Introduction
Intelligence analysis is rarely discussed in international humanitarian law (IHL) compliance, except when unanticipated civilian harm occurs. In those cases, a frequent refrain is, “if only the intelligence had been better”. The certainty of an assessment of both the identity and military value of a proposed target, which a leader uses to make a targeting decision, is almost always based on intelligence analysis. Intelligence also drives proportionality assessments, and effective precautions rely on an intelligence understanding of the operating environment. Therefore, military decision-makers and lawyers rely heavily on intelligence assessments to determine whether a specific military action will comply with IHL. However, the relationship between intelligence and IHL is an under-studied and sometimes misunderstood topic. Without a sufficient understanding of intelligence disciplines and analysis, including inherent weaknesses and common cognitive biases, undue weight or reliance on vague or incorrect intelligence analysis may result in inaccurate conclusions on confidence in identification, proportionality analysis or effective warnings. Thus, steps that could be taken to mitigate these deficiencies will go untaken.
In certain situations, civilian casualties are caused when engaging a military objective with a careful proportionality analysis and a decision that every feasible precaution has been taken but that incidental civilian harm is necessary and not excessive to the military advantage to be gained from damaging or destroying the target. In other cases, civilian casualties are the result of misidentification of the target, unidentified presence of civilians in the weapon affects area or sometimes even unanticipated effects of weapon employment (for example, secondary explosions due to unidentified additional explosives inside a building or the collapse of a block due to an unidentified underground tunnel). In some cases, gathering intelligence and fully identifying those risks would have been near impossible, but in other cases, the civilian casualties are due to a mischaracterization or misunderstanding of the intelligence or the level of certainty in the intelligence analysis presented. Decision-makers can reduce the number of situations that fall into the latter category by obtaining a better understanding of the intelligence field.
A full understanding of intelligence and intelligence analysis can lead decision-makers to better targeting decisions in the moment, and will also allow them to understand the range of additional intelligence that could be collected to increase certainty in their decision-making. For example, a blurry image could lead to a request for electronic intelligence that would collect emissions from those same coordinates and match the emission to military radar data, or electronic intelligence indicating a weapons system radar could lead to collection of imagery which indicates that a large civilian apartment complex is nearby. In academia, significant attention and analysis exists on the level of certainty required for decision-makersFootnote 1 to make a targeting decision in compliance with IHL, but significantly less attention and analysis exists on how one might get to whatever level of certainty is deemed to be required (e.g., the understanding of the intelligence provided that is necessary to reach a level of certainty for decision-making purposes).
This article explains the crucial role of military intelligence in complying with IHL and the ways in which knowledge of how military intelligence works can result in better protective outcomes for civilians in armed conflict. It does so by looking at three concrete decision points: (1) the determination of whether a potential target is a military objective, (2) proportionality in attack analysis, and (3) the taking of effective precautions. Critical to a reasonable decision is a fair evaluation of the supporting evidence, including the quality and credibility of the underlying sources, data and methodologies used to reach an intelligence assessment, existing uncertainties, and possible alternative explanations. Intelligence analysts, if following analytic and tradecraft standards, should be able to provide all of this information in order for a reasonable targeting decision to be made. Understanding the complexity of intelligence and intelligence analysis aids decision-makers in making good-faith and reasonable targeting decisions.
This article primarily provides details from a US military perspective;Footnote 2 however, the underlying principles on the value of intelligence apply mutatis mutandis to all militaries’ IHL compliance, although the exact processes may vary.
Requirements for decision-makers in IHL
IHL requires the decision-maker to have a reasonable level of certainty that a target is a valid military objective.Footnote 3 The requisite level of certainty and how a decision-maker gets there is explained slightly differently by different sources, sometimes dependent on the decision to be made.Footnote 4 The International Expert Meeting on the Principle of Proportionality in the Rules Governing the Conduct of Hostilities under International Humanitarian Law discussed several opinions on the standard for evaluating the decisions made by decision-makers. Although there was not a consensus, all suggestions included some version of either “reasonable”, “honest” or both.Footnote 5
Decision-makers do not always get “exquisite” intelligence; this is sometimes due to faults in the analysis that led to an inaccurate level of confidence in the assessment, and other times due to a dearth of intelligence information that prevents confident assessments. It is common knowledge that no weapons system is perfect, and that the targeting through which the system engages is only as good as the intelligence on which it is based. In practice, decision-makers make a determination based on the intelligence available at the time, the urgency of the situation and the likely harm that may result to their forces or protected persons and objects if their decision is wrong.Footnote 6 Additionally, decisions must be made on the “decision-maker's interpretation of the available information, which may, unknown to him, be unreliable or incorrect”.Footnote 7
In order to increase compliance with IHL and the spirit of the law, decision-makers – and particularly commanders who have the ability to affect intelligence and operational processes – have obligations in regard to intelligence. The 1987 Commentary on Additional Protocol I (AP I) explains that the identification of the objective should be carried out with “great care”, noting that
those who plan or decide upon … an attack will base their decision on information given to them, and they cannot be expected to have personal knowledge of the objective to be attacked and of its exact nature. However, this does not detract from their responsibility, and in cases of doubt, even if there is only slight doubt, they must call for additional information and if need be give orders for further reconnaissance to … their subordinates …. The evaluation of the information obtained must include a serious check of its accuracy.Footnote 8
Although the Commentary and customary international law recognize that decisions related to attacks are made based on the information available at the time, multiple military manuals stress that the commander must obtain the best possible intelligence.Footnote 9 This may require active engagement on the part of the decision-maker to ensure that intelligence collection apparatuses are set up properly,Footnote 10 that analysis is rigorous and the level of confidence in such analysis is provided, and that processes exist to collect additional intelligence. The actual collection of additional intelligence may not be feasible depending on the circumstances, but knowledge of intelligence is crucial for the decision-maker to determine when more is needed and, if they are unable to acquire further intelligence, what is a reasonable decision to make based on the intelligence available at the time. In order to be able to evaluate the intelligence presented and make reasonable targeting decisions, all decision-makers have an obligation to have an appropriate understanding of intelligence and intelligence analysis.
Good intelligence should provide answers to key questions in order for the decision-maker to make a targeting decision that complies with IHL. The key questions that decision-makers should look to intelligence to answer include, but are not necessarily limited to:
• What is the target and what does it provide to the enemy?
• What is the value of damaging or destroying it?
• Where is it located? Can it and does it move? If so, when was it last located and where might it go?
• How is the target identified, and how can one get positive identification?
• What are the effects on the civilian population (including direct injury/death to civilians, direct damage to civilian objects, and indirect effects)?
• How certain is the analyst of the above answers, and why?
When decision-makers feel that these questions have not been answered, they must press for such answers before making their decision.
Understanding the intelligence disciplines
Intelligence's key role is to provide decision-makers with analysis of the key aspects of the operating environment in order to assist in the decision-making process.Footnote 11 These key aspects can range from identifying the centres of gravity of key enemy systems (such as air defences or ballistic missiles) to determining the intentions and goals of the enemy and their future possible courses of action. Identification of centres of gravity requires intelligence on equipment, numbers, locations, capabilities, defences, networks, interactions and redundancies. The answers are frequently garnered not through a single piece of intelligence but through the integration of multiple pieces of intelligence and a deep understanding of the operating environment. However, decision-makers should start from an understanding of how the analysis they are presented with came to be, if they truly want to make a targeting decision in good faith that it is compliant with IHL.
Any time a decision-maker is presented with specific intelligence, they should frame their understanding of the intelligence around a few key questions:
• What concerns exist with this intelligence type, generally?
• How accurate is this specific piece of intelligence? What is that based on?
• Are there alternate explanations for the intelligence assessment presented?
• What other intelligence could support or disprove the assessment?
There are six basic intelligence disciplines,Footnote 12 each with a different source of the underlying intelligence. Each intelligence source has its own strengths, weaknesses, and vulnerabilities to manipulation and deception.Footnote 13 Understanding this and how different sources of intelligence can be fused together is crucial to understanding how certain a decision-maker can be in intelligence assessments underlying the identification of a person or object as a valid military objective.
Geospatial intelligence (GEOINT) is the “analysis and visual representation of security related activities on the earth” and is produced with imagery, imagery intelligence (IMINT) and geospatial information.Footnote 14 Examples of GEOINT include the intelligence needed to conduct target coordinate mensuration (the production of latitude, longitude and elevation data for a specific point on the earth, with associated errors, that supports the use of coordinate-seeking weapons),Footnote 15 and full-motion video (FMV) with accompanying data on a remotely piloted aircraft.Footnote 16
IMINT is a visual representation of objects derived from visual photography/videography, radar sensors and electro-optics.Footnote 17 A common example is a photographic image. IMINT can be used to conduct historical comparisons of enemy military capabilities and can also increase understanding of the physical terrain and civilian aspects such as cultural sites, water and electrical grids.Footnote 18 A common concern with IMINT is that photography is a snapshot in time and that things change, which can require re-verifying of the analysis. GEOINT and IMINT cannot show the viewer the inside of objects/buildings, so crucial information may be missing. Video, like FMV, is focused, which may lead to missing important elements of the operating environment outside of the field of view. Additionally, not all imagery is of the same quality, with reduced quality resulting in less certainty in analytical conclusions. For example, is what is displayed in an image truly a missile support vehicle or simply a large civilian van? Frequently, imagery can be paired with other forms of intelligence to get a more comprehensive understanding of the target and the surrounding environment. GEOINT and IMINT cannot tell someone the precise reasons behind movements or actions, but paired with human intelligence and/or signals intelligence, they may be able to give some indication. Electronic intelligence may also help to confirm the tentative identification made with GEOINT/IMINT.
Measurement and signature intelligence (MASINT) is defined as “information produced by quantitative and qualitative analysis of physical attributes of targets and events [in order] to characterize, locate, and identify them”.Footnote 19 While MASINT has a complicated definition, a simple example is the flight profile and range of a cruise missile. Significant information is needed to create signatures with high confidence. Like the prior intelligence disciplines discussed, even with high confidence in the intelligence provided, MASINT cannot provide the definitive intent of the adversary.
Signals intelligence (SIGINT) includes communications intelligence (COMINT), electronic intelligence (ELINT) and foreign instrumentation signals intelligence (FISINT). COMINT consists of information from collecting intercepted foreign communications.Footnote 20 It can provide insight into an enemy's intentions but is not without risk because at best, it provides what an individual believes to be true, not necessarily the objective truth. ELINT is intelligence from the interception of non-communications emitters. An example would be the interception of a military radar emission, leading to the location of the radar or identification of tactics.Footnote 21 FISINT is based on technical information from interception of foreign equipment and control systems.Footnote 22 This includes intelligence based on video datalinks, telemetry and firing command systems.
Human intelligence (HUMINT) is derived from human sources and can identify or provide insight into enemy plans, strategy, capabilities and intentions.Footnote 23 HUMINT sources must be evaluated for credibility, and the resulting intelligence must be treated with caution.Footnote 24 Open-source intelligence (OSINT) is intelligence based on publicly available information.Footnote 25 It is a growing field for intelligence professionals and can be used to enhance additional collection and analysis, but is susceptible to disinformation purposely spread by the enemy.Footnote 26
Intelligence assessments provided to a decision-maker are frequently a fusion of the various disciplines. All-source intelligence analysis helps reduce uncertainty by finding supporting evidence though other intelligence disciplines and sources of identification. It can also provide the context for a specific object or event, describing how it fits into the wider operational environment, to support proportionality and precautions analysis. For example, SIGINT identifying a possible military radar emission may lead to GEOINT collection to confirm the radar, provide a more specific location and identify any possible additional military equipment and combatants in the vicinity. Alternatively, GEOINT of possible or probable military equipment in a new location could lead to SIGINT collection to assist in identification of the equipment and determine additional details on the equipment, its tactics and capabilities, and command and control. Additional GEOINT or SIGINT may indicate the presence of civilians or civilian objects in the vicinity. OSINT might indicate that there is humanitarian food distribution which frequently occurs in that area on a certain day of the week. HUMINT or COMINT might indicate that a radar is going to move in a couple of hours to a new location away from any civilians or civilian objects. An all-source intelligence report for a decision-maker would fuse all of the information together and provide the decision-maker with appropriate explanations of assessments, assumptions and level of certainty, enabling them to make an appropriate targeting decision.
Analytic tradecraft and the risk of cognitive bias
Cognitive limitations cause people to apply a simplified strategy or a rule of thumb in order to make judgements and decisions with reduced mental burden.Footnote 27 Cognitive biases are the mental errors caused by the application of simplified processing strategies, and research indicates that mere awareness of cognitive biases is not enough to overcome them.Footnote 28 Richard J. Heurer Jr surveyed the biases that most influence intelligence analysis in his seminal work, Psychology of Intelligence Analysis. A number of cognitive biases are relevant specifically to the field of intelligence analysis. One bias relevant to targeting decisions and the examples discussed in this article is the “best guess strategy”, a coping mechanism for dealing with evidence of uncertain accuracy. Because the mind finds it difficult to cope with complicated probabilistic relationships, if analysts are processing information of uncertain accuracy or reliability, they will tend to make a simple “yes or no” decision, tending to either reject the evidence fully or accept it wholly.Footnote 29 This ignores the probabilistic nature of the judgement, leading to overconfidence in assessments.
Another form of cognitive bias is the “out of sight, out of mind” response to an absence of specific evidence. While analysts should ideally be able to identify what relevant information is missing, estimate the impact of the missing information and adjust their confidence in their assessment accordingly, this does not seem to be the norm.Footnote 30 A related bias, although not detailed in Heurer's book, is confirmation bias. Confirmation bias is the tendency to look for confirmation of an original hypothesis while avoiding disconfirmation of what is believed to be correct. This was cited as a reason for the mistaken identification of an aid worker as a member of Islamic State – Khorasan Province (ISIS-K) in the Kabul air strike discussed later in this article, as well as a number of other mistaken identification incidents over the last twenty or so years.Footnote 31
For the United States, one way to reduce the effects of cognitive biases was to introduce analytic standards and analytic tradecraft standards across its intelligence community through an Intelligence Community Directive (ICD) from the Office of the Director of National Intelligence. ICD 203, Analytic Standards, requires analytic products to be consistent with the five Analytic Standards: they must be objective, independent of political consideration, timely, and based on all available sources of intelligence information, and they must implement and exhibit the Analytic Tradecraft Standards.Footnote 32 The nine Analytic Tradecraft Standards are crucial to good intelligence, for targeting decisions and in general, and bear repeating here. They mandate that any analytic product:
1. properly describes the quality and credibility of underlying sources, data and methodologies;
2. properly expresses and explains uncertainties associated with major analytic judgements;
3. properly distinguishes between underlying intelligence information and analysts’ assumptions and judgements;
4. incorporates analysis of alternatives;
5. demonstrates customer relevance and addresses implications;
6. uses clear and logical argumentation;
7. explains change to or consistency of analytic judgements;
8. makes accurate judgements and assessments; and
9. incorporates effective visual information where appropriate.Footnote 33
Targeting decision-makers need to be aware of the requirements of good analytical tradecraft, so that they can assess in good faith the reasonableness of the intelligence assessments provided to them. For example, the US Department of Defense (DoD) recently recognized that operations and intelligence use different standards for certainty terminology and require standardization of terminology.Footnote 34 Currently, Analytic Tradecraft Standard 2 sets the US intelligence community's standards for levels of certainty. “Degrees of likelihood” refer to an event or development, while “confidence levels” refer to an analyst's confidence in an assessment or judgement; however, analysts do sometimes mix the two. Additionally, degrees of likelihood are associated with numerical percentage ranges that may be surprising to some decision-makers – for example, “likely” and “probable” include events that are 55% likely to occur, and “unlikely” and “improbable” include events that are 45% likely to occur.Footnote 35 The complexity of the standards and the varying analytical frameworks that decision-makers bring to their roles leave the comprehension of intelligence assessments ripe for misunderstanding, if efforts are not undertaken to learn about intelligence disciplines and analytical assessments.
The above assumes that the intelligence analysis meets the standards as described. However, the US National Defense Authorization Act for Fiscal Year 2023 added a requirement for the next five years that every head of an element of the intelligence community must create an ICD 203 training programme with yearly training, presumably because application of the Analytic Standards was found to be lacking.Footnote 36 This highlights the additional need for decision-makers to understand intelligence so that they can also understand when the information they have been provided with does not meet standards and is not sufficient for them to make informed targeting decisions.
These standards are taught and applied by the US intelligence community, and while some States may have similar approaches to structured analytical thought, not all of them do. Uncertainties that already exist while evaluating the quality of intelligence assessments are multiplied when one military relies on the intelligence and other targeting information of another State or even a non-State armed group.Footnote 37 The RAND Corporation recognized this risk in its independent report on the 2017 retaking of the city of Raqqa, noting that the Syrian Democratic Forces’ (SDF) intelligence collection tradecraft was likely not of the same quality as US or coalition practices and “might leave U.S. forces vulnerable to faulty intelligence or manipulation that could increase harm to civilians”.Footnote 38 The 2019 Baghuz air strike involving US, coalition and SDF forces that resulted in the death of four to sixty-four civilians (depending on the source) was due to incorrect or incomplete information, such as a reliance on SDF assurances of no civilian presence in the area, US special operations forces on the ground reporting that they could observe no civilians in the area, and an unmanned aerial video with FMV that was “unable to discern any civilians in the area at the time”.Footnote 39 A later DoD independent review conducted by a four-star Army general concluded that based on additional information he received that was not available to the ground forces commander (GFC) at the time, “through no fault of his own, the GFC relied on data that was not fully accurate”.Footnote 40 Because of the crucial importance of intelligence in targeting, independent characterization and verification is crucial to reducing risk and making a good-faith effort to comply with IHL principles.
Additional constraints on intelligence
In addition to inherent weaknesses in specific disciplines of intelligence and deficiencies in analytic tradecraft in specific pieces of intelligence or fused intelligence assessments, decision-makers must understand two other key constraints to intelligence analysis: the timeline in which intelligence is needed to make decisions and military resource constraints.
Time constraints
Decision-makers frequently want intelligence as soon as possible, sometimes before the information can be appropriately analyzed, fused with intelligence from other disciplines as appropriate, placed into context, and given a level of confidence in the analytical assessment. Some forms of intelligence take time to collect, process, exploit and disseminate; for example, it may be difficult to immediately get satellite imagery of a new potential target. In some cases, the desire for immediate intelligence answers is based on the necessity of the situation and cannot be changed. In other situations, however, decision-makers should be aware of the trade-offs of immediate or short-turnaround intelligence assessments versus longer-term fused and coordinated intelligence assessments, and should make a thoughtful and reasonable decision to accept those trade-offs based on operational requirements.
Resource constraints
Every military force wants more intelligence than it has intelligence assets to collect the information. Sometimes this can be mitigated by the reallocation of assets from one theatre to another, but frequently the number of collection requirements requested is simply larger than the intelligence assets can collect. This drives a need for prioritization of collection, and results in some collection requirements regularly not receiving any collection. Without intelligence collection, the underlying questions remain unanswered. In large-scale combat operations, the scale of operations and targeting will be such that many requests for intelligence collection will be unmet. The ability to task multiple assets, as frequently done in the counterterrorism/counter-insurgency fight, will only be available for the highest-priority targets.
The United States prioritizes intelligence collection based on commander priorities. Commander's critical information requirements (CCIRs) are information requirements identified by the commander as being critical to facilitating timely decision making.Footnote 41 CCIRs are further divided into two components: priority intelligence requirements (PIRs) and friendly force information requirements (FFIRs).Footnote 42 PIRs are generally focused on key enemy information that drives commanders’ decision-making. Common examples include key enemy capabilities and where they are located, what the enemy is trying to achieve and how, and command and control methods and key locations. Rarely are civilian objects and other elements of the civilian environment included, which results in less collection on civilian aspects of the operating environment.
Distinction and the role of intelligence
The foundational IHL principle of distinction, as reflected in Article 48 of AP I, requires all parties to a conflict to “distinguish between the civilian population and combatants and between civilian objects and military objectives”.Footnote 43 Distinction allows only combatants and military objectives to be targeted, while protected civilians and civilian objects may never be targeted. However, civilians may be injured or killed and objects damaged or destroyed as collateral damage incidental to the engagement of a valid target, pending compliance with other IHL restrictions (such as proportionality).Footnote 44 This principle is part of customary international law and binds all States.Footnote 45 In practice, it requires identification of combatants,Footnote 46 civilians, military objectivesFootnote 47 and civilian objects – and to identify combatants and military objectives correctly, intelligence analysts must collect, analyze and provide intelligence information that will enable decision-makers to determine whether they are reasonably confident that a proposed target is a military objective.
However, the role of intelligence and the question of how to assess it as a matter of complying with the principle of distinction are frequently overlooked. Intelligence analysts review best practices of analytical tradecraft and provide confidence-level assessments for their work. Commanders and decision-makers use key legal phrases such as “reasonably certain” to indicate that they have made a legal identification of a military objective based on the information available at the time,Footnote 48 but there is a general lack of discussion between the two on how intelligence analysis leads to a reasonably certain identification decision, and as mentioned previously, operations and intelligence do not apply the same standards for certainty terminology.Footnote 49 This may lead to misunderstandings between the two and a lack of additional steps that could have added clarity to an uncertain identification.
The challenge of target identification can vary depending on the operational environment, the adversary, and the collection assets available. Some may argue that future conflict is likely to consist of large-scale combat operations against a near-peer adversary and that much of the confusion in identification will no longer be an issue as State militaries will be uniformed and easily identifiable. This overlooks the complexity of identification in urban areas, dual-use infrastructure and other objects, and the real possibility of members of the civilian population directly participating in or supportingFootnote 50 the war effort in a manner that may make them targetable under IHL. Military objectives are “objects which by their nature, location, purpose, or use make an effective contribution to military action and whose total or partial destruction, capture or neutralization, in the circumstances ruling at the time, offers a definite military advantage”.Footnote 51 “Location” and “purpose”, the latter defined as intended use or possible use in the future,Footnote 52 provide the possibility for a large number of previously civilian objects to be targetable as military objectives. For example, during the NATO bombing campaign against the Federal Republic of Yugoslavia, NATO identified a railroad bridge that was part of an integrated communication supply network in Serbia as a legitimate military objective. However, at the time of engagement a civilian passenger train was attempting to cross it, which was only identified after weapons release.Footnote 53 Intelligence is crucial to understanding the operational environment, including not just military objectives and their effects on enemy capabilities but also the civilian population and civilian networks.
In determining whether a decision-maker has made an identification targeting decision in compliance with IHL, the DoD Law of War Manual (DoD Manual) uses a “good faith” standard. The standard appears subjective on its face, but the language explaining the standard notes that “the law of war requires commanders and other decision-makers to exercise professional judgment in making any assessment that a person or object is a military objective, and what is reasonable in making that assessment depends on the circumstances”.Footnote 54 One interpretation is that the DoD Manual requires decision-makers to make choices that are both reasonable and in good faith,Footnote 55 but others have argued that a possible interpretation is that the matter is completely subjective.Footnote 56 The 2004 edition of the UK Manual of the Law of Armed Conflict (UK Manual), when describing the obligation of the attacker to distinguish between civilian objects and military targets, states that
[t]his obligation is dependent on the quality of the information available to the commander at the time he makes decisions. If he makes reasonable efforts to gather intelligence, reviews the intelligence available to him and concludes in good faith that he is attacking a legitimate military target, he does not automatically violate the principle of distinction if the target turns out to be of a different and civilian nature.Footnote 57
How does one use intelligence to properly identify targets? Good intelligence will tell you not just what something is, but how it fits into the wider operational environment, where it is located in time and space, and sometimes even why it is doing what it is doing or what it is going to do. Good intelligence not only distinguishes between an enemy ballistic missile launcher and a civilian oil rig, but provides vital information on the crucial components to target, the exact location of the launcher and if it is expected to move again, how the launcher gets instructions and from whom, what the enemy plans to target with its ballistic missiles, and if there are any civilian objects or persons in the vicinity.
The target development process as used by the United States and NATO includes three stages: basic, intermediate and advanced. Each stage has its own minimum requirements. Basic target development begins the “process of identifying, locating, describing, and functionally characterizing” and databasing the target details.Footnote 58 Intermediate target development includes the minimum pieces of intelligence needed to validate the target, such as target significance, target description, characterization, expectation, elements and source documentation.Footnote 59 For example, for a surface-to-air missile system, the facility would consist of the main parts of the system, which could include radars, missile launchers and some form of command and control. The critical elements would be identified, along with the expectation of how destruction would affect the enemy's air defences. After target vetting and validation (described in the next paragraph), advanced target development provides the minimum information necessary to engage the target effectively. This includes weaponeering, aimpoint selection and development, and a collateral damage estimate (CDE).Footnote 60
A number of processes are built into the joint targeting cycle to review and refine the intelligence assessments of potential targets and ensure compliance with IHL and rules of engagement (ROE). For example, the US military mayFootnote 61 use the target vetting process to leverage the expertise of the wider national intelligence community in order to verify the fidelity of the intelligence and analysis used to develop the target.Footnote 62 Then, the target validation process determines, among other things, that the proposed target is in compliance with IHL and the ROE.Footnote 63 NATO doctrine applies this same validation process.Footnote 64 In cases of dynamic targeting, these processes may look very different and the compressed timeline may result not only in a quicker check of the intelligence but also in an inability to integrate more collected intelligence or ask for additional intelligence to be collected.
As previously discussed,Footnote 65 intelligence analysis is not perfect for a variety of reasons, but while some of these reasons cannot be addressed due to the nature of warfare, others can. The reality of imperfect intelligence requires decision-makers to look with an analytical eye to the provision of intelligence assessments and consider what steps they may take to improve confidence in assessments. IHL, through Article 57(2)(a)(i) of AP I, requires those who plan or decide upon an attack to “do everything feasible to verify that the objectives to be attacked are neither civilians nor civilian objects and are not subject to special protection but are military objectives”, but it does not specify what those feasible actions may be. The customary status of this general concept is recognized in Rule 16 of the International Committee of the Red Cross (ICRC) Customary Law Study,Footnote 66 and although not a party to AP I, the United States accepts a customary international law obligation to take feasible precautions to verify that objects of attack are military objectives.Footnote 67
A recent example of imperfect intelligence leading to tragic results was the 29 August 2021 US military targeting of an aid worker and his vehicle in Afghanistan. The aid worker was mistakenly identified as an ISIS-K member about to launch a suicide attack. The air strike resulted in the death of three civilian adults and seven children. The target engagement authority for this strike was told that the strike cell was “beyond reasonably certain” that the vehicle matched the threat they were tracking based on all of the intelligence, vehicle description, routes and point of origin.Footnote 68 However, a later statement by the US Air Force inspector-general concluded that “the interpretation or the correlation of the intelligence to what was being perceived at the time, in real time, was inaccurate”, and that “confirmation bias” in addition to other factors led to the ten civilian casualties.Footnote 69
Good practices for verifying identification for means of IHL compliance can include:
• collecting additional intelligence, and particularly intelligence of a different discipline that what was previously collected;
• reviewing the confidence level and reassessing the accuracy of the intelligence supporting the assessment that the proposed target is a military objective;Footnote 70
• determining other possible identifications that would fit with the current intelligence collected and then requesting, or collecting as needed, intelligence that will support or refute those other possible identifications;
• comparing the proposed target against no-strike lists and/or other intelligence collected on civilian objects; and
• reviewing previously approved targets at reasonable intervals as well as when warranted in light of fresh information and changing circumstances, e.g. to ascertain whether enemy forces continue to use the object for military purposes or whether the object's destruction or neutralization continues to offer a definite military advantage.Footnote 71
US and NATO doctrine both include the concept of no-strike entities that make up a no-strike list. No-strike lists contain entities upon which kinetic and non-kinetic operations are prohibited due to international law, ROE, agreements, or the risk of damaging relations with coalition partners or local populations.Footnote 72 Such entities can include medical, educational, diplomatic, cultural, religious and historical sites, and anything not a military objective;Footnote 73 common examples include hospitals, religious sites, cultural sites, schools and embassies of non-combatant countries. Although now a doctrinal and detailed process, the concept of creating a no-strike list has been used in previous conflicts. For example, during Operation Desert Storm in 1991, the United States used intelligence resources to identify cultural property and prepare a no-strike list.Footnote 74
In order to identify and then provide the details necessary to avoid targeting of, or unintentional damage to, no-strike entities, intelligence is needed to provide details on the entity's purpose and the same location accuracy as is required for lawful military targets.Footnote 75 When this is not provided, entities may be accidentally targeted, as evidenced by the infamous 1999 bombing of the Chinese embassy in Yugoslavia, which the NATO Bombing Campaign Final Report found was due in part to the fact that none of the military or intelligence databases used to verify target information had the correct location of the embassy.Footnote 76 The intelligence needed to create comprehensive no-strike lists is extensive and requires prioritization, either by target lists or other command priorities.
The last good practice listed above, the reviewing of previously approved targets, merits additional attention. In many of today's conflicts and in future large-scale combat operations, military objectives will be identified through intelligence gathered earlier, leading to latency and changes to the facts on the ground. Reliance on old assessments and confidence levels may result in unanticipated but preventable engagement of targets that are no longer valid military objectives or have unknown additional civilian presence or purpose.Footnote 77
Proportionality analysis's reliance on intelligence analysis
The rule of proportionality in military operations requires all combatants not to pursue an attack in which the expected injury and death to civilians and damage to civilian objects would be excessive compared to the concrete and direct military advantage expected to be achieved.Footnote 78 For example, if attacking an army command and control node with an air strike is likely to cause physical damage to the two civilian businesses in the building next door, the commander must determine that the expected concrete and direct military advantage of degrading or destroying the command and control node will have on the enemy's army is not excessive in relation to the harm and possible death/injury caused to civilians in the nearby business buildings.
Included in proportionality analysis are not just the direct effects from the munition but also the indirect harms foreseeably resulting from the attack.Footnote 79 While there is some disagreement among experts as to which indirect effects must be considered, there is generally a consensus on including indirect foreseeable harms, including as described in the Bothe, Partsch and Solf Commentary to AP I.Footnote 80 The DoD Manual limits this to foreseeable “immediate or direct harms”, providing as an example that if a power plant was destroyed and this would be expected to result in the deaths of civilians at a hospital connected to the power plant, this must be considered as part of the proportionality analysis.Footnote 81 The UK Manual refers to a planned precision bombing attack on a military fuel storage depot, with a foreseeable risk that burning fuel will flow into a civilian residential area and cause injury to the civilian population. The UK Manual counts this indirect effect as part of the expected collateral damage.Footnote 82
Importantly, this requirement includes not just the foreseeable harm that is identified in advance but all reasonably foreseeable harm, meaning that even if one did not know of the foreseeable harm, but should have, then it should have been included in the proportionality analysis.Footnote 83 As a result, properly identifying foreseeable harm is crucial to IHL compliance. Identifying such harm requires intelligence analysis not just to identify that objects are civilian objects but also to identify and understand civilian networks and how degrading or destroying one node will affect the rest of the network.
One way to determine the expected injury and death to civilians and damage to civilian objects is through the US collateral damage estimation methodology (CDEM), also adopted by NATO, which provides a methodical, data-driven approach to determining what direct collateral damage will likely occur in a specific instance. The process has five CDE levels, each progressively refining the analysis based on several factors, including target characteristics, weapon type and effect, delivery parameters, the physical environment around the target, and available intelligence.Footnote 84 Current technology also allows the user to change the weaponeering (type of munition, fuse, angle of attack, etc.) in order to see the effects on mission success (probability of damage or kill) and on collateral damage, thereby allowing for analysis on options to reduce collateral damage without hindering mission accomplishment. Allowing such modifications to weapons choice and employment to occur in quick succession while still achieving the desired effects on the target will lead to more protective results for civilians and civilian objects.
In most cases, this formal analysis is conducted by intelligence analysts certified in the CDEM.Footnote 85 Intelligence is also crucial for the collateral damage analysis in that intelligence data must be provided in order to determine probable collateral damage. Civilian objects in the vicinity of the target must be properly identified in order to be calculated into the analysis. For example, suppose a building near a target is not properly identified as a religious site, house, etc., and is instead misidentified as part of the military compound. In that case, the CDE will not include it. Furthermore, it may be impossible to determine the exact number of civilians in a civilian structure at a given time. Intelligence's answer to this is to create and use population density tables; these tables provide population density estimates for specific human activities under normal patterns of life, frequently integrating open-source information into the analysis.Footnote 86 Ideally, other forms of intelligence are integrated into the analysis instead of solely relying on population density tables.Footnote 87 Additionally, there are inherent limitations to the CDEM; one major limitation is that it is used to consider direct effects in the area around the target only and does not include indirect effects outside of that area.Footnote 88 The importance of understanding the civilian aspects of the operating environment is discussed in additional detail in the next section.
Good practices for identifying foreseeable but indirect harm include:
• using intelligence, including OSINT, to map out civilian critical infrastructure and the roles of key nodes;
• ensuring that intelligence is available on the civilian roles of dual-use objects and the impact of their degradation or loss on civilian life; and
• integrating intelligence on the effects of previous attacks into analysis of the effects of possible future attacks, to ensure that compounding effects are understood.
Precautions in attack
Even in situations in which an attack is against a lawful military object and meets the proportionality rule, IHL requires the attacker to take feasible precautions in planning and conducting the attack to reduce the risk to civilians and other protected persons and objects. The relevant part of Article 57 of AP I reads as follows:
-
2. With respect to attacks, the following precautions shall be taken: (a) those who plan or decide upon an attack shall:
(i) do everything feasible to verify that the objectives to be attacked are neither civilians nor civilian objects and are not subject to special protection but are military objectives within the meaning of paragraph 2 of Article 52 and that it is not prohibited by the provisions of this Protocol to attack them;
(ii) take all feasible precautions in the choice of means and methods of attack with a view to avoiding, and in any event to minimizing, incidental loss of civilian life, injury to civilians and damage to civilian objects;
(iii) refrain from deciding to launch any attack which may be expected to cause incidental loss of civilian life, injury to civilians, damage to civilian objects, or a combination thereof, which would be excessive in relation to the concrete and direct military advantage anticipated;
(b) an attack shall be cancelled or suspended if it becomes apparent that the objective is not a military one or is subject to special protection or that the attack may be expected to cause incidental loss of civilian life, injury to civilians, damage to civilian objects, or a combination thereof, which would be excessive in relation to the concrete and direct military advantage anticipated;
(c) effective advance warning shall be given of attacks which may affect the civilian population, unless circumstances do not permit.
3. When a choice is possible between several military objectives for obtaining a similar military advantage, the objective to be selected shall be that the attack on which may be expected to cause the least danger to civilian lives and to civilian objects.
4. In the conduct of military operations at sea or in the air, each Party to the conflict shall, in conformity with its rights and duties under the rules of international law applicable in armed conflict, take all reasonable precautions to avoid losses of civilian lives and damage to civilian objects.
The verification of the objective as a military objective is addressed in the section on distinction above, and the requirement of only proportional attacks is addressed in the proportionality section above.
Means and methods have been analyzed briefly in the section on proportionality when discussing weaponeering and the technological ability to repeatedly modify the munition and engagement parameters and see the probability of desired effects on the target and estimated collateral effects. This cannot be overstated as a way to reduce collateral effects without requiring a reduction in military effectiveness, but feasible precautions in means and methods are larger than this single approach. Means and methods also include considering the timing of the attack or even alternative methods that would have the same desired effect, such as cyber or electronic warfare methods. In order to understand which different means and methods would still be effective but also avoid or minimize incidental injury or death to civilians and damage to civilian objects, extensive intelligence is needed to understand the civilian environment and the effects desired on the target.
For example, choosing a different time to attack the target is frequently suggested as a way to avoid or reduce civilian harm. However, for static objects like buildings, this still requires gaining knowledge of the civilians who work in the building and their schedules, as well as any civilians that may be nearby and their schedules. Population density tables are used for averages when specific intelligence cannot be gathered; for moving targets, this requires a keen understanding of the operating environment, including areas with a high density of civilian populations and objects and the likelihood of civilian presence based on time of day. In some cases, near-real-time video from intelligence, surveillance and reconnaissance assets can provide some of that intelligence, identifying civilian presence at a snapshot in time. However, this can miss civilians outside of the current field of view and civilians hidden from view due to overhangs, walls and buildings, as evidenced in the Kabul air strike example discussed above.
Effective advanced warning is also customary international law and is stated as such in Rule 20 of the ICRC Customary Law Study: “Each party to the conflict must give effective advance warning of attacks which may affect the civilian population, unless circumstances do not permit.”Footnote 89 “Effective” in this instance means effective at reaching the intended civilians but not requiring an effective response from the civilians to reduce harm to themselves.Footnote 90 To effectively reach the intended civilians, intelligence is key in determining what the message should be, how it is written, and how it is delivered. For example, intelligence on the language(s) spoken, the literacy level and the means of communication (pamphlets, phone call/text messages, or even social media) used among the civilian population will all increase the chances of effectively reaching the intended audience.
In situations where the military wants the warning to be effective in the sense that potentially affected civilians can take actions to reduce risk of harm to themselves, additional steps based on intelligence of the operational environment can assist. For example, if a warning is given that a city will soon be the object of attack, intelligence can verify that the civilian population has a way to evacuate the city, and the warning military force can consider providing additional information to civilians to assist them in finding a secure way to safety.Footnote 91
Lastly, Article 57 of AP I provides that “[i]n the conduct of military operations, constant care shall be taken to spare the civilian population, civilians and civilian objects”. Article 27 of the 1907 Hague Regulations states that “[i]n sieges and bombardments all necessary steps should be taken to spare as far as possible” a list of specific objects including hospitals, religious sites and charities. While there is not much debate that the requirement to take constant care to spare civilians and civilian objects is a customary international law principle,Footnote 92 the interpretation of the scope of the requirement varies. Although it is debated if this is a general requirement in itself or simply a chapeau to the more detailed requirements in paragraph 2 of Article 57 dealing with attacks,Footnote 93 the 1987 Commentary to AP I recognizes it as a “general principle”,Footnote 94 and the United States recognizes a customary international law obligation to take feasible precautions to reduce the risk of harm to the civilian population and other protected persons and objects.Footnote 95
To fully understand the impact of military operations, intelligence must not only indicate the role of the target in the enemy's operations but also provide a deep understanding of the civilian aspects of the operating environment that will foreseeably be impacted by the target's engagement. Depending on the type of operation and the type of conflict, the level of intelligence required to understand the civilian aspects of the operating environment will vary. For example, the targeting of high-value individuals in counterterrorism operations requires detailed intelligence on the high-value individual for identification purposes (more so when outside an area of active combat), but less information on the larger civilian environment. More conventional military operations require a deeper and wider understanding of the civilian environment because of the larger impact that operations will have on it.Footnote 96 For example, the RAND Corporation found that US operations in Raqqa, prior to the 2017 operation to retake the city, focused on targeting senior terrorist leaders and “not on building an understanding of the civilian environment”.Footnote 97 As a result, the RAND report concluded that focusing intelligence only on “defeating the enemy” resulted in “insufficient emphasis on understanding the human terrain and finding ways to mitigate civilian harm risks”, which was needed for the effort to forcibly retake the city.Footnote 98
Through its 2022 Civilian Harm Mitigation and Response Action Plan, the DoD recognized the importance of increasing understanding of the civilian environment as part of both IHL compliance and as a good practice that supports policies on civilian harm mitigation, including “improv[ing] the commander's ability to distinguish non-adversarial aspects of the operational environment”.Footnote 99 The civilian environment, as characterized by the DoD, consists of the “civilian population and the personnel, organizations, resources, infrastructure, essential services, and systems on which civilian life depends”.Footnote 100 NATO previously developed a similar concept, the human environment, which requires
developing a comprehensive picture of the operating environment, including both the physical aspects of the human environment (e.g. population welfare, demographics, etc.), and the psychological aspects related to population perceptions (e.g. their attitudes towards respective factions, their support for the mission.)Footnote 101
Good practices for providing constant care to spare the civilian population from the effects of military operations include:
• collecting intelligence on the civilian environment so that the full effects of military operations can be understood in advance and mitigated as feasible;
• mapping the civilian networks on which civilian life depends (water, electricity, hospitals) and tracking to the level feasible the effects of military operations on those networks;
• using intelligence on the civilian population, infrastructure, future operations and the operational environment generally to model and predict internally displaced persons and refugee flows; and
• developing humanitarian notification and deconfliction systems.
Conclusion
Without intelligence, decision-makers would not be able to effectively target the enemy and have any hope of achieving ultimate victory. IHL, on the other hand, is a balance between military necessity and humanity, requiring even more intelligence in order to comply with specific provisions of the law and the general spirit behind it. As a result, intelligence is crucial to military success and IHL compliance, and decision-makers rely heavily upon it to make reasonable decisions on what to target and how to do so, and whether that specific military action is compliant with IHL. Decision-makers have an obligation to understand intelligence, and this article has elucidated the key roles of intelligence in specific targeting decisions, with the goal of enabling better compliance with IHL and better outcomes for protected persons and objects.