Kill Chain: The Rise of the High-Tech Assassins (25 page)

Read Kill Chain: The Rise of the High-Tech Assassins Online

Authors: Andrew Cockburn

Tags: #History, #Military, #Weapons, #Political Science, #Political Freedom, #Security (National & International), #United States

BOOK: Kill Chain: The Rise of the High-Tech Assassins
8.54Mb size Format: txt, pdf, ePub

Perhaps unsurprisingly, this sophisticated theory failed to gain traction when Rivolo proposed it on his return to Washington. His observations on the benefits, or lack thereof, of high-value targeting, did receive a receptive hearing from IDA Director Dennis Blair, a blunt-speaking former four-star admiral. Blair found Rivolo’s arguments on this score “completely convincing” and tried to interest others in the military high command but without success. As he afterward opaquely explained to Rivolo, there were “too many layers of command” to effect any change in policy. Rivolo and Hickey did better with a simple suggestion that Iraqi cell-phone companies put a random delay of a few seconds on the time it took a call to go through. This would automatically end the use of phones as detonators, since the triggermen could not time the blast on a moving target. This idea, which was adopted, was a lot cheaper than $100,000 Warlocks, but the counter-IED business was already too valuable for alternative, and simpler, solutions. In January 2006, proclaiming the defeat of the homemade bomb to be a major national priority, Congress approved the creation of a whole new bureaucracy, the Joint IED Defeat Organization (JIEDDO). Adopting a mission statement of “Attack the Network, Defeat the Device, Train the Force,” the new bureaucracy rapidly swelled to more than 3,000 people and an annual budget that equally rapidly climbed to over $4 billion.

Rivolo never thought much of JIEDDO, deriding it as a flaccid bureaucracy serving the interests of the contractors who feasted at its brimming trough, but in a roundabout way, it brought him back to Iraq. In December 2006, General Ray Odierno was appointed multinational corps commander–Iraq to command the day-to-day war. As such, he would inherit a large staff, including intelligence. But like many other leaders, military and civilian, he saw the need for a personal intelligence team headed by someone he could trust to be his “eyes and ears” on what was really going on. So he picked Jim Hickey, an old friend who had served under him in other commands. Hickey, in turn, recruited Rivolo as chief analyst.

The essential point of such a team was that it should be outside the formal bureaucracy, operating as much as possible under the radar. Hickey therefore needed a cover, an excuse for his handpicked team of a hundred people to be in Odierno’s headquarters. So he approached the JIEDDO director, a grandiloquent retired general named Montgomery Meigs, and proposed that Meigs authorize and pay for an intelligence unit at the Baghdad headquarters that would ostensibly be working for JIEDDO. He stipulated that Meigs could not attempt to exercise any control or interfere with its operations, but could claim credit for any success it might enjoy. Meigs agreed.

Installed at Camp Liberty, the vast U.S. military headquarters on the outskirts of Baghdad, Rivolo had total access to all information, classified or otherwise, in the Iraqi theater of operations, and he settled down to learn all he could about the IED war. There was plenty of information on hand. Every significant incident, bombing, firefight, accident—all inevitably jargonized to SIGACTS (the after-action reports that units were required to file on all incidents)—was assiduously noted and entered into the record. But as had been his reaction when introduced to the DEA, Rivolo was not impressed with the army’s staff work, especially when he discovered that their ignorance of basic statistics left them incapable of making the simple calculations necessary to account for “statistical fluctuations” in the reports of bomb attacks. “Odierno would get a chart with bullets that said ‘IED activity today is up 37 percent.’ Well, shit, that looks pretty bad. The following day they would say ‘oh we had a great day, IED activity was down 90 percent.’ True, but irrelevant.”

Rivolo bluntly informed them that there is a standard statistical formula for eliminating fluctuation to reveal an underlying trend and that the erratic numbers they were solemnly briefing meant nothing. In truth, the underlying trend was bleak. Shorn of scatter, the charts of bomb attacks and the resulting killed and wounded followed an undulating but inexorably upward slope. There had indeed been a decline in casualties in the spring of 2005, the clear result of a belated decision to “up-armor” the Humvees that soldiers had previously tried to protect with scrap metal and sandbags encased in plywood. But the ominous trend soon resumed, ticking up in a saw-toothed pattern, month after month, peaking at Ramadan in the fall, then dropping sharply as the Iraqi weather turned unpleasant before starting another upward climb in the spring.

“Apart from when we first put armor on the vehicles,” recalled Rivolo, “nothing else we were doing was making much difference.” This was certainly not for want of effort by the burgeoning anti-IED military-industrial complex, now lavishly nurtured by JIEDDO’s multibillion-dollar budget, as well as a host of other centers and task forces across the military bureaucracy. Multiple initiatives funded by the organization included the training of bees to detect homemade bombs (soldiers had to watch screens with magnified images to see if the insects stuck their tongues out when close to explosives), sniffer dogs, and “Fido,” a $25,000 “molecular sniffer” designed to duplicate canine detection capabilities.

Apart from such eccentricities, more substantial efforts were being introduced in the form of vastly heavier armored vehicles known as MRAPs. In his memoir of his time as secretary of defense, Robert Gates writes movingly of the death and suffering inflicted on troops by inadequate armor, and his pride at having forced a crash MRAP program on a reluctant military. However, according to a former senior staff officer at army headquarters in Baghdad, the initial requirement that MRAPs be built to withstand an explosion of several hundred pounds was progressively and quietly scaled back by developers to a more modest thirty-five pounds. Since many insurgent bombs were far more powerful than that, these massive and costly vehicles in fact made little practical difference to the number of dead and wounded GIs coming home from the wars. An exhaustive analysis of the number of killed and wounded per successful attack on the commonest type of MRAP compared to those suffered by Humvees equipped with additional armor in 2007 revealed that while the Humvee suffered 2.4 killed and wounded, the equivalent number for the MRAP was 2.3. Nevertheless, no less than 27,000 of these massive vehicles would be built and fielded for use in Iraq and Afghanistan. The total cost came to $40 billion.

Meanwhile, jostling for airspace above the bomb-pitted highways of Iraq were growing flocks of ISR, the acronym for “intelligence, surveillance, and reconnaissance” coined in the 1990s by Admiral William Owens, the apostle of net-centricity. Drones, U-2 spy planes (some operated by the air force, others by a specialized army unit), Task Force ODIN (“observe, detect, identify, and neutralize”), an operation dedicated to tracking down the deadly IEDs and the groups behind them—all were thrown into the mission. JIEDDO even embarked on an effort to deploy satellites on the fringes of space, once dedicated to seeking our Soviet ICBMs with thermonuclear warheads, to search for men digging a hole in the road.

Occupying space, the surveillance industry was also moving into time. Adopting an initiative originally conceived to track loose nuclear weapons, the military poured money into “change detection.” The concept was simple: if you had constant surveillance of every conceivable location where a bomb might go off, then, following an explosion, you merely had to rewind the tape to see who buried the bomb and follow the tape back in time to retrace the offender’s steps to wherever he picked it up. The possibilities were potentially limitless; sufficiently extensive surveillance would reveal the bomb maker’s lair, the origins of his materials, the home base of his financiers, and ultimately the location of his leaders. In a story called “On Rigor in Science,” the Argentine writer Jorge Luis Borges conceived of an empire “in which the cartographers’ guilds struck a map of the empire that was the exact same size of the empire and that coincided point for point with it.” In effect, this was the goal that the proponents of change detection, or “ground movement target indicators” as the concept was also known, were seeking to achieve by watching and recording ever-greater areas in hopes of providing the answer to everything. Year after year, new programs to achieve this goal were unveiled, though on close examination they usually turned out to be the same concept but with a different name. The goal may have been impossible, but the attempts were very profitable.

The army’s initiative, Constant Hawk, billed $84 million for 2007, while the air force’s offering, Angel Fire, garnered $55 million. Meanwhile the air force research laboratory in Dayton, Ohio, was hard at work on developing the Gotcha radar system. Mounted on a drone that resembled a miniature B-2 bomber, this was billed as capable of remaining aloft for 24 hours or more, beaming back a constant stream of radar, video, and infrared images of an area 20 kilometers wide to a specially designed $2.2 million supercomputer, all in hopes of catching the bomb layer at work. “The capability to scan an entire city from the air in any weather and detect any movement of any object as small as a cockroach is a goal of the Gotcha radar program at the Air Force Research Laboratory,” ran an air force promotional release.

Further inquiry reveals that Gotcha was in fact a variation on our old friend JSTARS, once conceived to observe and target advancing armored Soviet hordes. The dream of seeing everything, targeting everything, hitting anything had, with “rewinding the tapes,” now extended into four dimensions.

There was much in this enormous and expensive effort to impress outsiders. Defense Secretary Gates, for example, was beguiled by Task Force ODIN’s videos. “It was amazing,” he recalled in his memoir, “to watch a video in real time of an insurgent planting an IED, or view a video analysis tracing an insurgent pickup truck from the bomb-making site to the site of an attack. It was even more amazing—and gratifying—to watch the IED bomber and the pickup truck be quickly destroyed as a result of this unprecedented integration of sensors and shooters.”

Reality was less gratifying. In May 2007, some months after arriving in Baghdad, Hickey enlisted Odierno to sponsor a meeting at which the units that were deploying various technologies could present their results and make their case. When it came to their turn, Task Force ODIN displayed Constant Hawk videos of the type that so impressed Gates. Then Rivolo asked an awkward question: How many bomb planters had they actually tracked back to their point of origin? The task force representative came clean: one. Other vaunted technologies emerged with even less credit. Compass Call Nova, for example, a major air force contribution to the anti-IED effort, was cruising the skies at $34,000 per hour, year in and year out. Rivolo had made careful study of its performance by correlating specific missions flown with what happened on the ground below. The results were painfully clear: in the period he examined, between October 2006 and May 2007, hundreds of bombs had gone off or remained quiescent completely regardless of the $100 million planes overhead pulsing out their electronic commands. As he tersely informed Odierno, Compass Call Nova had “no detectable effect.” However, when queried at the meeting as to why they continued to fly these pointless and expensive ($100 million per year) missions, the air force representative replied, “[T]he field commanders want it.” (Rivolo later discovered that an inquisitive researcher at the Center for Naval Analysis had done a similar study a year before and had come to the same conclusions, which were duly ignored by high authority.)

There was, however, no mistaking who controlled the principal strategy for defeating the IED. It was evident even in the furniture. Most of the equipment around the base was “pretty beat up,” according to one of the tens of thousands of Americans who passed through its heavily guarded gates during the years of the occupation. The office equipment, furniture, and electronics were worn, much of it old, having been hurriedly shipped in from other bases around the world as the occupation army settled in for the long haul. One single-story building close by Odierno’s office was different, though. “You walked in there, and everything was brand new,” remembers a visitor. “They had the most up-to-date computers, big servers, nice big plasma screens in full working order on the walls. You could tell it had priority.”

This was the home of the High-Value Targeting Cell, a counterpart to the cell in the Pentagon that had tracked Saddam and, before him, Milo
š
evi
ć
. Here, analysts tracked individuals on NSA “manhunt” lists while others combed through reports from units around Iraq for sightings of the wanted men or others to be added to the Joint Priorities Effects List, the JPEL, a constantly refreshed master list of targets slated for elimination. All around Iraq and Afghanistan, every unit maintained its own list of high-value targets, also known as high-value individuals, each death or capture dutifully recorded in the SIGACTS. For example, a May 5, 2006, report on the shooting of Allah Harboni, spotted from a U.S. army observation post and shot as he tried to escape by car, was summarized as: “AT 0810C, A 3-187 OP ENGAGED AND KILLED ONE OF THEIR BN [Battalion] HVI’S IN THE SALAH AD DIN PROVINCE IN SAMARRA VIC 38SLC9652784715.”

Meanwhile, on the expansive grounds of Camp Slayer, yet another of the sprawling bases in Baghdad housing the military occupation regime, stood an ornate, domed building known as the Perfume Palace. Originally constructed for the pleasure of the notorious Uday, elder son of Saddam, it had escaped the “shock and awe” bombing and was now occupied by U.S. military intelligence. Jerry-built, with questionable drains, it was not a popular place to work: the chief of military intelligence in Iraq at one point decreed a weekly Be Happy Day as an initiative to raise morale. Although many of the inmates were servicemen and women, civilian contract employees occupied several floors. They were there thanks to JIEDDO, which was sluicing money into Attack the Network along with the rest of its mission statement. Most of them were retired U.S. policemen, retained by defense contractor SAIC to analyze intelligence dossiers in search of high-value targets. All commanded high salaries, as much as $300,000 a year, though their employers charged JIEDDO far more. Target hunting had become a profitable business. (Asked if their nominees ever found their way onto an actual target list, a JSOC officer bluntly answered, “No.”)

Other books

The Isle of Youth: Stories by van den Berg, Laura
Forsaken by Kristen Day
Mariette in Ecstasy by Ron Hansen
B006NZAQXW EBOK by Desai, Kiran
Shiverton Hall, the Creeper by Emerald Fennell
Cry of Eagles by William W. Johnstone