Can Hillary Turn on Electricity in Yemen Better than AQAP?

Due to the vagaries of smart phone RSS feeds, I re-read this story over the weekend. In addition to describing Secretary of State Clinton’s speech before the Special Operations Forces Industry Conference–in which she described how special ops fit into her idea of really smart power–it also aired JSOC complaints about Hillary’s proposed closer ties between diplomacy and special ops.

But rumor has it Clinton’s vision has its detractors — and that its implementation in hotspots such as Yemen and Congo has made some Special Operations Forces officers very unhappy. In Yemen, in particular, some commando officers look upon the State Department’s expanding shadow-war powers as a bureaucratic intrusion on what should be military territory. A source tells Danger Room that in Yemen State has effectively hijacked all U.S. counter-terrorism funding, requiring a labyrinthine approval process for even small expenditures. According to detractors, the funding control is a way of cementing State’s expansion into the Special Operations Forces traditional remit.

McRaven does not share the officers’ objections. The admiral has enthusiastically widened and deepened his command’s alliances with commando forces from allied nations — all in a bid to build what he calls the “global SOF partnership.” The Army 10th Special Forces Group’s ongoing deployment to Afghanistan is a perfect example: 10th Group’s Afghanistan task force includes commandos from Poland, Romania and several other countries. In a sense, McRaven is becoming more of a diplomat as Clinton becomes more of a warrior. Meeting in the middle, they’ve apparently chosen to be allies instead of rivals.

In that context, Clinton’s appearance at an otherwise minor military trade show is an important signal. McRaven is showing his officers that if he and America’s top diplomat can get along, then they can get along with their own State Department counterparts, as well. An evolving vision of American warfare is counting on it.

This story came out on May 24, just a few days after this largely unnoticed AP story described John Brennan seizing control over targeting. One reason for Brennan to do so, it seemed, was to give State more direct influence over targeting.

The move concentrates power over the use of lethal U.S. force outside war zones at the White House.

The process, which is about a month old, means Brennan’s staff consults the Pentagon, the State Department and other agencies as to who should go on the list, making a previous military-run review process in place since 2009 less relevant, according to two current and three former U.S. officials aware of the evolution in how the government targets terrorists.

[snip]

But some of the officials carrying out the policy are equally leery of “how easy it has become to kill someone,” one said. The U.S. is targeting al-Qaida operatives for reasons such as being heard in an intercepted conversation plotting to attack a U.S. ambassador overseas, the official said.[my emphasis]

That is, it seems like this process–which the AP dates to sometime in mid-April–allowed State to bypass DOD’s vetting process by submitting targeting suggestions directly to Brennan. And the AP story appeared to arise out of the same disgruntlement within JSOC as Wired’s story.

Now, I actually support Hillary’s efforts to strengthen State’s soft power efforts; we won the Cold War as much with soft power and oil price manipulation as we did by bankrupting Russia with an arms race. But we’ve sucked at it ever since. Read more

Share this entry

StuxNet: Covert Op-Exposing Code In, Covert Op-Exposing Code Out

In this interview between David Sanger and Jake Tapper, Sanger makes a striking claim: that he doesn’t know who leaked StuxNet.

I’ll tell you a deep secret. Who leaked the fact? Whoever it was who programmed this thing and made a mistake in it in 2010 so that the bug made it out of the Natanz nuclear plant, got replicated around the world so the entire world could go see this code and figure out that there was some kind of cyberattack underway. I have no idea who that person was. It wasn’t a person, it wasn’t a person, it was a technological error.

At one level, Sanger is just making the point I made here: the age of cyberwar may erode even very disciplined Administration attempts to cloak their covert operations in secrecy. Once StuxNet got out, it didn’t take Administration (or Israeli) sources leaking to expose the program.

But I’m amused that Sanger claims he doesn’t know who leaked the information because he doesn’t know who committed the “technological error” that allowed the code to escape Natanz. I find it particularly amusing given that Dianne Feinstein recently suggested Sanger misled her about what he would publish (while not denying she might call for jailing journalists who report such secrets).

What you have are very sophisticated journalists. David Sanger is one of the best. I spoke–he came into my office, he saw me, we’ve worked together at the Aspen Strategy Institute. He assured me that what he was publishing he had worked out with various agencies and he didn’t believe that anything was revealed that wasn’t known already. Well, I read the NY Times article and my heart dropped because he wove a tapestry which has an impact that’s beyond any single one thing. And he’s very good at what he does and he spent a year figuring it all out.

Sanger claims, now that DiFi attacked him, he doesn’t know who made this “technological error.”

But that’s not what he said in his article, as I noted here. His article clearly reported two sources–one of them a quote from Joe Biden–blaming the Israelis.

An error in the code, they said, had led it to spread to an engineer’s computer when it was hooked up to the centrifuges. When the engineer left Natanz and connected the computer to the Internet, the American- and Israeli-made bug failed to recognize that its environment had changed. It began replicating itself all around the world. Suddenly, the code was exposed, though its intent would not be clear, at least to ordinary computer users.

“We think there was a modification done by the Israelis,” one of the briefers told the president, “and we don’t know if we were part of that activity.”

Read more

Share this entry

30 Ways to Shrink Intelligence Oversight

Correction: I misunderstood a few things about this. First, this is the request from DNI, not what the Intelligence Committees have agreed to. And the House–which has taken up this request–did not accept all these requests (including the clearances audit). This post has been altered accordingly.

The DNI released their 2013 Intelligence Authorization request yesterday. Almost 10 pages of the 24 page document describe reporting that these “oversight” committees will no long require from the Intelligence Community. The bill starts by putting a default 3 year expiration on any new reporting requirements. And then it includes a list of 27 reports that the bill will eliminate and another 3 that it will modify.

And while some of the reports may well be redundant or outdated (the justification given for most of the changes), some seem really troubling. For example, the bill would eliminate a requirement–passed just three years ago–that the Administration audit and report (partially in unclassified form) the total number of security clearances and how long it takes to approve and reapprove those clearances. Here’s how the bill justifies eliminating such a report:

Justification: Section 506H includes two enduring reporting requirements. The requirement for a quadrennial audit of positions requiring security clearances should be repealed because the National Counterintelligence Executive, in partnership with other agencies with similar responsibilities, examines the manner in which security clearance requirements are determined more frequently than once every four years. Rather than submit a report regarding a quadrennial activity, the executive branch can provide more frequent briefings, as requested, if congressional interest persists.
With regard to the annual reporting requirement on security clearance determinations, the Executive Branch as a whole has made significant progress in expediting and streamlining the security clearance process since the passage of the Intelligence Reform and Terrorism Prevention Act, thus reducing the saliency of this report. This reporting requirement should be replaced by briefings, as requested, if congressional interest persists.

What this effectively does is eliminate one way for citizens to see at least the outlines and scope of our secret government. Rather than a partially unclassified report, instead, the intelligence community will brief Congress, rendering it not only secret, but eliminating some of the paperwork that can be FOIAed or archived.

The bill also would eliminate a requirement for the Director of National Intelligence and CIA Director to each provide an annual list of any advisory committees they’ve created, their subject, and their members. I’m guessing the proposed substitution–regular Congressional notifications and briefings–is probably not going to include the same level of detail. And given ODNI’s inadequate response to Electronic Frontier Foundation on an advisory committee as important as the Intelligence Oversight Board, I’m not all that confident it will provide adequate notice on more obscure advisory committees. Moreover, there is a history of advisory board members obtaining great influence and advantages from their position. Lists of members should be on paper somewhere.

Read more

Share this entry

Gang Warfare to Protect Israel’s Secrets

Easily the most overlooked line in David Sanger’s story on StuxNet is this one:

Mr. Obama concluded that when it came to stopping Iran, the United States had no other choice.

If Olympic Games failed, he told aides, there would be no time for sanctions and diplomacy with Iran to work. Israel could carry out a conventional military attack, prompting a conflict that could spread throughout the region.

It’s a sentiment he repeats in this worthwhile interview:

FP: There haven’t been thoughtful discussions about the consequences or the ethics or the international legal ramifications of this approach. Let’s imagine for a moment that you’re [Iranian President] Mahmoud Ahmadinejad and you are confronted with this. Isn’t your first reaction, “How is them blowing up Natanz with a code any different from them blowing up Natanz with a bomb? And doesn’t that justify military retaliation?”

DS: Blowing it up with computer code, rather than bombs, is different in one big respect: It very hard for the Iranians in real time to know who the attacker was, and thus to make a public case for retaliating. It takes a long time to figure out where a cyber attack comes from.

That was a big reason for the U.S. and Israel to attack Natanz in this way. But it wasn’t the only reason, at least from the American perspective. One of the main driving forces for Olympic Games was to so wrap the Israelis into a project that could cripple Natanz in a subtle way that Israel would see less of a motivation to go about a traditional bombing, one that could plunge the Middle East into a another war. [my emphasis]

A key purpose of StuxNet, according to Sanger, was not just to set back the Iranian nuke program. Rather, it was to set back the nuke program in such a way as to set back Israel’s push for war against Iran.

With that in mind, consider the way the article blamed the Israelis for letting StuxNet escape.

An error in the code, they said, had led it to spread to an engineer’s computer when it was hooked up to the centrifuges. When the engineer left Natanz and connected the computer to the Internet, the American- and Israeli-made bug failed to recognize that its environment had changed. It began replicating itself all around the world. Suddenly, the code was exposed, though its intent would not be clear, at least to ordinary computer users.

“We think there was a modification done by the Israelis,” one of the briefers told the president, “and we don’t know if we were part of that activity.”

Mr. Obama, according to officials in the room, asked a series of questions, fearful that the code could do damage outside the plant. The answers came back in hedged terms. Mr. Biden fumed. “It’s got to be the Israelis,” he said. “They went too far.”

After having explained that the whole point of StuxNet was to stop the Israelis from bombing Iran, the article then goes on to say that what alerted the Iranians to StuxNet’s presence in their systems–and effectively gave a very dangerous weapon to hackers around the world–was an Israeli modification to the code.

The Israelis went too far.

Those details are, IMO, some of the most interesting new details, not included the last time David Sanger confirmed the US and Israel were behind StuxNet on the front page of the NYT.

How very telling, then, that of all the highly revealing articles that have come out during this Administration–of all of the highly revealing articles that have come out in general, including Sanger’s earlier one revealing some of the very same details–Congress is going apeshit over this one.

Read more

Share this entry

UndieBomb 2.0: Defying the Trend

In his story describing the lowered standards for drone strikes the other day, Greg Miller described multiple officials admitting that we’re increasing the number of drone strikes in Yemen even though there’s no evidence more people are “migrat[ing]” to join AQAP.

U.S. officials said the pace has accelerated [in the last five months] even though there has not been a proliferation in the number of plots, or evidence of a significantly expanded migration of militants to join AQAP.

That may conflict with John Brennan’s claims that AQAP has tripled in size since the UndieBomber 1.0. It may suggest that that growth all took place before the last year. Or it may suggest–particularly given the use of the word “migration”–that these officials are distinguishing between non-Yemenis and local insurgents allying with AQAP.

Whichever it is, the NCTC just reported, last year attacks from AQAP didn’t go up either–in fact, they went down slightly.

Attacks by AQ and its affiliates increased by 8 percent from 2010 to 2011. A significant increase in attacks by al-Shabaab, from 401 in 2010 to 544 in 2011, offset a sharp decline in attacks by al-Qa‘ida in Iraq (AQI) and a smaller decline in attacks by al-Qa‘ida in the Arabian Peninsula (AQAP) and al-Qa‘ida in the Islamic Maghreb (AQIM).

Everyone but John Brennan–who has a history of lying about drone strikes–seems to be saying that the risk from terrorism, while still real, is going down in Yemen, not up.

UndieBomb Plot 2.0, to the limited degree that it was a general plan of Ibrahim al-Asiri and not a plot from Mohammed bin Nayef, appears to defy the trend.

Which brings me to something that’s been gnawing at me about the public claims about UndieBomb 2.0.

Imagine you’re Ibrahim al-Asiri. A Saudi-Brit shows up, trains, impresses the trainers. He offers to do a suicide mission and–while you don’t meet with him personally–the trainers decide to send him off on UndieBomb Plot 2.0. He leaves and you wait, and wait, and wait. And … nothing. That is, according to all the people complaining that the AP reported the government had thwarted a plot, what the government had intended.

If you’re AQAP, wouldn’t it be more suspicious hearing nothing about the guy who just walked off with your UndieBomb than hearing John Brennan boasting that he had thwarted the UndieBomb. Not bragging that the Saudis had infiltrated AQAP, which is what Brennan ended up bragging about. Just a big dog-and-pony about thwarting an attack, as the Administration did when it intercepted the toner cartridge plot.

Probably, the AP’s version of the story is correct and the Administration planned a dog-and-pony show, which would have left Asiri with the impression that the Saudi-Brit was what he appeared to be, an aspiring suicide bomber that got caught.

One alternative is that UndieBomber 2.0 actually absconded with an UndieBomb, but intended to go back into AQAP and continue to collect information. I wonder, though: Giving the increasing number of targets in Yemen, you’d think it’d be at least as important to collect information about AQAP plans in Yemen as to obtain the latest UndieBomb in the guise of an attack on the US.

But I’m puzzled by the claim that the Administration wasn’t going to announce they had thwarted the plot. That doesn’t make sense.

Share this entry

UndieBomb 2.0’s Handler

In honor of the Queen’s Jubliee, the Times of London’s paywall is down today (with free registration). So now’s a good time to read the paper’s good coverage on Yemen from Iona Craig and others (see her description of one of the civilians injured in Jaar; her description of Brennan’s visit in Yemen just as our Special Forces (and Marines) ramped up the fight in Yemen; or her description of how the local tribe in Lawder is taking on AQAP).

But I wanted to take a look at this story on UndieBomb 2.0 by two other reporters, with some of the more extensive comments about the UndieBomber’s handler. Note, much of the article generally–including some details on how UndieBomber 2.0 infiltrated AQAP–relies on Mustafa Alani, last seen at this blog both pushing the AQAP threat as well as boasting of the important Saudi role in collecting HUMINT on it.

About a year ago [UndieBomber 2.0] moved to Yemen and, like Abdulmutallab before him, enrolled at an Islamic or Arabic language school in Sana’a, the capital, in the hope of being “talent-spotted” by AQAP. He was accompanied by a handler at the school, who briefed Saudi intelligence on a daily basis.

Within three months, Alani said, the organisation had taken the bait — and he was soon being trained at a network of safe houses.

“He received instruction on how to avoid detection at the airport, how to behave,” Alani said. “He was able to convince Al-Qaeda he was genuinely ready to carry out the mission.”

The agent never met Asiri, but the device he described to his handler pointed to a more advanced version of the “underpants” bomb.

[snip]

The agent was entrusted with the bomb and told by AQAP to reserve a seat on a transatlantic flight. The booking was never made. Instead, he and his handler were whisked out of Yemen and the device was handed over to the CIA on about April 20.

Now, Alani is supposed to be tied closely to Saudi intelligence services. If this story is correct, it’s a remarkably, willful, on-the-record exposure of how the Saudis managed the operation out of a language school in Sanaa. If it is true, it would indicate one of the reasons this leak (which of course was substantially confirmed, at least, by foreign sources) was so damaging: because it exposed the UndieBomber, but also exposed the handler in Yemen.

If it is true, then consider the timeline: UndieBomber and his handler were “whisked out of Yemen” on about April 20. Robert Mueller went for a 45 minute meeting in Yemen having little to do with his core authorities on April 24, suggesting he obtained the UndieBomb and ferried it back to the States. Fahd al-Quso was killed (reportedly netting UndieBomber a $5 million reward) on May 6. The White House informed the AP that some security concerns had been resolved on May 7, which led to their story preempting the White House announcement on May 8.

That is, if the timeline laid out in this story (presumably largely by Alani) is true, then the handler was removed well before the story came out, and we succeeded in targeting Quso over two weeks after UndieBomber and his handler were removed. None of that tells us whether we might have gotten bombmaker Ibrahim al-Asiri had the role of the Saudi infiltrator not been exposed, in part by foreign sources, on May 8.

But it provides one narrative of what happened.

Share this entry

The “Kill List” Is a Shiny Object

I recognize the term “Kill List” has some political advantages. It’s a concise way to convey the cold brutality of our use of drones. Launching a petition for a Do Not Kill list–on the White House’s own website!–is a clever use of social media.

But the “Kill List” is a shiny object.

That’s because it propagates the myth that everyone we’re killing is a known terrorist. It propagates the myth that the outdated vetting process John Brennan wants to publicize to convince the American public we use a very deliberative process before killing people with drones covers all drone killings. It propagates the myth that the government plans out each and every drone strike so thoroughly as to have the President sign off on it.

Mr. Obama is the liberal law professor who campaigned against the Iraq war and torture, and then insisted on approving every new name on an expanding “kill list,” poring over terrorist suspects’ biographies on what one official calls the macabre “baseball cards” of an unconventional war.

It propagates the myth that the only innocents killed in drone strikes–19 year old Yemeni farmer Nasser Salim killed in the Fahd al-Quso drone strike, the girl Baitullah Mehsud had just married, Abdulrahman al-Awlaki–had the poor judgment to stand next to one of the named people on one of America’s Kill Lists.

The reference to and focus on a Kill List hides precisely the most controversial use of drones outside of Afghanistan: the targeting of patterns, not people.

There is absolutely no reason to believe, for example, that Obama–or even John Brennan–knew the identity of the up to 8 civilians who were killed by a drone in Jaar, Yemen, on May 15. All anyone knew about them, according to reporting, is that they ran out after an earlier drone strike to look at the impact site. Boom! They were never on any Kill List, but they are nonetheless just as dead as Quso is.

At precisely the moment the press reported the White House had embraced signature strikes in Yemen and pulled control of those strikes into the White House, John Brennan rolled out a propaganda campaign to focus on the deliberation that goes into the Kill List–that is, into drone killings not covered by the new signature strike policy.

The effort, very clearly, is an attempt to distract attention from those drone killings that don’t involve the kind of deliberation so carefully portrayed by the NYT.

A shiny object. One that is working.

Share this entry

What Happened to Mehsud’s Dirty Bomb?

As I alluded the other day, the story the NYT told about the targeting of Baitullah Mehsud differs in key respects from the story Joby Warrick told in his book, The Triple Agent. And since the discrepancy involves yet another unsubstantiated nuclear claim, and since Mehsud’s targeting led directly to the double agent Humam Khalil al-Balawi’s successful attack on Khost, the difference is worth mapping carefully.

First, the stories provide different explanations for how Mehsud came to be targeted. As I noted here, Warrick explained that we started targeting Mehsud after NSA intercepted a discussion about nukes.

In May [2009] one such phrase, plucked from routine phone intercepts, sent a translator bolting from his chair at the National Security Agency’s listening station at Fort Meade, Maryland. The words were highlighted in a report that was rushed to a supervisor’s office, then to the executive floor of CIA headquarters, and finally to the desk of Leon Panetta, now in his third month as CIA director.

Nuclear devices.

Panetta read the report and read it again. In a wiretap in the tribal province known as South Waziristan, two Taliban commanders had been overheard talking about Baitullah Mehsud, the short, thuggish Pashtun who had recently assumed command of Paksitan’s largest alliance of Taliban groups. It was an animated discussion about an acquisition of great importance, one that would ensure Mehsud’s defeat of Pakistan’s central government and elevate his standing among the world’s jihadists. One of the men used the Pashto term itami, meaning “atomic” or “nuclear.” Mehsud had itami devices, he said. (62-63)

Shortly thereafter, the government intercepted Mehsud’s shura council debating whether Islam permitted the use of Mehsud’s devices. Ultimately, the CIA concluded Mehsud had acquired a dirty bomb and started targeting him (including killing a close associate in hopes Mehsud would show up at his funeral; the Administration targeted the funeral but didn’t get Mehsud).

The NYT provides a much vaguer story.

The C.I.A. worried that Mr. Mehsud, whose group then mainly targeted the Pakistan government, did not meet the Obama administration’s criteria for targeted killing: he was not an imminent threat to the United States. But Pakistani officials wanted him dead, and the American drone program rested on their tacit approval. The issue was resolved after the president and his advisers found that he represented a threat, if not to the homeland, to American personnel in Pakistan.

The description is not inconsistent with Warrick’s description, which describes the US originally hesitating to target Mehsud and the Paksitanis rejoicing once we did.

U.S. officials had long viewed the Mehsud clan as a local problem for the Pakistanis and were reluctant to agitate yet another militant faction that might cross into Afghanistan to attack U.S. troops.

The dirty bomb threat changed everything. Now the Obama administration was privately talking about targeting Mehsud, and Pakistani officials, for once, were wholeheartedly embracing the idea of a U.S. missile strike on their soil. (71)

Perhaps it was the dirty bomb that convinced the US Mehsud threatened US troops, as described by the NYT. Mind you, it’s unclear whether an as-yet unconfirmed dirty bomb in the hand of a guy targeting Pakistan (the Pakistanis blamed him for Benazir Bhutto’s death) really presented a threat to US troops.  Perhaps it represented–like the insurgents in Yemen–a sufficient threat to our allied government we considered it a threat?

In any case, the NYT doesn’t mention the dirty bomb. Maybe that’s because no one ever found it.

By the time the campaign [against the Pakistani Taliban] ended, the Pakistanis were sitting on a mountain of small arms and enough explosives to supply a madrassa full of suicide bombers. But they found no trace of a dirty bomb. The radiation detectors never sounded at all.

Read more

Share this entry

The Commercial for John Brennan’s Signature Strike Drone Shop TADS

Between them, the NYT and the Daily Beast published over 10,000 words on Obama’s drone assassination program yesterday. Both stories rolled out the new acronym the Administration wants us to use: terrorist-attack-disruption strikes, or TADS. Neither of them, in those over 10,000 words, once mentioned Abdulrahman al-Awlaki, Anwar al-Awlaki’s 16 year old American citizen son also killed in a drone strike last year.

And while both stories break important new ground and challenge the Administration’s narrative in key ways, the prioritization of TADS over Abdulrahman in them is a pretty clear indication of the success with which the Administration pushed a certain agenda in these stories.

As I suggested at the end of this post, I think John Brennan hoped to use them to reframe recent changes to the drone program to make them more palatable.

Drone Strikes before They Got Worse

Before I lay out the new spin these stories offer on the signature strikes and vetting process rolled out last month, let’s recall what was included in the drone program before these recent changes, in addition to the killing of a 16-year old American citizen.

According to the NYT, the Administration assumed that, “people in an area of known terrorist activity, or found with a top Qaeda operative, are probably up to no good” and therefore all military age males in a strike zone could be targeted. A former senior counterterrorism official calls earlier drone targeting, “guilt by association.” Of signature strikes in Pakistan, a senior (apparently still-serving) official joked “that when the C.I.A. sees ‘three guys doing jumping jacks,’ the agency thinks it is a terrorist training camp.” And one of Obama’s top political advisors, David Axelrod, was attending targeting meetings, injecting a political taint on the program.

Even with all of that, these stories don’t explain how the intense vetting process they describe resulted in the al-Majala strike that made Jeh Johnson think about going to Catholic confession and “shook” John Brennan and President Obama. Or, of course, how we came to kill a 16 year old American citizen.

So all of that was in place before the recent changes to the drone assassination program made it worse. Don’t worry, though, it’s TADS now.

With all that in mind–Abdulrahman and the guilt by association and the three guys doing jumping jacks–let’s look at how these stories reframe signature strikes in Yemen and White House consolidation of the vetting.

Assassination Czar John Brennan’s Drone Shop

Consider the way the articles describe the targeting process. The NYT–relying on a single source, “an administration official who has watched [Obama] closely”–describes a very aggressive vetting process led by the DOD, then nods to a “parallel” process at CIA in countries where it leads the vetting.

The video conferences are run by the Pentagon, which oversees strikes in those countries, and participants do not hesitate to call out a challenge, pressing for the evidence behind accusations of ties to Al Qaeda.

“What’s a Qaeda facilitator?” asked one participant, illustrating the spirit of the exchanges. “If I open a gate and you drive through it, am I a facilitator?” Given the contentious discussions, it can take five or six sessions for a name to be approved, and names go off the list if a suspect no longer appears to pose an imminent threat, the official said. A parallel, more cloistered selection process at the C.I.A. focuses largely on Pakistan, where that agency conducts strikes.

The nominations go to the White House, where by his own insistence and guided by Mr. Brennan, Mr. Obama must approve any name. He signs off on every strike in Yemen and Somalia and also on the more complex and risky strikes in Pakistan — about a third of the total.

Since for the most part, DOD has managed the Yemen and Somalia strikes, while CIA managed the Pakistan ones, this conflates the vetting for personality strikes targeted at known people and the signature strikes the CIA has targeted against men doing jumping jacks in Pakistan. Somehow, al-Majala and Abdulrahman still got through that vetting process, but the exhaustive DOD one was, for the most part, far more rigorous than the CIA one.

Now compare that description of the DOD vetting process with the one the AP gave on May 21, which it says is “mostly defunct.”

The previous process for vetting them, now mostly defunct, was established by Mullen early in the Obama administration, with a major revamp in the spring of 2011, two officials said.

[snip]

Under the old Pentagon-run review, the first step was to gather evidence on a potential target. That person’s case would be discussed over an interagency secure video teleconference, involving the National Counterterrorism Center and the State Department, among other agencies. Among the data taken into consideration: Is the target a member of al-Qaida or its affiliates; is he engaged in activities aimed at the U.S. overseas or at home?

If a target isn’t captured or killed within 30 days after he is chosen, his case must be reviewed to see if he’s still a threat. [my emphasis]

That is, that free-ranging discussion, the process by which targets could come off the list as well as get put on it? At least according to the AP, it is now defunct–or at least “less relevant.” Read more

Share this entry

Panetta: We Do Not Share Anything Inappropriate with Anybody … Except Our Assets’ Identities

When Leon Panetta confirmed that Shakeel Afridi was working with the CIA when he used a vaccination program to collect intelligence on Osama bin Laden, he likely made it much harder for Pakistan to release the doctor, or even give him a light sentence. Had the Pakistanis gone easy on Afridi after that confirmation, it would have amounted to the government admitting it had ceded the government’s sovereignty to the war on terror.

While I’m sure he had authorization to confirm the ties, there are a whole bunch of reasons it was stupid to do so (including the delegitimization of public health programs).

Panetta’s own role in increasing the likelihood Afridi would face harsh punishment from Pakistan didn’t prevent him from complaining about Afridi’s fate on ABC’s Sunday show, however, claiming he just couldn’t understand why a country would punish one of its citizens working as a spy for an ally.

“It is so difficult to understand and it’s so disturbing that they would sentence this doctor to 33 years for helping in the search for the most notorious terrorist in our times,” Panetta told me in a “This Week” interview.

“This doctor was not working against Pakistan. He was working against al Qaeda,” Panetta added. “And I hope that ultimately Pakistan understands that, because what they have done here … does not help in the effort to try to reestablish a relationship between the United States and Pakistan.”

I sort of wish Jake Tapper had asked Panetta if he’s ever heard of Jonathan Pollard, who we’ve imprisoned, thus far, for 25 years, for spying for an ally. Even more, I’m, um, disappointed that Tapper didn’t ask Panetta WTF he confirmed Afridi’s work for the US, particularly since Tapper himself commented on Panetta’s earlier comments this morning.

Panetta in January was first US official to on-the-record confirm the doctor’s help

More curious still, when Tapper asked Panetta why the Administration shared so much information with Hollywood about the Osama bin Laden raid–and Panetta claimed the Administration “do[es] not share anything inappropriate with anybody”–Tapper didn’t ask the obvious follow-up. Read more

Share this entry