The Bin Laden Operation: Tapping Human Intelligence
By Fred Burton
Since May 2, when U.S. special operations forces crossed the Afghan-Pakistani border and killed Osama bin Laden, international media have covered the raid from virtually every angle. The United States and Pakistan have also squared off over the U.S. violation of Pakistan’s sovereign territory and Pakistan’s possible complicity in hiding the al Qaeda leader. All this surface-level discussion, however, largely ignores almost 10 years of intelligence development in the hunt for bin Laden.
While the cross-border nighttime raid deep into Pakistan was a daring and daunting operation, the work to find the target — one person out of 180 million in a country full of insurgent groups and a population hostile to American activities on its soil — was a far greater challenge. For the other side, the challenge of hiding the world’s most wanted man from the world’s most funded intelligence apparatus created a clandestine shell game that probably involved current or former Pakistani intelligence officers as well as competing intelligence services. The details of this struggle will likely remain classified for decades.
Examining the hunt for bin Laden is also difficult, mainly because of the sensitivity of the mission and the possibility that some of the public information now available could be disinformation intended to disguise intelligence sources and methods. Successful operations can often compromise human sources and new intelligence technologies that have taken years to develop. Because of this, it is not uncommon for intelligence services to try to create a wilderness of mirrors to protect sources and methods. But using open-source reporting and human intelligence from STRATFOR’s own sources, we can assemble enough information to draw some conclusions about this complex intelligence effort and raise some key questions.
The Challenge
Following the 9/11 attacks, finding and killing bin Laden became the primary mission of the U.S. intelligence community, particularly the CIA. This mission was clearly laid out in a presidential “finding,” or directive, signed on Sept. 17, 2001, by then-U.S. President George W. Bush. By 2005 it became clear to STRATFOR that bin Laden was deep inside Pakistan. Although the Pakistani government was ostensibly a U.S. ally, it was known that there were elements within it sympathetic to al Qaeda and bin Laden. In order to find bin Laden, U.S. intelligence would have to work with — and against — Pakistani intelligence services.
Finding bin Laden in a hostile intelligence environment while friends and sympathizers were protecting him represented a monumental intelligence challenge for the United States. With bin Laden and his confederates extremely conscious of U.S technical intelligence abilities, the search quickly became a human-intelligence challenge. While STRATFOR believes bin Laden had becometactically irrelevant since 9/11, he remained symbolically important and a focal point for the U.S. intelligence effort. And while it appears that the United States has improved its intelligence capabilities and passed an important test, much remains undone. Today, the public information surrounding the case illuminates the capabilities that will be used to find other high-value targets as the U.S. effort continues.
The official story on the intelligence that led to bin Laden’s Abbottabad compound has been widely reported, leaked from current and former U.S. officials. It focuses on a man with the cover name Abu Ahmed al-Kuwaiti, a Pakistani Pashtun born in Kuwait who became bin Laden’s most trusted courier. With fluency in Pashto and Arabic, according to media reports, al-Kuwaiti would be invaluable to al Qaeda, and in order to purchase bin Laden’s property and run errands he would also need to be fluent in Urdu. His position as bin Laden’s most trusted courier made him a key link in disrupting the organization. While this man supposedly led the United States to bin Laden, it took a decade of revamping U.S. intelligence capabilities and a great deal of hard work (and maybe even a lucky break) to actually find him.
The first step for U.S. intelligence services after Bush’s directive was focusing their efforts on bin Laden and the al Qaeda leadership. Intelligence collection against al Qaeda was under way before 9/11, but after the attacks it became the No. 1 priority. Due to a lack of human intelligence in the region and allies for an invasion of Afghanistan, the CIA revived connections with anti-Taliban forces in Afghanistan and with Pakistan’s Inter-Services Intelligence (ISI) directorate in order to oust the Taliban government and accrue intelligence for use in disrupting al Qaeda. The connections were built in the 1980s as the CIA famously operated through the ISI to fund militant groups in Afghanistan fighting the Soviet military. Most of these links were lost when the Soviets withdrew from the Southwest Asian state and the CIA nominally declared victory. Pakistan, left with Afghanistan and these militant groups, developed a working relationship with the Taliban and others for its own interests. A coterie of ISI officers was embedded with different militant groups, and some of them became jihadist sympathizers.
U.S. intelligence budgets were severely cut in the 1990s in light of the “peace dividend” following the fall of the Soviet Union, as some U.S. leaders argued there was no one left to fight. Intelligence collection was a dirty, ambiguous and dangerous game that U.S. politicians were not prepared to stomach. John Deutch, the director of the CIA from 1995 to 1996, gutted the CIA’s sources on what was known as the “Torricelli Principle” (named after then-Rep. Robert Torricelli), which called for the removal of any unsavory characters from the payroll. This meant losing sources in the exact kind of organizations U.S. intelligence would want to infiltrate, including militants in Southwest Asia.
The CIA began to revive its contacts in the region after the 1998 U.S. Embassy bombings in Nairobi, Kenya, and Dar es Salaam, Tanzania. While the U.S. intelligence community was looking for bin Laden at this time, he was not a high priority, and U.S. human-intelligence capabilities in the region were limited. The United States has always had trouble with human intelligence — having people sitting at computers is less of a security risk than having daring undercover operatives running around in the field — and by the end of the 1990s it was relying on technological platforms for intelligence more than ever.
The United States was in this state on Sept. 12, 2001, when it began to ramp up its intelligence operations, and al Qaeda was aware of this. Bin Laden knew that if he could stay away from electronic communications, and generally out of sight, he would be much harder to track. After invading Afghanistan and working with the ISI in Pakistan, the United States had a large number of detainees who it hoped would have information to breach bin Laden’s operational security. From some mix of detainees caught in operations in Afghanistan and Pakistan (particularly with the help of the ISI), including Khalid Sheikh Mohammed and Abu Farj al-Libi, came information leading to an important bin Laden courier known by various names, including Abu Ahmed al-Kuwaiti. (His actual identity is still unconfirmed, though his real name may be Sheikh Abu Ahmed.)
The efficacy of enhanced interrogation and torture techniques is constantly debated — they may have helped clarify or obfuscate the courier’s identity (some reports say Mohammed tried to lead investigators away from him). What is clear is that U.S. intelligence lacked both a sophisticated and nuanced understanding of al Qaeda and, most important, human sources with access to that information. With the United States not knowing what al Qaeda was capable of, the fear of a follow-on attack to 9/11 loomed large.
Anonymous U.S. intelligence officials told Reuters the breakthrough came when a man named Hassan Ghul was captured in Iraq in 2004 by Kurdish forces and turned over to the United States. Little is known about Ghul’s identity except that he is believed to have worked with Abu Musab al-Zarqawi and to have given interrogators information about a man named “al-Kuwaiti” who was a courier between al-Zarqawi and al Qaeda operational commanders in Afghanistan and Pakistan. Ghul was then given over to the Pakistani security services; he is believed to have been released in 2007 and to now be fighting somewhere in the region.
While U.S. intelligence services got confirmation of al-Kuwaiti’s role from al-Libi, they could not find the courier. It is unknown if they gave any of this information to the Pakistanis or asked for their help. According to leaks from U.S. officials to AP, the Pakistanis provided the National Security Agency (NSA), the main U.S. communications interception agency, with information that allowed it to monitor a SIM card from a cellphone that had frequently called Saudi Arabia. In 2010, the NSA intercepted a call made by al-Kuwaiti and began tracking him in Pakistan. Another U.S. official told CNN that the operational security exercised by al-Kuwaiti and his brother made them difficult to trail, but “an elaborate surveillance effort” was organized to track them to the Abbottabad compound.
From then on, the NSA monitored all of the cellphones used by the couriers and their family members, though they were often turned off and had batteries removed when the phones’ users went to the Abbottabad compound or to other important meetings. The compound was monitored by satellites and RQ-170 Sentinels, stealth versions of unmanned aerial vehicles (UAVs), which were reportedly flown over the compound. According to The Wall Street Journal, the National Geospatial-Intelligence Agency (NGA) even built a replica of the compound for CIA Director Leon Panetta and other officials. The NGA is the premier U.S. satellite observation agency, which could have watched the goings-on at the compound and even spotted bin Laden, though it would have been difficult to confirm his identity.
Some of these leaks could be disingenuous in order to lead the public and adversary intelligence agencies away from highly classified sources and methods. But they do reflect long-believed assessments of the U.S. intelligence community regarding its advanced capability in technology-based intelligence gathering as well as the challenges it faces in human-intelligence collection
No comments:
Post a Comment