Defense and Security

Intelligence

  • United States
    You Might Have Missed: Drones, Targeted Killings, and Autonomous Robots
    Maria Abi-Habib, “Troops Shot After Taliban Leader’s Call,” Wall Street Journal, October 26, 2012. Anti-American feelings are rife in the Afghan army and police, the two forces that are supposed to take over once the coalition’s military mandate ends in 2014. "We call the Americans troops infidels. They may be our allies in military terms, but under our religion they are our enemies," said an Afghan army sergeant serving in Khost province. "The Quran says that Christians and Jews can never be friends of the Muslims." Colum Lynch, “UN to Probe Drone Attacks by United States, Others Resulting in Civilian Deaths,” Washington Post, October 25, 2012. Emmerson said that his decision to investigate drone attacks and other targeted killings reflects frustration with the Obama administration’s unwillingness to provide public information on such covert strikes. “The Obama administration continues to formally adopt the position that it will neither confirm nor deny the existence of the drone program…In reality, the administration is holding its finger in the dam of public accountability,” he said according to a prepared copy of the speech. “I will be launching an investigation unit within the special procedures of the [UN] Human Rights Council to inquire into individual drone attacks, and other forms of targeted killings conducted in counterterrorism operations, in which it has been alleged that civilian casualties have been inflicted,” he added. (3PA: Earlier that week at the UN, Harold Koh responded to questions: “‘The point is, all killing is regrettable [but] not all killing is illegal.’ He said that killings by drone ‘in the course of armed conflict or in self defense is consistent with international law.’” It would be unprecedented for such an investigation into U.S. targeted killings. The first such inquiry was released on January 13, 2003 (see E/CN.4/2003/3, page 16).) Peter W. Singer, “Tell Us the One About the Robots, Mr. President,” Foreign Policy, October 24, 2012. Robotics is akin to gunpowder, the steam engine, or the computer. It’s a game-changing technology not merely because of its power, but because of its impact both on and off the battlefield. While modern unmanned systems are still in the first generation of use—the Model T Ford stage, so to speak—operators for these systems are already the fastest-growing group in the U.S. Air Force, potentially reshaping its long-term identity as more and more pilots never leave the ground. Government Accountability Office, “Future Aerostat and Airship Investment Decisions Drive Oversight and Coordinations Needs,” October 23, 2012. Victoria Nuland, Department of State Daily Press Briefing, October 19, 2012. QUESTION: You talk about intelligence issues when you want to talk about them and when it’s in your interest to do so. NULAND: That’s fair. Jeffrey S. Thurner, “No One at the Controls: Legal Implications of Fully Autonomous Targeting,” National Defense University, October 2012. The United States will likely face asymmetric threats in military campaigns of the future. Whether the threat is the substantial jamming and cyber-attack capabilities of the People’s Republic of China or the legions of swarming Iranian patrol boats, LARs [lethal autonomous robots] may provide the best way to counter it. LARs have the unique potential to operate at a tempo faster than humans can possibly achieve and to lethally strike even when communications links have been severed. Autonomous targeting technology will likely proliferate to nations and groups around the world. To prevent being surpassed by rivals, the United States should fully commit itself to harnessing the potential of fully autonomous targeting. The feared legal concerns do not appear to be an impediment to the development or deployment of LARs. Thus, operational commanders should take the lead in making this emerging technology a true force multiplier for the joint force. Operational commanders who establish appropriate control measures over these unmanned systems will ensure their LARs are effective, safe, and legal weapons on the battlefield. “Who’s Counting Casualties?” Oxford Research Group, October 2012. Greg Miller, “Plan for Hunting Terrorists Signals U.S. Intends to Keep Adding Names to Kill Lists,” Washington Post, October 23, 2012. Karen DeYoung, “A CIA Veteran Transforms U.S. Counterterrorism Policy,” Washington Post, October 24, 2012. (3PA: For my thoughts on John Brennan’s role in shaping U.S. targeted killing policies, see here and here.) Craig Whitlock, “Remote U.S. Base at Core of Secret Operations,” Washington Post, October 25, 2012.
  • United States
    Institutionalizing America’s Targeted Killing Program
    In today’s Washington Post, Greg Miller delivers a comprehensive, forward-looking, must-read report on the Obama administration’s vast and expanding targeted killing program. In the piece, Miller provides three significant details that were previously unreported. First, among senior Obama administration officials, “there is broad consensus [targeted killings] are likely to be extended at least another decade.” As a senior official is flippantly quoted: “We’re not going to wind up in 10 years in a world of everybody holding hands and saying, ‘We love America.’” Second, the National Counterterrorism Center (NCTC) maintains a “disposition matrix” that attempts to harmonize the CIA and JSOC kill lists, presents strategies to kill or capture individuals who appear on those lists, and describes what is required by U.S. government agencies and foreign partners should targeting information become available. Although the role played by the NCTC was previously unknown, it is consistent with the six primary missions (see page 37) established in its mandate by the 2004 Intelligence Reform and Terrorism Prevention Act. Third, the process of vetting and selecting individuals for targeted killings has been further narrowed and concentrated within the office of John Brennan—whose role as the "priest whose blessing has become indispensable" to Obama and misleading statements I have written about extensively. According to Miller’s article, Brennan ended the video conferences run by the chairman of the Joint Chiefs of Staff that discussed revisions to the kill lists because “Brennan thought the process shouldn’t be run by those who pull the trigger on strikes.” This is savvy power-grab by Brennan, although—in my experience—trigger-pullers possess considerably less enthusiasm for killing people than civilians sitting in the basement of the White House. After following this program closely for the past half-dozen years, I have stopped being surprised by how far and how quickly the United States has moved from the international norm against assassinations or “extrajudicial killings.” As I wrote in my book on discrete military operations, opposition to assassination was widely held and endured throughout the Ford, Carter, Reagan, Bush, and Clinton administrations through 1999 for the following reasons: Assassinations ran counter to well-established international norms, and were prohibited under both treaty and customary international law. Third, weakening the international norm against assassinations could result in retaliatory killings of American leaders, who are more vulnerable as a consequence of living in a relatively open society. Fourth, the targeted killing of suspected terrorists or political leaders was generally considered an ineffective foreign policy tool. An assassination attempt that failed could be counterproductive, in that it would create more legal and diplomatic problems than it was worth. An attempt that succeeded, meanwhile, would likely do little to diminish the long-term threat from an enemy state or group. Finally, the secretive and treacherous aspect of targeted killings was considered antithetical to the moral and ethical precepts of the United States. Miller’s report underscores the cementing of the mindset and apparent group-think among national security policymakers that the routine and indefinite killing of suspected terrorists and nearby military-age males is ethical, moral, legal, and effective (for now). Moreover, it demonstrates the increasing institutionalization—“codifying and streamlining the process” as Miller describes it—of executive branch power to use lethal force without any meaningful checks and balances. Recent history demonstrates that the executive branch does not willingly provide transparency and a plausible defense of its national security decisions, or cede any of its incrementally accrued powers, unless Congress, courts, or the American people care. Indeed, it is notable that Miller does not find officials worried about the legality, congressional oversight, transparency, or precedent setting for future state and nonstate powers wielding armed drones. Having spoken with dozens of officials across both administrations, I am convinced that those serving under President Bush were actually much more conscious and thoughtful about the long-term implications of targeted killings than those serving under Obama. In part, this is because more Bush administration officials were affected by the U.S. Senate Select Committee investigation, led by Senator Frank Church, that implicated the United States in assassination plots against foreign leaders—including at least eight separate plans to kill Cuban president Fidel Castro—and President Ford’s Executive Order 11905: “No employee of the United States Government shall engage in, or conspire to engage in, political assassination.” Recently, I spoke to a military official with extensive and wide-ranging experience in the special operations world, and who has had direct exposure to the targeted killing program. To emphasize how easy targeted killings by special operations forces or drones has become, this official flicked his hand back over and over, stating: "It really is like swatting flies. We can do it forever easily and you feel nothing. But how often do you really think about killing a fly?"
  • United States
    Foreign Policy Puzzles of the Vice Presidential Debate
    Although likely U.S. voters are evenly split between President Barack Obama and Governor Mitt Romney, nearly all Americans agree that foreign policy issues are not important in this election. The latest poll found that only 6 percent think “foreign policy and the Middle East” is the most important issue. However, last night’s vice presidential debate devoted a significant amount of time on foreign policy questions, perhaps because moderator Martha Raddatz (who actually moderated) previously covered the Pentagon and the State Department, and is now a senior foreign affairs correspondent for ABC News. Since Raddatz asked the questions and demanded specific answers, several hot-button foreign policy issues were raised, such as the attacks on the U.S. consulate in Benghazi, the suspected nuclear weapons program in Iran, the protracted conflict in Syria, and the near-forgotten war in Afghanistan. In response, both vice presidential candidates gave statements that are misleading or wishful thinking. Ryan: “If we had the status of forces agreement [in Iraq]…we probably would have been able to prevent [Iranian flights suspected of carrying weapons to Syria].” Here, Ryan echoes what the Wall Street Journal military planning staff determined last month: “The Iranian overflights…would not happen if the U.S. still had an airbase in Iraq to secure the country’s airspace.” Would Ryan have supported maintaining U.S. troops in Iraq without Baghdad providing immunity protections? The United States currently has 225 troops, 530 security assistance team members, and over 4,000 contractors to equip and train Iraqi security forces via the Office of Security Cooperation Iraq. Would Ryan support these troops and personnel attempting to intercept Iranian flights?  Does Ryan believe that the government of Iraq would allow the United States to intercept aircraft over its sovereign territory? Ryan: “When Barack Obama was elected, they had enough fissile material—nuclear material to make one bomb. Now they have enough for five.” Ryan should have added: “If the material was further enriched at Iran’s declared nuclear sites where the IAEA does routine physical inventory verifications, which would quickly detect such activity.” Biden: “There is no weapon that the Iranians have at this point. Both the Israelis and we know if they start the process of building a weapon.” Biden added, “They’re closer to being able to get enough fissile material to put in a weapon if they had a weapon.” What Biden fails to mention is that the creation of a workable HEU-fueled nuclear device isn’t the biggest hurdle for Iran. One of the items that Pakistani nuclear scientist A.Q. Khan shopped around on the nuclear black market was the blueprint for a Chinese-designed twelve kiloton warhead, which was successfully tested in 1966. Furthermore, even if Iran did not receive Chinese nuclear blueprints, Biden knows that it would not be overly difficult for Iranian engineers to manufacture a crude nuclear device. As he told an arms control conference in 2004: When I was chairman of the Foreign Relations Committee…I gathered the heads of all the national laboratories and some of their subordinates in [the Capitol]. I asked them a simple question. I said I would like you to go back to your laboratory and try to assume for a moment you are a relatively informed terrorist group with access to some nuclear scientists. Could you build, off-the-shelf, a nuclear device? Not a dirty bomb, but something that would start a nuclear reaction—an atomic bomb. Could you build one? They came back several months later and said, “We built one.”… I literally asked the laboratories to physically take this device into the Senate…it was bigger than a breadbox and smaller than a dump truck but they were able to get it in. They literally put it in a room and showed and explained how—literally off-the-shelf, without doing anything illegal—they actually constructed this device. Biden: “We are leaving [Afghanistan]. We are leaving in 2014, period.” The full withdrawal of all U.S. troops out of Afghanistan is not the current position of the Obama administration. On October 3, Secretary of State Hillary Clinton announced the appointment of Ambassador James Warlick, deputy special Representative for Afghanistan and Pakistan, to lead the negotiations for an agreement that would keep U.S. troops in Afghanistan for an undefined period of time. Reportedly, “Western officials have mentioned the residual American force as ranging from a few thousand to some 20,000.” In addition, some U.S. policymakers assume that Afghanistan will serve as hub for special operations raids and drone strikes into Pakistan. Does Biden support the scheduled pull out of U.S. forces from Afghanistan by the end of 2014 or not?  Would the government of Afghanistan agree? At the same time, Ryan and Biden did agree on one point. They both think that they have total clairvoyance into the mind of the Iranian supreme leader Ayatollah Ali Khamenei. Ryan: “Let’s look at this from the view of the ayatollahs. What do they see?” In response, Biden declared, “Let me tell you what the ayatollah sees.” Understanding the mindset of Ayatollah Khamenei is essential for efforts to prevent Iran from acquiring a nuclear weapon. In January, Director of National Intelligence James Clapper told the Senate: “Iran’s technical advances, particularly in uranium enrichment, strengthen our assessment that Iran is well-capable of producing enough highly-enriched uranium for a weapon if its political leaders, specifically the supreme leader himself, choose to do so.” This notion that U.S. policymakers—in a redux of the movie Being John Malkovich—can step into the shoes of a seventy-three-year-old Shiite theocrat and accurately comprehend what he sees and believes is lunacy. More accurately, it is what psychologists call the illusion of transparency, where “people overestimate others’ ability to know them, and they also overestimate their ability to know others.” The self-assuredness is also particularly dangerous for assessing the motives of repressive leaders. The recently declassified CIA review of how the intelligence community misunderstood Saddam Hussein’s motivations to refuse to fully reveal Iraq’s WMD programs should temper Ryan and Biden’s faith in their ability to think like the ayatollah: “Analysts tend to focus on what was most important to us—the hunt for WMD—and less on what would be most important for a paranoid dictatorship to protect…Deceptions were perpetrated and detected, but the reasons for those deceptions were misread.”
  • United States
    You Might Have Missed: Iran, Red Lines, Drones, and Dieting
    Prime Minister Benjamin Netanyahu: "I believe that, faced with a clear red line, Iran will back down.” (September 27, 2012) Deputy Foreign Minister Danny Ayalon, “I think that this whole matter of red lines should be made, but not publicly.” (September 27, 2012) Deputy Prime Minister Dan Meridor, “I don’t want to set red lines or deadlines for myself.” (September 14, 2012) “Rockets Galore,” The Economist, September 29, 2012. (3PA: A Hellfire drone missile costs $115,000 and weighs 50 kilograms. The new Spike missile costs $5,000 and weighs less than 3 kilograms.) Peter W. Singer, “After-Action Report; It’d Be Stupid But Not Disastrous,” TIME, September 28, 2012. (3PA: This five-part series on the effects of defense sequestration is a solid and balanced analysis.) Department of Defense, Press Briefing with George Little, September 25, 2012. Q:  You said the secretary sees the mission moving forward in Afghanistan.  Just kind of been a tumultuous couple weeks here.  What are the metrics of success that you guys are most impressed with?  What are the things that tell you that that’s the case? LITTLE:  Well, partnered operations continue.  Overall levels of violence are down.  We see Afghans more and more in the lead for their own operations and for their own governance.  That is the goal here.  That is what we’re trending toward.  At the end of the day, that’s how success is going to be defined.  It’s whether Afghans can provide for their own security and govern themselves. If anyone thinks that the metric of success is a surrender ceremony on the deck of a ship, they’re wrong.  The metric of success in Afghanistan is enabling the Afghans, Afghan political institutions, and the Afghan national security forces, to create a brighter future for Afghanistan.  That is the point and that is the goal of our strategy. (3PA: How would the Pentagon define “a brighter future for Afghanistan,” or know when they’ve achieved that objective?) Q:  Iran says it has built and deployed a reconnaissance drone, the Shahed 129 they’re calling it.  It says it doubles the range of previous drones, and they say it’s like the RQ Sentinel drone that went down in Iranian territory in 2011.  Are you aware of this drone, of this -- of this deployment?  Can you verify it in any way?  And are you concerned about it in any way? LITTLE:  I’m not in a position to verify that claim one way or the other.  I think that we have the most sophisticated, elaborate remotely-piloted vehicles in the world. General Richard B. Myers, “How Junk Food in Schools Affects the Military,” Politico, September 24, 2012. Being overweight or obese has now become the leading medical reason why young adults cannot enlist in the military. The Defense Department estimates that 1 in 4 young adults is too overweight to enlist. When weight problems are combined with other disqualifying factors, like failing to finish high school or being convicted of a serious crime, an estimated 75 percent of Americans age 17 to 24 are not able to join the military. Casey L. Coombs, “Yemen to Get UAVs from the United States,” Aviation Week, September 26, 2012. An anonymous Yemeni defense official, who was not authorized to speak with the press, tells Aviation Week that Yemen is receiving four AeroVironment RQ-11 Raven UAVs. The 1.9-kg Raven is equipped with sensors for target acquisition, and infrared cameras capable of displaying persons carrying weapons. “This type of technology would be very appropriate for Yemen’s frontline military units because it provides real-time intelligence from the battlefield to launch strikes while minimizing troops’ exposure to surprise attacks,” according to Aysh Awas, director of security and strategic studies at Sheba, a think tank here in the Yemeni capital. Living Under Drones: Death, Injury, and Trauma to Civilians From U.S. Drone Practices in Pakistan, Stanford Law School and NYU School of Law, September 2012.  
  • United States
    Who Else Is Violating Iraqi Airspace?
    The Iranian government is reportedly supplying military equipment via Iraqi airspace to Bashar al-Assad’s regime in Syria. Although Iraq temporarily halted the flights in mid-March at the request of the Obama administration, they resumed in July. Last week, Reuters quoted from an intelligence report from an unnamed country: "Planes are flying from Iran to Syria via Iraq on an almost daily basis, carrying IRGC (Iranian Revolutionary Guard Corps) personnel and tens of tons of weapons to arm the Syrian security forces and militias fighting against the rebels." Yet again, the Obama administration has asked Iraq to ban the flights outright, or force them to land and undergo inspections. This would be a relatively simple process, as Iraq requires advance notice of eight business days for flights in its airspace, and mandates that such flights occur within twenty-four hours. Despite such demands, Iraq lacks the political will and the capability—specifically an integrated air defense radar system and robust air force—to establish complete control over its airspace. Yesterday, Lt. Gen Robert Caslen, chief of the Office of Security Cooperation at the U.S. embassy in Iraq, told the New York Times: “Iraq recognizes they don’t control their airspace, and they are very sensitive to that,” General Caslen said. Each time Turkish fighter jets enter Iraq’s airspace to bomb Kurdish targets, he said, Iraqi officials “see it, they know it and they resent it.” This is an interesting statement from the most senior U.S. military official in Iraq. As the countries’ occupying power, the United States controlled Iraqi airspace from April 2003 until the last sector was transferred in October 2011 to Iraq. As part of that role, the United States leveraged access to Iraqi airbases to launch surveillance drone missions over Iran. At the same time, several of Iran’s more capable spy drones like the Ababil III were easily tracked and shot down by U.S. fighter jets over Iraq. Prior to the U.S. invasion in March 2003, the United States played the predominant role in enforcing the Iraqi southern and northern no-fly zones (NFZs)—encompassing sixty percent of Iraq—for twelve years. Altogether, the United States has had excellent situational awareness of Iraqi airspace for nearly twenty years, until handing over control to Baghdad in October 2011. What makes Caslen’s comments disturbing is that between April 2003 and October 2011, Turkish F-16s routinely entered Iraqi airspace to attack Kurdish targets—suspected members of the Kurdistan Workers’ Party (PKK).  These attacks were not only permitted by the United States, but U.S. manned and unmanned systems provided targeting information about suspected PKK camps to Turkey. This arrangement was cemented in November 2007 when the United States and Turkey established a joint combined intelligence fusion cell in Ankara to process all incoming intelligence on the PKK. On occasion, such Turkish attacks have been devastating to Kurdish civilians living in northern Iraq. Every single State Department Human Rights report—200720082009, and 2010—since the U.S.-Turkey cell opened warned of civilians casualties in counterterrorism operations where the PKK was the intended target. On December 28, 2011, a U.S. Predator drone provided video imagery of a caravan of suspected PKK militants near the Turkish border. After Turkish officers directed the drone to fly elsewhere, Turkish aircraft attacked the caravan with four sorties and killed thirty-four civilians. To this day, the United States provides targeting intelligence to the Turkish Air Force. If, as Caslen claims, Iraqis are aware of and resent the ongoing Turkish incursions into Iraq, they assuredly resented U.S. control of Iraqi airspace. Given the U.S. criticisms of Iraqi unwillingness to curtail Iranian arms and personnel flights headed to the Assad regime in Syria, it is also worth highlighting who else violates Iraqi airspace, and who supports those intrusions.
  • Intelligence
    Eye of the Storm for U.S.-Pakistan Relations
    Pakistan-U.S. ties have rebounded, but domestic turmoil and looming leadership transitions should command U.S. attention on this vital terrorist frontline, writes CFR’s Daniel Markey.
  • Defense and Security
    Armed Drones and the Hunt for bin Laden
    Today is the fourteenth anniversary of the best chance the United States had to kill Osama bin Laden before he led al-Qaeda to plan and carry out the terrorist attacks of 9/11. In addition to failing to elimate bin Laden, or any senior al-Qaeda leaders, the botched cruise missile attack of August 20, 1998, played a prominent role in accelerating efforts to arm unmanned drones. What began as highly specialized, covert tool to locate and kill one individual has developed into today’s default counterterrorism tactic. On August 7, 1998, at 10:30 a.m., a Toyota Dyna truck bomb exploded at the rear of the U.S. embassy in Nairobi, Kenya, killing 213 people—including 12 Americans—and injuring more than 4,000 others. Nine minutes later, a 1987 Nissan Atlas refrigeration truck bomb exploded thirty-five feet outside of the U.S. embassy in Dar es Salaam, Tanzania, killing 11 people and injuring 85 more. Both truck bombs were made in Kenya by the same man, Egyptian explosives expert Mushin Musa Matwalli Atwah, who was killed by a CIA drone in Pakistan in April 2006. The bombings were described by an CIA official as, “On a scale of 1 to 10 [with one being the highest], that’s a 1.” The following day, a “small group” within the National Security Council was formed, consisting of the principals and a handful of other senior officials. At the first meeting, Director of Central Intelligence George Tenet presented unusually specific evidence that over two hundred suspected militants and al-Qaeda leaders (including bin Laden) were planning to gather at the Zhawar Kili training complex in Khost, Afghanistan. Six days later, Tenet provided the CIA’s formal determination that bin Laden and his senior Egyptian aides were responsible for the U.S. embassy bombings; “This one is a slam dunk, Mr. President,” the director unequivocally stated, using a metaphor of certainty he would repeat for President Bush regarding Saddam Hussein’s supposed-WMD programs. Military planners in U.S. Central Command and the Joint Staff developed options including a special operations raid, which was discounted due to concerns that it would take too long to assemble the complete force package, enabling logistics, and combat search and rescue capabilities. Presented with six options to attack the Zhawar Kili training complex, a senior U.S. military official later told me, the president “went right to the cruise missile option.” In addition, a range of targets in Sudan, supposedly connected to bin Laden from when he lived there until 1996, were also considered by the small group. Eventually, two targets in the capital of Khartoum were proposed: the El-Shifa Pharmaceuticals Industries Company factory and the Khartoum Tannery Company, which bin Laden had received from the Sudanese government as partial payment for building a road linking the capital to the Red Sea. In the weeks prior to the embassy bombings, the CIA had presented intelligence to the White House about al-Qaeda’s efforts to acquire WMD, including an assessment of a soil sample taken near the El-Shifa factory that contained over two times the normal trace of O-ethyl methylphosphonothioic acid (or Empta), a chemical precursor used in the production of nerve gas. Shortly before the operation, Clinton, according to his autobiography, “took the tannery off the list because it had no military value to al-Qaeda and I wanted to minimize civilian casualties.” The cruise missile strikes—codenamed Operation Infinite Reach—were the model of American limited military force. At 7:30 p.m. local time in Sudan, two U.S. Navy warships in the Red Sea fired thirteen BGM-109 Tomahawk Land Attack Missiles (TLAMs) at the El-Shifa factory. Pentagon planners ran computer models to calculate the risk of the possible release of a chemical plume from the attack. To ensure that any toxins would be incinerated, extra Tomahawks were added in order to burn the factory to the ground. El-Shifa was destroyed, its night watchman was killed, and a watchman in a sugar factory next door was horribly injured. As General Anthony Zinni, commander of U.S. Central Command, sarcastically noted: “[El Shifa] was a success. We sprayed aspirin all over Khartoum.” Yet, it was a failure politically as it was later revealed that Bin Laden had no ownership stake in the factory, and it was not connected to producing WMD. At the same time as the El-Shifa strike, four Navy ships in the Arabian Sea off the coast of Pakistan launched sixty-six TLAMs against six sites within the Zhawar Kili complex at Khost. With no concern about collateral damage, the bombing of the Khost complex sought to inflict the maximum number of casualties. To accomplish this, Pentagon planners deployed cruise missiles in two waves. The first began with several C-model unitary warhead TLAMs that hit the complex to lure people outside to find out what was happening. The follow-up wave consisted of a saturation of D-model TLAMs armed with 166 soda-can-sized bomblets that burst several hundred feet above the target and blanketed an area roughly eight hundred by four hundred feet with shards of shrapnel. Reportedly, between twenty and sixty people were killed, including Pakistani ISI officers training militants to fight in Kashmir. Some later claimed that bin Laden was tipped off in advance by Pakistan, although U.S. officials argue there is no definitive evidence. For whatever reason—his bodyguard later claimed bin Laden was not at Khost at the time—bin Laden and all senior al-Qaeda members survived the cruise missiles. In December 1998, four months after Operation Infinite Reach, new intelligence emerged that bin Laden would be staying at a particular location in Kandahar for an indefinite period of time. This was crucial; the time needed to analyze the intelligence, obtain presidential authorization, program the missiles, and launch the targeted missile required a minimum of four to six hours. The collateral damage from a potential cruise missile attack against Kandahar was estimated at roughly three hundred casualties. Although the operation was never authorized, the 9/11 Commission later found: “After this episode Pentagon planners intensified efforts to find a more precise alternative to cruise missiles, such as using precision strike aircraft.” With specific guidance from the National Security Council to develop new means to locate, identify, and track bin Laden, an interagency team—led by Vice Admiral Scott Fry, the Joint Staff’s director of operations—soon settled on the most promising option: the Predator. In fifteen test flights before 9/11, unmanned surveillance drones provided live video coverage of Afghanistan. To enable the Predator to carry out lethal strikes, the Air Force mated the drone with a reconfigured Hellfire antitank missile normally used by attack helicopters. The first successful U.S. armed drone strike test took place on February 16, 2001. By November, a Predator was used to kill Mohammed Atef, a top al-Qaeda military commander in Afghanistan. Reviewing the debates among late Clinton and early Bush administration officials, one is struck by how uneasy many were with both deploying such a low-risk, low-cost lethal tool and where such a weapon would ultimately lead. Since that time, armed drones have been used some four hundred times outside of battlefield settings to kill nearly three thousand individuals. The emergence of drones as the preeminent tool in America’s undeclared Third War against suspected militants in Yemen, Pakistan, Somalia, and The Philippines is one that former officials would have found hard to believe. The relative precision that drones allow, compared to less precise tools like the cruise missiles launched fourteen years ago in the immediate search for bin Laden, makes them more attractive than anyone would have anticipated or predicted.
  • United States
    You Might Have Missed: Israeli Strike on Iran, No-Fly Zone in Syria, and Ernest Hemingway
    Benny Morris, “Obama’s Last Chance Before Israel Bombs Iran,” The Daily Beast, August 16, 2012. (3PA: In this piece, Morris predicts “Israel is likely to strike [Iran] before the American elections.” In July 2008, Morris boldly predicted in the New York Times, “Israel will almost surely attack Iran’s nuclear sites in the next four to seven months.” Morris also writes of Israel’s 1981 attack on the Iraqi Osirak plutonium reactor, “That successful strike actually put paid to Saddam Hussein’s nuclear weapons program, which was never resurrected.” It is totally untrue that Iraq’s nuclear program was never resurrected. As Målfrid Braut-Hegghammer wrote in the journal International Security: “The attack had mixed effects: it triggered a covert nuclear weapons program that did not previously exist, while necessitating a more difficult and time-consuming technical route to developing nuclear weapons.”) Jeffrey Lewis, “The Ayatollah’s Pregnant Pause,” Foreign Policy, August 15, 2012. Luke Coffey and James Phillips, “No-Fly Zone Over Syria: The Wrong Policy at the Wrong Time,” Heritage Foundation, August 15, 2012. U.S.-led airstrikes, especially without adequate regional buy-in from Turkey and other allies, could be the first step in an incremental process that could draw the U.S. into a protracted civil war that could continue long after Assad is gone. The U.S. may be limited in what it can do, but doing nothing will almost certainly yield an outcome that is not in America’s interest… The U.S. Air Force is not for hire every time there is a popular uprising somewhere in the world. Considering how little the West knows about the Syrian opposition and how fragmented it appears to be, it is currently not worth the amount of resources and manpower required carry out robust airstrikes à la Libya. While establishing an NFZ might be a feel-good measure, under the current conditions, it would likely achieve very little. W.J. Hennigan, “Key Test Set for Sustained Hypersonic Flight,” Los Angeles Times, August 13, 2012. The Pentagon believes that hypersonic missiles are the best way to hit a target in an hour or less. The only vehicle that the military currently has in its inventory with that kind of capability is the massive, nuclear-tipped intercontinental ballistic missile. Other means of hitting a distant target, such as cruise missiles and long-range bomber planes, can take hours to reach their destination. When pressed for an example of the need, military officials often point to a 1998 attack when the U.S. military tried—and failed—to kill Osama bin Laden. Navy vessels in the Arabian Sea lobbed cruise missiles at training camps in Afghanistan, hitting their targets—80 minutes later. By then, Bin Laden was gone. But with a hypersonic missile, such as the technology being tested on the WaveRider, "the attack would have been cut to just over 12 minutes," Richard Hallion, a former Air Force senior advisor, said in an Air Force Assn. report about hypersonic technology. (3PA: There has never been any proof that Bin Laden was at the Khost, Afghanistan training camp during the cruise missile raid. In 2006, Bin Laden’s bodyguard Abu Jandal told 60 Minutes that Bin Laden left his Tarnak Farms compound after the East Africa U.S. embassy bombings, knowing the United States would retaliate militarily. According Abu Jandal: "There was a fork in the road. One road leading to Khost and training camps, and another one leading to Kabul," Abu Jandal recalls. "I was with Sheikh Osama in the same vehicle with three guards, so he turned to us and said, ’What do you think? Khost or Kabul?’ We told him, ’Let’s just visit Kabul.’ So Sheikh Osama said, ’OK, Kabul.’ " The next day, some 70 U.S. cruise missiles struck Khost. U.S. Department of State Daily Press Briefing, August 13, 2012. QUESTION: But if I could just go into that second one. The Secretary consistently says we don’t want to make it worse. We want to do something, but we don’t want to make it worse. Would a humanitarian corridor make things worse? What would be the downside of that? MS. NULAND: Well again, I don’t know what that set of words means to you, Jill – a humanitarian corridor – I mean, de facto now, as you know, the opposition forces control territory from north of Aleppo all the way up to the border. So de facto they are able to operate in a different way now, they are controlling checkpoints into Turkey, they are able to operate in a way that was more difficult when the Syrian Government controlled all of those checkpoints. So— QUESTION: Are you saying that de facto, there is a corridor? MS. NULAND: I’m saying de facto there is opposition control of territory all the way up to the border. And that changes the way they operate. It changes the way – the needs that they might have. U.S. Department of State Implementation Plan of the National Action Plan on Women, Peace, and Security, August 2012. Nicholas Reynolds, “Ernest Hemingway, Wartime Spy,” Studies in Intelligence, June 2012. From the archive: "Intervention, Please: the ’No-Fly Zone’ Requests You Don’t Hear About," The Atlantic, January 10, 2012. (3PA: As the Syrian rebels repeat their demands for a U.S. or UN-led no-fly zone over the territory they control, it is worth noting the many demands for similar no-fly zones in countries not in the headlines today.)
  • United States
    Will America Help Israel Attack Iran?
    Yesterday, during a press conference, General Martin Dempsey, chairman of the Joint Chiefs of Staff, observed the following when asked about Israeli military capabilities to undertake unilateral strikes against Iranian nuclear facilities: DEMPSEY: Militarily, my assessment hasn’t changed. I want to make clear; I’m not privy to their planning. So what I’m telling you is based on what I know of their capabilities, and I may not know about all their capabilities, but I think that it’s a fair characterization to say that they could delay, but not destroy Iran’s nuclear capabilities. Q: Is a two- to three-year timeframe of delay, is that still the swag that— DEMPSEY: I haven’t changed my assessment. (This refers to his earlier assertion that an Israeli strike would “delay the production or the capability of Iran to achieve a nuclear weapon status—probably for a couple of years.”) Dempsey’s emphasis on the lack of joint U.S.-Israel military planning over attacking Iran is nothing new. In a February interview with Fareed Zakaria, when asked if Israel would fly over Iraqi airspace to strike Iran, Dempsey responded: “Well, I mean, I’m not privy, obviously, to their plans. But that is the shortest distance between two points.” In May, during a public address in Washington, DC, he stated: Israel and the United States have been closely collaborating on any number of fronts, especially in the area of intel sharing, so that we can come to a common understanding of the threat and of the likely timelines that we might have to confront. I probably met with [Chief of Staff of the Israel Defense Forces, Benny Gantz] more than any other of my counterparts–nearly every other month since I’ve been the chairman. That’ll continue because we have common interests in the defense of Israel as well as ensuring that –as you know, we’ve said we’re determined to prevent Iran from becoming a nuclear weapon state. So I can assure you that we are collaborating with the Israeli military on intel sharing and on our posture. I will say it does not rise to the level of joint military planning, but we’re closely collaborating. No one in the U.S. government believes that Israel would give the United States advance warning of a unilateral attack against Iran. When the White House, and later Secretary Panetta, demanded such notice, Israel pointedly declined. When asked about an Israeli heads-up, Dempsey simply said, “I don’t know.” Meanwhile, Senators Carl Levin and John McCain, chairman and ranking member of the Senate Armed Services Committee, both agree that the Obama administration does not know what Israel will decide to do. In late March, Panetta acknowledged: “If Israel decides to go after Iran and we have to defend ourselves, we could be engaged sooner than any of us want.” The near-certainty that Tel Aviv will not warn Washington before attacking Iran—as they never have for other preemptive attacks—along with Dempsey’s repeated warnings raise three important points that are often lost in media reports and Israeli and American public opinion polls. Specifically, there are no joint plans for a strike against Iran’s nuclear program, the most senior U.S. military official is unaware of Israeli military plans, and the United States will not know in advance of a unilateral Israeli operation. In the past week, U.S. officials have reaffirmed, “there is time and space to continue to pursue a diplomatic path,” and, “we have visibility into the program, and we would know if and when Iran made what’s called a ‘breakout move’ towards acquiring a weapon.” Despite pressure from Israeli prime minister Benjamin Netanyahu, the Obama administration will not attack Iran’s nuclear program any time soon. After years of threats, there may be an Israeli military attack against Iran in the next few months, with the United States on the sidelines—at least initially. Iran’s response to an Israeli attack, however, will almost certainly draw in U.S. military forces nearby, whether they want to or not.
  • Intelligence
    NYPD’s Powers of Threat Perception
    The NYPD’s new "Domain Awareness System" raises familiar questions about privacy and transparency that are likely to spark a debate at multiple levels of government, writes CFR’s Matthew Waxman.
  • United States
    The Other Reasons for Invading Syria
    As the fighting between the ever-weakening regime of President Bashar al-Assad and hundreds of armed opposition groups spreads and intensifies, pundits and policymakers are increasing their calls to intervene militarily in Syria’s civil war. The primary reason given for picking sides in this conflict is to protect unarmed civilians from the brutal and often indiscriminate force waged by Assad’s security forces. In tandem with this humanitarian impulse is the notion that giving weapons, intelligence, and logistics support to a select few, carefully vetted armed rebels will rapidly lead to regime change in Syria. Above all else, intervention proponents never claim that regime change will be very difficult, or require a single U.S. boot on the ground. As Paul Wolfowitz and Mark Palmer wrote last month: “No one is arguing for military intervention on the order of Afghanistan or Iraq.” However, there are a range of other justifications that intervention proponents put forth, having nothing to do with protecting civilians or regime change in Syria. To attempt to gather support from different audiences, such proponents routinely provide a laundry list of justifications that rationalize the inherent risks and uncertain ultimate costs of military operations. For example, according to U.S. officials, the Libya intervention was necessary to repay European support for the war in Afghanistan, and send messages of resolve to other dictators, such as Assad, who it turns-out was not receptive. Consider just three other reasons that intervention proponents have offered for invading Syria: Syrians have especially long memories. Anne-Marie Slaughter wrote in a recent op-ed titled “We Will Pay a High Price if We do not Arm Syria’s Rebels”: "Sooner or later some combination of the opposition groups will indeed control Syria. And when they do, their memories of who did what during the struggle to achieve a democratic Syria are going to matter far more to the U.S. and Europe than policy makers presently calculate…The eventual winners in Syria will matter a great deal to the health, wealth and stability of what is still the most geo-strategically important region in the world. Syrians will remember those who remember them, those who cared enough to help save their lives." Though Slaughter does not hypothesize what the “eventual winners” will do to America if President Obama does not authorize arming them today, it is a remarkable rationale that makes several assumptions. First, that the post-Assad political leaders of Syria will be the same individuals who received U.S. weapons. According to Rep. Mike Rodgers, Chairman of the House Permanent Intelligence Committee, there are at least 300 rebel groups in Syria, a quarter of whom “may be inspired” by Al Qaeda. Second, any country not arming the Syrian rebels will be remembered for their lack of enthusiasm, and suffer the wrath of Damascus for some period of time. Third, Syria’s political leaders will closely align their policy preferences with the United States, because the Obama administration armed them—rather than say the preferences of the Qataris or Saudis, who are providing weapons to Syrian rebel groups. Senator Marco Rubio echoed this notion when he contended: “Empowering and supporting Syria’s opposition today will give us our best chance of influencing it tomorrow.” Consider some recent history. The United States provided battlefield intelligence, money, and weapons and ammunition (up to 65,000 tons a year by 1987) to the Afghan mujahideen in the 1980s, some of whom later became members the Taliban, which ruled Afghanistan from 1996 to 2001. Not surprisingly, once the Taliban came to power it was not willingly directed by the United States, refusing repeated requests by the Clinton administration to kick out Osama Bin Laden and his Al Qaeda leadership. In Rwanda, the United States didn’t provide arms or intervene militarily during the genocide in 1994, yet somehow Paul Kagame’s government finds itself able to accept $200M in U.S. foreign assistance every year. Likewise, the future leaders of Syria will act in their own national interests with whoever it needs to, regardless of who is arming or funding the revolution today. Iran. In an op-ed that represents the opinion of many intervention proponents, Danielle Pletka wrote: “Ousting Tehran’s last reliable satellite regime and replacing it with a Sunni, democratic government would reassure our friends in the region that Washington is determined to stand up to Iran when necessary.” Described more vividly by James Dobbins at a Senate Foreign Relations Committee hearing last week: “There’s nothing more effective I think to put the Iranian threat in some perspective and reduce its pressure on Israel than to flip Syria.” It is doubtful that Syria’s opposition will appreciate that their revolution is used to “flip” their country’s relationship with Iran. Furthermore, to restate the point about country’s acting in their own national interests, one often repeated side-benefit of regime change in Iraq was that a non-Saddam Hussein leader in Baghdad would both cooperate closely with America and serve as a bulwark against Iran—neither happened. A transformative moment. As a Washington lobbyist hired by the Syrian opposition to drum up support on Capitol Hill admitted: "There is a window of opportunity. What we do now will affect the region for the next 20 to 30 years." This sort of grandiose thinking echoes President George H.W. Bush who kicked-off the first Gulf War in 1991 by proclaiming “We have before us the opportunity to forge for ourselves and for future generations a new world order.” It also reflects what many neo-conservative Bush administration officials proposed would be the tremendous spill-over gains from the shock-and-awe campaign that toppled Saddam Hussein. The costs ($810 billion and counting) and horrendous human consequences of the 2003 Gulf War should dissuade anybody that Washington can channel a revolution in Syria along a course that benefits only the interests of America and its allies in the Middle East. The nine-month run-up to the U.S. invasion of Iraq in March 2003 was a notable case of “justification fatigue,” where the intellectual arguments favoring regime change were more developed than the political-military plans to rebuild the country once Saddam fell. Whether in Syria, or elsewhere, citizens should carefully judge the merits of the many justifications offered, and decide for themselves whether it is worth the costs and consequences of intervening in another country.
  • Defense and Security
    Guest Post: Iran’s Nuclear Program: The Unintended Consequences of Nuclear Exports
    Matthew Fuhrmann is assistant professor of political science at Texas A&M University and a former Stanton nuclear security fellow at the Council on Foreign Relations. He is the author of Atomic Assistance: How “Atoms for Peace” Programs Cause Nuclear Insecurity. Iran’s nuclear program poses a threat to many nations—particularly Israel and the United States. Yet, it is sometimes forgotten that Washington was an early supporter of Tehran’s nuclear ambitions. The United States provided peaceful nuclear assistance to Iran from 1957 to 1979, when the two states were allies. Washington exported the Tehran Research Reactor (TRR), enriched uranium to fuel it, and “hot cells,” which can be used to produce plutonium—a critical ingredient for making nuclear weapons. All of this aid was provided for civilian uses, but it ended up indirectly augmenting Iran’s nuclear weapons program. For example, from 1988 to 1992 Iran conducted covert plutonium reprocessing experiments using fuel pellets irradiated in the TRR. The Iranian experience exposes a problem known as the dual-use dilemma: because nuclear technology has both peaceful and military applications, nuclear energy aid provides a potential foundation for a bomb program. However, this danger has not deterred the United States from providing nuclear energy assistance to many countries. Today, for instance, Washington is in the midst of negotiating agreements with Jordan and Vietnam that would permit the sharing of nuclear technology, materials, and know-how. Deals such as these could be a recipe for the further spread of nuclear weapons. In a new book, I explore the relationship between peaceful nuclear assistance and nuclear proliferation. Based on an analysis of global nuclear commerce from 1945 to 2000, I show that states are much more likely to covet (and successfully build) nuclear weapons when they accumulate atomic assistance—particularly if they experience an international crisis after receiving aid. Iran is just one of several proliferators that benefited from nuclear energy assistance. India conducted a nuclear test in 1974 using plutonium that was produced in a Canadian-supplied civilian reactor. Iraq probably intended to use a French-supplied civilian facility known as “Osiraq” for military purposes before it was bombed by Israel in 1981. And scientists from North Korea and South Africa received training—from the Soviet Union and the United States, respectively—under the auspices of civilian nuclear cooperation that ultimately facilitated nuclear proliferation. The international community has instituted a variety of measures—including International Atomic Energy Agency (IAEA) safeguards— to limit the proliferation potential of peaceful nuclear aid. Yet, as Iran, Iraq, Libya, South Korea, and others have shown, motivated states can circumvent existing rules and regulations with relative ease. Why, then, do countries provide peaceful nuclear assistance? Suppliers typically offer aid to “buy” cooperation from the recipient country. For example, the United States assisted Iran’s nuclear program to shore up its military alliance with Tehran and to influence Iranian policies on oil pricing. Nuclear exporters hope that they can reap the political and economic benefits of nuclear assistance without contributing to nuclear proliferation. Yet, in the long run, their gambles often backfire. The United States and other suppliers should revise their nuclear trade policies to prevent history from repeating itself. Requiring customers to refrain from building indigenous uranium enrichment or plutonium reprocessing plants (these facilities can produce bomb-grade materials) after accumulating relevant knowledge through peaceful nuclear assistance would be a particularly fruitful policy. Washington has so far expressed little enthusiasm about applying this policy across the board. However, swift action is needed to help prevent future crises like the one that is ongoing in Iran.
  • United States
    National Security Leaks and Iranian Revenge
    On June 1, 2012, the New York Times featured a remarkable work of journalism by David Sanger that opened with the following revelation: “From his first months in office, President Obama ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program.” In his 2009 book The Inheritance, Sanger revealed details about the National Security Agency’s (NSA) penetration of Iranian government computers—also known as cyber exploitation—that helped inform the 2007 National Intelligence Estimate, which judged “with high confidence that in fall 2003, Tehran halted its nuclear weapons program.” Sanger also offered clues about activities covered in a spring 2008 presidential finding that authorized covert action in Iran, including “efforts to interfere with the power supply to nuclear facilities—something that can sometimes be accomplished by tampering with computer code, and getting power sources to blow up.” While there were leaks about suspected U.S. covert activities targeting the Iranian nuclear program, no confirming evidence about the offensive cyber attacks had been published before last month. Many members of Congress and Obama administration officials reacted with the rote condemnation that has followed national security leaks throughout history. These most recent leaks, however, prompted a new and surprising response: freed from the normative constraints against offensive cyber attacks, other states and nonstate actors will now target the United States with unrelenting cyber attacks against its critical infrastructures. In an interview in the National Journal, chairman of the House Intelligence Committee Representative Mike Rogers warned: “Other nations, or even terrorists or hackers, might now believe they have justification for their own cyberattacks.” Senator Diane Feinstein, chairman of the Senate Intelligence Committee, argued that the leak could “to some extent” provide justification for similar cyber attacks against the United States. During a recent hearing of the Senate Homeland Security and Governmental Affairs Committee, former CIA director Michael Hayden and Senator John McCain had the following exchange: HAYDEN: Going to cyber, whether the story was true or false, a publication that the United States was responsible for that activity is almost taunting the Iranians to respond at a time and in a manner of their own choosing. MCCAIN: I was just going to say if I were the head of Iranian intelligence, I’d have been in the supreme leader’s office the next day. HAYDEN: I would have gone in with something. Mr. Khamenei, remember that briefing I gave you about a year ago and you told me to put it on the back-burner? Well, I’ve brought it forward. And in the absence of any Obama administration scapegoat, Sanger has often been targeted in the outcry against the leaks. In a hearing of the House Judiciary Committee, Colonel Kenneth Allard (ret.) declared, “If all of a sudden, utilities stop operating, you have [Sanger] to thank for it.” (In a truly revealing anecdote about the lack of congressional oversight over such high-risk covert operations, Representative Dan Lungren wondered aloud at the same hearing: “Would it bother you to know that the detail that was described in the New York Times, if true, is a level of detail not presented to members of Congress, such as the chairman of the Cybersecurity Subcommittee on Homeland Security, that is, happens to be me.”) Beyond the cyber attacks against Iran, Representative Louie Gohmert added, “You have the Taliban target a helicopter with nearly two dozen of SEAL Team Six members…when the vice president, the president outed SEAL Team Six?” If the Taliban successfully penetrated U.S. battlefield communications to the extent that, out of the one hundred thousand U.S. soldiers in Afghanistan, they can identify who is on each helicopter, Gohmert should initiate a hearing on the subject as soon as possible. The argument that the leaks describing U.S. (and Israeli) offensive cyber attacks against Iran’s nuclear facilities will compel a commensurate response rests on three assumptions: Iran is a rational actor previously constrained by international norms. If this is true, congressional members should hold hearings to investigate the Obama administration’s breach of prohibitory norms. As Ward Thomas noted in his excellent book, The Ethics of Destruction: Norms and Force in International Relations, such “power-maintenance” norms work by banning “weapons or practices that have the potential to close the gap between strong and weak states in international society.” As President Obama wrote in a recent op-ed, “It’s time to strengthen our defenses against this growing danger.” If you believe in the power of norms as do House Republicans, then U.S. cyber attacks against Iran only served to amplify retaliatory threats. Iran was unaware that America was engaged in covert operations—cyber exploitation or attack—against its nuclear program. Earlier this month, the Wall Street Journal reported, “The U.S. military is accelerating its cyberwarfare training programs in an aggressive expansion of its preparations for conflict on an emerging battlefield.” The Air Force lieutenant colonel who oversees one of the cyber courses noted, "Our curriculum is based on attack, exploit and defense of the cyber domain.” If Iranian officials subscribe to the Journal or read anything about the NSA, they would be well aware that preventing Iran from obtaining a nuclear weapon is the highest national security priority for the United States. And that the United States would utilize its well-publicized, unmatched cyber capabilities to achieve this goal. Leaks about U.S. covert actions against weak and distant states lead to a retaliation against America using similar means. In April 1984—after a few cocktails—Senator Barry Goldwater spontaneously read a classified memo on the Senate floor that detailed the direct role of the CIA in mining three Nicaraguan harbors. The next day, the Wall Street Journal ran the headline, “U.S. Role in Mining Nicaraguan Harbors Reportedly Is Larger than First Thought.” Did the Sandista government respond by mining American harbors, or retaliate directly? Unauthorized leaks by government officials are a routine, if at times unfortunate, occurrence in Washington, DC—no matter who occupies the White House. However, it is ridiculous to believe that these particular revelations from David Sanger would now untie Tehran’s cyber warriors to target U.S. critical infrastructure. The Iranian regime is assuredly exploring this capability as well, and its decision to attack will not hinge on a New York Times headline.
  • Defense and Security
    Targeted Killings and Signature Strikes
    In his memoir My American Journey, Colin Powell recollects his tours in Vietnam, first as a U.S. Army captain in 1962 and 1963, and later as a major in 1968 and 1969. Due to the length of the war, Powell notes that many officers and noncommissioned officers deployed to Vietnam were wholly unprepared, leading to a “breakdown in morale, discipline, and professional judgment.” I recall a phrase we used in the field, MAM, for military-age male. If a helo spotted a peasant in black pajamas who looked remotely suspicious, a possible MAM, the pilot would circle and fire in front of him. If he moved, his movement was judged evidence of hostile intent, and the next burst was not in front but at him. Brutal? Maybe so. The term “military-age male” is not defined in military doctrine, though it is routinely used by military officials in counterinsurgency operations to describe individuals who are deemed guilty not based on evidence, but rather on their demography. For example, in unsecured areas of Afghanistan all “fighting-age males,” which comprise any male between the ages of fifteen and seventy, may be required to undergo a biometric scan by U.S. soldiers or Afghan security forces. More recently, military-age male reentered the lexicon of American warfare with a New York Times passage describing the Obama administration’s methodology for “signature strikes” by drones against unnamed individuals: It in effect counts all military-age males in a strike zone as combatants, according to several administration officials, unless there is explicit intelligence posthumously proving them innocent. Counterterrorism officials insist this approach is one of simple logic: people in an area of known terrorist activity, or found with a top Qaeda operative, are probably up to no good. As I have noted elsewhere, “signature strikes” against military-age males did not begin under Obama, but originated in early 2008 under Bush. As first revealed in a February 2008 New York Times article: Instead of having to confirm the identity of a suspected militant leader before attacking, this shift allowed American operators to strike convoys of vehicles that bear the characteristics of Qaeda or Taliban leaders on the run, for instance, so long as the risk of civilian casualties is judged to be low. In the summer of 2008, President Bush lowered the threshold even further for who could be targeted in Pakistan. According to a Bush administration official: “We got down to a sort of ‘reasonable man’ standard. If it seemed reasonable, you could hit it.” One of the more disturbing recent revelations into White House foreign policy decision-making is that President Obama authorized targeted drone strikes while unaware that he had actually authorized signature strikes. According to Daniel Klaidman, when Obama was first made aware of signature strikes, the CIA’s deputy director clarified: “Mr. President, we can see that there are a lot of military-age males down there, men associated with terrorist activity, but we don’t necessarily know who they are.” Obama reacted sharply, “That’s not good enough for me.” According to one adviser describing the president’s unease: “‘He would squirm…he didn’t like the idea of kill ‘em and sort it out later.’” Like other controversial counterterrorism policies inherited by Obama, it did end up “good enough,” since he allowed the practice to stand in Pakistan, and in April authorized the CIA and JSOC to conduct signature strikes in Yemen as well. Although signature strikes have been known as a U.S. counterterrorism tactic for over four years, no administration official has acknowledged or defended them on-the-record. Instead, officials emphasize that targeted killings with drones (the official term is “targeted strikes”) are only carried out against specific individuals, which are usually lumped with terms like “senior” and “al-Qaeda.” Harold Koh: “The United States has the authority under international law, and the responsibility to its citizens, to use force, including lethal force, to defend itself, including by targeting persons such as high-level al-Qaeda leaders who are planning attacks.” John Brennan: “This Administration’s counterterrorism efforts outside of Afghanistan and Iraq are focused on those individuals who are a threat to the United States.” Jeh Johnson: “In an armed conflict, lethal force against known, individual members of the enemy is a long-standing and long-legal practice.” Eric Holder: “Target specific senior operational leaders of al Qaeda and associated forces.” In April, Brennan was asked, “If you could address the issue of signature strikes, which I guess aren’t necessarily targeted against specific individuals?” He replied: “You make reference to signature strikes that are frequently reported in the press. I was speaking here specifically about targeted strikes against individuals who are involved.” Shortly thereafter, when the White House spokesperson was asked about drone strikes, he simply stated: “I am not going to get into the specifics of the process by which these decisions are made.” It should be noted that while no government official will acknowledge or defend the practice, anonymous officials claim that the criteria for signature strikes is “tighter” today than when Obama entered office. The only known alteration to the practice is that the CIA changed its name. As Klaidman revealed: Signature strike has gotten to be sort of a pejorative term. They sometimes call it crowd killing. And it makes a lot of people uncomfortable. If you don’t have positive ID on the people you’re targeting with these drone strikes. So the CIA actually changed the name of signature strikes to something called TADS. I had the acronym but I didn’t know what it stood for. I had a couple of words. I kind of figured it out. Terrorist, T for terrorist, S for strike and I was trying to find out what does the A-D stand for. Eventually I figured it out. It was Terrorist attack disruption strike. And I was going to put it in Newsweek. And actually it was the excerpt from my book. And various agencies from the government were very unhappy about that. I sort of could not understand why. They said, well, it’s a classified term. And I said, well, why would it be classified? It doesn’t make any sense. It’s just a term to describe a particular kind of activity that we know takes place. They asked me not to print it. You know, I printed it anyway. No matter how U.S. officials (secretly) refer to the practice, signature strikes against military-age men have been part of U.S. targeted killings outside of battlefields from their beginning. In fact, the very first targeted killing was a signature strike. After a year-long manhunt and several missed opportunities by Yemeni soldiers, on November 3, 2002, a fusion of human intelligence assets and signals intercepts pinpointed Abu Ali al-Harithi—an operational planner in the al-Qaeda cell that bombed the USS Cole in 2002—and his bodyguards living in the Marib region near the border with Saudi Arabia. Yemeni and U.S. forces on the ground, supported by a Predator drone circling above, were monitoring al-Harithi’s group when they left a compound in two Toyota SUVs. All of the men were in one vehicle and the women in the other. According to an unnamed U.S. official, “If the women hadn’t gotten into another car, we wouldn’t have fired.” (A member of the Senate Select Committee on Intelligence later wondered, “What do we do, next time, if the women get into the car?”) Reportedly, the National Security Agency (NSA) intercepted a satellite phone call coming from the SUV filled with men. After an NSA analyst—who had listened to tapes of al-Harithi’s voice for years—heard confirming evidence, he shouted: “He’s in the backseat, and he’s giving the driver directions!” With that confirmation, a CIA-controlled Predator drone was authorized to fire a single Hellfire missile, which destroyed the SUV and killed al-Harithi, four unknown Yemenis, and Ahmed Hijazi (otherwise known as Kemal Derwish)—a naturalized U.S. citizen who recruited six men from Lackawanna, New York, to briefly attend an al-Qaeda training camp in Afghanistan. Ultimately, the Lackawanna Six pled guilty to providing material support to al-Qaeda and received sentences ranging from seven to nine years in federal prison. As the Los Angeles Times reported the drone strike: “Even though the CIA wasn’t sure who else was in the car, the customary rules of armed conflict say that anyone sitting next to a legitimate target such as Harithi was, in effect, accepting the risk of imminent death.” (Many international legal scholars would dispute this interpretation.) At the same time, U.S. officials acknowledged that the CIA did not know Hijazi was in the vehicle before the CIA launched the missile, although one later claimed his death was justifiable “collateral damage” since “he was just in the wrong place at the wrong time.” It is plausible that the military-age males who happened to get into al-Harithi’s SUV that day were involved with the suspected al-Qaeda operative in planning terrorist plots. However, there is no way to know this with any certainty, and the Bush administration never presented any supporting evidence to this effect. Moreover, we will never know what specific evidence was used to target al-Harithi, because some of it came from suspected al-Qaeda operative Abd al Rahim al-Nashiri. In 2008, CIA director Hayden testified before the Senate Select Committee on Intelligence that Nashiri was one of three detainees that the CIA waterboarded, and information obtained by torture is not admissible in a military commission trial. Whether they are called signature strikes, crowd killing, or Terrorist Attack Disruption Strikes, all have been part of U.S. targeted killings from the start, and continue with the CIA’s tactic of staggered drone strikes to kill rescuers of initial victims. The Obama administration makes the false choice that kinetic counterterrorism options are either “large, intrusive military deployments” or drone strikes (although some signature strikes have been conducted with cruise missiles). Or, as former CIA official Henry Crumpton—who, according to his memoir, authorized the first U.S. drone strike on October 20, 2001, in Afghanistan—crudely described the dichotomy: “Look at the firebombing of Dresden, and compare what we’re doing today.” However, people have the right to disagree with the ethical and moral tradeoffs of how drone strikes are currently conducted, and the unwillingness of the Obama administration to discuss them, as well as Congress’ reticence to question them. After ten years of signature strikes, isn’t this a debate worth having?
  • United States
    You Might Have Missed: Drone Strikes, Threat Inflation, and Iran’s Military Power
    Rebecca Hamilton, “Special Report: The Wonks Who Sold Washington on South Sudan,” Reuters, July 11, 2012. They called themselves the Council and gave each other clannish nicknames: the Emperor, the Deputy Emperor, the Spear Carrier. The unlikely fellowship included an Ethiopian refugee to America, an English-lit professor and a former Carter administration official who once sported a ponytail. The Council is little known in Washington or in Africa itself. But its quiet cajoling over nearly three decades helped South Sudan win its independence one year ago this week. Across successive U.S. administrations, they smoothed the path of southern Sudanese rebels in Washington, influenced legislation in Congress, and used their positions to shape foreign policy in favor of Sudan’s southern rebels, often with scant regard for U.S. government protocol. Paul West, “Romney, Echoing Senator Rubio, Sees Venezuelan Threat to U.S. Security,” Los Angeles Times, July 11, 2012. “The idea that this nation, that this president, doesn’t pose a national security threat to this country is simply naïve. It’s an extraordinary admission on the part of this president to be completely out of touch with what is happening in Latin America… This is a very misguided and misdirected thought,” he said. (3PA: According to the Congressional Budget Office, the United States spends $699 billion on defense annually, whereas Venezuela spends $3.3 billion. For more on Romney’s history of threat inflation, click here.) Sara Sorcher, “Insiders: Drones Strikes Right Approach in Current Phase of War on Terror,” National Journal, July 9, 2012. Two-thirds of National Journal’s National Security Insiders believe that the Obama administration’s increasing use of drone strikes to kill terrorism suspects overseas is the right approach—but many cautioned that Washington should not overuse the tactic. “The drone strike tactic…cuts both ways. Kills terrorists and infrastructure but reinforces view of some that U.S. is at war with Islam,” said one Insider who supports the accelerated use of drone strikes targeting militants in countries including Afghanistan, Pakistan, Yemen, and Somalia. “[We] need to develop local allies to fight and control territory." Another added: “It is right but insufficient. Whack-a-mole only goes so far." Tom Junod, “The Lethal Presidency of Barack Obama,” Esquire, July 9, 2012. Paul Schemm, “Officials: Feared Al-Qaida Offshoot Neutralized,” Associated Press, July 9, 2012. Six years after joining the Osama bin Laden franchise, al-Qaida in the Islamic Maghreb — known by its acronym AQIM — appears to have been neutralized in the nation where it originated and made its name, officials and experts say, corralled into a remote mountain area and reduced to occasional pinprick shootings against soldiers. Most experts agree there remain just a few hundred combatants holed up in Algeria’s Kabylie mountains. Steve Chapman, “The Arms Race That Won’t Happen,” Chicago Tribune, July 8, 2012. Nuclear proliferation is always said to be on the verge of suddenly accelerating, and somehow it never does. In 1981, there were five declared nuclear powers — the U.S., the Soviet Union, China, Britain and France — as well as Israel, which was (and is) undeclared. And today? The number of members added since then is not 15 but three: India, Pakistan and North Korea. Most of the other countries on the list of likely proliferators never came close — including Argentina, Chile, Morocco and Tunisia. Iraq tried and failed. Libya made an effort and then chose to give up. The peril was greatly overblown. It probably is again. But our leaders are not about to let mere history debunk the apocalyptic scenarios. They are committed to a policy based on fear rather than experience. Kelly McEvers, “Yemen Airstrikes Punish Militants and Civilians,” National Public Radio, July 6, 2012. In the escalating air war in Yemen, it’s extremely difficult to figure out who is responsible for any given strike. There are four possibilities: It could be a manned plane from the Yemeni Air Force or the U.S. military. Or it could be an unmanned drone flown by the U.S. military or the CIA. All are being used in the fight against al-Qaida and other militant groups in Yemen. But no matter who launches a particular strike, Yemenis are likely to blame it on the Americans. What’s more, we found that many more civilians are being killed than officials acknowledge. Neither the Yemeni government nor the U.S. military will say much about the strikes. When asked about this story, a Pentagon spokesman, Lt. Col. Jack Miller, said, "While we acknowledge that the U.S. conducts targeted strikes against al-Qaida terrorists, we cannot confirm specific counterterrorism operations. We take great care to avoid civilian casualties. Our counterterrorism operations are precise, lawful and effective." The Yemeni government does acknowledge its role in airstrikes, though it typically provides only limited and piecemeal information. The casualty figures given by the government are often lower than those that residents or journalists find at the scene of attacks, particularly when it comes to civilian casualties. Carlo Munoz, “Report: Pakistan Pushes for Control of U.S. Drone Strikes,” The Hill, July 6, 2012. Specifically, Pakistan is asking for control over the human intelligence assets inside the country that pinpoint locations and targets for American drones, according to the official. Granting Pakistani officials that kind of authority would essentially allow Islamabad to dictate which targets U.S. military and intelligence forces can hit inside the country. Department of Defense, Annual Report on Military Power of Iran (PDF), April 2012.