intelligence in peacekeeping operations

INTELLIGENCE IN PEACEKEEPING OPERATIONS
by
Philipp Jund
A Thesis Submitted in
Partial Fulfillment of the
Requirements for the Degree of
Master of Arts
in Diplomacy and Military Studies
at
Hawai„i Pacific University
July 2009
Abbreviations
AWACS
Airborne Warning and Control System
CENTRIXS
Combined Enterprise Regional Information Exchange System
DPKO
Department of Peacekeeping Operations
EW
Electronic Warfare
HUMINT
Human Intelligence
IMINT
Imagery Intelligence
IO
Information Operations
JMAC
Joint Mission Analysis Centre
JOC
Joint Operations Centre
MASINT
Measurement and Signature Intelligence
NATO
North Atlantic Treaty Organization
ODNI
Office of the Director of National Intelligence
OHR
Office of the High Representative
ORCI
Office of Research and Collecting Information
OSCE
The Organization for Security and Co-operation in Europe
OSD
Open Source Data
OSIF
Open Source Information
OSINT
Open Source Intelligence
OSINT-V
Validated OSINT
OSS
US Office of Strategic Services
RIMPAC
Rim of the Pacific Exercise
SACLANT
Supreme Allied Commander, Atlantic
SIGINT
Signals Intelligence
SITCEN
NATO Situation Centre
UN
United Nations
1
UNEF I
UN Emergency Force I
UNHCR
Office of the UN High Commissioner for Refugees
UNOSOM II
UN Operation in Somalia II
UNPROFOR
UN Protection Force
2
Introduction
The end of the Cold War brought about major changes in the world-wide power structure.
A fairly stable bi-polar world order dominated by two super powers, the USSR and the US,
turned into a less stable multi-polar world with only one super power left. Essentially, this
development lead to a decrease in conventional wars, but also to a sharp increase in small scale
conflicts and civil wars.
Those changes had major implications for the UN and its peacekeeping missions.
Traditional peacekeeping missions usually consisted of a UN mandated peacekeeping force,
establishing a “neutral zone” between the belligerents to keep them from fighting, while the
international community tried to mitigate between the parties and find a peaceful solution to the
conflict. This worked pretty well in most cases where both parties were open to outside
interference or yielded to the pressure applied by the super powers. In most of those conflicts the
UN troops had no problems establishing a buffer zone, because all sides of the conflict agreed to
their presence (Goulding, 1993, p. 456). In civil wars or ethnic conflicts (sometimes the same
thing, but not always) inside of a sovereign country, however, a separation of the warring
factions is much harder to achieve, because the lines between the parties will be blurred at best
and not completely identifiable at worst (Ali & Matthews, 1999, p. 276f). Additionally, it is
much harder to identify the intentions of the warring parties.
The overarching goal of this thesis is to examine and gain a better understanding of the
transformations UN peacekeeping underwent from the end of the Cold War into the 21st century.
However, the complexity of the topic and the limited scope of the paper require a focus on one
aspect of peacekeeping operations only. One aspect that is both crucial for the success of
3
peacekeeping missions and yet controversial is intelligence. To understand the importance of
intelligence for peacekeeping operations, the evolution of peacekeeping has to be traced first.
Without an understanding of the different forms of peacekeeping it is barely possible to
understand the importance of a single part of it.
There are many problems the UN faces in today‟s peacekeeping environment. Until the
end of the Cold War, the UN refrained from peacekeeping operations to be conducted inside of
sovereign states without being specifically asked to do so by the government of that country.
This is not because the international community did not want to contribute to stopping this kind
of conflict, but rather because of the principles the UN was founded on. The UN was founded on
seven principles, two of which state that “the Organization is based on the principle of the
sovereign equality of all its Members” and that “nothing contained in the present Charter shall
authorize the United Nations to intervene in matters which are essentially within the domestic
jurisdiction of any state (United Nations, 1996).” There is only one exception, which is a
Chapter VII resolution, allowing the use of force to “maintain or restore international peace and
security (United Nations, 1996).” Until recently, the UN strictly followed these principles and
did not interfere in the internal problems of a state. The growing number of internal conflicts
that had the potential to threaten peace and stability in the whole surrounding region (Bosnia, for
example) forced the UN to re--consider its stance however.
Starting with the end of the Cold War a growing number of so-called “failed states” like
Somalia, genocide or ethnic cleansing like in Rwanda and Bosnia and grave human rights
violations elsewhere convinced the general public, governments and the UN to rethink their
position on intervention in sovereign countries. Despite their reluctance to work together with
UN troops, NGOs realized the need for peacekeeping missions in conflicts that did not only
4
involve countries but also ethnic groups, or where no functioning central government existed any
more to restore peace and order, for example in Bosnia and Somalia (Carey & Richmond, 2003,
p. 26f).
The shift in the nature of conflicts poses additional challenges to the already very
complex task of a peacekeeping mission. Before the end of the Cold War, UN troops were sent
to crisis regions, because the opposing parties there asked for outside help in solving their
conflict or succumbed to the pressure of the super powers to accept UN intervention (Allen,
1996, p. 46). Even though there were some casualties on the side of the UN troops, they were
quite successful in establishing “neutral zones” between the warring parties, for example in
Cyprus, thus effectively ending the main hostilities. This does not mean, however, that all
conflicts were eventually solved. In the case of Cyprus, the UN troops are still there and the
situation is just slowly moving towards a solution (United Nations Department of Public
Information, 2009).
After establishing the belligerents‟ consent for a neutral UN peacekeeping force, the main
challenges that the UN faced were of logistical nature. Questions of who would send troops,
how to get supplies to them, how to finance the mission and how long the troops are supposed to
stay were prevalent. With the change in the nature of conflicts from conventional wars to rather
small scale conflicts like civil wars and/or ethnic tensions/conflicts, the requirements for the
missions became even more challenging.
Since every peacekeeping mission is essentially a military operation, intelligence has to
be part of the operation. On the other hand, many in the UN believe that the UN should not
engage in intelligence efforts (Jones, 1993, p. 17). To be able to still discuss the subject,
5
proponents reverted to call intelligence information instead (Villeneuve, 2006). In order to get
an idea of where the negative connotation of intelligence comes from, it is important to clearly
define what is meant by intelligence and what it is not. There is a clear distinction between
intelligence and espionage, for example.
Espionage is defined by the Encyclopaedia Britannica as a means to “obtain secret
information by means of spies, secret agents, or illegal monitoring devices. Espionage is
sometimes distinguished from the broader category of intelligence gathering by its aggressive
nature and its illegality (espionage, 2009).” This definition does give a hint as to why some
people within the UN do not want intelligence gathering to be a part of peacekeeping missions.
The success of peacekeeping operations depends heavily on the goodwill of all the parties
involved and espionage could very well compromise the overall mission by destroying this
goodwill. But espionage is not meant in the context of intelligence in peacekeeping operations.
Conducting effective espionage requires a network of spies and agents which is very time
consuming. The UN usually does not have that time, because there is no way to know where the
next conflict might break out. Therefore, for practical reasons, espionage is not an option for the
UN. This leaves it with intelligence gathering.
The gathering of intelligence is an essential part of every military operation. It helps the
commanders to make informed decisions which might save countless lives on both sides. The
collection of intelligence is the five step process illustrated in Figure 1, in which raw information
is turned into usable intelligence, called the intelligence cycle.
6
Figure 1: The Intelligence Cycle (Hughes-Wilson, 2004, p. 6)
Requirements for information or intelligence in peacekeeping operations are more
challenging than in “regular” military operations, because intelligence has to worry about more
than tactical issues (troop movements, order of battle, battles). They also have to worry about
the mood and state of the population, their perceptions of the peacekeeping operation, their
humanitarian needs, identifying criminal activity and separating it from cease fire violations or
the plans and intentions of the contending political and ethnic entities (De Jong, Wies, & Steele,
2003, p. 14). The challenge for intelligence is very similar to fighting an insurgency or counterterrorist campaign with the added complexity of not being able to state and/or identify anyone as
an “enemy.” Intelligence typically focuses on an enemy or threat. Officially, there are no
enemies in a peacekeeping operation, except in peace enforcing missions, and collecting
intelligence against the contending parties suggests that they are considered to be an enemy.
Furthermore, peacekeeping involves more restrictive rules of engagement than traditional
combat operations. Because of that, the troops need more detailed warning of contending party
7
intentions without presenting the image that they consider anyone to be hostile towards them
(Cowdrey, 1994, p. 16ff).
How this process works and how it might be integrated into UN peacekeeping missions
will be discussed in detail in Chapter 2 of this paper. Before the process of intelligence gathering
and support can be discussed, however, it is important to have a close look at peacekeeping in
general and the development it underwent from the 1950s until today. This is a necessary step,
because if there are different kinds of peacekeeping operations, the intelligence requirements will
also be different.
The changing nature of conflict also necessitated a change in peacekeeping. In Chapter 1
the development from first to wider or second generation to third generation peacekeeping will
be traced. The focus will be on the causes of change, on what changes were implemented by the
UN and the implications on intelligence requirements.
The changes in peacekeeping are not a straightforward process and there is quite some
discussion on how many different forms of peacekeeping exist and which peacekeeping
operations fall into what category. There is consensus on what first generation peacekeeping
operations are and what characterizes them. After that opinions start to diverge, which is most
likely due to the increasing complexity of the missions. With the increase in functions the
missions have to fulfill, it becomes more difficult to categorize them. Every additional function,
though, increases the amount of intelligence needed for a successful completion of the mission.
The main focus here will be on second and third generation peace operations, because
they are the prevalent form of peacekeeping today. Traditional peacekeeping can be excluded
here since it consists mainly of observer missions which by their very nature are intelligence
8
operations already. The question that arises from this fact is, though, how the UN developed
such an antipathy towards intelligence when its initial missions consisted almost exclusively of
military intelligence operations.
The third chapter of the paper will deal with the state of affairs on intelligence in peace
operations today. Recently there has been some movement towards acknowledging the need for
intelligence for the success of peace operations within the UN. Most of this came after the
problems and failures of the missions to Bosnia and Somalia were examined and compared with
successful missions like the one in Kosovo.
The intelligence problem in the UN is a multi-layered problem. It does not only pertain
to information within military operations. The lack of its own intelligence service also makes it
difficult for the UN to be able to mitigate conflicts before they escalate and to provide the troops
in the field with necessary intelligence. The problem with having an own intelligence service for
the UN would be to convince the member states that it is not intended to spy on them. However,
there are ways to mitigate those problems. One way would be to install an office that exclusively
focuses on open-source intelligence. The internet is a powerful tool to gather information on just
about everything without having to spy on anyone. Another possibility would be to incorporate
NGOs that are present in the crisis region into the intended solution of a crisis. NGOs usually
are already there before the conflict even starts and could thus be of great help to the
peacekeepers. A better coordination of the relief efforts of the NGOs by the UN would also
greatly improve the efficiency of help delivered to the crisis region. A third possibility is to
outsource the conduct of peace operations to a member country or to a regional international
organization such as NATO or the OSCE which the UN started to do successfully lately. These
possibilities will be examined in Chapter 3 of this paper.
9
Chapter 1
United Nations Peace Operations
“Peacekeeping stands out, as one of the Organization‟s most original and ambitious undertakings
in its efforts to control conflict and promote peace (United Nations, 1996).”
UN Secretary-General Boutros Boutros-Ghali rightfully identified peacekeeping as one
of the UN‟s most ambitious activities. The United Nations defines peacekeeping as “the
deployment of international military and civilian personnel to a conflict area with the consent of
the parties to the conflict in order to: stop or contain hostilities or supervise the carrying out of a
peace agreement. (Leonhard, 2004).” In order to be successful, peacekeepers have to overcome
many obstacles, challenges and problems. One of those challenges is the ever changing political
situation.
Peacekeeping during the Cold War
Since World War II, the global political and power situation changed considerably. Right
after the end of the war, many people, including then Secretary-General Dag Hammarskjold,
thought that the time for an increased role of the United Nations in global security policies had
come. However, the start of the Cold War put an end to these aspirations. The Soviets insisted
that they would take care of problems arising in their sphere of influence and the Americans,
although to a lesser extent, said the same about the Western Hemisphere. The result of this was
that the UN could only engage in conflicts the two superpowers had no interest in getting
involved in (Bellamy, Williams, & Griffin, 2004). During the Cold War the prevailing form of
10
conflict was inter-state conflict and the UN was quick to adapt to this. These so-called
“traditional (Jett, 1999)” or first generation peacekeeping operations are all based on three
principles: (1) the consent of all parties involved in the conflict to the presence of the
peacekeepers; (2) neutrality of the peacekeepers towards the conflict parties; and (3) minimum
use of force and only as a last resort and in self-defense (Bellamy, Williams, & Griffin; BoutrosGhali, 1992; Findlay, 2002).
The End of the Cold War
With the fall of the Berlin Wall in 1989 the Cold War ended and many people thought
that this would be the beginning of a new era of prolonged global peace, stability and prosperity.
However, the disintegration of Yugoslavia after Tito‟s death and the fall of his oppressive regime
and the following civil wars in Croatia and Bosnia proved that the dream of prolonged peace and
stability would not come true. The new situation of fierce intra-state civil wars and genocide
came as a direct result of the shift in the global power structure. The step from a bi-polar world
with two dominating superpowers to a multi-polar system with only one superpower created a
power vacuum that was destabilizing and that allowed conflicts that had been suppressed before,
to erupt again. Those new intra-state conflicts were a new challenge for the UN and its
peacekeepers. Originally, the UN Charter as specified in articles 2 (1) and 2 (7) did not allow the
UN to get involved in conflicts that were considered “intra-state affairs (United Nations, 1996).”
11
The Brahimi Report
The disasters of the UN missions to Bosnia and Somalia as well as the genocide in
Rwanda in the 1990s made it clear to the UN that it had to change its peacekeeping doctrine in
order to overcome the challenges posed by the new reality of violent conflicts. SecretaryGeneral Boutros Boutros-Ghali formed a Panel on United Nations Peace Operations, headed by
Ambassador Lakhdar Brahimi, to examine the existing peacekeeping doctrine and to come up
with recommendations on what needs to be changed (Durch, 2001, p. 2). The resulting report,
commonly known as the Brahimi Report, was published in August of 2000. The report
recommended drastic changes to the existing peacekeeping doctrine, redefining the basic
principles of peacekeeping operations for intra-state conflicts. The conflicts in Somalia and
Bosnia clearly showed that the consent of all local parties cannot be guaranteed in most intrastate conflicts, impartiality of the peacekeeping force cannot be ensured or might be exploited by
one of the parties (Mockaitis, 1999; United Nations, 2000, Executive Summary). Therefore, the
meaning of “impartiality” was changed from not taking any sides in the conflict to strict
“adherence to the principles of the Charter” of the UN and the mandate given to the
peacekeepers (United Nations, 2000). The report also suggested changing the rules of
engagement for the peacekeepers. In traditional peacekeeping, the use of force was only allowed
for self-defense. This strict rule should be widened to allow the peacekeepers to use force for
“defending themselves, other mission components and the mission‟s mandate (United Nations,
2000).” A third recommendation was that the peacekeeping force should be adequately armed,
implying that the provision for lightly armed troops needed to be replaced by a provision calling
for adequately armed forces (United Nations, 2000). The Srebrenica massacre was a cruel
12
reminder that lightly armed peacekeepers without armor could not fulfill their mandate to protect
civilians when facing heavily armed attackers using heavy artillery and battle tanks.1
The report also called for improvements in the command and control (C2) structure of the
peacekeeping force and the need for intelligence capabilities. However, the proposed solution to
the missing intelligence component was not suited for improving the situation of peacekeeping
forces in the field. It was rather an information tool for the UN leadership. The emphasis was
on the informational needs of the Secretary-General and members of the Executive Committee
on Peace and Security (ECPS). But considering the UN‟s long standing view that intelligence is
a bad thing which would undermine the credibility of peacekeeping forces, the acknowledgment
that an entity for information processing was needed was a big step in the right direction (Durch,
Holt, Earl, & Shanahan, 2003, p. 37ff).
Although the nature of peacekeeping operations had already changed during the 1990s to
include peace enforcement and peace building measures, the Brahimi Report and its
recommendations finally established an official, solid basis for the conduct of such operations by
carefully analyzing the status quo of peace operations and the resulting deficiencies that needed
to be addressed.
In order to show the urgent need for intelligence capabilities in peace operations it is
important to first consider the development of peace operations from traditional peacekeeping to
wider or second generation, to peace enforcement (Mackinley & Chopra, Summer 1992), starting
in 1956 with the establishment of UNEF I through the era of the Cold War to post Cold War
1
The 600 Dutch peacekeepers in Srebrenica were equipped with .50 caliber heavy machine guns mounted on 8
armored personnel carriers and AT-4 anti-tank rockets placed at the observation posts in addition to their side-arms.
The Serbs maintained the siege of the city with 1000-2000 well equipped soldiers. They were armed with tanks,
tracked armored vehicles and mortars. For more information see: UN General Assembly, 1999, p. 52.
13
peace operations. Of major importance is the change in size of operations in respect to troop size
and scope of the mandate, and of course the changes in the geo-political environment and the
nature of conflicts.
Traditional Peacekeeping
Traditional peacekeeping is the form of peacekeeping originally intended when the UN
was founded. It is based on the idea that the international community should assist the parties of
a conflict (in this respect, countries) in resolving their issues through peaceful diplomacy and not
through violence. The International Peace Academy defines peacekeeping as:
the prevention, containment, moderation, and termination of hostilities between or within
states, through the medium of a peaceful third party intervention, organized and directed
internationally, using multinational forces of soldiers, police, and civilians to restore and
maintain peace (Rikhye, Harbottle, & Egge, 1974, p. 11).
In order to achieve its primary mission, to stop armed conflict or to prevent its
recurrence, the UN tried to broker a cease fire between the warring parties and then established a
neutral zone between the enemies to prevent hostilities from breaking out again by deploying UN
peacekeepers into the area. Once the conflict parties were separated, the UN initiated
negotiations that would eventually lead to a peace treaty. After this treaty went into effect, the
peacekeeping troops were supposed to be replaced by a monitoring mission, which was intended
to make sure that all parties would adhere to the provisions of the peace treaty.
Initially, the UN got off to a very promising and successful start. Its first peacekeeping
mission deployed to Egypt and the Sinai in November of 1956 was an initial success (O'Neill &
Reese, 2005, p. 26). After Egypt nationalized the Suez Canal Company and Israel attacked
14
Egypt in October of 1956, occupying Gaza and the Sinai, France and Britain landed troops in the
Suez Canal Zone to “ensure” safe passage of ships through the canal. A Security Council
resolution was not possible due to the veto powers of France and Britain, so the UN General
Assembly voted unanimously to call for a cessation of hostilities and withdrawal of all foreign
troops from Egyptian soil. In order to ensure that those demands were met, the General
Assembly decided to dispatch the United Nations Emergency Force (UNEF) to the region to
monitor the progress. The force arrived in the area in November of 1956 and the withdrawal of
French and British troops went smoothly and was completed by December 22, 1956 (US State
Department, Bureau of Public Affairs). The last Israeli troops pulled out of the territory they had
occupied in the Sinai and in Gaza by March 1957. Subsequently, the UN troops helped to clear
the Suez Canal, which had been blocked during the war, and were mainly patrolling the border
areas between Israel and Egypt in Gaza and the Sinai. Because of Israeli opposition to the
peacekeeping mission, the UN troops were only stationed on the Egyptian side of the border,
with the consent of the Egyptian government of Gamal Abdel Nasser. UNEF I was very
successful in maintaining the cease-fire along the Israeli-Egyptian border until its withdrawal in
1967 at the request of the Egyptian government (UN Department of Public Information, 2003).
This peacekeeping operation was a departure from earlier missions by the UN which
were solely observer missions, like the United Nations Truce Supervision Organization
(UNTSO) to observe the cease-fire agreement in Palestine after the end of the Arab-Israeli war in
1948 and the United Nations Military Observer Group in India and Pakistan (UNMOGIP) which
was established after the First Kashmir War in 1949 to supervise the peace treaty mediated by
the UN (United Nations Association in Canada, 2007). For these earlier missions, the term
peacekeeping had not been used because they consisted only of a few unarmed military
15
observers that had no power to enforce the agreements, they could only report back to the UN if
one side violated the terms of the agreement.
With the establishment of UNEF I, the UN entered into a new era. It was the first time
that a UN sanctioned military force had been deployed to actively assure the compliance of all
sides to the cease-fire agreement.2 However, the use of the troops differed from what Chapter
VII, Article 42 specifies or would have allowed for. Chapter VII of the UN Charter would have
allowed the UN to “take such action by air, sea, or land forces as may be necessary to maintain
or restore international peace and security,” which would have allowed the UN to send armed
troops to Egypt in order to enforce the resolution by the General Assembly (United Nations,
1996). However, Secretary-General Dag Hammarskjold decided not to go this route, because he
feared that no one would volunteer troops to fight Israel, France and Britain on behalf of the UN.
By going the non-violent way, Hammarskjold ensured the success of the mission and set a
precedent for the conduct of peacekeeping operations for the next 40 years. Those operations
were based on the three principles of consent of the parties affected by the conflict, use of force
only in self-defense and impartiality (Katayanagi, 2002). These basic principles were valid until
the early 1990s, when the Cold War ended and the changing nature of conflict from wars
between states to intra-state or transnational conflict forced the UN to rethink its position. The
transition to a wider, more inclusive form of peacekeeping was marked by Secretary-General
Boutros-Boutros Ghali‟s An Agenda for Peace, which contained recommendations and analysis
on “ways of strengthening and making more efficient within the framework and provisions of the
2
Although the decision to intervene in the Korean War was sanctioned by the UN Security Council, it cannot be
considered a UN peacekeeping mission, because the forces sent to Korea actively engaged in combat operations,
taking the side of the South Koreans and because the troops were effectively under US command and engaged in
enforcing American interests in the region (i.e. stopping the spread of Communism).
16
Charter the capacity of the United Nations for preventive diplomacy, for peacemaking and for
peace-keeping (Boutros-Ghali, 1992).”
Wider or Second Generation Peacekeeping
The shift towards this new form of peace operations contained a widening of the
definition of peace operations, thus the term wider or second generation peacekeeping
(Mackinley & Chopra). This new form of peace operations was achieved by “improvements on
the Cold War peacekeeping model by redefining the use of force by peacekeepers and the
consent and mandate concepts (Fleitz, 2002, p. 8).” Thus, UN missions were not only
peacekeeping missions any more, but so-called peace operations, which, in addition to
peacekeeping can also include peace enforcement, peace building, peacemaking and conflict
prevention (Joint Chiefs of Staff, 1999). This shift became necessary when the situations in both
Bosnia and Somalia deteriorated because the local conflict parties showed no interest in working
together with UN troops and tried use their presence for their own gain (Clark, 2002, p. 49) and
otherwise just ignored the presence of the peacekeepers. It was also counterproductive that
peacekeepers were sent into a situation in which there was no official cease-fire or peace
agreement. The lack of a clear mandate did not help either. However, even though there is
considerable agreement on the definition of second generation peacekeeping, opinions differ on
which UN missions would qualify for either second or third generation peacekeeping. Especially
UNOSOM II in Somalia and UNPROFOR in the former Yugoslavia are categorized differently
quite often (Malan, 1998; Reichard, 2006, p. 13). This paper will consider both operations to be
17
third generation peacekeeping, because both were enforcement actions under Chapter VII of the
UN Charter (Katayanagi, 2002, p. 57).
Secretary-General Boutros-Ghali recognized these flaws in the concept of peacekeeping
and proposed wide-ranging changes. First of all, he tackled the issue of sovereignty, one of the
foundations of the UN system. He realized that sovereignty is not always easily established,
especially when a country falls apart into several different parts, all of which claim independence
but are not yet recognized by the UN (Krasner, 2001, p. 42; Deng, Kimaro, Lyons, Rothchild, &
Zartman, 1996, p. 14). This problem existed in former Yugoslavia. The first two countries to
separate from Yugoslavia, Slovenia and Croatia, were internationally recognized shortly after
declaring independence (Burg & Shoup, 2000, p. 121). The UN mission to Croatia,
UNPROFOR (UN Protection Force), was deployed after the Croatian government and the
Serbian-Croat leaders of the Krajina province agreed to a proposal by Cyrus Vance and Lord
Carrington to send UN forces (Holbrooke, 1999, p. 33). When Bosnia and Herzegovina declared
its independence from Yugoslavia, the situation was different. About equal parts of Bosnia were
inhabited by Bosnian Serbs, Bosnian Croatians and Bosnians Muslims. The Serbs wanted to join
Serbia and Montenegro for obvious reasons, the Croatians wanted their part of Bosnia to become
part of Croatia and the Bosnian Muslims were the only ones who truly wanted an independent
state.3
When civil unrest broke out all over Bosnia, the UN decided to widen the mandate of
UNPROFOR to monitor the peaceful secession of Bosnia from the former Yugoslavia, but to
maintain the structural integrity of the country. Unfortunately, the Bosnian Croats and especially
the Bosnian Serbs had no intention to let the UN stop them from reaching their goals. The
3
For further reading see Burg & Shoup, 2000; Finlan, 2004; Badsley & Latawski, 2004; Daalder, 2000.
18
European Union decided to formally recognize Bosnia and Herzegovina as an independent state
on April 7, 1992 (Mellenthin, 1993), the UN followed suit and recognized Bosnia on May 20,
1992 (United Nations Security Council, 1992). They were hoping that this move would prevent
an escalation of the civil war. The reasoning behind this was that if all three parties would all of
a sudden find themselves in one and the same country, they would try to solve the problem
peacefully.
In the end, it turned out that the only party that was interested in an UN involvement and
in a unified Bosnia and Herzegovina were the Bosnian Muslims. Thus, when the UN decided to
widen the mandate of UNPROFOR to also cover Bosnia in June 1992 (Lahneman, 2004, p. 54),
the peacekeepers were drawn into a full scale civil war, even though up until that point, the
common view was that the UN would not interfere in the internal problems of a sovereign state.
The case of Bosnia was quite difficult, however.
First, Bosnia was not an independent, internationally recognized country when the civil
unrest started, but by the time the UN troops arrived, Austria and Germany had recognized
Bosnia formally, undermining the first basic principle of traditional peace operations, namely
that the UN would respect a country‟s sovereignty and would not interfere in its internal affairs.
Second, the UN disregarded the consent of the parties to the conflict. Only one group, the
Bosnian Muslims, wanted the UN to officially help end the conflict. The Serbs were absolutely
not interested in any outside interference and established the Serbian Republic of Bosnia and
Herzegovina on January 9, 1992, which was changed to Republika Srbska later that year in order
to avoid confusion with the Republic of Bosnia and Herzegovina (US State Department, Bureau
of Public Affairs). The Croatians established an autonomous region of their own, called Croatian
Community of Herzeg-Bosnia in July 1992 (Mellenthin). These acts were followed by
19
systematic ethnic cleansing, a term preferred by the Clinton Administration in order to evade the
ramifications that calling the events in Bosnia genocide might have had. Both, Serbs and Croats,
systematically targeted other ethnicities, plundering their homes, setting them on fire, killing or
arresting the people. Their overall goal was to either become independent countries or part of
either Serbia or Croatia. However, neither of the two entities was ever formally recognized by
the international community.
What the UN peacekeepers were supposed to follow, though, were the remaining two
principles; impartiality and use of force in self defense only. This turned into a major nightmare
for the troops and basically rendered the execution of their mandate impossible. The first
widening of the mandate occurred in June 1992, when its troops were ordered to secure Sarajevo
airport (United Nations, 1992) and subsequently, in September 1992, the mandate was changed
to incorporate the protection of humanitarian aid efforts and civilian refugees in all of Bosnia and
Herzegovina (United Nations Security Council, 1992). On top of that, the peacekeepers were
also asked to protect the UN safe areas of Srebrenica (United Nations Security Council, 1993) on
April 16, 1993, and later Sarajevo, Tuzla, Gorazde, Zepa and Bihac (United Nations Security
Council, 1993). To protect those safe areas, the UN sent an additional 7,000 soldiers which were
explicitly allowed to use force in order to protect those safe areas from bombardments (United
Nations Security Council, 1993, §9). The UN even worked out an agreement with NATO that
NATO would provide air support if needed. However, this setup was a direct violation of
another principle of traditional peacekeeping, impartiality. The safe areas were established
exclusively to protect civilians from the Bosnian Serbs, which in turn amounted to the UN
choosing sides in the conflict opposing the Bosnian Serbs. In the end it did not take long until
the Bosnian Serbs realized that the threat of airstrikes was an empty threat and that without
20
those, the lightly armed peacekeepers were no match for their tanks and heavy artillery and they
attacked the safe zones (UN General Assembly, 1999).
The way the UN conducted its peace operations in Bosnia was not the most efficient way
to go about this. Like Secretary-General Boutros-Ghali in his Agenda for Peace noticed, it is
important that the peacekeepers have a clear and concise mandate they can follow. The lack of a
clear mandate, or rather the changes to the mandate of UNPROFOR from a small peacekeeping
force in Croatia to a peacekeeping operation covering Croatia and Bosnia (Greco, 1995-97, p. 2),
made it practically impossible for the troops to function effectively. The Srebrenica massacre
was arguably a direct consequence of the lack of guidance for the troops and the ignorance of the
UN Security Council. They believed merely threatening the use of force would be sufficient
even though there was more than enough warning before the massacre happened, that the
Bosnian Serbs would respect “only force or an unambiguous and credible threat to use it
(Holbrooke, p. 152).”
On the other side, the massacre also started the first successful attempt at peace
enforcement the UN undertook. As a response to the massacre, the UN asked NATO to start a
massive bombing campaign to bring the war to an end. NATO responded by implementing an
air campaign that only stopped when they ran out of targets (Holbrooke, p. 146).4 Thus, in the
end, the UN missions to Bosnia, UNPROFOR and its follow up mission IFOR (Implementation
Force), turned out to be the first major wider or second-generation peace operation conducted by
the UN. Some of the problems that were encountered in the course of the Bosnian war and
especially in Somalia showed that improvements were needed for this new kind of conflict.
Somalia showed the problems a peacekeeping force can encounter when there is no central,
4
For more details see also Daalder, 2000; Finlan, 2004; Owen, 2000; Ripley, 1999.
21
working government in existence and a massive nation building effort is needed to bring a
conflict to an end. This led to the creation of third-generation peacekeeping.
Third Generation Peacekeeping
Third generation peacekeeping goes one step further than second generation
peacekeeping. The goal of the latter is first and foremost to stop hostilities and to start a process
towards a normalization of relations among the conflict parties. Today, this process is generally
referred to as peacemaking (Canada Department of Foreign Affairs and International Trade ,
2008) and usually culminates with the conduct of free, democratic elections to install a new
government that is acceptable to everyone. However, this concept does not solve the underlying
problems that are causing the conflict, be they ethnic, religious or cultural. Third generation
peacekeeping is intended to take these things into account and is thus a long term process to
ensure peace and security. Because of the longer duration of these missions, the UN is relying
more and more on the help of regional organizations such as NATO, the OECD or the OAU.
Examples for this outsourcing of UN missions are Kosovo or Darfur, where the UN asked
NATO and the OAU, respectively, to provide troops to fulfill the UN mandate.5
Third generation peacekeeping is also wider than any other form of peacekeeping before.
It can consist of various stages leading from conflict to a stable peace. Depending on the
situation in the country or region, this form of peacekeeping can start with peace enforcement,
i.e. sending in troops to stop the fighting by using force, continue with nation building or
5
For more information on the EU mission in Kosovo see Bilefsky, 2008; DW Staff, 2008; for more details on the
OAU mission in Darfur see Hanson, 2008; St. Pierre & Leaver, 2008 and United Nations Department of Public
Information, 2009.
22
rebuilding of failed states, if no working civil authority exists any more (Hanhimäki, 2008, p.
77). The last step is making sure that the results of the elections are respected. This process is
usually accompanied by efforts to improve the humanitarian situation, like delivering food and
potable water to the civil population, and by efforts to improve the human rights situation.
However, some aspects of third generation peacekeeping are not easy or almost
impossible to do. Forcing parties of a conflict to stop fighting by using force and without taking
any sides, for example, is highly problematic. Chances are that the parties the peacekeepers want
to stop fighting each other, all of a sudden start working together fighting the peacekeepers. An
example for this is the UN mission to Somalia, when the UN and American troops decided to use
force to reach the goals of the mandate (disarming the clans and enabling humanitarian
assistance) and the clans decided to work together to fight the foreign troops, which eventually
led to the withdrawal of the UN troops and the failure of the mission (United Nations, 1997).
Those clans are actually still holding most of the power in Somalia today, almost fifteen years
after the UN troops left (Fleitz, p. 14).
Despite the usually wider, multidimensional mandates that include, among others, the
separation of combatants; the disarmament of irregular forces; the demobilization and
transformation of regular and irregular forces into a unified army; assistance with reintegration
into civil society; the establishment of new policing systems and the monitoring of elections for
new governments (Riza, 1995, p. 17), the most recent UN missions were all smaller in size than
the ones in Bosnia or Somalia. The overall number of peacekeepers rose dramatically from about
10,000 in January 1992 to about 78,000 in July 1993 with the implementation of the UN
missions to Bosnia and Somalia (UN Department of Public Information, 2001). After their end,
the number fell almost back to the Cold War levels, before rising again from January 2000 until
23
it reached a new high of about 113,000 as of May 2009 (UN Department of Public Information,
2009). Even though the overall number of peacekeepers rose, the number of peace operations by
the UN increased, too. Between 1990 and 2000, the UN Security Council approved 36 new
peacekeeping missions and currently, there are 16 active missions (United Nations, 2009).
Some authors are already speculating about a fourth generation of peacekeeping (Malan,
1998), but after reviewing the literature on second and third generation peacekeeping, the
existence of a new form of peacekeeping seems unlikely. Most descriptions of second and third
generation peacekeeping are so similar that it is already almost impossible to differentiate
between those two, much less between them and a fourth kind of peacekeeping. The only
difference is that most third generation peace operations include a Chapter VII provision and
most second generation peace operations only a Chapter VI provision.
Problems with Peace Operations
Despite the development of peacekeeping operations over the years, peacekeeping
regularly suffered from setbacks or catastrophic failures. There are several reasons for the
problems peace operations encountered. Some of them are external, like a change in the geopolitical situation, the changes in the kinds of conflicts peacekeepers were sent to or the conflict
parties themselves (Jett, p. 115), and some are internal, like unrealistic expectations, outdated
doctrine or ideology. Many of those problems have been addressed over the years, but changes
were almost always ad hoc changes after something went wrong first.
Jett argues that the main external factor influencing the outcome of UN peacekeeping is
“the parties to the conflict and the degree to which they are committed to the peace process (Jett,
24
1999, p. 113).” In traditional peacekeeping, one of the basic principles for the dispatch of
peacekeeping troops was consent of the conflict parties. However, consent does not mean that
the parties really want peace. In some instances at least one of the parties, usually one on the
losing side, will agree for a peacekeeping force to be stationed in the country, because it will
give them the opportunity to regroup, rearm and after the UN troops leave, to continue hostilities
in much better shape than before. Examples for this are the civil wars in Angola, Liberia and the
Congo.6
An underlying reason coming into play here is also the change in the nature of conflict.
While during the cold war most inter-state conflicts were territorial in nature, the post Cold War
intra-state conflicts were about political power and in some cases about control over natural
resources or money (Jett, p. 113). In these cases the UN approach to stopping the conflicts was
not quite adequate. In a conflict over territory it is fairly easy to find a compromise all parties
can agree on. However, when two groups within a country are fighting for political power,
stopping the hostilities and holding democratic elections will most likely not solve the problem,
because in political elections, like in war, there is usually just one winner and in many cases the
losing side will have a hard time accepting the loss. Examples for that are the UN missions to
Angola (UNAVEM II & III). Only after long, arduous negotiations and several breaches of the
armistice by both sides of the conflict, did the UN missions succeed, mainly after the UN
established a follow up mission (MONUA) that focused exclusively on installing a working civil
administration, establishing an independent, neutral police force and helping the administration
to address and deal with human rights violations and humanitarian problems (United Nations,
2001). After these issues were successfully resolved and the election system was changed from a
6
For more information, see Klare, 2001, Chapter 8 and Jett, 1999, Chapter 6.
25
plurality or winner-takes-all system to a proportional representation system the conflict was
finally resolved after free, democratic elections were held that were recognized by all parties and
that gave everyone a piece of the cake.
An abundance of natural resources can also prolong a conflict or hinder peacekeeping
efforts. If those resources are easily exploitable, like diamonds in Angola, and there is a market
for them, control over the resources provides for enormous amounts of money that can be
invested in new weapons (Klare, 2001). In large parts of Africa the proceeds from sales of
natural resources are closely controlled by the ruling party with most of the money going into the
elite‟s bank accounts and towards the purchase of arms. Naturally, as long as they control the
resources, the ruling parties have no incentive to cooperate with the UN and to work on ending
the conflict. The same is true when a rebel group controls the area where natural resources are
located. They have no reason to give up that area freely.
These are some examples for external factors that have major implications on the success
of a peacekeeping operation and that the UN has only limited control over, the most important
being the true consent of the conflict parties. Additionally, there are also some internal factors
that have an influence on the success or failure of a peacekeeping operation.
Internal elements that can affect the outcome of a peacekeeping mission are
organizational factors, the kind of mandate the peacekeepers are given and how the mission is
planned. Organizational factors include the decision making process of how, where and when
the UN should get involved. Jett identifies three different ways, through Security Council
initiatives in response to wars, requests from local parties in response to local wars and requests
to help with the implementation of a peace agreement signed by the parties in a civil war (Jett,
26
pp. 35-36). After 1991, however, the first two ways disappeared almost completely and most
peacekeeping missions were initiated after someone asked for UN assistance in ending a civil
war. The implementation of peace treaties that are not brokered by the UN, though, is quite
difficult, because some of the provisions of the treaties might just be impossible to enforce,
which in turn can have negative effects on the outcome of the mission before it even started.
This is tied in closely with the second internal factor, the mandate.
Every peacekeeping mission stands and fails with the mandate it receives from the
Security Council. If the mandate requires the peacekeepers to do things that are not feasible,
chances that the mission will fail are quite high. For example, widening the mandate of
UNPROFOR to protect the UN safe areas in Bosnia destined that mission to fail because the
Security Council did not take into consideration that the peacekeepers were not adequately
equipped and it did also not realize that the agreement with NATO to provide air support could
not work the way it was supposed to because of two parallel chains of command where only the
top executives (UN Secretary-General Boutros-Ghali and NATO Secretary-General de Hoop
Scheffer) were authorized to order the use of force. Unrealistic or vague mandates or changes to
existing ones were quite often the reason for failure of the mission. The latter is especially
critical when a mandate contains a Chapter VII provision that is actively used by the
peacekeepers. It is just not possible to reduce a mandate like this after force was used. It might
be possible to allow the troops to enforce their mandate if necessary, but only when it is possible
to send the necessary equipment and weapons. Otherwise, it could lead to a situation like in
Srebrenica. Also, trying to conduct elections in a failed state is quite unrealistic without
restoring a functioning civil authority and basic infrastructure first (see Angola).
27
Planning a peacekeeping mission is not an easy task. Many factors have to be taken into
consideration, some of which are quite difficult to solve. First of all, the Department for
Peacekeeping Operations (DPKO) needs to get the necessary troops for the task. Depending on
where the conflict is taking place or what is at stake, it is sometimes hard for the Security
Council to find countries willing to send troops. For example, the Security Council would like to
send a new peacekeeping force to Somalia for quite a while now, but after the fiasco of
UNOSOM II, no country wants to volunteer troops to be sent there. The United States, already
stretched by two wars and with the Mogadishu incident still fairly fresh in people‟s minds, will
not volunteer any troops for UN missions to Somalia or to conflicts that are not threatening US
national security. Other states simply do not think that the chances for success would be big
enough.
Another problem is to make sure that all the troops are adequately equipped. In recent
years, the countries that send the most troops do not have the funds to arm their troops the way
the European or US troops are. In 2007, eight of the top ten troop contributing countries were socalled third world or emerging countries with Pakistan, Bangladesh, India and Nepal taking the
top spots (Bah, Jones, & Tortolani, 2008, p. 2).
Directly linked with getting troops initially is the question of how many troops are
needed. In some instances there is time to send a fact finding mission to the place of interest first
and then, based on their report, the decision of how many troops are needed can be made.
Unfortunately, in most cases wars are not predictable and the conflict parties will not wait until
the UN has figured out how big of a peacekeeping force it will have to send in order to be
successful. If the UN is wrong in predicting the necessary troop strength, chances are that the
mission will fail before it even begins.
28
Overall, in order to properly plan a peacekeeping mission so that it has a chance for
success the planners need to be very well informed. They need to use all the information they
can possibly get and use all available sources. Ideally, the DPKO will be able to send its own
staff on a fact finding mission before sending in peacekeepers (Sutterlin, 2003, p. 21).
Additionally, they should interview all the NGOs that are already working there, if any,
and finally, they should ask the member states if they have any information that might be useful.
The bigger the area of deployment and the more parties are involved in the conflict, the more
information is needed. For the planning and organizing stage of a peacekeeping mission as well
as for formulating its mandate, the UN needs strategic intelligence of high quality, no matter how
uneasy they feel about using the term intelligence. No country would send its troops to a foreign
place without knowing exactly what it gets itself into. After it became clear in recent years that
the UN cannot count on unrestricted cooperation of all conflict parties any more it is imperative
to prepare the troops for a worst case scenario and not for the best possible one.
When setting up a peacekeeping force the planners should also consider giving the
peacekeepers the ability to collect tactical intelligence once they are in the target area. Since it
proved quite difficult for all the different countries involved in a peacekeeping operation to
effectively share the intelligence they collected with troops from other, non-aligned countries,
the UN might want to consider installing a neutral entity within the peacekeeping force that is
tasked with collecting intelligence for all troops, regardless of where they are from. In the end,
this might save countless lives on all sides.
Together with the capability to collect tactical intelligence while operating in the target
area, collecting strategic intelligence before sending the troops is a decisive factor for the success
29
of a peacekeeping mission. Therefore, the issue of intelligence in the UN and in UN missions
will be examined in greater detail in Chapter Two.
30
Chapter 2
Intelligence in Peacekeeping Operations
Intelligence is a crucial element of every military operation. Quite often success or
failure in achieving the goals of an operation depends on the quality of intelligence the military
commanders have. Also, with increasing complexity of the mission, the intelligence
requirements increase too.
Intelligence is also not a new concept. The gathering of information on the intentions and
capabilities of an enemy has been done for centuries. The modern form of intelligence
developed in the 19th and 20th centuries. In order to understand the importance of intelligence
and its complexity, it is helpful to have a look at how it developed and the impact it had on
military operations.
Forms of Intelligence
Intelligence can be divided into strategic, operational and tactical intelligence analogous
to the strategic, operational and tactical levels of command. Strategic intelligence is required for
the forming of policy and military plans on the national or international level (Miller, 2009).
Operational intelligence is defined by the US Department of Defense as “intelligence that is
required for planning and conducting campaigns and major operations to accomplish strategic
objectives within theaters or areas of operations (Keane, 2005, p. 145).” Tactical intelligence is
the intelligence field commanders need in order to make informed decisions on the battlefield
and to be successful in combat.
31
Intelligence Collection
Intelligence services, force commanders and troops in the field have a wide variety of
intelligence collection means at their disposal. According to the United States Intelligence
Community website, there are six basic intelligence collection disciplines. These are signals
intelligence (SIGINT), imagery intelligence (IMINT), measurement and signature intelligence
(MASINT), human-source intelligence (HUMINT), open-source intelligence (OSINT) and
geospatial intelligence (United States Intelligence Community, 2009). Geospatial intelligence is
sometimes considered to be a part of IMINT and not a discipline of its own. The following
figure illustrates the five disciplines as identified by NATO and their interrelations.
Figure 2: Open Source – All Source Relationship (NATO, 2001)
According to the NATO model, OSINT is the basis for all intelligence gathering efforts.
Today, most information that is needed is openly available in newspapers, on TV or on the
internet. After a thorough search of openly available sources, the gained intelligence can be
enhanced or corroborated by using other available collection methods.
32
The most basic and traditional form of intelligence collection is HUMINT. This can
include clandestine or covert operations or simply observations by government employees or
travelers. HUMINT can be gained by the use of spies, interviewing refugees or through
observations made by troops in the field (Johnson, 2008, p. 3). Today, HUMINT is usually
backed up with IMINT, using pictures taken from planes, drones or satellites, radar images and
infrared signatures (United States Intelligence Community, 2009). IMINT helps intelligence
officers to visualize reports gained through HUMINT or SIGINT, thus enabling them to get a
better picture of what is happening. SIGINT, traditionally the second form of intelligence
gathering,7 is the primary form of intelligence gathering on the battlefield. SIGINT targets
enemy communication and other electronic signals.
Historical Overview
Napoleon Bonaparte was the first military leader who used intelligence in major fashion.
He quickly recognized the advantages of always knowing about the enemy‟s movements and
intentions. After the French revolution, Napoleon reorganized the French cavalry even though
he was an artillery officer and no expert on cavalry tactics. John Elting states that Napoleon
nevertheless knew “how to organize and use cavalry effectively (Elting, 1997, p. 229).”
A staff officer of General Massena, Paul Thiebault, wrote a manual on how a general
staff should work and function, the Manuel général du service des états-majors généraux et
divisionnaires dans les armées (Thiebault, 1813). One of his major points for effective staff
work is that the staff officers always need the most up-to-date intelligence about the enemy. He
7
SIGINT was started by the French after the invention of wireless communications in the late nineteenth century
(Richelson, 1997).
33
argues that “reconnaissance must be conducted continuous to the front and flanks (Elting, p.
83).” Napoleon trusted mainly his cavalry to fulfill these duties and he even hired some
multilingual Polish to conduct deep reconnaissance behind enemy lines. He also insisted that all
intelligence gathered had to be brought to him directly, a feature that survived over time.
The start of the technological revolution at the end of the 19th century brought about big
changes in communications and as a result in intelligence gathering. In 1880, Thomas Edison
had invented the electric light bulb, already in 1876, Graham Bell successfully introduced the
telephone and in 1901, Guglielmo Marconi claimed to be the first person to send and receive
transatlantic radio transmissions. In 1908, the Wright brothers conducted the first official flight
with a motorized airplane in Le Mans. All those inventions were not only turned into practical
devices for the people, they were also very important for the military (Richelson, 1997). Soon
after the invention of the wireless, the French started to listen in to wireless communications,
thus gaining valuable information on the other European countries‟ intentions. The French and
the German armies also introduced the airplane into their forces, believing that their “most
significant impact on military operations would be in reconnaissance and communications
(Meilinger, Apr. 2000).”
In the course of World War I, military leaders on all sides learned quickly how important
it is to know what the enemy is doing and where his troops are. Lack of intelligence often lead
to catastrophic results like the battle of Tannenberg shows, where superior Russian forces were
almost annihilated by a much smaller German force mainly because the Germans were very well
informed about the Russian movements and intentions by effectively using signals, human and
imagery intelligence (Showalter, 2004).
34
Another reason for the growing importance of intelligence in military operations was the
growing size of armies. During the French Revolution, the French introduced the concept of the
levee en masse, which resulted in the formation of armies of unprecedented size. Elting (p. 55)
estimates that in the years “from 1804 to 1814, the total armed forces…reached an average of
more than a million,” making the French army the first ever to surpass the one million men mark.
Armies of this size enabled the commanding general to engage the enemy along an entire front
and at different places at the same time. For example, in 1805 Napoleon was able to fight the
Austrians in Germany and Italy at the same time.
Before, strategic intelligence was limited to preventing surprise attacks and to find out
where the opposing army was being assembled. To get this kind of information most countries
used spies that were sent to the opponent‟s court under some official pretext. Tactical
intelligence consisted of finding out the composition of the enemy‟s army and where the first
attack of the battle would be taking place.
The introduction of mass armies increased the need for information on the enemy
substantially. This increased the need for good intelligence, which in turn became more difficult
to obtain. Napoleon was the first to realize this and his successes in the early years of the
Napoleonic Wars proved just how important good reconnaissance was for military operations. A
very good example is the Battle of Ulm in 1805. Due to good strategic intelligence, Napoleon
was able to outflank the Austrian forces and encircle them in the city of Ulm. Because the
Austrians had not realized the importance of a systematic intelligence effort, they were
completely unaware of Napoleon‟s intentions and did not expect a French attack that early. In
the end they were completely taken by surprise and surrendered without a fight.
35
The increased mobility of armies was another factor for the growing importance of
intelligence. In the second half of the 19th century, most European countries started building
extensive railway systems. The railroad made it possible to move big armies in a matter of days
instead of months. Whereas it took Napoleon almost four weeks to march his Grande Armée
from Boulogne to the German border uncontested, at the beginning of World War I the Germans
were able to advance with 1.5 million soldiers to the outskirts of Paris within about one month
while fighting battles against Belgian, French and British forces (Blond, 2002). To leverage
against such rapid troop movements, an army needed excellent intelligence capabilities, which
the introduction of signals, communications and imagery intelligence made possible.
The First and Second World Wars also brought a huge challenge for the national
intelligence agencies, which was coalition warfare. In order to effectively use all troops in a
coalition, the command and control structure needed to be adjusted and the flow of information
between the members of the coalition had to be streamlined. In World War I the sharing of
information and intelligence between the French and the British was almost non-existent, which
lead to several lost battles or missed opportunities because one side had no idea what the other
was doing. The allied intelligence effort in World War II was much improved. Especially the
cooperation between the Americans and the British reached unprecedented levels and formed the
basis for intelligence cooperation until today. Because of that, some call this cooperation the
Intelligence Revolution.8 With respect to UN peacekeeping operations, the lessons learned from
this cooperation are only of limited use, because during World War II the intelligence
cooperation was so tight that Americans were actually working in the British Home Office.
Since the UN does not have an own intelligence service something like this would not be
8
For more details on the subject, see e.g. Andrew, 1988; Wark, Summer 1993.
36
possible. However, this example shows that if the threat is big enough, cooperation can happen
and it can be very effective.
The realization of the importance of intelligence for military operations lead to increased
spending on improving intelligence capabilities in most countries, especially in the US. The US
spent about $66 billion on its intelligence agencies in 2009. Unfortunately, that number is only
an approximate number, because the official numbers are classified and cannot be accessed
(GlobalSecurity.org, 2009).
Today, the US intelligence community consists of sixteen member organizations, ranging
from the Department of the Treasury to the Department of Homeland Security and the Defense
Intelligence Agency (Joint Chiefs of Staff, 2004). Under the coordination of the Director of
National Intelligence, all those intelligence agencies are supposed to provide enough information
to US forces abroad as well as in the US to enable them to effectively pursue and safeguard
American interests. A recent publication on intelligence doctrine by the JCS stresses that
“intelligence that is anticipatory, timely, accurate, usable, complete, relevant, objective, and
available is a crucial enabler of decisive unified action and successful military operations (Joint
Chiefs of Staff, 2004, pp. I-1).”
The Intelligence Cycle
The process of turning acquired information into intelligence and making this intelligence
available to policymakers, military commanders and other consumers is called the intelligence
cycle.
37
Figure 3: The Intelligence Cycle (Central Intelligence Agency, 2009)
The production of intelligence starts with the Planning & Direction stage. This step is
crucial for the outcome of intelligence production. At this stage, policymakers at the higher
levels of government file requests for intelligence on certain problems and in cooperation with
issue-coordinators determine what the core problems are and what kind of intelligence is needed.
This step directly influences how the next steps will look like.
The Collection Process follows next. In this step the intelligence services use the six
basic collection disciplines to get raw information that can later be processed into finished
intelligence. Without an adequate amount of raw data there will be problems in the Analysis &
Production stage. But first, in an additional step, the raw data needs to be transformed into
usable intelligence.
The third step in the intelligence cycle is the Processing & Exploitation step. In this step
the information gathered is turned into usable intelligence. This can be achieved by decoding
messages, translation of foreign language documents or by preparing the gathered information
38
for computer processing. Once this is done, the produced intelligence is handed over to the
analysts or directly to consumers.
The Analysis & Production stage is arguably the most important step in the intelligence
cycle, because here an analyst will decide what intelligence is important and what is not. The
analyst will compile and evaluate the intelligence and will create finished intelligence reports.
The US Intelligence Community distinguishes five different intelligence categories. These
categories are current, estimative, warning, research and scientific and technical intelligence.
The finished intelligence products then have to be distributed to the relevant persons.
The importance of the Dissemination Process is to make sure that the finished intelligence
actually reaches the right people, because the best intelligence is useless if it is given to the
wrong people. From this stage the cycle goes back to the first stage, because in most cases the
finished intelligence will cause more questions that need to be answered and the process will
start from the beginning.9
Intelligence in Peacekeeping Operations
In order to find out why there is a lack of understanding for the need of intelligence in
peacekeeping, it is important to distinguish between the different kinds of peacekeeping
operations. The three different generations of peacekeeping feature missions of increasing
complexity and to answer the question why intelligence was basically a non-factor in
peacekeeping operations for years a close examination of the different kinds of peacekeeping
operations is necessary. In this analysis I will also include observer missions even though they
do not fit in with any of the categories of peacekeeping mentioned in the first chapter, but they
9
For an in depth description of the intelligence cycle, see Central Intelligence Agency, 2009; United States
Intelligence Community, 2009; Federal Bureau of Investigation, 2009.
39
preceded first generation peacekeeping and offer valuable information on intelligence gathering
in UN peace missions.
Observer Missions
Even though intelligence has a negative connotation within the UN system, the UN is
fairly accustomed to intelligence gathering. The first missions the UN ever conducted in the late
1940s were so-called observer and fact finding missions, thus preceding traditional peacekeeping
operations. In those missions, the UN sent unarmed military observers to watch the belligerents,
to supervise the truce or armistice the sides had agreed on and to inform the General Assembly
or the Security Council on new developments (UN Department of Public Information, 2005 &
2006). Usually, observer missions are relatively small because they are not intended to guard a
demarcation line or territory, their only function is to monitor all sides to the conflict and to
report back to the UN headquarters in New York.
The observer missions use various means to collect the data they need. The UN observer
mission to Israel (UNTSO) uses observation towers/posts, patrols and inspections to monitor
Israel‟s borders with Syria and especially Lebanon (Birgisson, 1993, p. 94). UNMOGIP, the UN
mission to India and Pakistan mainly started with using ground and air reconnaissance to monitor
the cease fire agreement of 1949. Later, the observers monitored troop movements and
investigated complaints about violations of the treaty on both sides.
However, the Security Council has not stopped using observer missions after the
establishment of peacekeeping operations. Today, there is still ample use of observer and
40
verification missions in various parts of the world.10 Some of them are actually part of bigger
peacekeeping missions, others are still only focused on one specific task.
Nevertheless, those observer and verifying missions are essentially intelligence
operations. They use many forms of open information collection that are also used in military
intelligence operations. Those intelligence operations also start with the collection of raw
information, sometimes using the same methods. After all, the processing of the collected
information in any way into useful reports is by definition called intelligence. So, even if the UN
is calling those activities information gathering, it is the same as intelligence gathering.
Traditional or First Generation Peacekeeping
In traditional peacekeeping missions two different forms of intelligence gathering have to
be distinguished. There was no need for intelligence on expected attacks on the UN troops,
because the principle of consent of the conflict parties to the presence of the UN forces made
sure that the UN forces did not have to worry about hostile intentions towards them. Their
neutrality ensured them relative security and since their main task was to make sure that the
warring parties would not start fighting again or that a peace treaty was not broken by any side,
the need for good tactical intelligence was basically non-existent since tactical intelligence “is
intended primarily to respond to the needs of military field commanders so they can plan for, and
if necessary, conduct combat operations (Encyclopaedia Britannica, 2009).”
Actually, the character of most traditional peacekeeping operations made them purely
intelligence operations monitoring both sides of the conflict with an attached, lightly armed
military force to act as a deterrent. UNEF I, for example, consisted mainly of reconnaissance
10
For a comprehensive list of past and ongoing UN peace operations, see UN Department of Public Information,
2008.
41
units.11 The Yugoslavian army, for example, sent a whole reconnaissance battalion which was
supported by elements of a Canadian light cavalry battalion (United Nations, 2009).
The nature of traditional peacekeeping as intelligence or reconnaissance missions would
suggest that the experiences gained in those missions would have prepared the UN for situations
in which one participant of a conflict would not be willing to fully cooperate. However, there
are major differences between a situation in which both sides are willing to cooperate and one in
which at least one group is not. In first generation peacekeeping the main job of the troops is to
conduct reconnaissance along a demarcation line to find out if someone tried to cross it or not.
In order to do this it is sufficient to patrol the line with soldiers on foot, by vehicle or by plane
and if the terrain allows for it, the establishment of lookouts. Those activities, though, are openly
visible to the conflict parties and are obviously not aimed at anyone in particular. One could also
call them defensive operations.
Other than to fulfill the mandate those troops had no need for increased, more offensive
intelligence capabilities, because the peacekeepers were respected and there was no danger of
hostilities directed towards them. The repercussions a country would have faced after attacking
peacekeepers were serious enough to keep anyone from doing so. On the other hand, the UN
troops were only in an area because they were asked to be there by the conflict parties. That
consent might change, and it did at times, but if one party felt that the peacekeepers were not
needed or wanted any more, they could just ask the UN for the withdrawal of its troops and the
UN withdrew its troops as soon as possible. UNEF I, for example, ended because the Egyptian
government asked the UN to withdraw its troops, claiming that they were not needed any more
11
UNEF I was established in 1956 to secure and supervise the cessation of hostilities, including the withdrawal of
the armed forces of France, Israel and the United Kingdom from Egyptian territory and, after the withdrawal, to
serve as a buffer between the Egyptian and Israeli forces (UN Department of Public Information, 2003).
42
and after putting some pressure on the UN forces, the UN complied with the request (Lowe,
Roberts, Welsh, & Zaum, 2008, p. 181).
Second Generation Peacekeeping
The widening of responsibilities and mandates for peacekeepers changed the premises.
The peace operations were not just observer missions anymore, they were required to ensure that
humanitarian aid could be delivered, to prevent human rights violations and that functioning civil
administration could be installed to enable the conduct of free, democratic elections among other
things.
The changed geo-political situation also led to a different situation. In intra-state or
trans-national conflicts, the number of conflict parties increased and the distinctions between
those groups were vague at best.
These situations demanded a different approach to peace operations. It was not enough
to just react to a war and if called upon to send in some peacekeepers to ensure that the fighting
would not flare up again. Now the role of the peacekeepers turned into an active one and any
active military operation requires much more intelligence to succeed than a passive one.
The preparatory stage of the missions already required different planning. If troops are invited to
help but only perform passive, defensive operations in a clearly defined area, it is fairly easy to
evaluate the situation and to assess how many troops are needed to fulfill the mandate.
However, the situation the peacekeepers encountered in second generation peacekeeping
was different. It usually was a more fluid situation in which it was almost impossible to
determine where one sphere of influence ended and another one started. In a conflict like that,
the upfront preparations require a lot more information to ensure that, first, the mandate given is
43
adequate and, second, that the mission will succeed. In order to exactly assess the situation in
the conflict, good strategic intelligence is necessary. The planners of the mission need to know
what caused the conflict (ethnic, religious differences, access to natural resources, etc.), who the
parties in the conflict are, if there is a functioning central government, what the humanitarian
situation is like, what the groups are fighting for and, finally, if the conflict parties are interested
in UN intervention or not (UN Department of Peacekeeping Operations, 2006, p. 6). Some of
these things are fairly easy to figure out, but for some a great deal of information is necessary.
And most importantly, if the planners get it wrong, the mission will most likely fail.
The mission to Bosnia (UNPROFOR) is a good example for a lack of planning ahead of
time. The mandate originally did not mention Bosnia at all, because the UN force was sent to
stop fighting and ethnic cleansing in parts of Croatia. This mission went almost as planned and
succeeded. Shortly before the troops were to be withdrawn, the conflict in Bosnia started and the
UN decided to use the troops already in the area to make sure that the civilian population in
Bosnia received humanitarian aid. However, the change of the mandate of UNPROFOR did not
take the actual situation in Bosnia into account. Because of a lack of information, the
determination of the Bosnian Serbs to succeed was gravely underestimated, as well as their
opposition to UN interference in the conflict. In the end, the peacekeepers were not able to
fulfill their new mandate, because the Serbs did not cooperate. In many instances the Serbs
would either not let the supply convoys pass or they just took the supplies for themselves. Even
after the Security Council authorized UNPROFOR to take “all measures necessary to facilitate
the delivery of humanitarian assistance” under Chapter VII in August 1992 (United Nations,
1992) the situation did not improve. Most troop contributing countries, especially the British,
would not authorize their troops to use force for fear that this might endanger the troops.
44
The idea of establishing UN safe zones to protect civilians from ethnic cleansing was also
a good idea, but again, the lack of information from the ground and the disregard of previous
experiences led to catastrophe. Without proper preparation and equipment the UN troops were
tasked with protecting cities from Serbian attack. In addition, there was no attempt by the UN to
find out what the Serbs might think about such a move and what their reaction might be,
believing that the threat of airstrikes would keep the Serbian troops from attacking (Finlan, 2004,
p. 49). This might have worked if the UN would have been willing to show that this threat was
sincere and also by keeping the Bosnian Muslims from staging attacks on Serbian positions out
of those safe zones.
So, after all, second generation peacekeeping still suffered from a lack of intelligence
capabilities as well as the reluctance of the UN to acknowledge this. They still depended on the
intelligence provided to them by states participating in the mission. It seems like this might
work, since all militaries have intelligence capabilities, but there are also several problems
connected with that. Not all armies are on the same technological level, so the quality of
intelligence depends mainly on what countries are participating in a particular mission.12 With
the reluctance of the US to send peacekeepers since UNOSOM, the UN does not have access to
the best possible intelligence any more.
Another problem is the reluctance of countries to share their intelligence with troops from
non-aligned countries even if they are serving in the same mission. In Bosnia this became an
issue, when the commanding officer of UNPROFOR‟s intelligence unit was Swedish and his
subordinates from NATO countries received intelligence from their respective home countries
but could not share it with their commanding officer so that he might put it to good use (De Jong,
12
see e.g. Krishnasami, 2003, p. 34, for an account of Bangladesh‟s participation in UNOSOM II and the lack of
equipment of the Bangladeshi troops.
45
Wies, & Steele, 2003). As a reason for that most countries claim that they do not want to
compromise their sources or the level their intelligence capabilities are at. Generally, this is
understandable, however, if the unwillingness to share vital information might endanger the
overall success of an operation or the lives of UN personnel, it might be a good idea considering
the establishment of a UN entity that coordinates the intelligence gathering process and which
makes sure that no one‟s sources will be compromised. The question also remains whether it
might be possible to instill enough trust into the participants of a peacekeeping mission so that
they take intelligence from their partners without demanding to know where the intelligence is
from and how it was collected. After all, it is more important to have the necessary information
than to know its source.
UNPROFOR in Bosnia
Bosnia also shows that there are not only deficiencies in the way intelligence is generated
and shared, but also that there are major problems with the command structure of peace
operations, especially when it comes down to cooperating with non-UN entities. In Bosnia,
NATO was supposed to deliver support to the UN mission in several ways. NATO‟s tasks were
to enforce a no-fly zone over Bosnia and the UN arms embargo, provide air support against Serb
aggression and intelligence support to the troops on the ground (Finlan, 2004, pp. 47, 81). For
various reasons, all of those seemingly straightforward tasks could not be fully accomplished.
The enforcement of the no-fly zone over Bosnia could have been an easy task for NATO.
They deployed AWACS surveillance aircraft into the region, watching Bosnian airspace and
were able to detect almost all violations. However, the enforcement of the no-fly zone was only
a partial success because it was ignored about 3,317 times during the war and as a result, only
46
four planes were actually shot down by NATO aircraft in almost 100,000 sorties flown from
Italy and aircraft carriers (Jackson, 1997, p. 14). This low number of downed aircraft can be
explained by the limited number of fixed wing aircraft available to the various parties,
amounting to about 35 in total (Clark, 2002), and the fact that neither party actually engaged
their planes in combat missions. The bulk of the flights within the no-fly zone were done by
helicopter, and by the time a NATO pilot was authorized to shoot the helicopter down, it was
usually already out of range or had landed.
The enforcement problem was that there were two parallel chains of command, one
within NATO, the other within the UN. So, in the case of the no-fly zone, a NATO pilot, after
having detected an airspace violation, had to ask his superior for permission to engage, who in
turn had to go all the way up the NATO chain of command and then NATO had to inform the
UN Secretary General in New York and get his permission to engage. By the time the
permission to engage came back down the chain of command, several hours had passed and the
NATO pilot had most likely already returned from his mission (Thomas, March 1995; Gawne,
1996, p. 2).
In general, two parallel chains of command would not have posed a problem. It had to be
expected because two international organizations were militarily engaged in the conflict and
neither would want to give up power over its troops. However, the cooperation between the two
organizations happened on levels that were too far up the chain of command to be effective. It
became apparent that neither side fully trusted the other which only allowed for cooperation at
the highest levels. Even though this way of cooperation made sure that military commanders on
either side would not make decisions the other side did not want them to make, it also greatly
diminished the efficiency of cooperation. A low level cooperation would have made more sense
47
in order to fulfill the mission. In the example of the no-fly zone, the enforcement would have
been much more efficient if the pilot‟s superior would have been authorized to make the decision
to engage without having to go all the way to the UN Secretary General. But the chain of
command was not the only problem the NATO encountered in its quest to help the UN. NATO
had to overcome some substantial internal obstacles first.
The mission to Bosnia marked the first time that NATO air and naval forces actively
engaged in hostilities. So the beginning of the mission was a test run for NATO structures itself.
No one knew for sure how and if the existing structures would work. Additionally, when
Yugoslavia started to fall apart, NATO was ill equipped for dealing with the problem in the first
place, because there was no information on Yugoslavia whatsoever.13 This seems odd at first,
considering that Yugoslavia was a socialist country, but NATO had fairly good relations with
Yugoslavia and therefore did not waste any of its intelligence capabilities on watching the
country. They were more concerned with the Eastern Bloc states. So, when the conflict on the
Balkans started, NATO at first had to get information from any source it could get. One of the
sources that were tapped by them, for example, was the website of a river barge owners‟
association in Yugoslavia, who had pretty accurate information on where fighting took place
along the Danube and Save Rivers in the area (Schuster, 1995). Another issue was that NATO
did not have any ground troops in Bosnia that could have collected intelligence. At the
beginning of the conflict, NATO established links with the International Red Cross and UN
Humanitarian Relief Organizations to get an idea of what was going on daily in Bosnia (Wentz,
1998).
13
Yugoslavia had been considered a neutral to friendly nation by NATO, excluding it from intelligence collection.
NATO‟s intelligence support mechanisms were still focused on war with the Soviet Union, thus the lack of available
intelligence for operations in the conflict. For more information see Schuster C. O., 2004.
48
Another way NATO gained intelligence was through interviewing refugees and
monitoring the mostly Serbian radio transmissions. NATO actually provided a daily intelligence
briefing for the UN troops in Bosnia, but the cooperation was so dismal that the briefings rarely
reached the UN commanders on the ground. For example, NATO intelligence knew about the
attack on Srebrenica several days before it happened, but in the upper command structure of the
UN no one believed it and by the time NATO could get someone to Srebrenica to warn the
peacekeepers there, the massacre had already happened.14 However, even with ample notice the
300 ill equipped Dutch peacekeepers could probably not have prevented the Serbs from taking
the city anyway.
The UN‟s experience in Bosnia and Somalia opened the eyes of quite some UN officials
to the fact that in order to conduct multilevel peace operations successfully, the UN needs to
change its stance on intelligence.
The UN Reaction to Bosnia and Somalia
The UN finally realized that reforms in the Department of Peacekeeping Operations
(DPKO) were necessary and established a commission to examine the peacekeeping process and
to work out solutions to the shortcomings in the DPKO. The results were published in the
Brahimi Report, which was followed by several more reports on the progress of the reforms.
The main conclusion of the report was that the lack of a functioning global information
collection, processing and analysis capability was preventing the UN from successfully
conducting peace operations (United Nations, 2000).
1414
For a discussion of the role of intelligence before the Srebrenica massacre, see Wiebes, 2003, Chapter 8.
49
The aversion towards the word intelligence within the UN causes some serious problems.
The lack of accountability leads to the general notion that the UN cannot handle or collect
information efficiently or effectively. Because of this, the Secretary General has to rely on
informal information sharing from member states in addition to the information he might be
getting from UN fact-finding teams. However, this does not mean that the UN did not try to
formalize the process of information gathering.
Over the years, the UN had established over sixty UN Information centers around the
world. Secretary-General Javier Pérez de Cuéllar saw the need to improve the information
gathering capability of the UN. His attempt to streamline the flow of information from the
regional offices to the UN headquarters in New York failed, however, because the directors of
most of these offices had “no concept of the nature of political reporting (Sutterlin, 2003, p. 18).”
To improve the quality of information he was getting, Secretary-General Pérez de Cuéllar
founded the Office of Research and Collecting Information (ORCI) in 1988 as a part of his
personal staff (Peck, 1998, p. 72f). ORCI‟s mandate was to collect, organize and analyze
political information to help the secretary-general improve the UN‟s preventive diplomacy
efforts. Unfortunately, the office never got the necessary funding and personnel and experienced
massive internal pressure from other UN offices. Subsequently, when Boutros Boutros-Ghali
succeeded Mr. Pérez de Cuéllar as secretary-general, he quickly shut ORCI down in 1992, after
only four years (Smith, 1994, p. 188).
Secretary-General Boutros-Ghali was intent on changing the structure of the UN
Secretariat and understood the need for good information. Therefore, he assigned the
responsibilities of the ORCI to the newly created Department of Political Affairs and organized a
formal training of the personnel. The training was done by the UN Institute for Training and
50
Research in Geneva in association with the International Peace Academy (Sutterlin, p. 19). For
the first time a UN training program was created whose main purpose was to train UN officials
in the collection and analysis of information.
Because the UN already has offices and field representatives in nearly every country in
the world, gaining information on political, economic or any other issue is no problem for the
UN. The UN only lacks the system to properly treat the information that is gathered and
incorporate it into an early warning system. Similar systems already exist within the UN
organization to track refugee streams and food and other humanitarian crises. All this
information that is already gathered could provide desperately needed strategic information for
either crisis prevention or preparations for peacekeeping missions. On the other hand, it is not
feasible to expect UN personnel like UNHCR staff operating in a crisis region to start collecting
information on the various factions of the conflict in addition to their original tasks. There is a
need for a different entity to coordinate the effort of collecting and especially organizing
operational and tactical intelligence (De Jong, Wies, & Steele, 2003, p. 329).
The UN has made great strides towards integrating intelligence operations into its peace
operations. One step in this direction was the recent introduction of the Joint Mission Analysis
Centre (JMAC) and Joint Operations Centres (JOC) in 2006. Both already come pretty close to
being intelligence entities. A DPKO policy directive describes the task of the JMAC to be
“integrated operations monitoring, reporting and information analysis hubs at Mission
headquarters to support the more effective integration of mission-wide situational awareness,
security information and analysis for management decision-making (UN Department of
Peacekeeping Operations, 2006).”
51
The JMAC usually consists of experts in all the fields a multi-dimensional peace
operation might be concerned with. There might be political analysts, development and security
experts as well as humanitarian assistance and legal professionals working on the same team,
providing the operation‟s commander and the secretary-general with necessary information. The
JMACs are supposed to deliver intelligence on three different levels, operational intelligence
support for the conduct of peace operations, tactical intelligence to ensure the safety and security
of UN and other humanitarian assistance personnel and also strategic intelligence to support
decision making at the UN headquarters in New York in preparation of peace missions
(Cammaert, 2004).
The JMAC is an entity that streamlines the decision making and information sharing process
within the UN system. In most modern integrated UN missions at least several different UN
departments are participating. The JMAC might be used as a tool to avert a waste of resources
by decreasing redundancies. If the JMAC works properly it coordinates efforts between different
departments, thus minimizing the risk that any two departments are doing the same (UN
Department of Peacekeeping Operations, 2006).
However, because the UN is an institution organized in departments according to their
function, the process of integration is not an easy task. Some departments are quite unwilling to
subordinate their interests to the interests of the overall organization. They fear that by doing so
they will lose importance and valuable resources (Pelz & Lehmann, 2007, p. 2). If these
problems are not resolved before the JMAC is assembled, there could be problems further down
the line.
52
Another issue the JMAC is facing is the way it is treated by the UN leadership. If the UN
leadership treats the JMACs as personal information tools, most of their potential is wasted,
especially once the mission is under way and the field commanders need information to
successfully conduct their operations (Franco, 2009, p. 7f). On the other hand, if the JMACs are
not equally accepted by all participating departments, their positive effects on the mission are not
utilized. There is definitely a tendency towards that, because the JMACs were created after the
DPKO demanded that they need better intelligence support (Ngulube, Hagglund, Erskine, &
Tubman, 1995, p. 20f). As a result, many civilian UN departments are reluctant to send
personnel to work in the JMACs.
In general, the JMAC concept has the potential to one day fulfill the role of an
intelligence capability for peacekeeping missions. So far, it has shown its potential within the
setting of a peace operation, but the task of also providing strategic intelligence for the upper
management level is likely to cause discussions of where in the chain of command the JMACs
should be located. If the location stays within the DPKO chain of command, the concept could
be further developed into an intelligence entity for peace operations. If the UN leadership
decides to take the JMACs out of the DPKO in order to make them more appealing to the
civilian departments their value for the commanders of the peacekeeping troops might be limited,
but the improved strategic intelligence for the upper management of the UN could lead to major
improvements in the planning process of peace operations. How the intelligence process within
the UN could be improved and the role open source intelligence (OSINT) might play in will be
discussed in Chapter 3.
53
Chapter 3
The Use of Open Source Intelligence in UN Peacekeeping Missions
For the UN, the problem with intelligence is twofold. On the internal level the use of
intelligence capabilities on all levels is controversial. On the tactical and operational level, the
field commanders are on their own, either having to use whatever intelligence their troops can
produce or being at the mercy of technological more advanced member states like the US and
their willingness for intelligence support. On the strategic level the members of the Security
Council have to rely on the information their own intelligence services produce which they
cannot or will not share with the other members for fear of compromising sources or collection
technologies.
Another issue here is the difference in intelligence capabilities. The US as the sole super
power left has the most advanced collection methods and invests the most money in its secret
services. However, after UNOSOM II, the US has not sent many troops to participate in UN
peace operations.15 After 9/11 with two wars going on in Iraq and Afghanistan, the possibility
for an increase in US participation in UN missions is basically non-existent. On the other hand,
countries like Bangladesh and Pakistan are sending the most peacekeepers, but their troops rely
mostly on intelligence support from more advanced countries. The question is whether countries
like the US are willing to divert their resources in assistance of foreign UN troops, giving those
countries basically a free ride.
15
According to numbers published by the Henry S. Stimson Center, US troop contributions to UN peacekeeping
missions at the end of 2005 totaled 308 (Henry L. Stimson Center, 2005).
54
One solution to this predicament could be Open Source Intelligence (OSINT), the use of
openly available information for UN purposes. The use of OSINT is not a new concept and it
has been used successfully in the past.
OSINT in a Historic Context
Openly available information has been used by military intelligence in the past. One
impressive example of this is the Japanese intelligence effort during the Russo-Japanese War of
1904-05. At the outset of the war, the Russian Far East Fleet was outnumbered by the Japanese
Navy. Not only did the Japanese have superior numbers, their ships were also more modern. In
order to defeat the Japanese fleet the Russian leadership decided to send the Russian Baltic Fleet
to assist in the conflict. The Japanese were able to follow the movements of the Baltic Fleet all
the way from St. Petersburg to Vietnam by utilizing information readily available in British
newspapers. Those newspapers reported continuously on the advance of the Russian fleet after
the Russians mistook a British fishing fleet at the Dogger Bank in the North Sea for Japanese
warships, sinking several trawlers in the incident. Because the Japanese new exactly when to
expect the Russian fleet, they were able to prepare for their arrival and achieved a decisive
victory (Jukes, 2002, p. 72ff).
During World War II, the Japanese themselves were the victims of open source
intelligence efforts. The US Office of Strategic Services (OSS) used publications and broadcasts
of warship commissioning in Japanese media to get an idea of the size of the Japanese naval
forces due to a lack of agents and spies in Japan.
55
OSINT defined
Due to the availability of open source information, OSINT could be an easy, adequate
solution to the UN intelligence problem. But first the question what OSINT is needs to be
answered. The Office of the Director of National Intelligence (ODNI) defines open source
information as “publicly available information that anyone can lawfully obtain by request,
purchase, or observation. This includes almost all information on the internet, in newspapers,
scholarly or academic papers. OSINT is defined as intelligence “produced from publicly
available information that is collected, exploited, and disseminated in a timely manner to an
appropriate audience for the purpose of addressing a specific intelligence requirement (Office of
the Director of National Intelligence, 2006, p. 8).”
NATO defines four different forms of OSINT. Open Source Data (OSD), Open Source
Information (OSIF), Open Source Intelligence (OSINT) and finally Validated OSINT (OSINTV), showing a progression of information through the intelligence cycle (NATO, 2001). OSD is
considered to be raw information from a primary source like photographs, tape recordings or
commercial satellite images. OSIF is considered to be generic information that is usually widely
distributed and already at least partially validated and filtered. OSINT describes the process of
information that has been “deliberately discovered, discriminated, distilled, and disseminated to a
select audience, generally the commander and their immediate staff, in order to address a specific
question (NATO, 2001, p. 2).” OSINT-V is the product of a validation process, either by using
classified intelligence sources or unquestionable open sources.
OSINT is not a process that stands by itself, it usually is part of an all-source intelligence
effort. In general, OSINT is considered to make up 80 percent of the information available to
56
intelligence analysts on developments outside of their home country (Hulnick, 2008, p. 3;
Deyevre, 2008). Considering this high percentage, the use of OSINT could be a viable option
for the UN to accommodate its need for intelligence without compromising its goal of neutrality.
OSINT can provide enough information on the political situation, the history of the
conflict, the conflict parties and regional powers to enable the Security Council to get a detailed
view of the conflict before drafting a resolution for a peace mission. Openly available
information can even enable the commander of the peacekeeping force to conduct what is called
„Intelligence Preparation of the Battlefield.‟ This is usually done to reduce “uncertainties
concerning the enemy, environment, and terrain for all types of operations (Fordham, 2000).”
With the tools available on the internet today, this can be achieved by using publicly
available information. For example, it is no problem to get detailed information on the terrain
the peacekeeping force will encounter in the target area. Geographic information such as maps,
infrastructure and terrain as well as and high-resolution satellite images are readily available
online for free or for a small fee on websites such as GoogleEarth. The fee for the commercial
version of GoogleEarth is currently US$400 (GoogleEarth: Explore, Search, and Discover,
2009). In connection with GPS systems, important buildings, crossroads or radio stations can be
easily found and marked before going in. Ten years ago, this could only be done by the US or
Soviet intelligence community which was the only entities with access to sufficient satellite
imagery.
57
Current Use of OSINT
Currently, OSINT is used successfully by various entities. The US intelligence
community and NATO, for example, are working hard on integrating OSINT into their allsource intelligence approach, thus recognizing the importance of utilizing public information and
making it possible to share parts of their intelligence with others.
The US intelligence community has always used OSINT to complement intelligence
gained by the traditional clandestine intelligence services. However, in 2006, the Office of the
Director of National Intelligence (ODNI) published a directive institutionalizing OSINT. The
directive established the position of Assistant Deputy Director of National Security for Open
Source, the National Open Source Committee and an Open Source Center (started in 2005). The
directive created a uniform open source strategy, policy and program guidance for the US
intelligence community. The Open Source Center creates reports, translations and analytical
products from publicly available information and makes those available to government officials
of all branches. It also assists other intelligence agencies to develop open source centers on a
smaller scale to improve their all-source intelligence approach (Office of the Director of National
Intelligence, 2006).
NATO is using OSINT to make intelligence sharing between its members easier. Up
until the end of the Cold War, most NATO members were fairly cooperative in sharing their
intelligence with other member states, because all of them had the same enemy and it was in
their best interest to let the other countries know what they deemed necessary. The fact that only
a few countries (Greece, Turkey, Western Germany and Spain) joined the organization during
the Cold War also helped in that respect. After the fall of the Berlin Wall, NATO opened to
58
former Eastern Bloc states and in 1999 the Czech Republic, Hungary and Poland “became the
first former members of the Warsaw Pact to join NATO (NATO, 2009).” In 2004, seven more
countries joined the alliance, bringing the total number of members to 26.
Between the Cold War members and the new members a substantial technology gap
existed and still exists. The intelligence capabilities of the old members, especially the US and
the UK, were much better than those of the new members that were still in the process of
restructuring and modernizing their armed forces when they joined NATO. In addition, the US
Senate had an issue with the new member states‟ data security and counterintelligence systems.
The fear was that intelligence provided by the US could be compromised and might eventually
end up in the hands of hostile/enemy intelligence services (United States Congress, Senate,
2000). However, NATO leadership took and still takes the improvement of interoperability
seriously and works hard to improve it.
NATO held several exercises in 2005 and 2006 to test intelligence interoperability
between the member states. A Situation Centre (SITCEN) was established at NATO
headquarters in Brussels to fulfill three distinct functions. It is supposed to assist NATO
leadership in its consultation function, “to serve as a focal point within the Alliance for the
receipt, exchange, and dissemination of political, military, and economic intelligence and
information (NATO, 2002),” and to facilitate the sharing of intelligence between members. In
addition, NATO created a Intelligence Fusion Centre at the US airbase in Molesworth, UK, to
facilitate the sharing of intelligence between the US and the rest of the NATO members
(Supreme Headquarters Allied Powers Europe, 2006).
59
Another step to enhance information sharing between its members was the introduction
of the CENTRIXS system. The CENTRIXS system is an online platform aimed at enhancing
interoperability between multinational partners (Boardman & Shuey, 2004, p. 2). This system
gives military members of different countries a secure way of communicating. They can access
the system via satellite or by using an ordinary landline. It is also not only in use at NATO any
more. By August 2008, the system had been opened to various other countries (Brannon, 2006).
The US Navy, for example, uses it during its biennial RIMPAC exercise. In this exercise, navies
from all allied Pacific Rim nations usually take part.
However, the CENTRIXS system is not an OSINT system, but it has the potential of
being used in peacekeeping missions. The US Navy just introduced the Indonesian Navy to the
system with the goal of improving their logistics system in case of another natural disaster in the
area (McLendon, 2008), so the system probably does not give its users access to sensitive, top
secret material.
NATO also operates a peacekeeping section that is supposed to provide “conceptual and
technical strategic planning and advice on peace support operations (NATO, 2002).” It is also
tasked with developing a joint Alliance policy on peacekeeping. In those functions, the
peacekeeping section keeps in close contact with other international organization like OSCE,
UN, UNHCR and OHR.
The Use of OSINT in the EU and NATO
In the course of its unified security and defense policy, the EU Military Committee
installed an intelligence division to deal with intelligence requirements for EU-led security
60
missions. In case of security missions that are using any NATO equipment or assets, the default
location for the operations center will be at the Supreme Headquarters Allied Forces Europe
(SHAPE) in Mons/ Belgium. The EU intelligence division is getting finished intelligence
products from EU member states which it turns into intelligence products that can be
disseminated EU wide. In order to produce the best, non-biased intelligence possible, the EU
intelligence division corroborates the intelligence it gets with openly available information from
the EU‟s Joint Situation Center, Policy Unit and the EU Commission (Vas Antunes, 2007).
However, OSINT only plays a supporting role.
At first glance, it does not seem clear why the UN should look at NATO in order to solve
its intelligence problem. NATO is a military alliance, the UN is not. However, being a military
alliance seemingly makes NATO an expert in all military matters, including intelligence
gathering, but surprisingly, NATO is not an expert in intel gathering at all. On the contrary,
NATO does not have an intelligence gathering capability of its own, just like the UN. NATO
leadership is also dependent on intelligence its members provide. In order to fill eventual
information deficiencies, NATO installed an OSINT system to utilize publicly available
information.
NATO has published three works on OSINT in 2001 and 2002 that could be used as a
guideline or basis for a future UN OSINT system. The main work is the NATO OSINT
Handbook (NATO, 2001).16 This publication explains all aspects of OSINT concerning military
use. This basic work was supplemented by two others, the NATO Open Source Intelligence
16
To access the Handbook online, go to http://www.oss.net/dynamaster/file_archive/
030201/ca5fb66734f540fbb4f8f6ef759b258c/NATO%20OSINT%20Handbook%20v1.2%20-%20Jan%202002.pdf.
61
Reader (NATO, 2002)17 and the NATO Intelligence Exploitation of the Internet (NATO, 2002).18
The supplemental reader contains papers and articles from world-wide experts on how open
information can be integrated in an intelligence product. The third publication is the most
specific of the three as it exclusively deals with the exploitation of one source of open
information.
NATO officials recognized the importance of OSINT for their operations. They call it
the major new "force" in 21st Century Information Operations (IO) in connection with the
internet. A lesson learned from the NATO involvement in Bosnia also included in the Handbook
is that NATO acknowledges the fact that in post Cold War operations have changed dynamics of
command & control and information, especially humanitarian assistance or disaster relief. These
operations are most likely outside of the NATO sphere of influence and need detailed
information about “infrastructure, demographics, health, and other matters not traditionally
addressed by classified information collection operations (NATO, 2001),” but can be adequately
addressed through OSINT.
The Handbook also recognizes the importance of OSINT for coalition operations. It
enables all participants, insiders and outsiders to operate using a similar level of information.
According to NATO, OSINT is actually an integral part of an all-source intelligence model. The
SACLANT Intelligence Branch calls OSINT a “vital element of the all-source intelligence
process” that has been neglected for “too long (NATO, 2001, p. 36).” To illustrate the
importance of OSINT for the all-source intelligence process, NATO developed the following
17
The NATO OSINT Reader can be found online at http://www.oss.net/dynamaster/file_archive/
030201/254633082e785f8fe44f546bf5c9f1ed/NATO%20OSINT%20 Reader%20FINAL%2011OCT02.pdf.
18
This work can be accessed online at
http://www.oss.net/dynamaster/file_archive/030201/1c0160cde7302e1c718edb08884ca7d7/
Intelligence%20Exploitation%20of%20the%20Internet%20FINAL%2018NOV02.pdf.
62
figure which depicts OSIF and OSINT as the basis for an all-source intelligence analysis. Using
the NATO model as a foundation, the UN could be able to form a proper working intelligence
capability. But as Figure 2 shows, there will still be the need for traditional intelligence
operations to complement the OSINT process and to provide the UN with the best intelligence
possible.
Figure 4: Open Source – All Source Relationship (NATO, 2001)
Intelligence Support for the UN
OSINT is something the UN could conduct by itself without having to rely on outside
help. Most of the information needed is readily available on the internet. OSINT might be able
to provide the UN with the necessary intelligence to warn of possible conflicts or humanitarian
catastrophes to give the UN enough time to intervene. It should also be good enough to assist
the UN leadership in planning interventions and peace or humanitarian operations. It can also
provide an enormous amount of information on the target area for the commander of the
63
peacekeeping force so that he can prepare his troops as best as possible. Once the troops are on
the ground, however, OSINT usually reaches its limitations. For the successful conduct of the
mission in the target area, more than OSINT is necessary.
With most peace operations so far, the UN has almost completely relied on outside help
for intelligence support of its missions. In most cases the troop contributing countries also
provided the intelligence for the commanders in the field. During the earlier peace operations
this used to be no problem, because the US, Britain, France as members of the Security Council
were not supposed to send combat troops. They provided the financial and logistical support,
including intelligence support, to peace operations (Baker, 1994). Because of this, it was no
problem for the combat troops to get the necessary intelligence support that they needed. But
things have changed, and today most troops in peace operations come from poor countries like
Bangladesh. Some of these countries send their troops to UN missions so that the UN will pay
for them and their home government can save the money. Generally these troops are also poorly
equipped and do not possess the ability to conduct intelligence operations other than patrolling or
interviewing refugees on their own. More than ever do they rely on countries like the US to
provide them with the intelligence they need.
In the light of these problems, the UN will have to think about how to get the necessary
intelligence support for its peace operations. With two wars in Iraq and Afghanistan, the US will
probably not send any troops to peace operations again anytime soon. So, the commanders of
peacekeeping forces will not be able to rely on the American contingent among their troops to
conduct local intelligence operations for the rest of the force. Considering the reluctance of the
Russians or Chinese to actively engage in UN peacekeeping, it seems unlikely that they might be
willing to assists the UN in intelligence matters.
64
However, there are several possibilities that exist. The French, for example, suggested
that the UN get an intelligence satellite, paid for by the international community, so that it can
conduct its own intelligence (Herman, 1997, p. 364). Considering the sentiment against
intelligence within the UN, though, it seems highly unlikely that this idea will ever be realized.
And having one satellite to monitor the currently sixteen peacekeeping missions would probably
not be enough. The US was estimated to have about six imaging satellites in orbit before the
year 2000, but planned to increase that number by several dozens (Silber, 1999) and that before
the wars in Iraq and Afghanistan even started. These numbers suggest that the best way for the
UN would be to cooperate with the US.
Improvements to the UN Intelligence Process
After the failures in Bosnia, Somalia and Rwanda, the UN realized that there was a need
for better intelligence, but still called information. The first step was to establish the Lessons
Learned Unit within the DPKO. Its task was to examine past peace operations and to assess
what worked and what went wrong in order to improve future missions. The results were quite
obvious. Whatever went wrong in peace operations, it could almost always be traced back to a
lack of information, be it strategic for the planning process or operational/tactical for the conduct
of the mission. Most failures could be attributed to a lack of information.
The notion of a lack of information was further reinforced by the Brahimi Report. Its
main recommendation for the secretary-general was that the UN could not afford to act on barely
any information and that it needed to improve the quality of information at every level. A first
reaction was to establish JMACs and JOCs to improve the integration of all participating UN
65
departments in a particular mission and to streamline the process of information gathering. In a
second step, the UN needs to decide how it wants to get the information it needs. The decision
will probably be between intelligence support by member states, most likely the US, the
development of an own intelligence capability out of the JMACs by using OSINT or a mix of the
two.
But first, the UN has to decide where to get intelligence support for its missions from and
what kind of intelligence they need/want. Naturally, when it comes down to military matters, the
first look goes towards the militarily most powerful country, which currently is the US. The US
would be willing to provide intelligence support to UN missions, especially if the conflict is also
affecting US national interests. In order for a close cooperation to work, there are several issues
that the UN needs to work on beforehand.
The UN needs to create an entity within the institution that provides it with an adequate
intelligence basis, making sure that they do not solely rely on the US support. Using the NATO
model for OSINT and applying this model to the JMAC idea could lead to an effective solution
to that issue. A solid intelligence basis of its own would also help the UN to avoid creating the
impression that it is no longer neutral but a US run institution, which could happen if the UN
relied too much on US support.
For the US to consider supporting the UN with intelligence, the UN also needs to
improve its accountability, communications and information security system (Knutsen, 2008).
So far, consensus within the UN was that in order to show all parties in a conflict that the UN is
neutral all of its communications in the field had to be done over open, non-secure lines. The
reasoning behind this was that this would prove to the conflict parties that the UN was not taking
66
sides or spying on any of them. For the UN to receive sensitive information from the US, it has
to change that practice, because the US will not take the risk that its sources or technology might
be compromised in an UN operation. This could easily be done by providing the peacekeeping
troops with secure communication gear that is commercially available. Some of those
commercial communications gears are so secure that even the NSA is having trouble breaking
the codes and is thus actively involved in creating US encryption standards (Barker & Kelsey,
2007).
Additionally, the UN could introduce its own classification system for intelligence. For
example, sensitive information could be classified as secret and only the UN Secretariat and the
troop commanders in the field would have access to it and non-sensitive information and OSINT
could be classified as general information and be made accessible to everyone. The fear of
intelligence being compromised is a leftover from the Cold War, when the US did not want to
share its intelligence with the UN for fear that the Soviet Union might be able to figure out US
collection methods and technology and develop countermeasures. Even with the Soviet Union
gone, there is still much mistrust going around. The war in Bosnia is a good example for that.
There the US was even hesitant to share intelligence with some NATO allies. They feared, for
example, that the French would share information with the Serbs, because they traditionally had
closer ties to them than to the other conflict parties going back to World War I (Wiebes, 2003).
The US also feared that what the Serbs knew, the Russians would eventually get to know,
because they were the Serbs only ally and that had to be prevented, so, in the end, there was only
limited intelligence sharing between the US and the French.19 But if the UN would standardize
19
The fears that the French would share intelligence with the Bosnian Serbs or the Serbia proved to be justified. In
1998, a French army officer working at NATO Headquarters in Brussels was arrested on suspicions of spying for
Serbia, informing the Serbs on possible targets of NATO airstrikes (Truehart, 1998).
67
its treatment of intelligence and would increase the accountability, the US could share at least
some intelligence with the UN.
The US has already started to implement OSINT into its all-source intelligence plan.
Most intelligence agencies have established a capability to utilize OSINT to their advantage.
These capabilities could easily be used to help the UN with necessary intelligence. The DNI‟s
office officially coordinates the collection of OSINT within the US intelligence community and
should therefore have the newest and best intelligence available. The ODNI in this function
could also coordinate US intelligence support to UN peace operations. In certain cases, the
ODNI could also enhance the quality of the intelligence gained from openly available
information by including some intelligence that was collected otherwise without telling the UN.
Burying this intelligence in OSINT would enable the US to provide the UN with timely quality
intelligence without the risk of compromising important sources or technologies.
The newer forms of UN peace operations where the UN authorizes another international
institution or a regional power to conduct peace operations for them require a different approach
from the US. In this case, the US will have to amend existing bilateral treaties on information
sharing to include peace operations conducted by the country in question. It would not be
feasible in this instance to first share the information with the UN Secretariat, because the
Secretariat is not directly involved. However, this approach could also cause some resentment
within the UN Secretariat since the field commanders would have a better level of information
than the authorizing institution.
There are some issues the UN should take seriously, though. Using the US as its primary
partner and provider of intelligence means that the UN Secretariat will be walking on a thin line.
68
If member countries or parties in a conflict the UN is intervening in feel that the UN is too
dependent on the US, the principle of neutrality of the peacekeepers could be jeopardized,
endangering the troops. On the other side, as long as the US is the world leader in intelligence
production and basically the only country willing to help the UN, the Secretariat has little choice
than to depend on US support.
Forms of US Intelligence Support
There are several ways the US could help UN forces with intelligence support. They
could provide tactical intelligence for early warning to protect UN troops from attacks. The US
could provide operational intelligence to troop commanders helping them achieve their mission
objectives easier and with minimal casualties.
Tactical intelligence for the UN troops on the ground could help them achieve the goals
specified in the mission mandate easier. For example, the British troops in Bosnia that were
charged with protecting UNHCR supply convoys could have used this kind of intelligence to
their advantage. The effective use of ground radar, SIGINT, IMINT and HUMINT could have
helped them avoid roadblocks or troop concentrations and they could have planned to evade
unwanted encounters much easier and more supplies would have reached the people in need with
much less casualties.
This approach also has a positive side effect. If countries are contemplating whether to
send additional troops to assist a peace operation or not, news that the troops already there are
able to effectively and, more importantly, safely conduct their missions could very well
determine whether those countries will send troops or not. The US is able to provide this
69
intelligence without difficulty. Most US military detachments have their own SIGINT/EW
group assisting with warning of imminent hostile operations.
The US could also provide remote sensor equipment such as drones. These drones are
currently used successfully in Iraq, Afghanistan and Pakistan to track down insurgents in remote
parts of the countries. The use of these drones would greatly enhance the possibilities of UN
peacekeepers to monitor their designated area of operation. In connection with aerial
reconnaissance/ patrols and IMINT conducted by satellites huge areas could be covered in
relatively little time without endangering any of the peacekeepers. The peacekeepers would only
have to put themselves at risk if the monitoring of the area records suspicious activity that needs
to be verified or stopped. Also, if the UN troops are supposed to do convoy duty delivering
humanitarian aid, the commanders could plan the routes the convoys should take around possible
obstacles like enemy roadblocks, minefields or destroyed bridges to minimize risk and maximize
the amount of relief delivered.
The most important point in using aerial reconnaissance like drones and satellites is cost.
Using drones instead of airplanes is much more cost efficient. Maintenance costs are generally
lower and the staff to operate and maintain the drones is much smaller than the one needed for an
airplane (Wingfield, 2009). If necessary, the drone can be operated by a pilot sitting at a desk
somewhere in the US. The drones also do not need excessive infrastructure. Whereas modern
aircraft need at least a landing strip and a hangar for maintenance, the drones can be started from
almost anywhere where there is a small flat piece of ground. Using satellites that are already in
orbit circling earth is also not too expensive as long as the course of the satellite does not have to
be changed for taking the pictures. In addition, the huge area that can be covered using aerial
reconnaissance helps cutting cost when it comes down to troop size. Instead of having to have
70
enough troops to patrol the whole area of operation, the peacekeepers would only need a small,
highly mobile force that could reach any point quickly once a suspicious activity is detected.
In general, the UN has several possibilities of how to get its intelligence. It could
develop its own intelligence capability using the NATO model for utilizing OSINT. The UN
structure with field offices in almost every country and its ability to go almost anywhere in the
world forms an excellent basis for that. The introduction of JMACs for peace operations also
goes in that direction depending on how far the UN Secretariat is willing to take this concept.
On the other hand, the UN could also try to cooperate with the US more closely, acknowledging
the fact that the US has the most extensive intelligence community in the world. In this case the
UN needs to greatly improve its information handling and security system. Necessary steps also
need to be taken to make sure that the UN will not be perceived as a US puppet.
Conclusion
Intelligence in peacekeeping operations is a complex and controversial issue. There is a
large variety of literature on peacekeeping. The bulk of that literature does not specifically focus
on the intelligence component of the missions, though. At first glance, this seems quite odd
considering the importance of intelligence to regular military operations. On closer examination
however, the reasons for that become clear.
First, initial operations by the UN in the late 1940s and early 1950s were exclusively
observer missions. Their task of observing and patrolling an area by using air and ground patrols
and the frequent use of observing positions essentially made these missions intelligence
missions. After all, observation and reconnaissance are basic elements of intelligence gathering.
71
This did not change much throughout the Cold War unless the mission in question was a
humanitarian effort. Considering the omnipresence of intelligence, it becomes less surprising
that most authors concentrated on other features of peace operations, like whether they were
successful or not.
Second, there was no need for extensive intelligence operations during traditional peace
operations. The main reason for tactical and operational intelligence is force protection.
Because UN forces were only deployed when all parties to a conflict agreed to their presence,
there were no threats to the security of the troops. The most important issues UN commanders
faced were to make sure that no side of the conflict violated the terms of the treaty that was
signed before the UN deployed the troops.
And finally, the UN itself did not want to have anything to do with intelligence for the
longest time, because they were influenced by the negative connotations that clandestine
intelligence operations had and, to a certain extent, still have. This view did not change until the
1990s, with the start of large scale peace operations in Bosnia (UNPROFOR) and Somalia
(UNOSOM I & II). Both operations were conducted as if they were the same small scale
operations than before, with little or no intelligence preparation and support. As a result, both
operations suffered major setbacks and catastrophes. In Bosnia the Srebrenica massacre and in
Somalia the slaying of eighteen US Army Rangers in Mogadishu were direct results of bad or
missing intelligence, which eventually led to a change in the perception of intelligence in peace
operations.
The importance of finding a good classification for peace operations is a direct result of
the issue mentioned above. Additionally, the evolution of peace operations from observer
72
missions and traditional peacekeeping to second generation or wider peacekeeping to third
generation peace operations is also parallel to the development of intelligence requirements of
the troops.
In traditional peacekeeping, the main mission of the UN troops was essentially passive.
They were to deploy in between warring factions and keep them apart to prevent hostilities to
resume. There was no threat to the security of the troops as long as they stayed in their zone
along the demarcation line. The job of the troops was to monitor both sides and to report
suspicious behavior.
In second generation or wider peacekeeping, the intelligence requirements changed
drastically. The change from staying neutral and no use of force whatsoever to defense of the
mandate even by use of force together with dropping the requirement of consent of all conflict
parties to the presence of the UN force before its arrival necessitated a completely different
intelligence approach. Now there was a need for strategic intelligence preparation of the mission
as well as an intensive tactical and operational intelligence effort to prevent casualties and to
ensure the success of the mission. Unfortunately it took the tragedies of Srebrenica and
Mogadishu to hammer that point home within the UN. The US in Somalia and NATO in Bosnia
had already seen the need for a different approach to intelligence, but within the UN their efforts
went unheeded at first. Afterwards, the UN Secretariat saw the need for changes and installed a
commission to come up with suggestions. The resulting Brahimi report stressed the need for
intelligence support for peace operations which changed the perceptions of the issue slowly.
Now the question was what to do about intelligence. Should the UN develop its own
intelligence capability or agency or should they find other ways of achieving the goal of
73
comprehensive intelligence support for peace operations from the planning to the final stages of
the mission.
Secretary-General Javier Pérez de Cuéllar was the first to recognize the importance of
information. He tried to streamline the flow of information from local UN offices in countries
all over the world to the UN Headquarters in New York to enable the UN Secretariat to make
decisions based on good information without being dependent on what the member states
provided. To make this process more efficient, he founded the Office of Research and
Collecting Information (ORCI) in 1988. His successor, Boutros Boutros-Ghali quickly shut the
ORCI down after noticing that it was not working very well. Mr. Boutros-Ghali assigned the
task of information collection to the newly founded Department of Political Affairs. To ensure
the quality of the information produced, he also started a training program for the employees
assigned to the department.
Recently, the UN greatly improved its ability to process information to use for peace
operations by establishing Joint Mission Analysis Centres (JMAC) in peace missions. These
centers have the potential of being developed into intelligence support centers. Their success
mainly depends on what the UN Secretariat is planning on doing with them. If they use them as
a tool to keep the secretariat informed they would curtail the enormous possibilities of the
JMACs for peace operations. Linked correctly with intelligence agencies of member states or a
UN owned intelligence entity, these JMACs could be developed into a powerful intelligence
authority. But to realize the great potential of the JMACs, the UN needs to decide how it wants
to generate the intelligence it needs for its peace operations. Do they want to start their own
intelligence agency, do they want to keep relying on members to provide intelligence support or
are they going for a mix.
74
The obvious choice would be to keep relying on intelligence support from member states,
especially the US. This would not require much change from the existing structures. The only
requirements would be to sign a bilateral treaty with the US government, to install a classifying
system for intelligence and to get secure communications gear for the peacekeepers.
A radical change from the status quo would be to start an intelligence agency or
department. This department could rely almost completely on OSINT to provide sufficient
intelligence for the UN Secretariat for planning and executing peace operations. The advantage
would be that the UN would not have to rely on anyone else to get the necessary intelligence.
And the UN would not have to establish the department from scratch. It could adopt the NATO
model for OSINT generation and sharing. For intelligence generation in the field, the UN could
ask the troop contributing countries to equip their troops with intelligence capabilities much like
American troops.
A mix between both extremes would probably work best. NATO and the US have
already realized the enormous potential of OSINT and have integrated it into their respective
intelligence structures. NATO even considers OSINT to be the basis for all-source intelligence
gathering as the model in Chapter II illustrates. This intelligence is easy to share since it should
not be classified by NATO or the US. For specific tasks the US or any other UN partner could
still enhance the intelligence picture generated through OSINT with some intelligence generated
through clandestine means. If they would just mix that information in with their overall
intelligence report the probability that any sources or technologies might be compromised are
almost non-existent.
75
Examining the different kinds of UN peace operations and how their intelligence
requirements are fulfilled creates the impression that the UN has made great strides towards a
comprehensive solution to the intelligence needs for its missions. The invention of the JMAC is
a great first step in implementing intelligence into the UN peace operations approach. In a next
step the UN will have to decide on how it wants to get its intelligence and then implement it
consequently. How this will turn out remains to be seen, but there is definitely reason for hope.
76
I. Bibliography
Aksu, E. (2003). The United Nations, intra-state peacekeeping and normative change. New
York: Manchester University Press.
Ali, T. M., & Matthews, R. O. (Eds.). (1999). Civil Wars in Africa: Roots and Resolutions.
Montreal: McGill - Queen's University Press.
Allen, J. H. (1996). Peacekeeping: Outspoken Observations by a Field Officer. Santa Barbara:
Praeger.
Andrew, C. (1988). Intelligence Collaboration between Britain and the United States during the
Second World War. The Intelligence Revolution: A Historical Perspective (pp. 111-122).
Colorado Springs, CO: US Air Force Academy.
Badsley, S., & Latawski, P. (Eds.). (2004). Britain, NATO and the lessons of the Balkan conflicts
1991-1999. London ; New York: Frank Cass.
Bah, A. S., Jones, B. D., & Tortolani, B. C. (Eds.). (2008). Annual Review of Global Peace
Operations 2008. Retrieved June 23, 2009, from Center on International Cooperation at
New York University:
http://www.cic.nyu.edu/internationalsecurity/docs/Final2008briefingreport.pdf
Baker, J. H. (1994, Spring). Policy Challenges of UN Peace Operations. Parameters , pp. 13-26.
Barker, E., & Kelsey, J. (2007). Recommendation for Random Number Generation Using
Deterministic Random Bit Generators (Revised). NIST Special Publication 800-90,
National Institute of Standards and Technology, Computer Security Division.
Barnett, M. (1995). The New United Nations Politics of Peace: From Juridical Sovereignty to
Empirical Sovereignty. Global Governance , 1 (1), 79-97.
Belfer Center for Science and International Affairs. (2008). Intrastate Conflict Program Harvard- Belfer Center for Science and International Affairs. Retrieved December 8,
2008, from Belfer Center:
http://belfercenter.ksg.harvard.edu/project/52/intrastate_conflict_program.html
Bellamy, A. J., Williams, P., & Griffin, S. (2004). Understanding Peacekeeping. Malden, MA:
Blackwell Pub.
Bellamy, A. J., Williams, P., & Griffin, S. (2004). Understanding Peacekeeping. Malden, MA:
Blackwell Pub.
77
Bilefsky, D. (2008, December 2). Europe: Thousands in Kosovo protest EU mission. Retrieved
June 23, 2009, from New York Times:
http://www.nytimes.com/2008/12/02/world/europe/02iht-kosovo.4.18337586.html
Birgisson, K. T. (1993). United Nations Special Committee on the Balkans. In W. J. Durch, The
Evolution of UN Peacekeeping: Case Studies and Comparative Analysis. New York: St.
Martin's Press.
Blond, G. (2002). The Marne: The Battle That Saved Paris and Changed the Course of the First
World War. London: Prion.
Boardman, J. L., & Shuey, D. W. (2004, April). Combined Enterprise Regional Information
Exchange System (CENTRIXS); Supporting Coalition Warfare World-Wide. Retrieved
July 6, 2009, from Air University: http://www.au.af.mil/au/awc/awcgate/ccrp/centrixs.pdf
Boutros-Ghali, B. (1992). An Agenda for Peace. New York: United Nations Department of
Public Information.
Brannon, B. (2006, July 18). CENTRIXS Enhances Communication Between Indonesian, U.S.
Navies . Retrieved July 6, 2009, from Navy.mil - Official Website of the United States
Navy: http://www.navy.mil/search/display.asp?story_id=24725
Burg, S. L., & Shoup, P. S. (2000). The War in Bosnia-Herzegovina: Ethnic Conflict and
International Intervention. New York: M. E. Sharpe, Inc.
Cammaert, P. C. (2004, December). UN Peacekeeping and Intelligence - No longer a Secret.
Retrieved July 1, 2009, from OSS.net:
http://www.oss.net/dynamaster/file_archive/070910/2db1bfa78100d0aa6a5997a50a74fc2
1/004%20UN%20MajGen%20Cammaert.doc
Canada Department of Foreign Affairs and International Trade . (2008, June 13). Canada and
Peace Operations - Peacemaking. Retrieved June 23, 2009, from Foreign Affairs and
International Trade Canada: http://www.international.gc.ca/peace-paix/makingretablissement.aspx?lang=en
Carey, H. F., & Richmond, O. P. (Eds.). (2003). Mitigating Conflict: The Role of NGOs.
Portland: Frank Cass Publishers.
Cassidy, R. M. (2004). Peacekeeping In The Abyss: British And American Peacekeeping
Doctrine And Practice After The Cold War. Westport, CT: Praeger.
Central Intelligence Agency. (2009). The Intelligence Cycle. Retrieved July 7, 2009, from CIA
Publications: http://www.fas.org/irp/cia/product/facttell/index.html
78
Charles W. Kegley, J. (Ed.). (1995). Controversies in International Relations Theory : Realism
and the Neoliberal Challenge. New York: St. Martin's Press.
Clark, W. K. (2002). Waging Modern War: Bosnia, Kosovo and the Future of Combat. New
York: Public Affairs.
Connaughton, R. (2001). Military Intervention and Peacekeeping: The reality. Aldershot:
Ashgate Publishing Company.
Cowdrey, C. B. (1994, September 9). Shoot? Don't Shoot? Rules of Engagement in Peackeeping
Operations. Retrieved April 8, 2009, from Defense Technical Information Center:
http://www.dtic.mil/cgibin/GetTRDoc?AD=ADA284086&Location=U2&doc=GetTRDoc.pdf
Cuneo, J. R. (1947). Winged Mars Volume II: The Air Weapon 1914-1916. Harrisburg, PA:
Military Service Publishing Company.
De Jong, B., Wies, P., & Steele, R. D. (Eds.). (2003). Peacekeeping Intelligence: Emerging
Concepts for the Future. Oakton, VA: OSS International Press.
Debrix, F. (1999). Re-Envisioning Peacekeeping: The United Nations and the Mobilization of
Ideology. Minneapolis, MN: University of Minnesota Press.
Dembinski, M., & Gerke, K. (Eds.). (1998). Cooperationor Conflict? Transatlantic Relations in
Transition. Frankfurt/Main: Campus Verlag.
Deng, F. M., Kimaro, S., Lyons, T., Rothchild, D., & Zartman, I. W. (1996). Sovereignty as
Responsibility: Conflict Management in Africa. Washington, D.C.: The Brookings
Institution.
Deyevre, A. (2008, November 3). Intelligence Cooperation: The OSINT Option. Europolitics
(3630), p. 16.
Durch, W. J. (2001). UN Peace Operations and the "Brahimi Report". Washington, D.C.: The
Henry L. Stimson Center.
DW Staff. (2008, November 21). Peacekeeping: UN Extends EU Peacekeeping Mandate in
Bosnia. Retrieved June 23, 2009, from Deutsche Welle World: http://www.dwworld.de/dw/article/0,,3809976,00.html
Elting, J. R. (1997). Swords around a Throne: Napoleon's Grande Armee. London: Phoenix.
Encyclopaedia Britannica. (2009). intelligence. Retrieved June 24, 2009, from Encyclopaedia
Britannica online:
79
http://www.britannica.com/EBchecked/topic/289765/intelligence/53081/Levels-ofintelligence#ref=ref511578
espionage. (2009). Encyclopaedia Britannica. Retrieved February 24, 2009, from Encyclopaedia
Britannica online: http://www.britannica.com/EBchecked/topic/192738/espionage
Federal Bureau of Investigation. (2009). Directorate of Intelligence - The Intelligence Cycle.
Retrieved July 8, 2009, from Federal Bureau of Investigation:
http://www.fbi.gov/intelligence/di_cycle.htm
Findlay, T. (2002). The Use of Force in UN Peace Operations. New York: Oxford University
Press.
Finlan, A. (2004). The Collapse of Yugoslavia 1991 - 1999. Oxford: Osprey Publishing.
Fleitz, J. F. (2002). Peacekeeping Fiascoes of the 1990s : Causes, Solutions, and U.S. Interests.
Westport, CT: Praeger.
Fordham, D. (2000, 6 19). Intelligence Preparation of the Battlefield. Retrieved March 16, 2009,
from Security Focus: http://www.securityfocus.com/infocus/1234
Franco, J. J. (2009). Military Information in Peace Keeping Missions: Argentina’s Experience in
Haiti. Retrieved July 1, 2009, from US Army Peacekeeping & Stability Operations
Center:
https://pksoi.army.mil/Docs/PKSOI%20Bulletin/Bulletin%20Articles/Military_Informati
on_in_Peace_Keeping_Missions_English_rev5.pdf
Frederick H. Fleitz, J. (2002). Peacekeeping Fiascoes of the 1990s : Causes, Solutions, and U.S.
Interests. London: Praeger.
Gawne, B. G. (1996). Dual Key Command and Control in Operation Deny Flight: Paralyzed by
Design. Newport, RI: Naval War College.
GlobalSecurity.org. (2009). Intelligence: FY2009 Intelligence Budget. Retrieved February 9,
2009, from GlobalSecurity.org:
http://www.globalsecurity.org/intell/library/budget/index.html
GoogleEarth: Explore, Search, and Discover. (2009). Retrieved March 16, 2009, from
GoogleEarth: http://earth.google.com
Goulding, M. (1993, July). The Evolution of United Nations Peacekeeping. International Affairs
, 69 (3), pp. 451-464.
Hanson, S. (2008, April 29). The African Union. Retrieved June 23, 2009, from Council on
Foreign Relations: http://www.cfr.org/publication/11616/african_union.html
80
Henry L. Stimson Center. (2005, December 31). US Personell Contributions to UN
Peacekeeping Operations. Retrieved July 6, 2009, from Future of Peace Operations
Project, Henry L. Stimson Center:
http://www.stimson.org/fopo/pdf/dec05uscontribunpko.pdf
Herman, M. (1997). Intelligence Power in Peace and War. Cambridge: Cambridge University
Press.
Hodge, C. C. (Ed.). (2002). NATO for a New Century: Atlanticism and European Security.
Westport, CT: Praeger.
Holbrooke, R. (1999). To End a War. New York: Random House, Inc.
Hughes-Wilson, C. J. (2004). Military Intelligence Blunders and Cover-Ups. New York: Carroll
& Graf Publishers.
Hulnick, A. S. (2008). OSINT: Is it really Intelligence. Convention of the American Political
Science Association. Boston.
Jackson, R. J. (1997, June 30). NATO and Peacekeeping.
Jett, D. C. (1999). Why Peacekeeping Fails. New York: St. Martin's Press.
Johnson, L. K. (2008). Evaluating "Humint": The Role of Foreign Agents in U.S. Security.
Retrieved July 7, 2009, from All Academic research:
http://www.allacademic.com//meta/p_mla_apa_research_citation/3/1/0/6/6/pages310665/
p310665-1.php
Joint Chiefs of Staff. (2004, October 7). Joint Publication 2-01: Joint and National Intelligence
Support to Military Operations. Retrieved February 9, 2009, from Defense Technical
Information Center Online: http://www.dtic.mil/doctrine/jel/new_pubs/jp2_01.pdf
Joint Chiefs of Staff. (1999, February 12). Peace Operations. Retrieved January 28, 2009, from
Joint Electronic Library: http://www.dtic.mil/doctrine/jel/new_pubs/jp3_07_3.pdf
Jones, G. (1993). Intelligence Support to United Nations Activities. Carlisle, PA: US Army War
College.
Joseph S. Nye, J. (2007). Understanding International Conflicts: An Introduction to Theory and
History. New York: Pearson/Longman.
Joshua S. Goldstein, J. C. (1997, September). Reciprocity, Bullying, and International
Cooperation: Time-series Analysis of the Bosnia Conflict. The American Political
Science Review , pp. 515-529.
Jukes, J. (2002). The Russo-Japanese War1904-1905. New York: Osprey Publishing.
81
Katayanagi, M. (2002). Human Rights Functions of United Nations Peacekeeping Operations.
The Hague: Martinus Nijhoff Publishers.
Katznelson, I., & Milner, H. V. (Eds.). (2002). Political Science : The state of the Discipline.
New York: Norton.
Keane, M. (2005). Dictionary of Modern Strategy and Tactics. Annapolis, MD: Naval Institute
Press.
Keegan, J. (2004). Intelligence in War: The value - and limitations - of what the military can
learn about the enemy. Westminster, MD: Knopf Publishing Group.
Klare, M. T. (2001). Fighting for the Riches of the Earth: Internal Wars over Minerals and
Timber. In M. T. Klare, Resource Wars: The New Landscape of Global Conflict (pp. 190212). New York: Henry Holt.
Knutsen, D. (2008, July 1). Audit Report: Audit of the Galileo System at the United Nations
Logistics Base in Brindidi, Italy. Retrieved July 6, 2009, from UN Office of Internal
Oversight Services - Internal Audit Division:
http://www.usunnewyork.usmission.gov/spec_rep/oversight/OIOS_20080701_01.pdf
Krasner, S. D. (Ed.). (2001). Problematic Sovereignty: Contested Rules and Political
Possibilities. New York: Columbia University Press.
Krasno, J., Hayes, B. C., & Daniel, D. C. (Eds.). (2003). Leveraging for Success in United
Nations Peace Operations. Westport, CT: Praeger.
Krishnasami, K. (2003, March). Bangladesh and UN Peacekeeping: The Participation of a 'small'
State. Commonwealth & Comparative Politics , 41 (1), pp. 24-47.
Lahneman, W. J. (Ed.). (2004). Military Intervention: Cases in Context for the Twenty-First
Century. Lanham, MD: Rowman & Littlefield Publishers.
Leonhard, J. (2004). Die Nationalisierung des Krieges und der Bellizismus der Nation: die
Diskussion um Volks- und Nationalkrieg in Deutschland, Großbritannien und den
Vereinigten Staaten seit den 1860er Jahren. In C. Jansen, Der Bürger als Soldat; Die
Militarisierung europäischer Gesellschaften im langen 19. Jahrhundert: Ein
internationaler Vergleich (pp. 83-105). Essen: Klartext Verlag.
Lowe, V., Roberts, A., Welsh, J., & Zaum, D. (Eds.). (2008). The United Nations Security
Council and War: The Evolution of Thought and Practice since 1945. New York: Oxford
University Press.
Luttwak, E. N. (1999, July/August). Give War a Chance. Foreign Affairs , 36-44.
82
Mackinley, J., & Chopra, J. (Summer 1992). Second Generation Multinational Operations. The
Washington Quarterly , 15 (3), 113-131.
Mackinley, J., & Chopra, J. (Summer 1992). Second Generation Multinational Operations. The
Washington Quarterly , 15 (3), 113-131.
Malan, M. (1998). Peacekeeping in the New Millennium: Towards 'Fourth Generation' Peace
Operations? African Security Review , 7 (3).
Matheson, M. J. (2006). Council UNbound. Washington, DC: United States Institute of Peace.
McLendon, K. (2008, August 13). Navy Newsstand: CENTRIXS Online for CARAT and Naval
Engagement Activity. Retrieved March 17, 2009, from GlobalSecurity.org:
http://www.globalsecurity.org/military/library/news/2008/08/mil-080813-nns03.htm
Meilinger, P. S. (Apr. 2000). The Historiography of Airpower: Theory and Doctrine. The
Journal of Military History, Vol. 64, No. 2 , 467-501.
Mellenthin, K. (1993, July 7). Der Weg zum Bürgerkrieg: Eine Chronologie. Retrieved January
27, 2009, from Knut Mellenthin; Jounalist, Autor, Redakteur: Texte:
http://www.knutmellenthin.de/artikel/archiv/jugoslawien/der-weg-zum-buergerkriegeine-chronologie-771993.html
Miller, G. A. (2009). WordNet. Retrieved July 7, 2009, from Princeton University:
http://wordnet.princeton.edu/
Mockaitis, T. R. (1999). Peace Operations and Intrastate Conflict: The Sword or the Olive
Branch. Westport, CT: Praeger.
NATO. (2002, October 19). Chapter 10: Civilian Organization and Structures: The Division of
Defence Planning and Operations. Retrieved March 17, 2009, from NATO Handbook:
http://www.nato.int/docu/handbook/2001/hb1011.htm
NATO. (2002). NATO Intelligence Exploitation of the Internet. Norfolk, VA: NATO SACLANT
Intelligence Branch.
NATO. (2001). NATO Open Source Intelligence Handbook. Norfolk, VA: NATO SACLANT
Intelligence Branch.
NATO. (2002). NATO Open Source Intelligence Reader. Norfolk, VA: NATO SACLANT
Intelligence Branch.
NATO. (2009, February 18). NATO Topics: Nato Enlargement. Retrieved March 16, 2009, from
North Atlantic Treaty Organization: http://www.nato.int/issues/enlargement/index.html
83
Ngulube, M. M., Hagglund, G., Erskine, E. A., & Tubman, W. (1995). The Comprehensive
Report on Lessons Learned from United Nations Operations in Somalia (UNOSOM)
April 1992 - March 1995. Retrieved July 1, 2009, from UN Department of Peacekeeping
Operations: http://www.un.org/Depts/dpko/lessons/UNOSOM.pdf
Office of the Director of National Intelligence. (2006, July 11). Intelligence Community
Directive Number 301. Washington, D.C.
Oliver, I. (2005). War and Peace in the Balkans: The Diplomacy of Conflict in the Former
Yugoslavia. New York: I.B. Taurus.
O'Neill, J. T., & Reese, N. (2005). United Nations Peacekeeping in the Post-Cold War Era. New
York: Routledge.
Owen, R. C. (2000). Deliberate Force: A Case Study in Effective Air Campaigning: Final Report
of the Air University Balkans Air Campaign Study. Maxwell AFB, AL: Air University
Press.
Paris, R. (2000). Broadening the Study of Peace Operations. International Studies Review , 2 (3),
27.
Peck, C. (1998). Sustainable Peace: The Role of the UN and Regional Organizations in
Preventing Conflict. Lanham, MD: Rowman & Littlefield Publishers.
Pelz, T., & Lehmann, V. (2007, November). The Evolution of UN Peacekeeping (2): Reforming
DPKO. Retrieved July 1, 2009, from Friedrich Ebert Foundation New York:
http://library.fes.de/pdf-files/bueros/usa/04977.pdf
Ratner, S. R. (1995). The New UN Peacekeeping. New York: Macmillan.
Reagan, R. (1980, August 18). Peace: Restoring the margin of safety. Chicago.
Reichard, M. (2006). The EU-NATO Relationship. London: Ashgate Publishing, Ltd.
Richelson, J. T. (1997). A Century of Spies: Intelligence in the Twentieth Century. New York:
Oxford University Press.
Rikhye, J., Harbottle, M., & Egge, B. (1974). The Thin Blue Line: International Peacekeeping
and its Future. New Haven: Yale University Press.
Ripley, T. (1999). Operation Deliberate Force: The UN and NATO Campaign in Bosnia 1995.
Lancaster: Lancaster University Press.
Riza, S. Q. (1995). Parameters of UN Peacekeeping. RUSI Journal , 140, 17-20.
84
Rubinstein, R. A. (2008). Peacekeeping Under Fire: Culture And Intervention. Boulder, CO:
Paradigm Publishers.
Schuster, C. O. (2004). Intelligence Support to Peacekeeping Operations. Ottawa: Carleton
University.
Showalter, D. E. (2004). Tannenberg 1914: Clash of Empires. Washington, D.C.: Brassey's.
Silber, K. (1999, September 19). Analysts Expect Spy Satellite Number to Increase . Retrieved
March 24, 2009, from space.com: http://www.space.com/news/spy_satellites.html
Sitkowski, A. (2006). UN Peacekeeping: Myth and Reality. Westport, CT: Praeger Security
International.
Smith, H. (1994, Autumn). Intelligence and UN Peacekeeping. Survival , Volume (3), pp. 17492.
Sorensen, D. S., & Wood, P. C. (Eds.). (2005). The politics of peacekeeping in the post-cold war
era. London;New York: Routledge.
St. Pierre, K., & Leaver, E. R. (2008, November ). Peace Operations Fact Sheet Series:
UNAMID. Retrieved June 23, 2009, from The Henry L. Stimson Center:
http://www.stimson.org/fopo/pdf/UN-AU_Hybrid_FINAL_Dec_2008_el.pdf
Steinbruner, J. D. (2000). Principles of Global Security. Washington, D.C.: Brookings Institution
Press.
Supreme Headquarters Allied Powers Europe. (2006, October 17). Intelligence fusion centre
initial operational capability (IOC) ceremony. Brussels.
Sutterlin, J. S. (2003). The United Nations and the Maintenance of International Security: A
Challenge to be Met. Westport, CT: Praeger.
Thomas, T. L. (March 1995). United Nations Crisis Management in Bosnia: Problems and
Recommendations. Vojenske Rozhledy , 50-63.
Truehart, C. (1998, November 4). France sees NATO Ties unhurt by Spy Case. Retrieved July 7,
2009, from The Washington Post:
http://pqasb.pqarchiver.com/washingtonpost/access/35666125.html?dids=35666125:3566
6125&FMT=ABS&FMTS=ABS:FT&date=Nov+4%2C+1998&author=Charles+Truehea
rt&pub=The+Washington+Post&edition=&startpage=A.16&desc=France+Sees+NATO+
Ties+Unhurt+by+Spy+Case
UN Department of Peacekeeping Operations. (2006). The Joint Operations Centre and the Joint
Mission Analysis Centre, UN doc. POL/2006/3000/. Retrieved July 1, 2009, from Estado
85
Mayor Conjunto de las Fuerzas Armadas: http://www.fuerzasarmadas.mil.ar/OMP/Publicaciones/ONU/ENGLISH/PEACEKEEPING%20OPERATIO
NS/Joint%20Ops%20Centres%20and%20Joint%20Mission%20Analysis%20Centres.pdf
UN Department of Peacekeeping Operations. (2006, June 13). United Nations Integrated
Missions Planning Process (IMPP). Retrieved June 24, 2009, from UN Department of
Peacekeeping Operations:
http://action.web.ca/home/cpcc/attach/06_DPKO_IMPP_final_.pdf
UN Department of Public Information. (2003). Completed Peacekeeping Operations: Middle
East. Retrieved January 23, 2009, from First United Nations Emergency Force:
http://www.un.org/Depts/dpko/dpko/co_mission/unefi.htm
UN Department of Public Information. (2005). India and Pakistan - UNMOGIP - Mandate.
Retrieved June 24, 2009, from United Nations:
http://www.un.org/Depts/dpko/missions/unmogip/mandate.html
UN Department of Public Information. (2009, May 26). Latest Updates. Retrieved June 23,
2009, from ReliefWeb: http://www2.reliefweb.int/rw/rwb.nsf/db900SID/KHII7SF3FL?OpenDocument
UN Department of Public Information. (2008). List of Operations. Retrieved June 24, 2009, from
United Nations Peacekeeping: http://www.un.org/Depts/dpko/list/list.pdf
UN Department of Public Information. (2006). Middle East - UNTSO - Mandate. Retrieved June
24, 2009, from United Nations:
http://www.un.org/Depts/dpko/missions/untso/mandate.html
UN Department of Public Information. (2001). Statistical Data and Charts. Retrieved June 23,
2009, from United Nations Peacekeeping from 1991 to 2000:
http://www.un.org/Depts/dpko/dpko/pub/pko.htm
UN Peacekeeping Missions: UNPROFOR. (1996, August 31). Retrieved December 10, 2006,
from http://www.un.org/Depts/dpko/dpko/co_mission/unprof_b.htm.
United Nations. (2001). Angola - MONUA - Mandate. Retrieved January 30, 2009, from
Completed Peacekeeping Operations - Angola:
http://www.un.org/Depts/DPKO/Missions/Monua/monuam.htm
United Nations Association in Canada. (2007). UN Peacekeeping: Definition. Retrieved January
24, 2009, from Peace and Security / Paix et Securite:
http://www.unac.org/peacekeeping/en/un-peacekeeping/definition/
86
United Nations. (1996). Charter of the United Nations; June 26, 1945. Retrieved January 23,
2009, from The Avalon Project at Yale Law School:
http://www.yale.edu/lawweb/avalon/un/unchart.htm#art42
United Nations Department of Public Information. (2009). Cyprus - UNFICYP - Background.
Retrieved April 7, 2009, from UNFICYP: United Nations Peacekeeping Force in Cyprus:
http://www.un.org/Depts/dpko/missions/unficyp/background.html
United Nations Department of Public Information. (2006). Q & A: How do you measure success
in peacekeeping and what are some recent examples? Retrieved December 12, 2008,
from United Nations Peacekeeping: Meeting New Challenges:
http://www.un.org/Depts/dpko/dpko/faq/q18.htm
United Nations Department of Public Information. (2009). UNAMID: African Union - United
Nations Mission in Darfur. Retrieved June 23, 2009, from United Nations:
http://unamid.unmissions.org/Default.aspx?ctl=Details&tabid=900&mid=1073&ItemID=
656
United Nations. (2009). First United Nations Emergency Force (UNEF I) - Background (Full
Text). Retrieved March 5, 2009, from UN Department of Peacekeeping Operations:
http://www.un.org/Depts/dpko/dpko/co_mission/unef1backgr2.html
United Nations. (2000). Introduction to the United Nations. Retrieved February 24, 2009, from
United Nations: http://www.un.org/cyberschoolbus/unintro/unintro2.htm
United Nations. (2000). Report of the Panel on United Nations Peace Operations: Executive
Summary. Retrieved January 24, 2009, from United Nations:
http://www.un.org/peace/reports/peace_operations/
United Nations. (1992, August 13). Resolution 770. Retrieved February 12, 2009, from Security
Council Resolutions - 1992:
http://daccessdds.un.org/doc/UNDOC/GEN/N92/379/66/IMG/N9237966.pdf?OpenElem
ent
United Nations Security Council. (1992, May 20). Resolution 755. Retrieved January 27, 2009,
from Security Council Resolutions - 1992:
http://daccessdds.un.org/doc/RESOLUTION/GEN/NR0/011/14/IMG/NR001114.pdf?Op
enElement
United Nations Security Council. (1992, June 8). Resolution 758. Retrieved January 27, 2009,
from Security Council Resolutions - 1992:
http://daccessdds.un.org/doc/RESOLUTION/GEN/NR0/011/17/IMG/NR001117.pdf?Op
enElement
87
United Nations Security Council. (1992, September 14). Resolution 776 (1992). Retrieved June
22, 2009, from Security Council Resolutions - 1992:
http://daccessdds.un.org/doc/UNDOC/GEN/N92/438/40/IMG/N9243840.pdf?OpenElem
ent
United Nations Security Council. (1993, April 16). Resolution 819 (1993). Retrieved January 27,
2009, from Security Council Resolutions - 1993:
http://daccessdds.un.org/doc/UNDOC/GEN/N93/221/90/IMG/N9322190.pdf?OpenElem
ent
United Nations Security Council. (1993, May 6). Resolution 824. Retrieved January 27, 2009,
from Security Council resolutions - 1993:
http://daccessdds.un.org/doc/UNDOC/GEN/N93/262/07/IMG/N9326207.pdf?OpenElem
ent
United Nations Security Council. (1993, June 4). Resolution 836 (1993). Retrieved June 22,
2009, from Security Council Resolutions - 1993:
http://daccessdds.un.org/doc/UNDOC/GEN/N93/330/21/IMG/N9333021.pdf?OpenElem
ent
United Nations. (1996). The Blue Helmets: A Review of United Nations Peacekeeping (3rd ed.).
New York: United Nations Department of Public Information.
United Nations. (2009, January). Uniformed Personnel in UN Peacekeeping: 1991- present.
Retrieved January 28, 2009, from United Nations Peacekeeping:
http://www.un.org/Depts/dpko/chart.pdf
United Nations. (1997, March 21). UNOSOM II - Mission Backgrounder. Retrieved January 28,
2009, from Somalia - UNOSOM II:
http://www.un.org/Depts/DPKO/Missions/unosom2b.htm
United States Congress, Senate. (2000). Authorizing Appropriations for Fiscal Year 2001 for the
Intelligence Activities of the US Government and the Central Intelligence Retirement and
Disability System and for Other Purposes. 106th Congress (Report 106-279) , 2nd sess.,
24-25.
United States Intelligence Community. (2009). Collection. Retrieved July 7, 2009, from United
States Intelligence Community: http://www.intelligence.gov/2-business_cycle2.shtml
US State Department, Bureau of Public Affairs. (n.d.). Bosnia and Herzegovina: People and
Historical Highlights. Retrieved June 22, 2009, from US Department of State:
http://www.state.gov/r/pa/ei/bgn/2868.htm#history
88
US State Department, Bureau of Public Affairs. (n.d.). Suez Crisis, 1956. Retrieved June 16,
2009, from US Department of State: http://www.state.gov/r/pa/ho/time/lw/97179.htm
Vas Antunes, J. N. (2007, April 15). Developing an Intelligence Capability: The European
Union. Retrieved July 9, 2009, from CIA - Center for the Study of Intelligence:
https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csistudies/studies/vol49no4/Intelligence%20Capability_6.htm
Villeneuve, D. (2006). Intelligence and the UN: Lessons from Bosnia - A Canadian Experience.
Military Intelligence Professional Bulletin , 22-25.
Wark, W. K. (Summer 1993). The Intelligence Revolution and the Future. Queen's Quarterly , 916.
Wentz, L. K. (1998). NATO Command, Control, and Communications in Bosnia. In L. R.
Chalmer, & J. W. Pierce (Eds.), NATO 1997: Year of Change. Washington, D.C.:
National Defense University Press.
Wiebes, C. (2003). Intelligence and the War in Bosnia, 1992-1995. New Brunswick, NJ:
Transaction Publishers.
Wingfield, B. (2009, June 1). Drone Wars. Retrieved July 7, 2009, from Forbes.com:
http://www.forbes.com/2009/06/01/northrop-boeing-defense-business-aviationdrones.html
Yoder, A. (1993). Evolution of the United Nations System. London: Taylor & Francis.
89