24.12.2014 Views

Letnik 9/2, september 2007 - Slovenska vojska

Letnik 9/2, september 2007 - Slovenska vojska

Letnik 9/2, september 2007 - Slovenska vojska

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

NESLIŠNO OROŽJE: RAZVIJANJE OBVEŠČEVALNEGA SODELOVANJA V ...<br />

A number of recent examples can be cited to make the point, even if the<br />

information available is only partial due, largely, to the inherently secretive<br />

nature of intelligence operations. We might return to our opening example of how<br />

intelligence served as a silent weapon in the targeted killing (that is transparently<br />

what the episode represents) of al-Zarqawi, the savage and quite possibly<br />

psychopathic head of al-Qaeda in Iraq. Available information suggests that al-<br />

Zarqawi was the target of clandestine intelligence collection and subsequent<br />

surveillance by at least three countries, the United States, Iraq and Jordan. The<br />

Jordanians, in fact, may well have been the key player in the chain of events<br />

that led to identifying Zarqawi’s whereabouts. What is certain is that the USAF<br />

launched their bombing run on a specific structure believed to be serving as<br />

Zarqawi’s safe house and operations center of the moment. The tactical intelligence<br />

that lead to the successful killing of Zarqawi was clearly valid, precise and timely<br />

– in short, contained the required ingredients of actionable intelligence. It is quite<br />

possible that the information was obtained and confirmed by a combination of<br />

human sourcing (a spy) and technical intercept. Similarly, the widely publicized<br />

transfer of fourteen “high-value targets” from CIA detention centers to the<br />

Guantanamo facility in September, 2006 strikingly underlines the value of<br />

intelligence cooperation. As announced by President Bush on 6 September,<br />

2006, the al-Qaeda operatives captured 2 and incarcerated by CIA in so-called<br />

“secret prisons” were instrumental in providing valuable operational details that<br />

permitted the “rolling up” of other al-Qaeda devotees, including, notably, Khalid<br />

Sheik Mohammed and Abd al-Rahim al-Nashiri (The White House, 2006). Surely<br />

without serious dispute, lives were saved due to this (undoubtedly complex and<br />

costly) intelligence campaign. It is generally alleged that the network of “secret<br />

prisons” in which the terrorists were detained and interrogated required the<br />

cooperation of a number of foreign countries and their intelligence services. The<br />

information obtained seems to have been shared between services in at least some<br />

instances, notably with Australia. At any rate, the acquisition and exploitation<br />

of information from al-Qaeda prisoners permitted both intelligence sharing and<br />

direct action against high-value terrorist targets. Although popular focus is often<br />

on the boot that kicks down the door to a known terrorists’ room, the critical part<br />

of the counterterrorist equation is ensuring that the boot – SOCOM or other – is<br />

2<br />

For the identities of the fourteen terrorists transferred from CIA custody to the custody of the Department of<br />

Defense, see Office of the Director of National Intelligence http://www.odni.gov/announcements/content/detaineeBiographies.pdf.<br />

88

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!