The Democratic Party War on The Central Intelligence Agency Will Lead To Blow-back and Payback When CIA Agents Reveal What They Were Really Doing in Benghazi — Shipping Arms To Syrian Rebels Including Al-Qaeda — Impeachable Offenses — The Genie Is Out of The Bottle and The CIA Knows Where The Bodies Are Buried — Do The Ends Ever Justify The Means? — Remembering September 11, 2001 and 2012 –Videos
The Pronk Pops Show Podcasts
Story 1: The Democratic Party War on The Central Intelligence Agency Will Lead To Blow-back and Payback When CIA Agents Reveal What They Were Really Doing in Benghazi — Shipping Arms To Syrian Rebels Including Al-Qaeda — Impeachable Offenses — The Genie Is Out of The Bottle and The CIA Knows Where The Bodies Are Buried — Do The Ends Ever Justify The Means? — Remembering September 11, 2001 and 2012 –Videos
“The term “covert action” means an activity or activities of the United States Government to influence political, economic, or military conditions abroad, where it is intended that the role of the United States Government will not be apparent or acknowledged publicly, but does not include . . . (2) traditional . . . military activities or routine support to such activities.“
People Falling from the World Trade Center
9/11 – The Falling Man
Breaking News December 2014 Dick Cheney CIA interrogation techniques I’d do it again in a minute
Cheney Accuses Chuck Todd of Taking a Cheap Shot
Dick Cheney Says CIA Torture Report ‘ FULL OF CRAP ‘ (Full VIDEO)
John Brennan CIA Director Responds To Torture Report in Press Conference ( FULL VIDEO)
Conversation: Putting the CIA Interrogation Report Into Context
Former CIA Officer Defends Torture Programme He Designed
Ex-CIA defends CIA torture (09Dec14)
CIA Headquarters in Langley, Virginia: Changes to Interrogation Policy for the United States (2009)
Paul on Benghazi: Hillary Was ‘Most Eager’ to Get Arms From Libya to Syria
CNN CIA Pressuring Agents With Knowledge Of Benghazi To Keep Silent ‘You Jeopardize Your Family’
Obama Approves CIA Covert Actions In Libya 3/30/11 – CNN
Treason Exposed! Obama Used Benghazi Attack to Cover Up Arms Shipments to Muslim Brotherhood
What roles Turkey play in Syria’s insurgency?
NY Times says CIA supplying arms to Syria insurgents
WW3 in ACTION: US LAUNCH covert OPERATION to ARM militants in Syria with HEAVY WEAPONS!
Retired Lt. Gen. Jerry Boykin suspects US Was Running Guns To Syrian Rebels Via Benghazi
Retired Army Lt. Gen. William G. Boykin—who is the former commander of the U.S. Special Forces Command, the former deputy undersecretary of defense for intelligence and who, in the 1990s, worked with the CIA—told CNSNews.com in a video interview last week that he believes it is a reasonable supposition that the U.S. was supporting or planning to support the Syrian rebels via Benghazi, Libya.
Trey Gowdy Opening Statement Benghazi Hearing 9.17.14
Robert David Steele: Former CIA Spy Benghazi Was CIA Operation
The Benghazi Select Committee: Many Questions Remain Unanswered
G. Edward Griffin – The Collectivist Conspiracy
G. Edward Griffin- On Individualism v Collectivism #1
G. Edward Griffin- On Individualism v Collectivism #2
CNBC: BENGAHZI IS NOT ABOUT LIBYA! “It’s An NSC Operation Moving Arms & Fighters Into Syria”
Ron Paul on Covert U.S. Support of Terrorist Insurrection in Syria
June 27, 2012 – Ron Paul warns of the ongoing U.S. government’s covert support of the terrorist insurrection against the Syrian government and offers a short history of the quagmires and blowback that U.S. interventions abroad have brought about.
Glenn Beck – Benghazi: Truth coming out
Soros, Obama & ‘Responsibility to Protect’
END WAR: Scheuer On CIA In Libya To Arm Islamist And May Be US Ground Invasion In Another Arab State
The truth about SYRIA by Westerns
Syrian Rebels Capture City Near Jordanian Border – Libya Vs Syria Where’s The Obama Admin?
Gaffney on Benghazi » Not Just About Cover Up « About Administration Embracing Muslim Brotherhood
ADM Lyons, “Muslim Brotherhood has penetrated every government agency”
ADM “Ace” Lyons, Former Commander in Chief of the U.S. Pacific Fleet, the largest single military command in the world, states, “The Muslim Brotherhood has penetrated every level of the US government.”
End the Coverup: Rep. Frank Wolf Urges New Benghazi Investigation
Rep. Frank Wolf called a press conference outside the capitol to discuss his sponsorship of H. Res. 36, which would create a special congressional committee to investigate the failures that contributed to the deadly jihadist attack in Benghazi, Libya last year. He was joined by Family Research Council’s Lt. Gen. Jerry Boykin, former Deputy Undersecretary of Defense for Intelligence and former member of Delta Force. Boykin represented Special Operations Speaks, a group of ex-special forces operators who came together to write a letter to Members of Congress, urging them to commit to getting to the bottom of what happened in Benghazi, and to end the administration’s cover-up. Finally, the Center for Security Policy’s Frank Gaffney spoke about the implications of the attack in Libya on America’s national security and foreign policy in the Middle East/North Africa region.
Write a letter to your congressman at Http://www.endthecoverup.com
Gen. Jerry Boykin: “Get accountability and get the truth out” on Benghazi
Rand Paul: I Believe Part of Cause for Benghazi Attack Was Gun-Running Operation Going
Syrian rebel group Al-Nusra allies itself to al-Qaeda
Nusra Front and al-Qaeda in Iraq are joining forces to bring back the Caliphate.
A Caliphate Is Coming – GBTV
Obama Hiding Arms Shipments To Syrian Jihadists
Lebanon seizes 150 tons of Libyan arms en route to Syrian rebels
Treason: Benghazi Revelations Could Sink Obama
Benghazi-Gate: Connection between CIA and al-Qaeda in Libya and Syria, with Turkey’s Help
Benghazi-Gate: Connection between CIA and al-Qaeda in Libya and Syria, with Turkey’s Help
Syrian Rebel Group Joins Branch Of Al Qaeda
West Intervenes to Stop Islamist Rebels in Mali but Supports Them to Destroy Syria
A presidential finding is an executive directive issued by the head of the executive branch of a government, similar to the more well-known executive order. The term is mostly used by the United States Government, and in other countries may be identified by different terms. Such findings and other executive decrees are usually protocols which have evolved through the course of government and not typically established by law.
Use and history in the United States
“US President Barack Obama has signed a secret order allowing the CIA and other American agencies to support rebels seeking to overthrow the Assad regime, a US government source told Reuters. Obama reportedly gave the order, known as an intelligence “finding”, earlier this year. The presidential finding also provides for US collaboration with a secret command center operated by Turkey and its allies. The full extent of the assistance the “finding” allows the CIA to give the Syrian rebels is unclear. It is also unknown precisely when Obama signed the order.” The report of Obama’s authorization for covert rebel support comes amidst continued fighting between Syrian government troops and rebels over control of Aleppo, the country’s economic capital. Thousands of people have fled the city, while the government and rebels continue to release conflicting reports on the extent of their control over the city. Asia Times Online correspondent Pepe Escobar told RT that the leak’s timing was intended to distort the true nature of Washington’s covert operations on the ground in Syria.
“This intelligence finding signed by Obama – that’s the code for a secret order – this was signed six months ago. So the fact that Reuters has only been allowed now to report about it proves that there have been high deliberations in Washington: ‘should we let people know about what they already know?’”
“In fact, the Washington Post two weeks ago had already reported about it, and when the CIA wants to leak something in the US, they usually go to the Washington Post. The CIA and Mossad, on the ground [in Syria], side by side working with the Qataris, the Turks, the Saudis and a swarm of jihadis coming from everywhere, but especially from across the border in Iraq,” he argues.
Escobar says the leak was intended to make it look as though Washington was leading the Syrian campaign from behind the scenes, when in fact the US is “leading from the front lines alongside al-Qaeda-style Jihadists, Qatari intelligence, and Turkish logistics.” 
The first specific use of presidential findings was precipitated by the Agricultural Trade Development and Assistance Act of 1954, in which the findings indicated that certain conditions of that act had be satisfied and, therefore, sales of agricultural commodities could proceed. In their use under this act, such findings were published in the Federal Register and the CFR Title 3 compilations. In contrast, presidential findings in their modern use are not published in these or other governmental publications.
Current use of the presidential finding stems from the so-called Hughes-Ryan amendment to the Foreign Assistance Act of 1974, which prohibited the expenditure of appropriated funds by or on behalf of the Central Intelligence Agency for intelligence activities “unless and until the President finds that each such operation is important to the national security of the United States and reports, in a timely fashion, a description and scope of such operation to the appropriate committees of Congress” (section 662). This was intended to ensure that clear responsibility for such action was attributable to the President and that Congress was always made aware of such activities. Due to the sensitivity of their content, presidential findings are almost always classified.
The most recent change to exercise of findings occurred in the Intelligence Authorization Act of 1991, which introduced increased flexibility in the reporting requirement: findings are to be “reported to the intelligence committees as soon as possible” after being approved “and before the initiation of the covert action authorized by the finding.” As such, presidential findings are one of the primary means through which the intelligence committees exercise their oversight of the government’s intelligence operations.
Covert Action: Title 10, Title 50, and the Chain of Command
By Joseph B. Berger III
America champions the rule of law and must maintain that moral stance in its international dealings and retain the clarity of an unambiguous chain of command. The Abbottabad raid on Osama bin Laden’s compound highlighted the dangers and vagaries of departing from the traditional military chain of command. The Secretary of Defense was taken out of the chain and the CID Director was inserted. In contrast, the rescue of a U.S. citizen in Somalia was carried out secretively but not covertly by joint forces under military command, maintaining individual Servicemember protections that may be forfeit in the gray zone of questionable legality. National authorities should reconsider the rejection of the 9/11 Commission’s recommendation that DOD be responsible for paramilitary covert actions, and when DOD acts in that capacity, the operation should be carried out as a traditional military operation with a military chain of command.
Recent media reports have Pentagon officials considering “putting elite special operations troops under CIA [Central Intelligence Agency] control in Afghanistan after 2014, just as they were during last year’s raid on [Osama bin Laden’s] compound.”1 This shell game would allow Afghan and U.S. officials to deny the presence of American troops in Afghanistan because once “assigned to CIA control, even temporarily, they become spies.”2 Nearly simultaneously, Department of Defense (DOD) leaders were warned to “be vigilant in ensuring military personnel are not inappropriately utilized” in performing “new, expanding, or existing missions,” ensuring the force is aligned against strategic choices “supported by rigorous analysis.”3 Placing Servicemembers—uniformed members of the Army, Navy, Marine Corps, and Air Force—under CIA control demands such rigorous analysis. The raid on bin Laden’s compound provides a framework.
n his May 1, 2011, televised address, President Barack Obama reported “to the American people and to the world that the United States ha[d] conducted an operation that killed Osama bin Laden.”4 President Obama initially detailed little beyond noting that he had directed “the[n] Director of the CIA [Leon Panetta], to make the killing or capture of bin Laden the top priority of our war against al Qaeda” and that the operation, carried out by a “small team of Americans” was done “at [his] direction [as President].” In the following days, senior executive branch officials garrulously provided explicit details, from the now-iconic White House Situation Room photograph to intricate diagrams of the Abbottabad compound and the assault force’s composition. Most noteworthy was Panetta’s unequivocal assertion the raid was a covert action:
Since this was what’s called a “Title 50” operation, which is a covert operation, and it comes directly from the president of the United States who made the decision to conduct this operation in a covert way, that direction goes to me. And then, I am, you know, the person who then commands the mission. But having said that, I have to tell you that the real commander was Admiral [William] McRaven because he was on site, and he was actually in charge of the military operation that went in and got bin Laden.5
Despite his self-effacing trumpeting of Vice Admiral McRaven’s role, Panetta’s comment highlights that critical confusion exists among even the most senior U.S. leaders about the chain of command and the appropriate classification of such operations.
Openly describing the raid as both a “covert operation” and “military operation,” Panetta asserted he was the “commander,” describing a chain of “command” that went from the President to Panetta to McRaven. Panetta’s public comments are problematic, as is describing a chain of command that excludes the Secretary of Defense and purports to route command authority through the CIA director. Title 50 is clear:
The term “covert action” means an activity or activities of the United States Government to influence political, economic, or military conditions abroad, where it is intended that the role of the United States Government will not be apparent or acknowledged publicly, but does not include . . . (2) traditional . . . military activities or routine support to such activities.6
The administration did the opposite, making patently clear the raid’s nature and, in exhaustive detail, the precise role of the United States. Instead of categorizing it as a covert action under the director’s “command,” the President could have conducted the raid as a covert action under the Secretary of Defense instead of the CIA director, or under his own constitutional authority as Commander in Chief and the Secretary’s statutory authorities, classifying it as a traditional military activity and excepting it from the statute’s coverage. As a traditional military activity, there would have been no legal limits on subsequent public discussion. Alternatively, conducting the raid as a covert action within a military chain of command removes the issues the director raised in asserting command authority over Servicemembers. The decisionmaking process remains shrouded, but conducting a raid into a sovereign country targeting a nonstate actor using military personnel and equipment under the “command” of the CIA director and classifying it as a covert action raises significant legal and policy questions. Such decisions threaten the legitimacy and moral authority of future U.S. actions and demand a rigorous examination of those associated risks.
The Abbottabad raid illustrates the post-9/11 security environment convergence of DOD military and CIA intelligence operations.7 While dead terrorists attest to this arrangement’s efficacy, many directly challenge the legal and policy framework behind current DOD-CIA cooperation. The discourse focuses largely on distinctions between Title 10 and Title 50 and the legal basis for conducting apparently overlapping military and intelligence operations beyond the battlefields of Iraq and Afghanistan. Notwithstanding the potentially misleadingly simple labels of Title 10 and Title 50, these complex issues lack clear answers. Many argue the legacy structure ill equips the President to effectively combat the threat. But tweaking that structure carries risk. Thus, correctly classifying and structuring our actions within that framework are critical. The law of war is designed to protect our nation’s military forces when they are engaged in traditional military activities under a military chain of command; spies conducting intelligence activities under executive authority have no such protections. This distinction rests on a constitutional, statutory, treaty, and doctrinal framework underpinning the military concept of command authority.
U.S. power relies on moral and legal legitimacy. Exclusive state control over the legitimate use of armed force remains viable domestically and internationally only where exercised within an accepted framework. Thus, employing DOD forces in a nontraditional manner entails significant risk. The policy implications of classification and structure are neither semantic nor inconsequential, and must be understood by senior decisionmakers; likewise, individual Servicemembers must understand the practical effects. A rigorous risk analysis should therefore inform any deviation, however permissible under domestic law.
This article focuses on the risks associated with both using military personnel to conduct kinetic covert action and using them without a military chain of command. Those risks inform the recommendation to change practice, but not the law. Specifically, the author rejects melding distinct operational military (Title 10) and intelligence (Title 50) authorities into the often mentioned Title 60. Properly classifying actions—either under the statute as a covert action or exempted from the statute as a traditional military activity—ensures the correct command structure is in place.8 Ultimately, the analysis argues for revisiting the previously rejected 9/11 Commission recommendation to place paramilitary covert action under DOD control.9
This article first outlines current and likely future threats and then explains the critical terms of art related to covert action and, against that lingua franca, examines why kinetic military operations should be either classified as traditional military activities or kept under a military chain of command. Analyzing the relevant constitutional, statutory, treaty, and doctrinal elements of command, this article illustrates that a raid conducted like the Abbottabad raid, while legally permissible, is best conducted as a traditional military activity.
Changed Character of the Battlefield and Enemy
In the decade since 9/11, DOD and CIA elements have become “operationally synthesi[zed].”10 A senior intelligence official recently noted that “the two proud groups of American secret warriors had been ‘deconflicted and basically integrated’—finally—10 years after 9/11.”11 The direct outgrowth is the increased reliance on special operations forces (SOF) to achieve national objectives against a “nimble and determined” enemy who “cannot be underestimated.”12 While the United States fought wars on geographically defined battlefields in Iraq and Afghanistan and beyond, the underlying legal structure remained constant. In the wars’ background, leaders, advisors, academics, and others argued about the structure of the appropriate legal and policy framework. Post-Iraq and post-Afghanistan, the United States must still address other threats, including those that al Qaeda and their associated forces present.
The threats have migrated beyond a battlefield defined by sovereign nations’ borders. When asked recently in “how many countries we are currently engaged in a shooting war,” Secretary of Defense Panetta laughed, responding, “That’s a good question. I have to stop and think about that . . . we’re going after al Qaeda wherever they’re at. . . clearly, we’re confronting al Qaeda in Pakistan, Yemen, Somalia, [and] North Africa.”13 The unresolved legal and policy challenges will likely increase in complexity on this geographically unconstrained battlefield. Remaining rooted in enduring principles is critical. DOD conduct of kinetic operations beyond traditionally recognized battlefields raises significant legal and policy concerns, especially where the U.S. Government conducts them without knowledge or consent of the host nation, as apparently happened with the Abbottabad operation.14 Properly categorizing and structuring these operations, while vexing for policymakers and their lawyers, carries much greater stakes for the Servicemembers executing them.
The Need for a Lingua Franca
Colloquial usage refers to DOD authorities as Title 10, and the CIA’s as Title 50. That is technically inaccurate and misleading since DOD routinely operates under both Titles 10 and 50.15 Instead of Title 10, this article uses the term military operations; instead of Title 50, it uses CIA operations or the more specific covert action. All three terms require clarification.
CIA operations are all CIA activities except covert action. Covert action is the narrow, statutory subset of Presidentially approved, CIA-led activities.16 Unfortunately, colloquially, covert action “is frequently used to describe any activity the government wants concealed from the public.”17 That common usage ignores the fact that a traditional military activity, notwithstanding how “secretly” it is executed, is by statute not a covert action. DOD defines a covert operation as one “planned and executed as to conceal the identity of or permit plausible denial by the sponsor,” where “emphasis is placed on concealment of the identity of the sponsor rather than on concealment of the operation.”18 While not in conflict with the statutory definition, the DOD definition is incomplete; it fails to recognize the President’s role and ignores the exception of traditional military activities.19 Practitioners should use the statutory definition.
The concept of clandestine operations further blurs colloquial and doctrinal imprecision.20 DOD activities “may be both covert and clandestine . . . focus[ing] equally on operational considerations and intelligencerelated activities.”21 Appropriately, DOD officials assert that, absent a Presidential covert action finding, they “conduct only ‘clandestine activities.’” 22 They characterize clandestine activities as those “conducted in secret but which constitute ‘passive’ intelligence information gathering.”23 Interchanging the terms and mixing them with intelligence functions is inaccurate and dangerous; practitioners must draw clear distinctions. The sponsorship of a covert action is hidden, not the act itself. The specific acts of the U.S. Government in influencing a foreign election (for example, posters, marches, election results, and so forth) would be visible, but not the covert sponsorship of those acts. For clandestine acts, the act itself (for example, intercepting a phone call) must remain hidden. The CIA and DOD can conduct clandestine operations without Presidential approval, whereas covert action triggers statutory requirements for a Presidential finding and congressional notification. Some have argued DOD’s “activities should be limited to clandestine” activities, as this would ensure military personnel are protected by the law of war,24 a critical point examined in detail later.
Military operations are DOD activities conducted under Title 10, including activities intended or likely to involve kinetic action. Pursuant to an order issued by the Secretary of Defense, they are conducted by military personnel under DOD command and in accordance with the law of war. They specifically exclude DOD’s intelligence activities (for example, the Joint Military Intelligence Program); like the CIA’s, those intelligence activities are conducted pursuant to Title 50.
Statutorily assigned responsibility helps distinguish between CIA operations and military operations. Although the President can designate which department, agency, or entity of the U.S. Government will participate in the covert action, the statute implicitly tasks the CIA as the default lead agency: “Any employee . . . of the [U.S.] Government other than the [CIA] directed to participate in any way in a covert action shall be subject either to the policies and regulations of the [CIA], or to written policies or regulations adopted . . . to govern such participation.25
Executive order 12333 (EO 12333) makes that default tasking explicit:
The Director of the [CIA] shall . . . conduct covert action activities approved by the President. No agency except the [CIA] (or the Armed Forces of the United States in time of war declared by the Congress or during any period covered by a report from the President to the Congress consistent with the War Powers Resolution. . . .) may conduct any covert action activity unless the President determines that another agency is more likely to achieve a particular objective.26
The statute, coupled with EO 12333, unequivocally places all covert action squarely under the CIA’s control; the narrow exception for DOD is currently inapplicable. While the Executive order expressly tasks
the director with conducting covert action, it does not task the Secretary of Defense.27
Default CIA primacy and the absence of statutory specificity in defining traditional military activities create risk when DOD conducts kinetic covert action.
The Unique Nature of Traditional Military Activities
One practitioner described traditional military activities’ exclusion from covert action’s definition as “the exception that swallows the rule.”28 But while DOD-CIA operational convergence blurs the issue, the exception need not swallow the rule. Functionally, anything done by a uniformed member of a nation’s armed forces is a “military” activity; the nuanced requirement is to understand which are traditional military activities. That definition can be consequential, functional, or historical—or a combination of some or all three approaches. The statute’s legislative history provides the best clarification, noting the conferees intended that:
“Traditional military activities” include activities by military personnel under the direction and control of a United States military commander (whether or not the U.S. sponsorship of such activities is apparent or later to be acknowledged) . . . where the fact of the U.S. role in the overall operation is apparent or to be acknowledged publicly.
In this regard, the conferees intend to draw a line between activities that are and are not under the direction and control of the military commander. Activities that are not under the direction and control of a military commander should not be considered as “traditional military activities.”29
That nonstatutory definition frames the follow-on analysis. That functional and historical definition turns on who is in charge.
Activities under the “direction and control of a military commander” meet the requirement to be excepted from the statute; those with a different command and control arrangement are not traditional military activities. “Command” is unique to the military and the definition appears to draw a bright line rule; but the CIA director blurred the line by asserting “command” over a DOD element.30 The confusion questions the necessary nature and scope of leadership by a “military commander.” What level or rank of command is required? Must the chain of command from that military commander run directly back to the Commander in Chief solely through military channels? Must it run through the Secretary of Defense? Can it run through the director if there is a military commander below him? Given Goldwater-Nichols,31 what about the geographic combatant commander? In short, what does the wiring diagram look like? These questions highlight three baseline possibilities as depicted in the figure below.
Chain of Command Possibilities
Part 1A of the figure reflects DOD’s Title 10 chain of command, illustrating the broadest historical, functional, and consequential definition of traditional military activity. The clear chain is rooted in the uniquely military concept of command and the President’s constitutionally defined role as Commander in Chief. It clarifies congressional oversight responsibility, results in unquestioned jurisdiction, and forms the basis of the strongest legal argument for combatant immunity. Part 1B represents the President as chief executive, exercising oversight and control of the CIA under Title 50. This hierarchy lacks the legal command authority exercised over military personnel in 1A. Finally, part 1C represents the paradox created by the covert action statute’s attempts to overlap the parallel structures of 1A and 1B; it is often described as Title 60.
The current Congressional Authorization for the Use of Military Force allows the President to “use all necessary and appropriate force” to prevent “future acts of international terrorism against the United States.”32 This statutory grant of power creates the paradox: here, where the Senate vote was 98 to 0 and the House vote was 420 to 1, the President’s executive authority (as Commander in Chief and chief executive) is greatest,33 the exercise of those powers blurs the clear lines of parts 1A and 1B of the illustration. Merging the two, although permissible under the covert action statute, creates risk.
Consequently, questions about the nature and structure of the chain of command demand rigorous scrutiny and cannot be left to ad hoc arrangements. Defining military command determines whether or not the activity is a traditional military activity and therefore not under the ambit of the statute. The criticality of this categorization is twofold: it is the core of the state’s monopoly on the legitimate use of force and cloaks Servicemembers in the legal armor of combatant immunity.
Chain of Command, or Control?
Since George Washington’s Presidency, the Secretary of War (later Defense) has served without interruption as a Cabinet member. The President’s role, enshrined in the Constitution, is clear: “The President shall be Commander-in-Chief of the Army and Navy of the United States.”34 With the Secretary of Defense, this embodies the Founders’ vision of civilian control of the military. The Secretary of Defense’s appointment requires the “Advice and Consent of the Senate.”35 While the President can relieve him and replace him with an inferior officer (that is, the Deputy Secretary of Defense), Senateconfirmed executive branch officials are not fungible. He cannot interchange officials individually confirmed to fulfill separate and unique duties—something James Madison warned about in Federalist 51.36
Longstanding U.S. practice is an unbroken chain of command from the President, through his Secretary of Defense, to a subordinate uniformed commander. Even GoldwaterNichols’s37 streamlining the military warfighting chain of command to run from the President through the Secretary and directly to the unified combatant commanders did not alter that fundamental practice.38 Combatant commanders simply replace Service chiefs. The civilian leader between the Commander in Chief and his senior uniformed commander remains unchanged—a specific individual confirmed by the Senate to execute statutory duties. The inviolate concept of civilian control of the military and the Senate’s Advice and Consent requirement make assertion of any executive authority to “trade out” duties between Cabinet officials implausible. The President can place military personnel under CIA control, but control is not command.
Command is the inherently military “privilege” that is “exercised by virtue of office and the special assignment of members of the US Armed Forces holding military grade.”39 In fact, under the Army regulation, “A civilian, other than the President as Commander-in-Chief . . . may not exercise command.”40 Goldwater-Nichols allows the President to exercise command through his Secretary of Defense. Command rests on constitutional and statutory authority (including the Uniform Code of Military Justice) and the customs and practices of the Service. Removing military personnel from that hierarchy— illustrated in part 1C of the figure—changes their fundamental nature. This is Panetta’s assertion: he was in “command” 41 of the raid on Osama bin Laden’s compound.
itles 10 and 50 define the specific duties of the Secretary of Defense42 and Title 50 the CIA director’s.43 The duties are neither identical nor interchangeable. In Title 50, Congress explicitly states that DOD shall function “under the direction, authority, and control of the Secretary of Defense” in order to “provide for their unified direction under civilian control.”44 Placing the Services under the Secretary of Defense is necessary to “provide for the establishment of [a] clear and direct line of command.”45 Congress is equally clear in Title 10, granting the Secretary complete authority over DOD: “there shall be a Secretary of Defense, who is the head of the [Department], appointed . . . by the President, by and with the advice and consent of the Senate.”46 The statute allows the Secretary to “perform any of his functions or duties, or [to] exercise any of his powers through” other persons, but only persons from within DOD.47
Two caveats exist to the Secretary of Defense’s “authority, direction, and control”: the Secretary’s authority is “subject to the direction of the President” and the 1947 National Security Act.48 The latter covers DOD personnel within the National Foreign Intelligence Program (NFIP). The former appears to be an exception that swallows the rule. But even in empowering the President to limit his Secretary’s authority, Congress did not specifically authorize any change to the fundamental command of military forces. Likewise, in defining the director’s limited authorities over military personnel, Congress maintained the military command structure over military operations.
Congress neither allows the director command nor control of DOD operational assets, nor did it grant the President a caveat like that with the Secretary of Defense’s authority.49 Although the director’s duties include the transfer of “personnel within the NFIP,” which includes DOD personnel, such transfers are limited to personnel within DOD’s Joint Military Intelligence Program (JMIP).50 SOF are not part of the JMIP. When DOD does transfer any JMIP personnel to the CIA, the director must “promptly” report that transfer to both the intelligence oversight and Armed Services Committees of both houses.51 Transfers between other executive branch elements trigger no such requirements. Congress only intended CIA control over DOD intelligence assets and was clearly concerned about even that. Goldwater-Nichols reinforces this analysis.
Goldwater-Nichols codifies geographic combatant commanders’ nearly inviolable command authority: “all forces operating within the geographic area assigned to a unified combatant command shall be assigned to, and under” his command.52 Two exceptions supplant that authority. Servicemembers assigned to U.S. Embassies (for example, the Defense Attaché) are under the Ambassador’s control and the Defense Intelligence Agency’s command. For those Servicemembers, diplomatic protections have replaced law of war protections, but the Secretary of Defense remains in the chain of command. The second exception, carved from GoldwaterNichols’s “unless otherwise directed by the President” language, covers DOD participation in covert action.53 Goldwater-Nichols’s silence on the Secretary of Defense remaining in the chain of command indicates Congress did not intend to change the default hierarchy. DOD recognized that point by defining combatant command as being “under a single commander” and running “through the Secretary of Defense.”54 All these say nothing about covert action.
The statute and EO 12333 put the director “in charge” of the conduct of covert actions.55 CIA “ownership” means any non-CIA employee supporting a covert action “belongs” to the CIA. However, the CIA lacks DOD’s legal command structure and no CIA official possesses the command authority inherent in an officer’s commission.56 The CIA can only be in charge, not in command. The director cannot give a lawful order that would be legally binding on Servicemembers. The Constitution unequivocally grants Congress the authority to “make Rules for the Government and Regulation of the land and naval Forces.”57 Those rules, the Uniform Code of Military Justice, never contemplated CIA personnel exercising command authority over Servicemembers. The CIA’s ownership of covert action is limited. Exclusive CIA control fails elsewhere; the statute authorizes the President to task “departments, agencies, or entities”58 to conduct covert action. The implication is that DOD can conduct a covert action exclusively. EO 12333 specifically envisions that.59 Placing DOD elements under CIA control to conduct a kinetic operation is arguably unnecessary.
This chain of command is constitutionally enshrined, codified, and ratified through longstanding practice; even if Congress had explicitly authorized the President to reroute it, doing so creates risk. First, it removes the law of war’s protections upon which Servicemembers conducting kinetic operations rely. In such an event, Servicemembers must be made aware they are no longer protected. Second, as a state practice, realigning military personnel under a nonmilitary framework to conduct kinetic activities creates precedential risk for U.S. allies. Such a decision must be fully informed at all levels.
Chain of Command: International Law Context
National armies engaged against each other have, throughout modern history, been cloaked in the law of war’s combatant
immunity. Absent that immunity, a captured individual is subject to criminal prosecution for his wartime conduct. His deliberately targeting and killing others become nonmilitary and therefore criminal. In World War II’s aftermath, widespread acceptance of what constituted an “army” rendered a definition unnecessary: “Individuals composing the national forces” automatically enjoyed combatant immunity.60 However, for those outside their nation’s military hierarchy, specificity was necessary. The Third Geneva Convention grants prisoner of war status—which confers combatant immunity—to those who are subordinate to a responsible commander, wear a fixed, distinctive insignia recognizable at a distance, carry their arms openly, and conduct their operations in accordance with the laws and customs of war.61
The command requirement stems from the “dual principle of responsible command and its corollary command responsibility.”62 The Hague Convention required that a commander be “responsible for his subordinates.”63 The Geneva Convention recognized “no part of [an] army . . . is not subordinated to a military commander,” applying this “from the Commander-in-Chief down to the common soldier.”64 The later protocols “could not conceive” of a hierarchy “without the persons who make up the command structure being familiar with the law applicable in armed conflict.”65 This is DOD’s unchallenged area of expertise.66 Like Congress’s definition of traditional military activity,67 the commentary’s definition, when coupled with the requirements for those not considered part of the Nation’s army, is the parallel to Servicemembers conducting kinetic covert action under CIA control. Combatant immunity necessitates prisoner of war status; for those not acting as part of the army, that status requires a military chain of command. Replacing the Secretary of Defense with the CIA director eviscerates this.
U.S. history records a fundamental belief in the rules for combatant immunity.68 First, to codify these requirements, the 1863 Lieber Code defined prisoner of war as including “all soldiers.”69 The code noted noncompliance with the rules meant no combatant immunity: spies were “punishable with death by hanging by the neck.”70 “Armed prowlers . . . who steal within the lines of the hostile army for the purpose of . . . killing . . . are not entitled to the privileges of the prisoner of war.”71 The code’s noteworthy purpose was not to regulate conduct between nations, but for application in a non-international armed conflict and maintaining the moral high ground necessary to facilitate reconciliation with and reintegration of the confederate states.
The law of war’s efficacy rests on the principle of reciprocity. One party provides the protections to its prisoners believing and hoping its enemies will respond in kind. Commendable German and U.S. treatment of each other’s prisoners during World War II exemplifies this principle; Japanese treatment of U.S prisoners at Bataan proves its imperfections. Regardless, maintaining the moral high ground is critical. Had Abbottabad gone poorly, the United States would have asserted that U.S. personnel in Pakistani custody were entitled to the high standards of prisoner of war treatment. That would have required those Soldiers and Sailors to be in compliance with the law of war. The nonmilitary chain of command may have been problematic in making that assertion.
“From its inception . . . America has venerated the rule of law.”72 Traditional military activities occur against a rich fabric of domestic and international law. Covert action, while uniquely codified, presents multiple dilemmas. Although permissible under U.S. domestic law, covert action is generally illegal in the target country.73 Again, maintaining the moral high ground is critical.
Although inimical to covert action’s fundamental premise, overt executive branch commentary following the Abbottabad raid highlighted the legal risk associated with policy decisions. Placing Servicemembers under CIA command threatens to undermine the protections they rely on when conducting kinetic military operations, especially where the activity is more accurately classified as a traditional military activity.
The risk can—and should—be mitigated by first properly classifying the activity. Classifying a traditional military activity as anything else undermines the very categorization and its inherent law of war protections. DOD can undoubtedly conduct secretive (that is, clandestine and/or unacknowledged) actions as traditional military activities and enjoy the full body of the law of war’s protections. The current framework neither envisions nor facilitates placing Servicemembers under CIA control and preserving the command relationships necessary to cloak them in combatant immunity. The Abbottabad raid utilized this risk-laden approach.
This is not to assert that conducting the raid as a covert action was illegal. There were three likely outcomes: success, failure,
or something in between (that is, aborting the mission). Neither success nor failure required covert action’s plausible deniability. The United States immediately publicly acknowledged killing of “public enemy number one”; regardless, the crashed helicopter disclosed the U.S. role. A noncatastrophic driven decision to abort (for example, Pakistani detection of violation of their sovereign airspace) provides the sole outcome where the United States would likely have hidden behind the statute’s shield, disavowing all. The covert action classification provided an insurance policy, yet the cost of allowing that policy to “lapse” through post-success disclosures undermines the plausibility of such “insurance” in the future.
Compare the Abbottabad covert action with the recent rescue of a U.S. citizen in Somalia, conducted secretively, but not covertly, by “a small number of joint combatequipped U.S. forces.”74 This comparison illustrates that such activities can be conducted as traditional military activities, maintaining secrecy and preserving individual Servicemember protections. The need for continued distinction between covert action and traditional military activities and, where covert, the need for DOD-conducted operations to maintain a military chain of command, drive these recommendations. The United States should revisit the rejection of the 9/11 Commission’s recommendation that DOD assume responsibility for paramilitary covert operations.75
Where DOD participation is necessary and primary, the operation should be conducted as an unacknowledged traditional military activity. If the risk analysis drives a decision to conduct the operation as a covert action, the President should maintain the military chain of command. This ensures Servicemembers going in harm’s way have every protection the Nation they serve can provide them—or a clearer understanding of the additional risks they are assuming on behalf
of their Nation. JFQ
The Largest Covert Operation in CIA History
By Chalmers Johnson
The History News Network
Monday 09 June 2003
The Central Intelligence Agency has an almost unblemished record of screwing up every “secret” armed intervention it ever undertook. From the overthrow of the Iranian government in 1953 through the Bay of Pigs, the failed attempts to assassinate Fidel Castro of Cuba and Patrice Lumumba of the Republic of Congo, the Phoenix Program in Vietnam, the “secret war” in Laos, aid to the Greek colonels who seized power in 1967, the 1973 killing of Salvador Allende in Chile and Ronald Reagan’s Iran-contra war against Nicaragua, there is not a single instance in which the agency’s activities did not prove acutely embarrassing to the United States. The CIA continues to get away with this primarily because its budget and operations have always been secret and Congress is normally too indifferent to its constitutional functions to rein in a rogue bureaucracy. Therefore the tale of a purported CIA success story should be of some interest.
According to the author of the newly released Charlie Wilson’s War, the exception to CIA incompetence was the arming between 1979 and 1988 of thousands of Afghan moujahedeen (“freedom fighters”). The agency flooded Afghanistan with an astonishing array of extremely dangerous weapons and “unapologetically mov[ed] to equip and train cadres of high tech holy warriors in the art of waging a war of urban terror against a modern superpower,” in this case, the USSR.
The author of this glowing account, George Crile, is a veteran producer for the CBS television news show “60 Minutes” and an exuberant Tom Clancy-type enthusiast for the Afghan caper. He argues that the U.S. clandestine involvement in Afghanistan was “the largest and most successful CIA operation in history” and “the one morally unambiguous crusade of our time.” He adds that “there was nothing so romantic and exciting as this war against the Evil Empire.” Crile’s sole measure of success is the number of Soviet soldiers killed (about 15,000), which undermined Soviet morale and contributed to the disintegration of the Soviet Union in the period from 1989 to 1991. That’s the successful part.
However, he never mentions that the “tens of thousands of fanatical Muslim fundamentalists” the CIA armed are some of the same people who in 1996 killed 19 American airmen at Dhahran, Saudi Arabia; bombed our embassies in Kenya and Tanzania in 1998; blew a hole in the side of the U.S. destroyer Cole in Aden harbor in 2000; and on Sept. 11, 2001, flew hijacked airliners into New York’s World Trade Center and the Pentagon. Today, the world awaits what is almost certain to happen soon at some airport — a terrorist firing a U.S. Stinger low-level surface-to-air missile (manufactured at one time by General Dynamics in Rancho Cucamonga) into an American jumbo jet. The CIA supplied thousands of them to the moujahedeen and trained them to be experts in their use. If the CIA’s activities in Afghanistan are a “success story,” then Enron should be considered a model of corporate behavior.
Nonetheless, Crile’s account is important, if appalling, precisely because it details how a ruthless ignoramus congressman and a high-ranking CIA thug managed to hijack American foreign policy. From 1973 to 1996, Charlie Wilson represented the 2nd District of Texas in the U.S. House of Representatives. His constituency was in the heart of the East Texas Bible Belt and was the long-held fiefdom of his fellow Democrat, Martin Dies, the first chairman of the House Un-American Affairs Committee. Wilson is 6 feet, 4 inches tall and “handsome, with one of those classic outdoor faces that tobacco companies bet millions on.” He graduated from the Naval Academy in 1956, eighth from the bottom of his class and with more demerits than any other cadet in Annapolis history.
After serving in the Texas Legislature, he arrived in Washington in 1973 and quickly became known as “Good Time Charlie,” “the biggest playboy in Congress.” He hired only good-looking women for his staff and escorted “a parade of beauty queens to White House parties.” Even Crile, who featured Wilson many times on “60 Minutes” and obviously admires him, describes him as “a seemingly corrupt, cocaine snorting, scandal prone womanizer who the CIA was convinced could only get the Agency into terrible trouble if it permitted him to become involved in any way in its operations.”
Wilson’s partner in getting the CIA to arm the moujahedeen was Gust Avrakotos, the son of working-class Greek immigrants from the steel workers’ town of Aliquippa, Pa. Only in 1960 did the CIA begin to recruit officers for the Directorate of Operations from among what it called “new Americans,” meaning such ethnic groups as Chinese, Japanese, Latinos and Greek Americans. Until then, it had followed its British model and taken only Ivy League sons of the Eastern Establishment. Avrakotos joined the CIA in 1961 and came to nurture a hatred of the bluebloods, or “cake eaters,” as he called them, who discriminated against him. After “spook school” at Camp Peary, next door to Jamestown, Va., he was posted to Athens, where, as a Greek speaker, he remained until 1978.
During Avrakotos’s time in Greece, the CIA was instrumental in destroying Greek freedom and helping to turn the country into probably the single most anti-American democracy on Earth today. Incredibly, Crile describes this as follows: “On April 21, 1967, he [Avrakotos] got one of those breaks that can make a career. A military junta seized power in Athens that day and suspended democratic and constitutional government.” Avrakotos became the CIA’s chief liaison with the Greek colonels. After the fall of the colonels’ brutally fascist regime, the 17 November terrorist organization assassinated the CIA’s Athens station chief, Richard Welch, on Dec. 23, 1975, and “Gust came to be vilified in the Greek radical press as the sinister force responsible for most of the country’s many ills.” He left the country in 1978 but could not get another decent assignment — he tried for Helsinki — because the head of the European Division regarded him as simply too uncouth to send to any of its capitals. He sat around Langley for several years without work until he was recruited by John McGaffin, head of the Afghan program. “If it’s really true that you have nothing to do,” McGaffin said, “why not come upstairs? We’re killing Russians.”
Wilson was the moneybags and sparkplug of this pair; Avrakotos was a street fighter who relished giving Kalashnikovs and Stingers to the tribesmen in Afghanistan. Wilson was the more complex of the two, and Crile argues that his “Good Time Charlie” image was actually a cover for a Barry Goldwater kind of hyper-patriotism. But Wilson was also a liberal on the proposed Equal Rights Amendment and a close friend of the late Congresswoman Barbara Jordan (D-Texas), and his sister Sharon became chairwoman of the board of Planned Parenthood.
As a boy, Wilson was fascinated by World War II and developed an almost childlike belief that he possessed a “special destiny” to “kill bad guys” and help underdogs prevail over their enemies. When he entered Congress, just at the time of the Yom Kippur War, he became a passionate supporter of Israel. After he traveled to Israel, the American Israel Public Affairs Committee began to steer large amounts of money from all over the country to him and to cultivate him as “one of Israel’s most important Congressional champions: a non-Jew with no Jewish constituents.” Jewish members of Congress also rallied to put Wilson on the all-powerful Appropriations Committee in order to guarantee Israel’s annual $3-billion subsidy. His own Texas delegation opposed his appointment.
Wilson was not discriminating in his largess. He also became a supporter of Anastasio “Tacho” Somoza, the West Point graduate and dictator of Nicaragua who in 1979 was swept away by popular fury. Before that happened, President Carter tried to cut the $3.1-million annual U.S. aid package to Nicaragua, but Wilson, declaring Somoza to be “America’s oldest anti-Communist ally in Central America,” opposed the president and prevailed.
During Wilson’s long tenure on the House Appropriations Committee, one of its subcommittee chairmen, Clarence D. “Doc” Long, used to have a sign mounted over his desk: “Them that has the gold makes the rules.” Wilson advanced rapidly on this most powerful of congressional committees. He was first appointed to the foreign operations subcommittee, which doles out foreign aid. He then did a big favor for then-Speaker Thomas P. “Tip” O’Neill Jr. (D-Mass.). The chairman of the Defense Appropriations subcommittee at the time, Rep. John Murtha (D-Pa.), had been caught in the FBI’s ABSCAM sting operation in which an agent disguised as a Saudi sheik offered members of Congress large cash bribes. O’Neill put Wilson on the Ethics Committee to save Murtha, which he did. In return, O’Neill assigned Wilson to the defense appropriations subcommittee and made him a life member of the governing board of the John F. Kennedy Performing Arts Center, where he delighted in taking his young dates. Wilson soon discovered that all of the CIA’s budget and 40 percent of the Pentagon’s budget is “black,” hidden from the public and even from Congress. As a member of the defense subcommittee, he could arrange to have virtually any amount of money added to whatever black project he supported. So long as Wilson did favors for other members on the subcommittee, such as supporting defense projects in their districts, they would never object to his private obsessions.
About this time, Wilson came under the influence of a remarkable, rabidly conservative Houston woman in her mid-40s, Joanne Herring. They later fell in love, although they never married. She had a reputation among the rich of the River Oaks section of Houston as a collector of powerful men, a social lioness and hostess to her fellow members of the John Birch Society. She counted among her friends Ferdinand and Imelda Marcos, dictator and first lady of the Philippines, and Yaqub Khan, Pakistan’s ambassador to Washington, D.C., who got Herring named as Pakistan’s honorary consul for Houston.
In July 1977, the head of Pakistan’s army, Mohammed Zia-ul-Haq, seized power and declared martial law, and in 1979, he hanged Zulfikar Ali Bhutto, the president who had promoted him. In retaliation, Carter cut off U.S. aid to Pakistan. In 1980, Herring went to Islamabad and was so entranced by Zia and his support for the Afghan freedom fighters that on her return to the United States, she encouraged Wilson to go to Pakistan. There he met Zia, learned about the Afghan moujahedeen and became a convert to the cause. Once Reagan replaced Carter, Wilson was able to restore Zia’s aid money and added several millions to the CIA’s funds for secretly arming the Afghan guerrillas, each dollar of which the Saudi government secretly matched.
Although Wilson romanticized the mountain warriors of Afghanistan, the struggle was never as uneven as it seemed. Pakistan provided the fighters with sanctuary, training and arms and even sent its own officers into Afghanistan as advisors on military operations. Saudi Arabia served as the fighters’ banker, providing hundred of millions with no strings attached. Several governments, including those of Egypt, China and Israel, secretly supplied arms. And the insurgency enjoyed the backing of the United States through the CIA.
Wilson’s and the CIA’s greatest preoccupation was supplying the Afghans with something effective against the Soviets’ most feared weapon, the Mi-24 Hind helicopter gunship. The Red Army used it to slaughter innumerable moujahedeen as well as to shoot up Afghan villages. Wilson favored the Oerlikon antiaircraft gun made in Switzerland (it was later charged that he was on the take from the Zurich-based arms manufacturer). Avrakotos opposed it because it was too heavy for guerrillas to move easily, but he could not openly stand in Wilson’s way. After months of controversy, the Joint Chiefs of Staff finally dropped their objections to supplying the American Stinger, President Reagan signed off on it, and the “silver bullet” was on its way. The Stinger had never before been used in combat. It proved to be murderous against the Hinds, and Soviet President Mikhail S. Gorbachev decided to cut his losses and get out altogether. In Wilson’s postwar tour of Afghanistan, moujahedeen fighters surrounded him and triumphantly fired their missiles for his benefit. They also gave him as a souvenir the stock from the first Stinger to shoot down a Hind gunship.
The CIA “bluebloods” fired Avrakotos in the summer of 1986, and he retired to Rome. Wilson became chairman of the Intelligence Oversight Committee, at which time he wrote to his CIA friends, “Well, gentlemen, the fox is in the hen house. Do whatever you like.” After retiring from Congress in 1996, he became a lobbyist for Pakistan under a contract that paid him $30,000 a month. Meanwhile, the United States lost interest in Afghanistan, which descended into a civil war that the Taliban ultimately won. In the autumn of 2001, the United States returned in force after Al Qaeda retaliated against its former weapon supplier by attacking New York and Washington. The president of the United States went around asking, “Why do they hate us?”
Crile knows a lot about these matters and presents them in a dramatic manner. There are, however, one or two items that he appears unaware of or is suppressing. For the CIA legally to carry out a covert action, the president must authorize a document called a finding. Crile repeatedly says that Carter signed such a finding ordering the CIA to provide covert backing to the moujahedeen after the Soviet Union invaded Afghanistan on Dec. 24, 1979. The truth of the matter is that Carter signed the finding on July 3, 1979, six months before the Soviet invasion, and he did so on the advice of his national security advisor, Zbigniew Brzezinski, in order to try to provoke a Russian incursion. Brzezinski has confirmed this sequence of events in an interview with a French newspaper, and former CIA Director Robert M. Gates says so explicitly in his 1996 memoirs. It may surprise Charlie Wilson to learn that his heroic moujahedeen were manipulated by Washington like so much cannon fodder in order to give the USSR its own Vietnam. The moujahedeen did the job, but as subsequent events have made clear, they may not be grateful to the United States.
Mr. Johnson is the author of Blowback: The Costs and Consequences of American Empire and The Sorrows of Empire: Militarism, Secrecy and the End of the Republic, to be published in January by Metropolitan Books.
Background Articles and Videos
CIA Covert Action in the Cold War: Iran, Jamaica, Chile, Cuba, Afghanistan, Libya, Latin America
The CIA Controls Al Qaeda
Triple Cross Bin Laden’s Spy In America (Full Documentary)
Covert Action – Operation Field Goal
A CIA special operations officer pursues a tip from an intercepted al-Qaeda transmission and ventures alone into enemy territory – where he’ll need all his training to survive.
CIA Covert Operations and U.S. Interventions Since World War II Full documentary
Col. L Fletcher Prouty: Secret Team – The Formation & Purpose of The NSC – PT 1 of 4
Col. L Fletcher Prouty: The Secret Team – The CIA’s Origins Of Covert Operations – PT 2 of 4
Col. L Fletcher Prouty: The Secret Team – Covert Operations & Their Consequences – PT 3 of 4
Col. L Fletcher Prouty: Secret Team – Conclusion – PT 4 of 4
Muslim Brotherhood Subversion: 12 Key Players in Obama/Bush Administrations
C.I.A. Agents in Libya Aid Airstrikes and Meet Rebels
By MARK MAZZETTI and ERIC SCHMITT
WASHINGTON — The Central Intelligence Agency has inserted clandestine operatives into Libya to gather intelligence for military airstrikes and to contact and vet the beleaguered rebels battling Col. Muammar el-Qaddafi’s forces, according to American officials.
While President Obama has insisted that no American military ground troops participate in the Libyan campaign, small groups of C.I.A. operatives have been working in Libya for several weeks as part of a shadow force of Westerners that the Obama administration hopes can help bleed Colonel Qaddafi’s military, the officials said.
In addition to the C.I.A. presence, composed of an unknown number of Americans who had worked at the spy agency’s station in Tripoli and others who arrived more recently, current and former British officials said that dozens of British special forces and MI6 intelligence officers are working inside Libya. The British operatives have been directing airstrikes from British jets and gathering intelligence about the whereabouts of Libyan government tank columns, artillery pieces and missile installations, the officials said.
American officials hope that similar information gathered by American intelligence officers — including the location of Colonel Qaddafi’s munitions depots and the clusters of government troops inside towns — might help weaken Libya’s military enough to encourage defections within its ranks.
In addition, the American spies are meeting with rebels to try to fill in gaps in understanding who their leaders are and the allegiances of the groups opposed to Colonel Qaddafi, said United States government officials, speaking on the condition of anonymity because of the classified nature of the activities. American officials cautioned, though, that the Western operatives were not directing the actions of rebel forces.
A C.I.A. spokesman declined to comment.
The United States and its allies have been scrambling to gather detailed information on the location and abilities of Libyan infantry and armored forces that normally takes months of painstaking analysis.
“We didn’t have great data,” Gen. Carter F. Ham, who handed over control of the Libya mission to NATO on Wednesday, said in an e-mail last week. “Libya hasn’t been a country we focused on a lot over past few years.”
Several weeks ago, President Obama signed a secret finding authorizing the C.I.A. to provide arms and other support to Libyan rebels, American officials said Wednesday. But weapons have not yet been shipped into Libya, as Obama administration officials debate the effects of giving them to the rebel groups. The presidential finding was first reported by Reuters.
In a statement released Wednesday evening, Jay Carney, the White House press secretary, declined to comment “on intelligence matters,” but he said that no decision had yet been made to provide arms to the rebels.
Representative Mike Rogers, a Michigan Republican who leads the House Intelligence Committee, said Wednesday that he opposed arming the rebels. “We need to understand more about the opposition before I would support passing out guns and advanced weapons to them,” Mr. Rogers said in a statement.
Because the publicly stated goal of the Libyan campaign is not explicitly to overthrow Colonel Qaddafi’s government, the clandestine war now going on is significantly different from the Afghan campaign to drive the Taliban from power in 2001. Back then, American C.I.A. and Special Forces troops worked alongside Afghan militias, armed them and called in airstrikes that paved the rebel advances on strategically important cities like Kabul and Kandahar.
In recent weeks, the American military has been monitoring Libyan troops with U-2 spy planes and a high-altitude Global Hawk drone, as well as a special aircraft, JSTARS, that tracks the movements of large groups of troops. Military officials said that the Air Force also has Predator drones, similar to those now operating in Afghanistan, in reserve.
Air Force RC-135 Rivet Joint eavesdropping planes intercept communications from Libyan commanders and troops and relay that information to the Global Hawk, which zooms in on the location of armored forces and determines rough coordinates. The Global Hawk sends the coordinates to analysts at a ground station, who pass the information to command centers for targeting. The command center beams the coordinates to an E-3 Sentry Awacs command-and-control plane, which in turn directs warplanes to their targets.
Lt. Gen. David A. Deptula, who recently retired as the Air Force’s top intelligence official, said that Libya’s flat desert terrain and clear weather have allowed warplanes with advanced sensors to hunt Libyan armored columns with relative ease, day or night, without the need for extensive direction from American troops on the ground.
But if government troops advance into or near cities in along the country’s eastern coast, which so far have been off-limits to coalition aircraft for fear of causing civilian casualties, General Deptula said that ground operatives would be particularly helpful in providing target coordinates or pointing them out to pilots with hand-held laser designators.
The C.I.A. and British intelligence services were intensely focused on Libya eight years ago, before and during the successful effort to get Colonel Qaddafi to give up his nuclear weapons program. He agreed to do so in the fall of 2003, and allowed C.I.A. and other American nuclear experts into the country to assess Libya’s equipment and bomb designs and to arrange for their transfer out of the country.
Once the weapons program was eliminated, a former American official said, intelligence agencies shifted their focus away from Libya. But as Colonel Qaddafi began his recent crackdown on the rebel groups, the American spy agencies have worked to rekindle ties to Libyan informants and to learn more about the country’s military leaders.
A former British government official who is briefed on current operations confirmed media reports that dozens of British Special Forces soldiers, from the elite Special Air Service and Special Boat Service units, are on the ground across Libya. The British soldiers have been particularly focused on finding the locations of Colonel Qaddafi’s Russian-made surface-to-air missiles.
A spokesman for Britain’s Ministry of Defense declined to comment, citing a policy not to discuss the operations of British Special Forces.
Military, CIA shun 9/11 panel on covert operations
Special-ops lead urged in report
By Bill Gertz The Washington Times
The U.S. military and the CIA failed to agree on implementing a key recommendation of the commission that investigated the 9/11 terrorist attacks: Give special-operations commandos the lead for all covert military action.
The 9/11 Commission ordered the shift in response to concerns that CIA covert action — a mainstay of the agency’s World War II predecessor, the Office of Strategic Services — had “atrophied.” The agency also had a “risk averse” approach to spying and semisecret military activities.
Former Navy Secretary John F. Lehman, a member of the panel, said a report card made public last week by the Bipartisan Policy Center didn’t address the failure to implement the covert action change because of the secrecy surrounding the issue.
Retired Army Lt. Gen. William “Gerry” Boykin, a former Delta Force commando and Pentagon intelligence policymaker during the George W. Bush administration, said that after the commission issued its recommendation in 2004, disagreements arose over bureaucratic turf, and the CIA and the U.S. Special Operations Command (SoCom) could not agree on how to implement it.
The military has expanded special operations forces in recent years. But critics complain that the Pentagon official in charge of the policies for their use is Michael G. Vickers, a former CIA official who comes from the agency’s risk-averse, anti-covert-action culture.
Military covert action involves training and equipping foreign military or paramilitary forces in semisecret activities where the U.S. role is hidden. Past programs included arming Cuban rebels for the ill-fated Bay of Pigs invasion, deploying direct-action hit teams in Vietnam, and the arming and training of anti-communist rebels in Latin America and anti-Soviet rebels in Afghanistan.
“Our capabilities are complementary, not duplicative, and the success of those capabilities should speak for itself,” she said.
Gen. Boykin said a task force was set up to study the 9/11 recommendation, but it failed to define paramilitary covert action. “This was a fundamental question that no one could answer,” Gen. Boykin said.
If the commission meant training, SoCom already had the mission of working with surrogates. But “paramilitary” operations — activities that are militarylike but carried out by groups other than the military — automatically would become military if the function is passed to the Pentagon.
Gen. Boykin said that if the commission wanted to give responsibility for covert action to the Pentagon, the CIA was opposed, arguing that the change would hinder intelligence collection. The agency said its facilities and equipment were “dual-use” — for spying and paramilitary — and could not be transferred.
“Working from the assumption that the commission was not really sure what they were recommending, the study group determined that the capabilities already in SoCom were competent to train indigenous forces including using clandestine methodology,” he said.
“The agreement was that the CIA would support [special operations] as needed with facilities and other resources.”
Bureaucratic turf also played a role.
However, special operations forces also “did not want the covert action mission because they saw it as something that would absorb huge amounts of time and resources and would be a distraction,” he said.
Former CIA officer Robert Baer, who was investigated by the Clinton administration during a covert action in northern Iraq, said he favors giving the mission to the military. “No matter what the bosses say, the CIA hates covert and paramilitary operations,” he said.
“The place is managed by liberal-arts majors who do a lot better operating on intuition and big-horizon stuff — like whether we’re winning or losing in Afghanistan,” Mr. Baer said. “But never ask it to run a bunch of Hmong tribesmen or disaffected Pashtuns and ever hope to win a war with them.”
Every covert action requires a presidential directive stating that the proposed action is in the country’s national interest. The procedure is often cumbersome and prone to public disclosure. Supporters of the change say military-led covert action would be more flexible and easier to approve.
Hiring former special operations forces at the CIA will not help the agency’s covert military capabilities, Mr. Baer said. “Outside military discipline, they just don’t perform up to their capabilities,” he said.
Mr. Baer said the covert program to supply Stinger anti-aircraft missiles to Afghan rebels in the 1980s was less a covert action success than a “logistics” plan to ship arms to the fighters in the field. “It was not a proper paramilitary campaign,” he said.
A Harvard University study several years ago quoted anti-covert-action officials at the CIA as opposing the Stinger operation because of fears it would trigger a war with the Soviet Union.
The 9/11 Commission report describes the CIA in 2001 as “institutionally averse to risk, with its capacity for covert action atrophied.”
It also says the CIA did not invest in developing “robust” paramilitary operations with U.S. personnel but instead relied on proxies trained and organized by CIA officers without military experience. “The results were unsatisfactory,” it says.
The 9/11 Commission said the CIA could continue clandestine and nonmilitary covert action, including propaganda and nonmilitary disruption.
“We believe, however, that one important area of responsibility should change,” the commission’s report says. “Lead responsibility for directing and executing paramilitary operations, whether clandestine or covert, should shift to the Defense Department.”
There, covert military action programs should be consolidated and placed under Special Operations Command, it says.
“Whether the price is measured in either money or people, the United States cannot afford to build two separate capabilities for carrying out secret military operations, secretly operating standoff missiles, and secretly training foreign military or paramilitary forces,” the report says.
Follow us: @washtimes on Twitter
The Pronk Pops Show Podcasts Portfolio
Listen To Pronk Pops Podcast or Download Show 383-386
Listen To Pronk Pops Podcast or Download Show 376-382
Listen To Pronk Pops Podcast or Download Show 369-375
Listen To Pronk Pops Podcast or Download Show 360-368
Listen To Pronk Pops Podcast or Download Show 354-359
Listen To Pronk Pops Podcast or Download Show 346-353
Listen To Pronk Pops Podcast or Download Show 338-345
Listen To Pronk Pops Podcast or Download Show 328-337
Listen To Pronk Pops Podcast or Download Show 319-327
Listen To Pronk Pops Podcast or Download Show 307-318
Listen To Pronk Pops Podcast or Download Show 296-306
Listen To Pronk Pops Podcast or Download Show 287-295
Listen To Pronk Pops Podcast or Download Show 277-286
Listen To Pronk Pops Podcast or Download Show 264-276
Listen To Pronk Pops Podcast or Download Show 250-263
Listen To Pronk Pops Podcast or Download Show 236-249
Listen To Pronk Pops Podcast or Download Show 222-235
Listen To Pronk Pops Podcast or Download Show 211-221
Listen To Pronk Pops Podcast or Download Show 202-210
Listen To Pronk Pops Podcast or Download Show 194-201
Listen To Pronk Pops Podcast or Download Show 184-193
Listen To Pronk Pops Podcast or Download Show 174-183
Listen To Pronk Pops Podcast or Download Show 165-173
Listen To Pronk Pops Podcast or Download Show 158-164
Listen To Pronk Pops Podcast or Download Show 151-157
Listen To Pronk Pops Podcast or Download Show 143-150
Listen To Pronk Pops Podcast or Download Show 135-142
Listen To Pronk Pops Podcast or Download Show 131-134
Listen To Pronk Pops Podcast or Download Show 124-130
Listen To Pronk Pops Podcast or Download Shows 121-123
Listen To Pronk Pops Podcast or Download Shows 118-120
Listen To Pronk Pops Podcast or Download Shows 113 -117
Listen To Pronk Pops Podcast or Download Shows 108-111
Listen To Pronk Pops Podcast or Download Shows 106-108
Listen To Pronk Pops Podcast or Download Shows 104-105
Listen To Pronk Pops Podcast or Download Shows 101-103
Listen To Pronk Pops Podcast or Download Shows 98-100
Listen To Pronk Pops Podcast or Download Shows 94-97
Listen To Pronk Pops Podcast or Download Shows 88-90
Listen To Pronk Pops Podcast or Download Shows 84-87
Listen To Pronk Pops Podcast or Download Shows 79-83
Listen To Pronk Pops Podcast or Download Shows 74-78
Listen To Pronk Pops Podcast or Download Shows 71-73
Listen To Pronk Pops Podcast or Download Shows 68-70
Listen To Pronk Pops Podcast or Download Shows 65-67
Listen To Pronk Pops Podcast or Download Shows 62-64
Listen To Pronk Pops Podcast or Download Shows 58-61
Listen To Pronk Pops Podcast or Download Shows 55-57
Listen To Pronk Pops Podcast or Download Shows 52-54
Listen To Pronk Pops Podcast or Download Shows 49-51
Listen To Pronk Pops Podcast or Download Shows 45-48
Listen To Pronk Pops Podcast or Download Shows 41-44
Listen To Pronk Pops Podcast or Download Shows 38-40
Listen To Pronk Pops Podcast or Download Shows 34-37
Listen To Pronk Pops Podcast or Download Shows 30-33
Listen To Pronk Pops Podcast or Download Shows 27-29
Listen To Pronk Pops Podcast or Download Shows 17-26
Listen To Pronk Pops Podcast or Download Shows 16-22
Listen To Pronk Pops Podcast or Download Shows 10-15
Listen To Pronk Pops Podcast or Download Shows 01-09