Ex CIA Director: Keep America Safe, Embrace Drone Warfare

Targeted killing using drones has become part of the American way of war. To do it legally and effectively requires detailed and accurate intelligence. It also requires some excruciatingly difficult decisions. The dialogue above, representative of many such missions, shows how hard the commanders and analysts work to get it right.

The longer they have gone on, however, the more controversial drone strikes have become. Critics assert that a high percentage of the people killed in drone strikes are civilians — a claim totally at odds with the intelligence I have reviewed, and that the strikes have turned the Muslim world against the United States, fueling terrorist recruitment. Political elites have joined in, complaining that intelligence agencies have gone too far, until they have felt in danger, when they have complained that the agencies did not go far enough.

The program is not perfect. No military program is. But here is the bottom line: It works. I think it fair to say that the targeted killing program has been the most precise and effective application of firepower in the history of armed conflict. It disrupted terrorist plots and reduced the original Qaeda organization along the Afghanistan-Pakistan border to a shell of its former self. And that was well before Osama bin Laden was killed in 2011.

Not many years before, the targeted killings were fairly limited. But by 2008, we knew that the terrorist threat had increased to intolerable levels, both to American forces in South Asia and to the United States itself. From our surveillance platforms, we could observe training camps where men leapt off motorbikes and fired on simulated targets. Early that year, the CIA and I began recommending more aggressive action.

We were confident that the intelligence was good enough to sustain a campaign of very precise attacks. To be sure, it was not, is not, always error-free. In late 2006, for instance, a strike killed a one-legged man we believed was a chieftain in the Haqqani network, a violent and highly effective group allied with Al Qaeda and the Taliban. It turned out that the man was indeed affiliated with the Haqqanis, but he wasn’t the leader we wanted. With all the land mines in the region, there were many one-legged terrorists in South Asia.

I demanded a full explanation for the misidentification. There were no excuses. People were thoroughly, maybe even excessively, contrite. But even if I was convinced that we could routinely provide high-quality intelligence to enable precision targeting, we still had to convince policy makers in the government that they should take advantage of it.

We had one thing going for us. I got to talk to President George W. Bush directly every week without filters. I briefed him every Thursday morning and began to use the sessions to underscore Al Qaeda’s growing footprint and brazenness in the tribal region of Pakistan. My chief analyst on this, a lanky Notre Dame graduate, met with me almost daily and stressed that as bad as this might be for Afghanistan and our forces there, the threat could also come to our shores.

If we had boiled our briefings down, the essence would have been: “Knowing what we know, there will be no explaining our inaction after the next attack.”

So the United States began to test some limits. In early 2008, a charismatic Qaeda operations chief was killed along the Afghanistan-Pakistan border. The strike was clean and the target so important that even regional reaction was muted. Local people knew who he was and did not mourn his passing.

Later in the year another senior Qaeda operative, active in planning attacks in the West, was killed along with several lieutenants in a similar strike that resulted in a similar reaction.

By midsummer, when Hellfire missiles killed a senior Qaeda operator who was active in its weapons of mass destruction program, it was clear that the United States had launched a campaign of targeted killings in South Asia.

Publicly available sources document nearly three-dozen attacks in the last seven months of the Bush administration, almost three times the total of the previous four years. According to those sources, 18 senior and midlevel Taliban and Qaeda leaders were killed.

The intelligence used for these strikes was based on human reports, surveillance technology and the near unblinking stare of the Predator itself. The strikes were particularly damaging to Al Qaeda’s operational leaders, who couldn’t afford to hunker down like Bin Laden and his deputy, Ayman al-Zawahri, whose main contribution to the movement was pretty much just staying alive. Those front-line operators had to move and communicate, and that made them vulnerable.

Other attacks were intended to disrupt known Qaeda locations and activities even when the identities of the people present were not known. Critics said these so-called signature strikes were indiscriminate. They were not. Intelligence for signature strikes always had multiple threads and deep history. The data was near encyclopedic.

Many such strikes killed high-value targets whose presence was suspected but not certain. And we made no excuses about killing lower-ranking terrorists. The United States viewed these attacks as legitimate acts of war against an armed enemy, and in warfare it is regrettably necessary to kill foot soldiers, too.

The signature strikes drastically shrank the enemy’s bench and made the leadership worry that they had no safe havens. Almost inadvertently, these strikes also helped protect intelligence sources and methods since the strikes seemed more random than they actually were.

It wasn’t long before intelligence reporting began to confirm our success. We learned there was a widespread sense of helplessness among the Qaeda leadership. Years later, documents proved just how anguished they were.

In 2015, an American court case against a Qaeda member prompted the government to release eight documents from the trove of Bin Laden letters captured when he was killed in Abbottabad, Pakistan, in 2011. Bin Laden’s correspondence with his chief lieutenants, in 2010, is remarkable in its candor.

The letters show the stress within the organization. “I convey my condolences regarding our great brother Sheikh Sa’id” who died “as a martyr during a spy plane attack,” read one from June 2010.

“The strikes by the spy planes are still going on,” it continued. A member named al-Sa’di Ihsanullah was the “latest to become a martyr: He was killed about a week ago, also by air raids.” It noted, “The midlevel commands and staff members are hurt by the killings.”

Signature strikes were also taking a toll. In November, the same Bin Laden lieutenant complained, after 20 fighters were killed in one place on Eid al-Fitr, the Muslim feast celebrating the end of Ramadan, that the men had “gathered for the holidays, despite our orders.”

Al Qaeda gained a healthy respect for American intelligence. “Based on our analysis, they are constantly monitoring several potential or possibly confirmed targets,” the June letter said.

The frightened underlings in the field beseeched Bin Laden to help. “We would like your guidance,” the June letter said. “Especially on this idea: reduce the work, meaning stopping many of the operations so we can move around less, and be less exposed to strikes.”

“There is an idea preferred by some brothers to avoid attrition,” it continued. “The idea is that some brothers will travel to some ‘safe’ areas with their families, just for protection. They would only stay for a time, until the crisis is over, maybe one or two years.”

Two months later another Bin Laden deputy agreed to their taking refuge and “calming down and minimizing movement.”

All this correspondence was from 2010, but it is consistent with the intelligence picture we were gathering in 2008. Al Qaeda along the Afghanistan-Pakistan border was spending more time worrying about its own survival than planning how to threaten ours.

The correspondence also confirmed our intelligence showing that attacking Americans on American soil was central to their plotting.

The letters are filled with references to recruits from a host of countries, including the United States. One correspondence emphasized, that, “operations inside America are some of the most important work of the Organization, as long as they are possible, because they affect the security and economy of the American people as a whole.”

Throughout the campaign, civilian casualties were a constant concern. In one strike, the grandson of the target was sleeping near him on a cot outside, trying to keep cool in the summer heat. The Hellfire missiles were directed so that their energy and fragments splayed away from him and toward his grandfather. They did, but not enough.

The target was hard to locate and people were risking their lives to find him. The United States took the shot. A child died, and we deeply regret that he did. But his grandfather had a garage full of dangerous chemicals, and he intended to use them, perhaps on Americans.

We tried to get better. Carefully reviewing video of one successful strike, we could discern, as a GBU was already hurtling toward an arms cache, a frightened woman responding to another weapon that had just detonated. She was running with young children square into the path of the incoming bomb, and they were killed. We realized, once our after-action review was done, that we needed to put even more eyes on targets as they were being struck to try to avoid any future civilian casualties.

For my part, the United States needs not only to maintain this capacity, but also to be willing to use it. Radical Islamism thrives in many corners of the world, Pakistan, Somalia, Yemen, Syria, Libya, Mali, the list goes on, where governments cannot or will not act. In some of these instances, the United States must.

And unmanned aerial vehicles carrying precision weapons and guided by powerful intelligence offer a proportional and discriminating response when response is necessary. Civilians have died, but in my firm opinion, the death toll from terrorist attacks would have been much higher if we had not taken action. What we need here is a dial, not a switch.

Michael Hayden was director of the Central Intelligence Agency from 2006 to 2009. He is the author of the forthcoming book, “Playing to the Edge: American Intelligence in the Age of Terror.

NYT: http://nyti.ms/1XFD9q9

« Cybersecurity Is Childsplay
Three Pronged Attack: Chinese Military In Cyberwarfare Buildup »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Trustwave

Trustwave

Trustwave is a leader in managed detection and response (MDR), managed security services (MSS), consulting and professional services, database security, and email security.

Organization for Security and Co-operation in Europe (OSCE)

Organization for Security and Co-operation in Europe (OSCE)

OSCE is the world's largest security-oriented intergovernmental organization. Areas of activity include Cyber/ICT security.

Certus Software

Certus Software

Our Secure Data Erasure solutions protect customer data confidentiality by completely erasing it from data storage devices.

Qufaro

Qufaro

Qufaro is a new initiative designed to make it simpler for those with career ambitions in cyber security to access the UK’s cyber-specific education and innovation opportunities.

CTM360

CTM360

CTM360 is a unified external security platform offering 24x7x365 Cyber Threat Management for detecting and responding to cyber threats.

Swiss Cyber Think Tank (SCTT)

Swiss Cyber Think Tank (SCTT)

The Swiss Cyber Think Tank is a business network for Cyber Risk & Insurability, providing an industry-wide networking platform for insurers, technology and security firms.

ICT Reverse

ICT Reverse

ICT Reverse is one of the UK’s leading, fully accredited providers of ICT asset disposal and secure data erasure.

360° Online Brand Protection

360° Online Brand Protection

360° Online Brand Protection have developed a response to monitor counterfeiting and piracy activity at the online point of sale.

Trusted Connectivity Alliance (TCA)

Trusted Connectivity Alliance (TCA)

Trusted Connectivity Alliance is a global, non-profit industry association which is working to enable a secure connected future.

VIRTIS

VIRTIS

VIRTIS' mission is to provide today's leading organizations peace of mind that their entire digital network perimeter is safe from hackers and data breach.

Bloc Ventures

Bloc Ventures

Bloc Ventures is an investment company providing long-term, ‘patient’ equity capital to early stage unquoted deep technology companies.

NARIS

NARIS

NARIS is the leading provider of an integrated Governance, Risk and Compliance platform called NARIS GRC.

Rhodian Group

Rhodian Group

Rhodian Group (formerly Adar) specialize in providing Technology, Cybersecurity, and Compliance services to the insurance industry.

InfoSecTrain

InfoSecTrain

InfoSecTrain are a leading training and consulting organization dedicated to providing top-tier IT security training and information security services to organizations and individuals across the globe

GAM Tech

GAM Tech

GAM Tech is a Managed IT Service Provider that serves small and medium sized businesses in Alberta, British Columbia, Ontario and Quebec.

Axiler

Axiler

Axiler’s AI-driven self-healing architecture seamlessly detect, patch, and neutralize threats in real-time, ensuring systems remain secure and ever-adaptable.