Small Wars Journal

Pseudo-Operations to Neutralize Extremist Networks, Insurgents, and Terrorists

Sun, 04/18/2010 - 10:16am
Pseudo-Operations to Neutralize Extremist Networks, Insurgents, and Terrorists

by Major Seth Wheeler

Download the full article: Pseudo-Operations to Neutralize Extremist Networks, Insurgents, and Terrorists

Terrorism is a threat to the stability and national security of many countries, and has undermined countless governments. However, technological improvements within the last century have allowed greater, more spectacular attacks and broadened the means by which terrorists may broadcast their message. Although previous terrorist attacks against United States citizens have drawn a measure of global attention, the world became acutely aware of the effects of terrorism on 11 September 2001 during the World Trade Center attack orchestrated by Osama Bin Laden and his terror group al Qaeda. The psychological impact of such a devastating attack—conducted so efficiently at such little cost to the attacker—jumpstarted a global level of effort to defeat terrorism and extremism. Indeed, Secretary of Defense Robert Gates identified terrorism as a Global National Defense priority in his 2008 National Defense Strategy, and discussed terrorism on 15 occasions throughout his 23-page report. Degrading terrorism requires full-spectrum deterrence and counter strategies: the incorporation of effective foreign policy measures against state-sponsors of terrorism; international security forces assistance programs to ensure competent counter-terror skill-sets within our allies' ranks; military or police action to kinetically defeat armed resistance or restore sovereignty; and other internal defense and development programs to deny terrorists sanctuary or resources and political advantage.

That stated, terrorists' geographic or political sanctuaries that the United States cannot directly or indirectly influence through foreign policy initiatives will remain in certain pockets of the world, such as the remaining insurgent-terror organization FARC controlled areas of Colombia or Somalia. Assuming that some terrorists will remain irreconcilable for a variety of reasons not discussed here, and that comprehensive deterrence strategies or counter-terror efforts may prove ineffective, then how does the United States influence or neutralize irreconcilable terrorists protected by a foreign population? What tools can be implemented to eradicate, deflect, isolate, or neutralize typically suicidal extremists employing terror as a weapon? One consideration is pseudo-operations. Penetration of terrorist and insurgent groups by foreign services is inherently difficult, due to the existing mistrust within the organization and extensive vetting required for membership. Pseudo-operations may overcome these challenges and create conditions congruent with the interests of the United States, as several case studies will demonstrate in a later section. However, an overview of what pseudo-operations are and what they can do is first necessary.

Download the full article: Pseudo-Operations to Neutralize Extremist Networks, Insurgents, and Terrorists

Major Seth Wheeler, U.S. Army, graduated with a M.S. in Defense Analysis - Irregular Warfare from the Naval Postgraduate School in December, 2009. He is currently attending CGSC ILE at Fort Belvoir, VA, and will join the 5th Special Forces Group (Airborne) in June, 2010.
The views expressed above are those of the author and do not reflect the official policy or position of the Department of the Army, Department of Defense, or the U.S. Government.

About the Author(s)

Comments

Peter,
Salient points and well stated. I think you are right-on with your analysis of terrorism. That is exactly why small-footprint task forces that provide a more precise application of US foreign policy is necessary -- those suggested in the Pseudo-operations paper. The alternative may be as you describe -- the blunt instrument of large military deployments cause an increased death toll . . . etc.
I take my oath very seriously. Please vote carefully.

Peter (not verified)

Wed, 06/09/2010 - 4:27am

Terrorism in the context you are describing is less dangerous than peanut butter allergies, lightning stikes and deer accidents, please google this and confirm its truth

Terrorism in its real context ( the use of violence for political gain ) is being used in widespread and massive proportions by various politicians and political parties throughout the world

The use of the false context of terrorism is promoting the real terrorist's agenda, which is the erosion of rights and freedoms that protect us from tyranny and mass genocide

If you are in law enforcement or military organizations, please take your oaths seriously and start waking up to the obvious facts and reality of the situation. Reflecting on the death toll from politicians is a good start.

lawcline

Wed, 04/28/2010 - 10:34am

If I could throw myself in here. Very interesting paper, and a nice expansion. There were several groups that I didn't include in my paper that didn't quite make the cut as what I considered to be true pseudo ops, but decidedly are worth looking at. These mostly would be the various colonial auxiliaries used in particular by the British, French, and Portugese in the tail end of their colonial period. Most of these groups were not used specifically for the (maybe overly narrow) definition I used, but probably came close.

In particular, somebody with access and who can speak Portugese probably could find some very interesting material on the Portugese campaigns in Africa and their use of locals. The British campaign in Oman might also be useful (and sources more available).

Again, very much enjoyed the paper.

Best,
Larry Cline

Thanks, and I was finally able to read it. Good job on the paper, and had never heard of the Bolshevik Cheka program. Cheers. -matt

Wheeler

Wed, 04/21/2010 - 10:41am

Matt,
It appears that each pseudo-operations employment was different -- tailored to METT-TC (please forgive the short-hand). As the paper mentions, different case studies yielded different observations; varying in the ways and means.
The Bolshevik Cheka created The Trust; briefly discussed in the paper. Lawrence Cline does not discuss this case study, and remains an interesting topic for research.

Mr. Maxwell,

I will try another update and see if that is the trick. The file didn't even pop up in my NeoOffice. I will find a way to get the thing up and let you know. I am also overseas right now, and maybe that has something to do with it too. Who knows.
-----------------
Mr. Wheeler,

Thanks for the clarification. On my blog I like to cover these topics, because they really don't get enough attention in my view. If
In my studies about the subject, I think I am most interested in how the Selous Scouts conducted pseudo-operations. Was there a particular group that piqued your interest for this paper? Better yet, was there any other groups not mentioned by Mr. Cline that were of particular interest to you? -matt

*****
"All warfare is based on deception." -Sun Tzu

Matt,
Lawrence Cline's research on Pseudo-Operations http://www.strategicstudiesinstitute.army.mil/pdffiles/pub607.pdf is described in the Forward of his article PSEUDO OPERATIONS AND COUNTERINSURGENCY: LESSONS FROM OTHER COUNTRIES as examining the role of Pseudo-Operations in Counterinsurgency campaigns. I believe Cline's detailed analysis of Pseudo-Operations is invaluable to the field. The purpose of this article above (an attempt anyway) was to frame the relevance of Pseudo-Operations in security operations and foreign policy initiatives, serving as a short(er) primer on the subject for decision-makers. I hope I've answered the question to your satisfaction.

Matt- not sure what the Mac issue is for you. I use a Mac and all files download just fine for me. Do you need to download an updated PDF reader?

How does this compare to Lawrence Cline's paper on the same subject? By the way, if the editors could put up a mac friendly link to download, then more folks could read this. Thanks. -matt