for example, Major Wayne Robinson, Eradicating Organized Criminal Gangs in Jamaica:
Can Lessons be Learnt from a Successful Counterinsurgency? (Quantico, VA: US Marine Corps Staff
College Dissertation, 2008),
22 Richard Drayton, “From Kabul to Kingston: Army tactics in Jamaica resemble those used
in Afghanistan – and it’s no mere coincidence,” The Guardian, June 13, 2010,
(accessed April 16, 2012).
23 Horace Helps, “Toll from Jamaica violence rises to 73”, May 27, 2010,
(accessed April 16, 2012).
24 Potter 2001, 139-144
25 Caerus Associates’ “Ideas from Caerus,”
March 10, 2012). view/index.html> (accessed March 10, 2012).
the city as a system: future conflict and urban resilience Reproduced with permission of the copyright owner. Further reproduction prohibited without
26 IBM’s “Smarter Cities,”
permission.