20.02.2013 Views

Handbook of intelligence studies / edited by

Handbook of intelligence studies / edited by

Handbook of intelligence studies / edited by

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

JOHN PRADOS<br />

Directives from Bush administration secretary <strong>of</strong> defense Donald H. Rumsfeld have sought to<br />

widen that role even further. For example, the fiscal 2005 Intelligence Appropriation Act<br />

contained authorization for special forces to spend money to hire local groups for covert<br />

operations in the same fashion as the CIA, taking away another <strong>of</strong> Langley’s few areas <strong>of</strong><br />

exclusivity. These roles and missions remain in contention between Rumsfeld and John<br />

Negroponte, the Director <strong>of</strong> National Intelligence, who exercises theoretical control over all<br />

US <strong>intelligence</strong> operations, but at this writing Rumsfeld seems to have the upper hand.<br />

In contrast to the CIA the military special forces do <strong>of</strong>fer a full spectrum <strong>of</strong> capability. They<br />

are also available in unprecedented numbers: at 26,000 today, Army Special Forces are more<br />

than twice as numerous as at their Vietnam war peak, and form only one element <strong>of</strong> an allservice<br />

force that currently totals 44,000 men and women. 9 The Defense Department’s most<br />

recent posture review nevertheless mandates a further increase <strong>of</strong> 15 percent in these forces<br />

along with new technology and additional spending. The Rumsfeld operational scheme would<br />

allow these forces to work covertly in espionage missions as well as to undertake a wider array<br />

<strong>of</strong> counterterror activities.<br />

Though the special forces have substantial capability they have never carried out a full-scale<br />

secret war. Laos and Afghanistan (both wars there) were CIA enterprises in which detached<br />

military <strong>of</strong>ficers served (the first case), or Special Forces detachments worked in tandem with<br />

the agency (in the second Afghan war) with shared operational control. In Bosnia and the<br />

occupation <strong>of</strong> Iraq the special forces have worked as elite strike teams, and in Afghanistan’s<br />

occupation in that role as well as in Vietnam-style pacification missions. 10 There are training<br />

missions underway as well in Colombia, Africa, and the Philippines. The court is out on how<br />

USSOC might perform in a full scale paramilitary operation.<br />

Beyond the strike team role, special operations forces and CIA covert operators have<br />

exhibited a marked predilection for stand-<strong>of</strong>f operations. These have featured use <strong>of</strong> the<br />

Predator unmanned aerial vehicle (UAV) armed with precision guided missiles. First introduced<br />

as a surveillance system over Bosnia in the 1990s, a version <strong>of</strong> this UAV armed with the<br />

Hellfire missile was developed <strong>by</strong> the CIA and the Air Force in 2000–01. 11 The first armed<br />

Predator mission took place on October 7, 2001. It has since been used in its combat role, as far<br />

as is known at this writing, in Afghanistan, Iraq, Pakistan, and Yemen. At present the Air Force is<br />

creating a dedicated UAV special operations squadron. Stand-<strong>of</strong>f operations obviously reduce<br />

the vulnerability <strong>of</strong> US personnel but they have important rigidities, not being in actual<br />

physical proximity to targets, not being recallable, not being deniable (and thus not truly covert)<br />

since only the United States possesses this capability, and eroding the distinction between<br />

covert and conventional military operations. In at least one case so far a Predator strike has<br />

triggered large anti-US demonstrations in the target country.<br />

In summary, the international environment is presently increasingly hostile to continued<br />

covert operations. For different reasons the CIA and military special operations forces have<br />

covert capabilities that are limited and in some respects mismatched to operational needs, while<br />

stand-<strong>of</strong>f strike systems, presently being touted as a panacea, have their own rigidities. These are<br />

cautionary elements when considering the future <strong>of</strong> covert operations.<br />

Classic conundrums <strong>of</strong> covert action<br />

The covert operations most <strong>of</strong>ten cited as successes are the political action in Italy (1948), the<br />

CIA coups in Iran (1953) and Guatemala (1954), and the paramilitary action in Afghanistan<br />

(1979–1989). In terms <strong>of</strong> number, these amount to only a tiny fraction <strong>of</strong> the inventory <strong>of</strong><br />

292

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!