Jump to content

1 post in this topic

Recommended Posts

Filed: Timeline
Posted

Last Friday, Navy SEALs reportedly attacked a compound in the coastal city of Barawe, Somalia, with the goal of capturing or killing a senior leader of al-Shabab. According to an Obama administration official: "It did not achieve the objective." Hours later, Army Delta Force commandos were reportedly involved in a mission in Tripoli, Libya, which led to the capture of Abu Anas al-Libi, who was indicted in a U.S. district court for his alleged involvement in the U.S. African embassy bombings in 1998.

...

Several news reports and analysts ... claimed that the operations demonstrated that the Obama administration suddenly prefers capturing suspected terrorists to killing them. Recent evidence would suggest otherwise. In 2013, by one estimate, there have been 45 U.S. drone strikes (in Pakistan and Yemen) that killed approximately 209 people; two raids that captured one person are clearly not the equal. There are assuredly other covert or clandestine capture/kill operations that we do not know about, but it is far too soon to tell if this portends a wholly new policy shift.

...

Nothing captures public attention, or appears to appraise U.S. counterterrorism effectiveness more than verifiable uses of military force and/or demonstrable terrorist attacks. Someone, it is unclear who, once said: "Not everything that can be counted counts, and not everything that counts can be counted." Accordingly, assessing U.S. counterterrorism policies based solely on a limited selection of events amplified in the media should be avoided.

The overwhelming majority of counterterrorism operations and tactics are never known, rarely revealed years later, and of debatable effectiveness. For example, after the Saudi Hezbollah bombing of the Khobar Towers housing facility in Dhahran, Saudi Arabia, that killed 19 Americans in June 1996, the Clinton White House debated many military and non-military responses against Iran. One that was implemented consisted of a large-scale covert operation that "outed" Iranian agents around the world in order to deter Tehran from threatening U.S. intelligence agents and diplomatic institutions. Among the participants was then-CIA station chief to Saudi Arabia John Brennan, who reportedly knocked on the car window of an Iranian agent, and announced: "Hello, I'm from the U.S. embassy, and I've got something to tell you." Whether this coordinated demonstration of global U.S. surveillance worked, and for how long, is unclear.

Similarly, financial counterterror tools are applied discreetly, in corporate boardrooms and via off-the-record conversations between regulatory officials. In his excellent new book, Treasury's War: The Unleashing of a New Era of Financial Warfare, former Bush administration official Juan Zarate describes how law-enforcement, intelligence, and regulatory agencies developed and refined tools to monitor and constrain international financial transactions that are diverted to support terrorist causes:

This was a new kind of war -- not 'shock and awe,' but more like a creeping financial insurgency. It was a 'hidden war' intended to constrict our enemies' financial lifeblood. And we were succeeding, under the radar.

The book catalogues notable innovations in reducing terrorists' access to global banking networks, and increasing the resources required to securely transfer money. Several intercepted al Qaeda communications -- later selectively released by the U.S. government -- showed how some local affiliates had become primarily fundraising entities, with an aspiration to re-activate plots should they be able to bring in sufficient funding. Yet, as Zarate notes, al Qaeda's affiliates adapted to U.S. pressure, developed self-funding mechanisms, and continue to recruit, train, and plan terrorist attacks, albeit with a predominantly domestic or regional focus.

Since quiet or unreported counterterrorism programs are impossible to evaluate in real-time, they subsequently have little salience in policy debates. On the other hand, drone strikes that occur in plain sight, or widely reported special operation raids, are unmistakable and treated as privileged sources of data for evaluating counterterrorism policies. But while there are three databases that provide estimates of U.S. targeted killing operations and casualties, there is none for covert "influence" operations or for the application of financial tools.

...

There are scores of major, multi-year counterterrorism operations going on around the world, just as there committed terrorists plotting to conduct international attacks. However, few terrorism or counterterrorism activities ever come to light, and even when those activities do, they usually lack the specificity or comprehensiveness to assess their overall impact. Given this reality of such uncertainty, when thinking about the phenomenon of terrorism, we should be conscious about how little we really know, and refrain from over-interpreting those few public events that appear in the news.

http://www.foreignpolicy.com/articles/2013/10/08/the_known_unknowns_of_counterterrorism_ops

 

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
- Back to Top -

Important Disclaimer: Please read carefully the Visajourney.com Terms of Service. If you do not agree to the Terms of Service you should not access or view any page (including this page) on VisaJourney.com. Answers and comments provided on Visajourney.com Forums are general information, and are not intended to substitute for informed professional medical, psychiatric, psychological, tax, legal, investment, accounting, or other professional advice. Visajourney.com does not endorse, and expressly disclaims liability for any product, manufacturer, distributor, service or service provider mentioned or any opinion expressed in answers or comments. VisaJourney.com does not condone immigration fraud in any way, shape or manner. VisaJourney.com recommends that if any member or user knows directly of someone involved in fraudulent or illegal activity, that they report such activity directly to the Department of Homeland Security, Immigration and Customs Enforcement. You can contact ICE via email at Immigration.Reply@dhs.gov or you can telephone ICE at 1-866-347-2423. All reported threads/posts containing reference to immigration fraud or illegal activities will be removed from this board. If you feel that you have found inappropriate content, please let us know by contacting us here with a url link to that content. Thank you.
×
×
  • Create New...