Dirty Wars (99 page)

Read Dirty Wars Online

Authors: Jeremy Scahill

BOOK: Dirty Wars
2.67Mb size Format: txt, pdf, ePub

10
enacted a law
:
Intelligence Authorization Act for FY 1981, Pub. Law 96–450 (1980). Title V of the law—“Accountability for Intelligence Activities”—states that “the Director of the Central Intelligence and the heads of all departments, agencies, and other entities of the United States involved in intelligence activities shall...keep the Select Committee on Intelligence of the Senate and the Permanent Select Committee on Intelligence of the House of Representatives...fully and currently informed of all intelligence activities which are the responsibility of, are engaged in by, or are carried out for or on behalf of, any department, agency, or entity of the United States, including any significant anticipated intelligence activity.”

10

seriously weakened
”:
Savage,
Takeover,
p. 43.

11

congressional resurgence,” “signing statements
”:
Ibid.

11
unlawful use of force
:
“Case Concerning the Military and Paramilitary Activities in and Against Nicaragua (Nicaragua v. United States of America),” Summary of the Judgment, International Court of Justice, June 27, 1986.

11
Boland Amendment
:
Senate Select Committee on Secret Military Assistance to Iran and the Nicaraguan Opposition and House Select Committee to Investigate Covert Arms Transactions with Iran, Report of the Congressional Committees Investigating the Iran-Contra Affair, with Supplemental, Minority, and Additional Views, Senate Rep. No. 100–216, House Rep. No. 100–433 (1987), pp. 498–500.

11
Fourteen members
:
Paula Dwyer, “Pointing a Finger at Reagan,”
Businessweek,
June 23, 1997.

11

minority report
”:
Senate Select Committee on Secret Military Assistance to Iran and the Nicaraguan Opposition and House Select Committee to Investigate Covert Arms Transactions with Iran, Report of the Congressional Committees Investigating the Iran-Contra Affair, Section II: Minority Report, Senate Rep. No. 100–216, House Rep. No. 100–433 (1987), pp. 437, 469.

12
commissioning a study
:
Tom Squitieri, “Role of Security Companies Likely to Become More Visible,”
USA Today,
April 1, 2004.

12
American Enterprise Institute
:
Savage,
Takeover,
p. 67.

12
portraits
:
The second portrait was, for the time being, only a photograph, but it would later be replaced by a painting worth nearly $50,000. See Christopher Lee, “Official Portraits Draw Skeptical Gaze,”
Washington Post,
October 21, 2008.

12

a serious threat
”:
Transcript, Donald Rumsfeld remarks, “DOD Acquisition and Logistics Excellence Week Kickoff—Bureaucracy to Battlefield,” The Pentagon, September 10, 2001.

13

revolution in military affairs
”:
Paul C. Light, “Rumsfeld's Revolution at Defense,” Brookings Policy Brief Series, Paper No. 142, Brookings Institution, July 2005.

13
massive missile defense systems
:
James M. Lindsay and Ivo H. Daalder, “The Bush Revolution: The Remaking of America's Foreign Policy,” Brookings Institution, May 2003.

13

threat of jihadist terrorism
”:
Douglas Feith,
War and Decision: Inside the Pentagon at the Dawn of the War on Terrorism
(New York: Harper, 2009), p. 1.

13

From the start
”:
Ron Suskind,
The Price of Loyalty: George W. Bush, the White House, and the Education of Paul O'Neill
(New York: Simon and Schuster Paperbacks, 2004), p. 86.

13

laid out the case
”:
Bob Woodward,
State of Denial: Bush at War, Part III
(New York: Simon and Schuster Paperbacks, 2006), p. 49.

14

immediate priority targets
”:
Feith,
War and Decision,
p. 51.

14

The agenda was very clear
”:
Author interview, General Hugh Shelton (Ret.), March 2011. All information and statements attributed to General Shelton come from the author's interview, unless otherwise noted.

14

any shred
”:
Richard Clarke,
Against All Enemies: Inside America's War on Terror
(New York: Free Press, 2004), p. 32.

14

10 percent chance
”:
9/11 Commission Report,
pp. 335–336.

14
clashed with Wolfowitz
:
“The War Behind Closed Doors,”
Frontline,
PBS, February 20, 2003.

15

have no clear information
”:
Author interview, Dr. Emile Nakhleh, February 2012. Details of Dr. Nakhleh's career are from the author's interviews. Information about Dr. Nakleh's scholarship at the CIA can also be found in his biography on the American Foreign Policy Project, accessed October 5, 2012,
http://americanforeignpolicy.org/iran-ex-perts/emile-nakhleh
.

15

humble” foreign policy
:
Transcript, presidential debate between George W. Bush and Al Gore, Wake Forest University, Winston-Salem, North Carolina, October 11, 2000,
www.debates.org/index.php?page=october-ii-2000-debate-transcript
.

15
more than a dozen visits
:
Some reports have stated that Cheney made around a dozen visits to CIA headquarters; other reports have put the number slightly lower. Dubose and Bernstein report that “Cheney made at least eight, perhaps as many as fifteen” visits, citing interviews within and connected to the CIA. Libby was reportedly a more frequent visitor. See Tom Hamburger and Peter Wallsten
(Los Angeles Times),
“Cheney's Tussles with CIA Are Subtext of Leaker Probe; Vice President's Skeptical View of Intelligence Agency Dates Back to the Late 1980's,”
Baltimore Sun,
October 21, 2005; Lou Dubose and Jake Bernstein,
Vice: Dick Cheney and the Hijacking of the American Presidency
(New York: Random House, 2006, Kindle edition).

15
mass arrests
:
Martha Mendoza (AP), “One Man Still Locked Up from 9/11 Sweeps,”
Washington Post,
October 14, 2006.

16
rigorous legal and oversight system
:
Joshua A. Bobich, “Note: Who Authorized This?! An Assessment of the Process for Approving U.S. Covert Action,”
William Mitchell Law Review
33 (3) (April 10, 2007): 1111–1142, 1126. The details of the Clinton administration's process for approving covert actions are from the article.

16
closely mirrored
:
Ibid., p. 1126; memorandum from George W. Bush, “Subject: Organization of the National Security Council System,” February 13, 2001. The memorandum
is known as National Security Presidential Directive-i (NSPD-i), and though the unclassified memorandum does not mention covert action specifically, it purports to preserve much of the structure of the national security system.

16

new series of authorities,” covert actions
:
9/11 Commission Report,
p. 210.

16
counterterrorism funding, retaliatory strike
:
Ibid., p. 202.

17

taking the offensive,” “breaking the back
”:
Ibid., p. 204.

17
Uzbekistan, stopped short
:
Ibid., p. 203.

17

admittedly ambitious
”:
Ibid., pp. 204–205.

17
five more meetings
:
Prepared testimony of Secretary Donald Rumsfeld, for delivery to the National Commission on Terrorist Attacks upon the United States, March 23, 2004.

17

concluded
”:
9/11 Commission Report,
p. 212.

17
began flying drones
:
Ibid., p. 190.

17
K2
:
Author interview, US military intelligence source, February 2010.

17
not yet operational
:
Bill Yenne,
Attack of the Drones: A History of Unmanned Aerial Combat
(St. Paul, MN: Zenith Press, 2004), p. 86. According to Yenne, “On February 16, 2001, during tests at Nellis Air Force Base, a Predator successfully fired a Hellfire AGM-114C into a target. The notion of turning the Predator into a
predator
had been realized.”

17
Cofer Black argued
:
9/11 Commission Report,
pp. 190, 211.

17

in front of CNN
”:
Ibid., p. 211. The commission obtained and quoted from a memorandum sent by Cofer Black to Richard Clarke, January 25, 2001.

17
shelve the use of the drones
:
Ibid.

17
“‘
This was new ground
'”:
Ibid.

18
assistant director for collection
:
“The Honorable Charles E. Allen, Principal,” Chertoff Group, accessed October 5, 2012,
http://chertoffgroup.com/bios/charles-allen.php
.

18

happy to pull the trigger
”:
9/11 Commission Report,
p. 211.

18
September 4 meeting
:
Ibid., p. 213.

18
three years to implement
:
Ibid.

18
“‘
broad covert action program
'”:
Ibid., p. 214.

18

Only a crisis
”:
Milton Friedman,
Capitalism and Freedom,
40th armiv. ed.
(Chicago: University of Chicago Press, 2002), Preface, 1982, p. xiv.

18
mentored Rumsfeld
:
Naomi Klein,
The Shock Doctrine: The Rise of Disaster Capitalism
(New York: Picador, 2007), p. 14.

18
Cheney, sought his counsel
:
Nina Easton, “Why Is Dick Cheney Smiling?”
Money.CNN.com
, November 25, 2007.

19

When that crisis occurs
”:
Friedman,
Capitalism and Freedom,
Preface, 1982, p. xiv.

19

a new Pearl Harbor
”:
“Rebuilding America's Defenses,” p. 51.

19

duty to use his bully pulpit
”:
Feith,
War and Decision,
p. 51.

19

all necessary and appropriate force
”:
Joint Resolution to Authorize the Use of United States Armed Forces Against Those Responsible for the Recent Attacks Launched Against the United States, Pub. Law 107–40, Sec. 2 (2001).

19
one opposing vote, no dissent
:
Richard F. Grimmett, “Authorization for Use of Military Force in Response to the 9/11 Attacks (P.L. 107–40): Legislative History,” Congressional Research Service, updated January 16, 2007.

19

urge the use of restraint
”:
“Barbara Lee's 9/14/01 Speech,” YouTube video, 2:19, from footage of debate prior to passage of the “Authorization for Use of Military Force,” September 14, 2001, posted by “One Voice-PAC,” September 12, 2007,
www.youtube.com/watch?v=Zh_sxilhyV0
.

19

There must be some of us
”:
Prepared speech of Representative Barbara Lee, in opposition to authorizing the use of force in Afghanistan, September 14, 2001.

20

the dark side
”:
Transcript, interview with Vice President Richard Cheney,
Meet the Press,
NBC, September 16, 2001.

20
secret presidential directive
:
Woodward,
Bush at War,
pp. 75, 101. Woodward outlines an earlier proposal made by CIA director George Tenet during the meetings at Camp David, titled “Going to War,” which includes authorities to detain and use lethal force against members of the al Qaeda network. The September 17 finding, Woodward writes, “authorized all the steps proposed by Tenet at Camp David.”

20
Zambia, Somalia and South Africa
:
Steve Coll,
Ghost Wars: The Secret History of the CIA, Afghanistan, and Bin Laden, from the Soviet Invasion to September 10, 2001
(New York: Penguin Press, 2004), p. 267.

20
Zaire
:
Ibid.

20
CIA station chief
:
Ibid., front matter.

20

the Ford Foundation of Sunni Islamic terrorism
”:
Ibid., p. 271.

20

operating directive
”:
Ibid., p. 267.

21
not yet signed
:
Ibid.

21

taboo in the outfit
”:
Bill Waugh with Tim Keown,
Hunting the Jackal: A Special Forces and CIA Ground Soldier's Fifty-Year Career Hunting America's Enemies
(New York: William Morrow, 2004), p. 143.

21
dump his body
:
Robert Young Pelton,
Licensed to Kill: Hired Guns in the War on Terror
(New York: Three Rivers Press, 2006), p. 28.

21

He used to come in my office
”:
Author interview, Colonel Lawrence Wilkerson (Ret.), May 2011.

21
August 6, 2001, Crawford, Texas, ranch
:
Michael Hirsh and Michael Isikoff, “What Went Wrong,”
Newsweek,
May 27, 2002.

Other books

Rules of the Hunt by Victor O'Reilly
Gallant Scoundrel by Brenda Hiatt
The Bridge of Peace by Cindy Woodsmall
Untangle My Heart (Tangled Hearts) by Alexander, Maria K.
Origin ARS 4 by Scottie Futch