Iran Election Guide

Donate to EAWV





Or, click to learn more

Search

Entries in Central Intelligence Agency (8)

Thursday
May212009

Text: The Latest CIA Report on Iran's Nuclear, Chemical, and Biological Programmes

iran-flag10Every year, the US Director of National Intelligence is required by law to submit to Congress a report on "the acquisition by foreign countries during the preceding 6 months of dual-use and other technology useful for the development or production of weapons of mass destruction (including nuclear weapons, chemical weapons, and biological weapons) and advanced conventional munitions".

This is the section of the full report, submitted earlier this month, concerning Iran:

I. Acquisition by Country

As required by Section 721 of the Fiscal Year 1997 Intelligence Authorization Act, the following are country summaries of acquisition activities (solicitations, negotiations, contracts, and deliveries) related to weapons of mass destruction (WMD) and advanced conventional weapons (ACW) that occurred from 1 January through 31 December 2008. This report focuses on key countries that we assess are seeking WMD capabilities.

Iran

Nuclear

We assess that Iran had been working to develop nuclear weapons through at least fall 2003, but that in fall 2003 Iran halted its nuclear weapons design and weaponization activities, and its covert uranium conversion- and enrichment-related activities. We judge that the halt lasted at least several years, and that Tehran had not resumed these activities as of at least mid-2007. We do not know whether Iran currently intends to develop nuclear weapons, although we assess Tehran at a minimum is keeping open the option to develop nuclear weapons by continuing to develop a range of technical capabilities that could be applied to producing nuclear weapons, if a decision is made to do so.

During the reporting period, Iran continued to expand its nuclear infrastructure and continued uranium enrichment and activities related to its heavy water research reactor, despite multiple United Nations Security Council Resolutions since late 2006 calling for the suspension of those activities.

• In 2008, Iran continued to make progress enriching uranium at the underground cascade halls at Natanz with first-generation centrifuges, and in testing and operating second-generation centrifuges at the pilot plant there.

• In November 2008, Iran announced it had about 5,000 centrifuges operating at Natanz. The International Atomic Energy Agency (IAEA) reported that between mid-December 2007 and November 2008, Iran fed about 8,080 kilograms of uranium
feed gas into its cascades, and produced about 555 kilograms of low enriched uranium (LEU) gas (uranium hexafluoride) at an enrichment level appropriate for reactor fuel, a significant improvement from the 75 kilograms of LEU gas it had produced in 2007.

• Iran has also fed small amounts of uranium feed gas to its second generationcentrifuges—the IR-2, since January 2008, and the IR-3, since April 2008.

• Iran in January 2008 received the final delivery of the initial batch of uranium fuel purchased from Russia required to operate the nuclear reactor at Bushehr. Delays in the project pushed the reactor's startup time into 2009.

• Iran in 2008 continued construction of the reactor buildings at the IR-40 Heavy Water Research Reactor, including installing a dome on the reactor containment building by mid-November.

• The IAEA in 2008 continued to investigate the "alleged studies" documentation — information indicating Iran conducted military-led, covert uranium conversion and nuclear weaponization work prior to 2003. According to the November 2008 Director General's Report to the Board of Governors, the "alleged studies" issue remains unresolved and the IAEA continues to call on Iran to provide further clarification.

Ballistic Missiles

Iran has continued to develop its ballistic missile program, which it views as its primary deterrent. Iran is fielding increased numbers of short- and medium-range ballistic missiles (SRBMs, MRBMs) and we judge that Iran currently is focusing on producing more capable MRBMs. Iran's ballistic missile inventory is one of the largest in the Middle East.

The Shahab-3 MRBM, capable of striking Israel, was formally handed over to the Iranian military in July 2003. During a military parade in September 2007, Iran displayed a missile, referred to as the Ghadr-1, which Iranian officials claimed had a range of 1,800-km.

Iran's defense ministry in 2005 stated that it had successfully tested an engine for a 2,000km ballistic missile and implied it would have two-stages~a key technology in the development of longer-range ballistic missiles. In late November 2007, Iran's defense minister claimed Iran had developed a new 2000 km-range missile called the Ashura. Iranian officials on 12 November 2008 claimed to have launched a two stage, solid propellant missile called the Sejil with a range of 2,000 km.

As early as 2005, Iran has stated its intentions to send its own satellites into orbit. In 2005, Iran's first satellite with an imagery payload, Sina-1, was launched on a Russian rocket, and Iran signed a $132 million deal with a Russian firm to build and launch a communications satellite. As of January 2008, Tehran reportedly had allocated $250 million to build and purchase satellites. Iran announced it would launch four more satellites by 2010 to improve land and mobile telephone communications.

Iranian officials, including President Ahmadi-Nejad, claimed that Tehran in February 2008 launched a probe called the Kavoshgar ("towards orbit") and that this device is transmitting information back to Earth. Based on Iranian press footage of the launch, however, the vehicle—which looked similar to the Shahab-3 MRBM, a system that by itself probably does not have the capability to place an object into orbit—appeared to suffer an in-flight failure. Iran's President also announced Tehran would conduct two more rocket tests prior to launching a "home-produced" satellite into orbit later in 2008, and several Iranian news websites released photos of a new rocket called "Safir" that appears larger than Tehran's existing ballistic missiles. Iranian officials stated on 27 August 2008 that they had launched a smaller research rocket called the Kavosh-2.

Technologies used to build an SLV are directly applicable to the development of longer range ballistic missiles. Assistance from entities in China and North Korea, as well as assistance from Russian entities at least in the past, has helped Iran move toward self-sufficiency in the production of ballistic missiles. Iran still remains dependent on foreign suppliers for
some key missile components, however. Iran also has marketed for export at trade shows guidance components suitable for ballistic missiles.

Chemical and Biological

We assess that Iran maintains the capability to produce chemical warfare (CW) agents in times of need and conducts research that may have offensive applications. Tehran continues to seek production technology, training, and expertise from foreign entities that could advance its capability to produce CW agents. We judge that Iran is capable of weaponizing CW agents in a variety of delivery systems.

Iran probably has the capability to produce some biological warfare (BW) agents for offensive purposes, if it made the decision to do so. We assess that Iran has previously conducted offensive BW agent research and development. Iran continues to seek dual-use technologies that could be used for BW.
Monday
May182009

Torture: More on the CIA-Military, Guantanamo-Iraq Link

millerLast week, when we wrote about testimony by Philip Zelikow and Ali Soufan to a Senate hearing on torture, reader John Birch wrote perceptively, "Zelikow was testifying about the organized use of toture as an interrogation method by the CIA....The photos [Obama] held back are of the abuse and even torture of prisoners by the U.S. military." This prompted my response, "The connection is that the authorisation of torture by the CIA and US military, sanctioned from spring 2002 by Bush officials, made its way to Guantanamo Bay and then to Iraq, including Abu Ghraib," notably via General Geoffrey Miller.

Writing for Salon, Mark Benjamin adds an interesting dimension: Gitmo general told Iraq WMD search team to torture
[Even] before Miller met with the Abu Ghraib officials, he first made a little-known visit to the Iraq Survey Group, which was in charge of the hunt for WMDs in Iraq after the invasion. Miller told the ISG they were “running a country club” by not getting tough on detainees....Miller recommended temperature manipulation and sleep deprivation.

Gitmo general told Iraq WMD search team to torture


It’s one thing if, as former Vice President Dick Cheney keeps saying, the United States brutally interrogated people to keep our kids safe from another strike by Osama bin Laden. If folks got tortured to provide a rationale for going to war with Iraq, though, that's a whole different story.

Recent news reports have suggested the possibility that the Bush administration might have endorsed torture to prove an Iraq-al Qaida link. And a recent report from the Senate Armed Services Committee shows that months after then-President Bush had declared Mission Accomplished in Iraq, an Army general working hand in glove with top administration officials tried, albeit unsuccessfully, to convince a unit charged with finding weapons of mass destruction to get tough on its prisoners.

In August and early September of 2003, Maj. Gen. Geoffrey Miller, the man in charge of the Pentagon’s torture laboratory at Guantanamo Bay, was dispatched to Iraq, allegedly to Gitmoize operations there.

It seems to have worked, at least in one place. Soon after Miller visited with officials in charge of Abu Ghraib, guards there began to use working dogs, stress positions, extremely lengthy interrogations, isolation, yelling and nudity in order to try to wring information from prisoners -- all techniques that had been used at Guantanamo and that the world would later see in photos released from an investigation in to what had gone on at the prison.

But according to the Senate committee's report, before Miller met with the Abu Ghraib officials, he first made a little-known visit to the Iraq Survey Group, which was in charge of the hunt for WMDs in Iraq after the invasion.

Miller told the ISG they were “running a country club” by not getting tough on detainees, Chief Warrant Officer Brian Searcy, the ISG interrogation chief, told the Senate committee. Searcy said Miller suggested shackling detainees and forcing them to walk on gravel. Mike Kamin, another ISG official, told committee investigators that Miller recommended temperature manipulation and sleep deprivation.

Miller also told the ISG’s Maj. Gen. Keith Dayton that Dayton’s unit was “not getting much out of these people,” and complained that the ISG had not “broken” their detainees psychologically. Miller offered to send along suggested techniques, Dayton recalled, that would “actually break” the prisoners.

Dayton demurred, saying his unit wasn’t changing anything and that lawyers would have to carefully vet anything Miller suggested. The ISG generally balked. One of its debriefers threatened to resign if Miller got his way. After the cool reception, Miller appears to have dropped the effort with respect to the ISG.

On his return from Iraq, Miller was sent directly to the Pentagon to personally brief then-Deputy Secretary of Defense Paul Wolfowitz and Under Secretary of Defense for Intelligence Steven Cambone.

When interviewed by the committee, Miller couldn’t remember much about that visit. But in retrospect, it is pretty clear why the ISG wasn’t “getting much” out of their detainees on WMDs in Iraq: There weren’t any. Though with enough abuse, the detainees probably would have claimed otherwise.
Friday
May152009

Secret Wars: Pentagon $50 Billion "Black Budget" Reaches for the Sky

pentagon-reconSo much for the Obama Administration putting a check on the Pentagon and its ambitions. Writing in The Intelligence Daily, Tim Burghardt reveals the expansion of the military "black budget". Next year's expenditure on covert operations will be close to the entire military budget of Britain, France, Japan, or even China,the next supposed superpower rival to the US.

Big Increases for Intelligence and Pentagon "Black" Programs in 2010


Continuing along the dark path marked out by his predecessors in the Oval Office, President Barack Obama's Defense and Intelligence budget for Fiscal Year 2010 will greatly expand the reach of unaccountable agencies--and the corporate grifters whom they serve.

According to Aviation Week, "the Pentagon's 'black' operations, including the intelligence budgets nested inside it, are roughly equal in magnitude to the entire defense budgets of the UK, France or Japan, and 10 per cent of the total."



Yes, you read that correctly. The "black" or secret portions of the budget are almost as large as the entire defense outlays of America's allies, hardly slouches when it comes to feeding their own militarist beasts. The U.S. Air Force alone intends to spend approximately $12 billion on "black" programs in 2010 or 36 percent of its entire research and development budget. Aviation Week reveals:
Black-world procurement remains dominated by the single line item that used to be called "Selected Activities," resident in the USAF's "other procurement" section. This year's number stands just above $16 billion. In inflation-adjusted terms, that's 240 per cent more than it was ten years ago.

On the operations side, secret spending has risen 8 per cent over last year, to just over $15 billion--equivalent to more than a third of Air Force operating costs.

What does it all go for? In simple terms, we don't know. It is apparent that much if not all of the intelligence community is funded through the black budget: for example, an $850 million USAF line item is clearly linked to reconnaissance satellites. But even so, the numbers are startling--and get more so year by year. (Bill Sweetman, "Black budget blows by $50 billion mark," Aviation Week, May 7, 2009)

How's that for change! The Register gives a break down of the numbers for added emphasis:

1) Mainstream US armed forces $490bn-odd
2) UK armed forces $60bn
3) Chinese armed forces $58bn
4) French armed forces $54bn
5) "Black" US forces $50bn+
6) Japanese Self-Defence forces $44bn

While the American government refuses to disclose the CIA or NSA's budget, "both the Agency and other non-military spooks do get money of their own. Some of this is spent on military or quasi-military activities," The Register reports.

Toss in the world-wide deployment of CIA and U.S. Special Operations Command (USSOCOM) paramilitary operatives hidden among a welter of Special Access Programs (SAPs) classified above top secret and pretty soon we're talking real money!

One such program may have been Dick Cheney's "executive assassination ring" disclosed by investigative journalist Seymour Hersh during a "Great Conversations" event at the University of Minnesota in March.

And should pesky investigators from the Government Accountability Office (GAO) have the temerity to probe said "executive assassination ring," or other DoD "black" programs well, their Inspector General's had better think again!

According to the whistleblowing security and intelligence website Cryptome, a May 8, 2009 letter from Susan Ragland, GAO Director of Financial Management and Assurance to Diane Watson (D-CA), Chairwoman of the House Committee on Government Management, Organization and Procurement, lays down the law in no uncertain terms to Congress.

Ms. Ragland wrote: "the IG Act authorizes the heads of six agencies to prohibit their respective IGs from carrying out or completing an audit or investigation, or from issuing any subpoena if the head determines that such prohibition is necessary to prevent either the disclosure of certain sensitive information or significant harm to certain national interests."

Neat, isn't it! Under statutory authority granted the Executive Branch by congressional grifters, Congress amended the IG Act "to establish the Department of Defense (DOD) IG and placed the IG under the authority, direction, and control of the Secretary of Defense with respect to audits or investigations or the issuance of subpoenas that require access to certain information."

What information may be withheld from public scrutiny? Ms. Ragland informs us: "Specifically, the Secretary of Defense may prohibit the DOD IG from initiating, carrying out, or completing such audits or investigations or from issuing a subpoena if the Secretary determines that the prohibition is necessary to preserve the national security interests of the United States."

The same restrictions to the IG Act that apply to the Defense Department are similarly operative for the Departments of the Treasury, Homeland Security, Justice, the U.S. Postal Service (!), the Federal Reserve Board, and the Central Intelligence Agency. Talk about veritable mountains of dirty laundry--and "black" programs--that can be hidden here!

Space-Based Spies

Among the items nestled within the dark arms of Pentagon war planners is a program called "Imagery Satellite Way Ahead," a joint effort between "the Office of the Director of National Intelligence and the Department of Defense designed to revamp the nation's constellation of spy satellites," Congressional Quarterly reports.

As Antifascist Calling revealed in several investigative pieces in June, October and November 2008, America's fleet of military spy satellites are flown by the secretive National Reconnaissance Office (NRO).

According to the agency's own description, "The NRO is a joint organization engaged in the research and development, acquisition, launch and operation of overhead reconnaissance systems necessary to meet the needs of the Intelligence Community and of the Department of Defense. The NRO conducts other activities as directed by the Secretary of Defense and/or the Director of National Intelligence."

As investigative journalist Tim Shorrock revealed in his essential book, Spies for Hire, some ninety-five percent of NRO employees are contractors working for defense and security firms. Indeed, as Shorrock disclosed, "with an estimated $8 billion annual budget, the largest in the IC, contractors control about $7 billion worth of business at the NRO, giving the spy satellite industry the distinction of being the most privatized part of the Intelligence Community."

While the Office's website is short on information, some of the "other activities" alluded to by NRO spooks include the Department of Homeland Security's National Applications Office (NAO).

As I wrote in October, the NAO will coordinate how domestic law enforcement and "disaster relief" agencies such as FEMA use satellite imagery (IMINT) generated by spy satellites. But based on the available evidence, hard to come by since these programs are classified above top secret, the technological power of these military assets are truly terrifying--and toxic for a democracy.

DHS describes the National Applications Office as "the executive agent to facilitate the use of intelligence community technological assets for civil, homeland security and law enforcement purposes." As Congressional Quarterly reveals, the "classified plan would include new, redesigned 'electro-optical' satellites, which collect data from across the electromagnetic spectrum, as well as the expanded use of commercial satellite imagery. Although the cost is secret, most estimates place it in the multibillion-dollar range."

How these redesigned assets will be deployed hasn't been announced. The more pertinent issue is whether or not DHS, reputedly a civilian agency but one which answers to the militarized Office of the Director of National Intelligence (ODNI), will position these assets to illegally spy on Americans. The available evidence is they will.

DHS avers that "homeland security and law enforcement will also benefit from access to Intelligence Community capabilities." With Pentagon "black" programs already costing taxpayers tens of billions of dollars the question remains, with NAO as the "principal interface" between American spooks, DHS bureaucrats and law enforcement, who will oversee NAO's "more robust access to needed remote sensing information to appropriate customers"?

Certainly not Congress. Investigative journalist Siobhan Gorman writing in The Wall Street Journal documented last year, that despite a highly-critical June 2008 study by the Congressional Research Service (CRS), Congress partially-funded the program "in a little debated $634 billion spending measure."

Indeed, a fully-operational NAO now provides federal, state and local officials "with extensive access to spy-satellite imagery--but no eavesdropping--to assist with emergency response and other domestic-security needs, such as identifying where ports or border areas are vulnerable to terrorism." But as CRS investigators wrote:
Members of Congress and outside groups have raised concerns that using satellites for law enforcement purposes may infringe on the privacy and Fourth Amendment rights of U.S. persons. Other commentators have questioned whether the proposed surveillance will violate the Posse Comitatus Act or other restrictions on military involvement in civilian law enforcement, or would otherwise exceed the statutory mandates of the agencies involved. (Richard A. Best Jr. and Jennifer K. Elsea, "Satellite Surveillance: Domestic Issues," Congressional Research Service, June 27, 2008)

While these serious civil liberties' issues have apparently been swept under the carpet, huge funding outlays by Congress for Pentagon's "black" budget operations indicate that President Obama's promises of "change" in how "government does business" is so much hot-air meant to placate the rubes.

Driven by a Corporatist Agenda

Wholesale spying by the American government on its citizens as numerous investigators have uncovered, is aided and abetted by a host of well-heeled corporate grifters in the defense, intelligence and security industries. These powerful, and influential, private players in the Military-Industrial-Security Complex are largely unaccountable; it can be said that America's intelligence and security needs are driven by firms that benefit directly from the Pentagon's penchant for secrecy.

Federal Computer Week reported in April that the program to revamp America's spy satellites "has the backing of the Obama administration, and the program is expected to win congressional approval, according to a senior intelligence official."
The same anonymous "senior official" told the publication, "given the backing of the Defense Department, ODNI and the Obama administration, lawmakers are expected to approve the plan." And as with other "black" programs, the cost is classified but is expected to run into the billions; a veritable windfall for enterprising defense corporations.

The electro-optical satellite modernization program involves building new satellites that the National Reconnaissance Office (NRO) would operate and expanding the use of imagery from commercial providers, according to a statement the Office of the Director of National Intelligence released April 7. Under the plan, the National Geospatial-Intelligence Agency would continue to integrate imagery products for government customers. (Ben Bain, "Spy satellite tally could increase," Federal Computer Week, April 8, 2009)

While no decision has been reached on the "acquisition approach for the program," ODNI and NRO "would oversee the acquisition strategy for the new government-built satellites and a contract would likely be awarded within months."

In a toss-off statement to justify the enormous outlay of taxpayer dollars for the new initiative, Obama's Director of National Intelligence, Dennis Blair, said last month, "When it comes to supporting our military forces and the safety of Americans, we cannot afford any gaps in collection." Or perhaps "any gaps in collection" on Americans. As Tim Shorrock revealed:
The plans to increase domestic spying are estimated to be worth billions of dollars in new business for the intelligence contractors. The market potential was on display in October at GEOINT 2007, the annual conference sponsored by the U.S. Geospatial Intelligence Foundation (USGIF), a non-profit organization funded by the largest contractors for the NGA. During the conference, which took place in October at the spacious Henry B. Gonzalez Convention Center in downtown San Antonio, many companies were displaying spying and surveillance tools that had been used in Afghanistan and Iraq and were now being re-branded for potential domestic use. ("Domestic Spying, Inc.," CorpWatch, November 27, 2007)

Indeed, according to Shorrock when the NAO program was conceived in 2005, former ODNI director Michael McConnell "turned to Booz Allen Hamilton of McLean, Virginia--one of the largest contractors in the spy business. The company was tasked with studying how intelligence from spy satellites and photoreconnaissance planes could be better used domestically to track potential threats to security within the U.S."

Tellingly, McConnell was a senior vice president with the spooky firm for a decade. Booz Allen Hamilton was acquired by the private equity firm The Carlyle Group in a 2008 deal worth $2.54 billion. In addition to Booz Allen Hamilton, other giant defense and security corporations involved in running Homeland Security's National Applications Office include the scandal-tainted British firm BAE Systems, ManTech, Boeing and L-3 Communications.

Among the firms in the running to land ODNI/NRO new spy satellite contracts are: BAE, Boeing, Lockheed Martin and Northrop Grumman. All of these corporations according to the Project on Government Oversight's (POGO) Federal Contractor Mismanagement Database (FCMD) have "histories of misconduct such as contract fraud and environmental, ethics, and labor violations."

Unsurprisingly, Lockheed Martin, Boeing, BAE and Northrop Grumman lead the pack in "total instances of misconduct" as well as fines levied by the federal government for abusive practices and outright fraud.

Conclusion

Unaccountable federal agencies and corporations will continue the capitalist "security" grift, particularly when it comes to "black" programs run by the Department of Defense and the Office of the Director of National Intelligence. Despite a documented history of serious ethical and constitutional breeches, these programs will persist and expand well into the future. While the Obama administration has said it favors government transparency, it has continued to employ the opaque methods of its predecessors.

From the use of the state secrets privilege to conceal driftnet surveillance of Americans, to its refusal to launch an investigation--and prosecution--of Bush regime torture enablers and war criminals, the "change" administration instead, has delivered "more of the same."
Thursday
May142009

Mr President, Torture Still Matters: Obama Puts Away The Abuse Photographs

Related Post: Video - Obama Decides Not to Release Photographs of Detainee Abuse
Related Post: Bush Official Zelikow Condemns Torture Programmes
Related Post: FBI Agent Ali Soufan Testifies on Torture

obama-detainee-photosThis may be one of the most difficult articles I have ever written. For when I heard last night that President Obama had decided to withdraw White House consent for the release of photographs of the abuse of detainees, my reaction was dismay and, yes, revulsion. Having declared in his Inaugural Speech that the US would never again separate security from values, having signed an Executive Order "banning" torture, having promised to close the Guantanamo Bay detention facility, here was Obama --- faced with the recognition of the past --- refusing to allow that acknowledgement.

And he was doing so, ironically, horribly, with the same rationale that the Bush Administration used for eight years whenever it did not want the political inconvenience of knowledge, let alone debate, of its actions: because "national security" demanded that we did not hear or see.

But first, to keep this post on an analytic rather than emotional level and to provide essential context, this is not a case of the White House volunteering the photographs and then retracting. The release of the pictures has been ordered by a United States District Court hearing a case brought by the American Civil Liberties Union.

So there is an Alice-in-Wonderland quality about Obama's opening words, "These photos are associated with closed investigations of alleged abuse of detainees". The President invokes the legal process to say that his Administration has to defy...the legal process.

(What's more, Obama's assertion is either a lie or a misstatement. Later, he indicated that the photographs related to an investigation, started "long before" he took office, which has always been completed by the Pentagon with "appropriate actions taken". So there is no "ongoing" legal investigation within the military.

Obama did refer to the "chilling effect" that these photographs might have on future investigations of detainee abuse. Even if such investigations are being contemplated, and there is no indication that this is case, this is a red herring. The photographs in question pertain to past enquiries and would have no standing in any prosecution of unrelated incidents.)

The second Obama rationalisation was that "these photos are not particularly sensational. especially when compared to the painful images we remember from Abu Ghraib". If this was an issue of whether the release of the photos is to satisfy voyeurs of torture, this might be relevant --- nothing to see here, folks, move along.

But that is not the issue. Abuse is abuse, irrespective of its "sensational" appearance (indeed abuse such as extended sleep deprivation is quite banal). A person does not have to be hooded and standing on a box in a crucifix position for the act to qualify as torture.

But Obama was saving his headline rationale for last: releasing the photographs would "inflame anti-American opinion and put our troops in danger". No need for subtle readings here: if you make me accept the court decision, our boys will be killed.

I'll give the President the benefit of the doubt, as Juan Cole does, that he has been persuaded of this by the US military and that this isn't an emotional fig leaf. But let's be clear: any insurgent or "extremist" who wants to shoot at or blow up American troops already has more than enough pretext from the last eight years: he/she can invoke what is already known or suspected about the torture and abuse in Iraq, Afghanistan, Guantanamo Bay, and secret CIA "black sites" around the world.

So instead you have to presume that Obama believes that others who are not currently fighting US forces will be prompted to do so by these photographs. Yet, if the pictures in question are not "sensational", if they do not match up to the horrors of Abu Ghraib, why would they provoke such a decision?

That logic leads to one of two conclusions: either the photographs are innocuous, and Obama is blowing smoke about "anti-American" reaction, or they are so horrific that they will provoke previously non-violent individuals to a murderous response. (For the sake of humanity, I hope it is the former.)

To be blunt, if not yet emotional, Obama's reasons are flimsy and at times illogical. So, since the President is normally quite intelligent and logical, the statement is more of a cover-up than the actual reason behind his decision.

So what did happen? Obama gave in to pressure.

In part, the pressure came from the public bubble of Washington politics. The Dick Cheney roadshow may be a distortion, even a fabrication, of what actually happened in the Bush years, but his banging away --- assisted by an array of broadcasters and newspapers --- at the risk to "national security" of the torture investigations finally put a dent in the White House. It is no coincidence that, 24 hours before Obama's statement, the former Vice President's first attack in an interview with Fox was on the release of the photos.

That, however, is only one pressure --- and probably a less important pressure --- that buckled Obama.

The ultimate "winners" in this sordid battle are US military commanders, supported by top officials at the Central Intelligence Agency. CIA Director Leon Panetta had already let it be known that he objected to any more disclosure of photographs, and Secretary of Defense Robert Gates fired his own volley on Wednesday. While generals kept their mutterings private, the gist of their opposition came out in suitably-placed media pieces.

While those commanders did put out the word that their troops would be endangered by the publicity over the photos, they had other considerations. The US military is still detaining insurgents in Iraq and Afghanistan. The CIA and military are still working with allied countries, such as Pakistan, who have their own methods of interrogation.

Public exposure of what occurred in the past could conceivably limit, apart from Obama's necessary reference at the end of his statement that "the abuse of detainees...will not be tolerated", what measures could be taken in future. Inquiry and investigation raises that the prospect that military and intelligence officials are, in theory at least, legally accountable.

In this continuing War on Terror, that's still not an acceptable risk. Instead, the story has to be maintained that torture was only, in Obama's words, "carried out in the past by a small number of individuals". The "chain of command", both political and military, has to be put beyond scrutiny.

This is not to say, of course, that the "enhanced interrogation" goes on, at least not in the form sanctioned by the Bush Administration from 2002 to 2005. It is to say that the risk of a system of oversight, prompted by a full recognition of what occurred in those years, must not be taken.
Thursday
May142009

Transcript: FBI Agent Ali Soufan Testifies on Torture 

Related Post: Bush Official Zelikow Condemns Illegal Programmes

statue-of-liberty-torture2Testifying behind a screen, former FBI agent Ali Soufan told a Senate hearing yesterday about the damage caused by the Bush Administration's "enhanced interrogations". Soufan was one of the first agents to question Al Qa'eda operative Abu Zubaydah, and by "connecting" with the detainee, he learned the identity of 9/11 planner Khalid Sheikh Mohammed. Shortly afterwards, CIA operatives took over the question, applying techniques including waterboarding. Abu Zubaydah, mentally and physically broken, offered little from that point.

Soufan's testimony can be read next to his opinion piece, published last month, in The New York Times.

Mr. Chairman, Committee members, thank you for inviting me to appear before you today. I know that each one of you cares deeply about our nation's security. It was always a comfort to me during the most dangerous of situations that I faced, from going undercover as an al Qaeda operative, to unraveling terrorist cells, to tracking down the killers of the 17 U.S. sailors murdered in the USS Cole bombing, that those of us on the frontline had your support and the backing of the American people. So I thank you.

The issue that I am here to discuss today – interrogation methods used to question terrorists – is not, and should not be, a partisan matter. We all share a commitment to using the best interrogation method possible that serves our national security interests and fits squarely within the framework of our nation's principles.

From my experience – and I speak as someone who has personally interrogated many terrorists and elicited important actionable intelligence– I strongly believe that it is a mistake to use what has become known as the "enhanced interrogation techniques," a position shared by many professional operatives, including the CIA officers who were present at the initial phases of the Abu Zubaydah interrogation.

These techniques, from an operational perspective, are ineffective, slow and unreliable, and as a result harmful to our efforts to defeat al Qaeda. (This is aside from the important additional considerations that they are un-American and harmful to our reputation and cause.)

My interest in speaking about this issue is not to advocate the prosecution of anyone. People were given misinformation, half-truths, and false claims of successes; and reluctant intelligence officers were given instructions and assurances from higher authorities. Examining a past we cannot change is only worthwhile when it helps guide us towards claiming a better future that is yet within our reach.

And my focus is on the future. I wish to do my part to ensure that we never again use these harmful, slow, ineffective, and unreliable techniques instead of the tried, tested, and successful ones – the ones that are also in sync with our values and moral character. Only by doing this will we defeat the terrorists as effectively and quickly as possible.

Most of my professional career has been spent investigating, studying, and interrogating terrorists. I have had the privilege of working alongside, and learning from, some of the most dedicated and talented men and women our nation has– individuals from the FBI, and other law enforcement, military, and intelligence agencies.

In my capacity as a FBI Agent, I investigated and supervised highly sensitive and complex international terrorism cases, including the East Africa bombings, the USS Cole bombing, and the events surrounding the attacks of 9/11. I also coordinated both domestic and international counter-terrorism operations on the Joint Terrorist Task Force, FBI New York Office.

I personally interrogated many terrorists we have in our custody and elsewhere, and gained confessions, identified terror operatives, their funding, details of potential plots, and information on how al Qaeda operates, along with other actionable intelligence. Because of these successes, I was the government's main witness in both of the trials we have had so far in Guantanamo Bay – the trial of Salim Ahmed Hamdan, a driver and bodyguard for Osama Bin Laden, and Ali Hamza Al Bahlul, Bin Laden's propagandist. In addition I am currently helping the prosecution prepare for upcoming trials of other detainees held in Guantanamo Bay.

There are many examples of successful interrogations of terrorists that have taken place before and after 9/11. Many of them are classified, but one that is already public and mirrors the other cases, is the interrogation of al Qaeda terrorist Nasser Ahmad Nasser al-Bahri, known as Abu Jandal. In the immediate aftermath of 9/11, together with my partner Special Agent Robert McFadden, a first-class intelligence operative from the Naval Criminal Investigative Service (NCIS), (which, from my experience, is one of the classiest agencies I encountered in the intelligence community), I interrogated Abu Jandal.
Through our interrogation, which was done completely by the book (including advising him of his rights), we obtained a treasure trove of highly significant actionable intelligence. For example, Abu Jandal gave us extensive information on Osama Bin Laden's terror network, structure, leadership, membership, security details, facilities, family, communication methods, travels, training, ammunitions, and weaponry, including a breakdown of what machine guns, rifles, rocket launchers, and anti-tank missiles they used. He also provided explicit details of the 9/11plot operatives, and identified many terrorists who we later successfully apprehended.

The information was important for the preparation of the war in Afghanistan in 2001. It also provided an important background to the 9/11 Commission report; it provided a foundation for the trials so far held in Guantanamo Bay; and it also has been invaluable in helping to capture and identify top al Qaeda operatives and thus disrupt plots.
The approach used in these successful interrogations can be called the Informed Interrogation Approach. Until the introduction of the "enhanced" technique, it was the sole approach used by our military, intelligence, and law enforcement community.

It is an approach rooted in experiences and lessons learned during World War II and from our Counter-insurgency experience in Vietnam – experiences and lessons that generated the Army Field Manual. This was then refined over the decades to include how to interrogate terrorism suspects specifically, as experience was gained from interrogations following the first World Trade Center bombing, the East Africa Embassy bombings, and the USS Cole bombing. To sum up, it is an approach derived from the cumulative experiences, wisdom, and successes of the most effective operational people our country has produced.

Before I joined the Bureau, for example, traditional investigative strategies along with intelligence derived from human sources successfully thwarted the 1993 New York City Landmark Bomb Plot (TERRSTOP), a plot by the Blind Sheikh Omar Abdel-Rahman, to attack the UN Headquarters, the FBI's New York office, and tunnels and bridges across New York City, -- as a follow-up to the 1993 World Trade Center bombings. That remains to this day the largest thwarted attack on our homeland. I had the privilege of working with, and learning from, those who conducted this successful operation.

The Informed Interrogation Approach is based on leveraging our knowledge of the detainee's culture and mindset, together with using information we already know about him.

The interrogator knows that there are three primary points of influence on the detainee:

First, there is the fear that the detainee feels as a result of his capture and isolation from his support base. People crave human contact, and this is especially true in some cultures more than others. The interrogator turns this knowledge into an advantage by becoming the one person the detainee can talk to and who listens to what he has to say, and uses this to encourage the detainee to open up.

In addition, acting in a non-threatening way isn't how the detainee is trained to expect a U.S. interrogator to act. This adds to the detainee's confusion and makes him more likely to cooperate.

Second, and connected, there is the need the detainee feels to sustain a position of respect and value to interrogator. As the interrogator is the one person speaking to and listening to the detainee, a relationship is built – and the detainee doesn't want to jeopardize it. The interrogator capitalizes on this and compels the detainee to give up more information.

And third, there is the impression the detainee has of the evidence against him. The interrogator has to do his or her homework and become an expert in every detail known to the intelligence community about the detainee. The interrogator then uses that knowledge to impress upon the detainee that everything about him is known and that any lie will be easily caught.

For example, in my first interrogation of the terrorist Abu Zubaydah, who had strong links to al Qaeda's leaders and who knew the details of the 9/11 plot before it happened, I asked him his name. He replied with his alias. I then asked him, "how about if I call you Hani?" That was the name his mother nicknamed him as a child. He looked at me in shock, said "ok," and we started talking.

The Army Field Manual is not about being nice or soft. It is a knowledge-based approach. It is about outwitting the detainee by using a combination of interpersonal, cognitive, and emotional strategies to get the information needed. If done correctly it's an approach that works quickly and effectively because it outwits the detainee using a method that he is not trained, or able, to resist.

This Informed Interrogation Approach is in sharp contrast with the harsh interrogation approach introduced by outside contractors and forced upon CIA officials to use.

The harsh technique method doesn't use the knowledge we have of the detainee's history, mindset, vulnerabilities, or culture, and instead tries to subjugate the detainee into submission through humiliation and cruelty. The approach applies a force continuum, each time using harsher and harsher techniques until the detainee submits.

The idea behind the technique is to force the detainee to see the interrogator as the master who controls his pain. It is an exercise in trying to gain compliance rather than eliciting cooperation. A theoretical application of this technique is a situation where the detainee is stripped naked and told: "Tell us what you know."

If the detainee doesn't immediately respond by giving information, for example he asks: "what do you want to know?" the interviewer will reply: "you know," and walk out of the interrogation room. Then the next step on the force continuum is introduced, for example sleep deprivation, and the process will continue until the detainee's will is broken and he automatically gives up all information he is presumed to know.

There are many problems with this technique.

A major problem is that it is ineffective. Al Qaeda terrorists are trained to resist torture. As shocking as these techniques are to us, the al Qaeda training prepares them for much worse – the torture they would expect to receive if caught by dictatorships for example.

This is why, as we see from the recently released Department of Justice memos on interrogation, the contractors had to keep getting authorization to use harsher and harsher methods, until they reached waterboarding and then there was nothing they could do but use that technique again and again. Abu Zubaydah had to be waterboarded 83 times and Khalid Shaikh Mohammed 183 times. In a democracy there is a glass ceiling of harsh techniques the interrogator cannot breach, and a detainee can eventually call the interrogator's bluff.

In addition the harsh techniques only serves to reinforce what the detainee has been prepared to expect if captured. This gives him a greater sense of control and predictability about his experience, and strengthens his will to resist.

A second major problem with this technique is that evidence gained from it is unreliable. There is no way to know whether the detainee is being truthful, or just speaking to either mitigate his discomfort or to deliberately provide false information. As the interrogator isn't an expert on the detainee or the subject matter, nor has he spent time going over the details of the case, the interrogator cannot easily know if the detainee is telling the truth. This unfortunately has happened and we have had problems ranging from agents chasing false leads to the disastrous case of Ibn Sheikh al-Libby who gave false information on Iraq, al Qaeda, and WMD.

A third major problem with this technique is that it is slow. It takes place over a long period of time, for example preventing the detainee from sleeping for 180 hours as the memos detail, or waterboarding 183 times in the case of KSM. When we have an alleged "ticking timebomb" scenario and need to get information quickly, we can't afford to wait that long.

A fourth problem with this technique is that ignores the end game. In our country we have due process, which requires evidence to be collected in a certain way. The CIA, because of the sensitivity of its operations, by necessity, operates secretly. These two factors mean that by putting the CIA in charge of interrogations, either secrecy is sacrificed for justice and the CIA's operations are hampered, or justice is not served. Neither is a desirable outcome.

Another disastrous consequence of the use of the harsh techniques was that it reintroduced the "Chinese Wall" between the CIA and FBI – similar to the wall that prevented us from working together to stop 9/11. In addition, the FBI and the CIA officers on the ground during the Abu Zubaydah interrogation were working together closely and effectively, until the contractors' interferences. Because we in the FBI would not be a part of the harsh techniques, the agents who knew the most about the terrorists could have no part in the investigation. An FBI colleague of mine, for example, who had tracked KSM and knew more about him than anyone in the government, was not allowed to speak to him.

Furthermore, the CIA specializes in collecting, analyzing, and interpreting intelligence. The FBI, on the other hand, has a trained investigative branch. Until that point, we were complimenting each other's expertise, until the imposition of the "enhanced methods." As a result people ended doing what they were not trained to do.

It is also important to realize that those behind this technique are outside contractors with no expertise in intelligence operations, investigations, terrorism, or al Qaeda. Nor did the contractors have any experience in the art of interview and interrogation. One of the contractors told me this at the time, and this lack of experience has also now been recently reported on by sources familiar with their backgrounds.

The case of the terrorist Abu Zubaydah is a good example of where the success of the Informed Interrogation Approach can be contrasted with the failure of the harsh technique approach. I have to restrict my remarks to what has been unclassified. (I will note that there is documented evidence supporting everything I will tell you today.)

Immediately after Abu Zubaydah was captured, a fellow FBI agent and I were flown to meet him at an undisclosed location. We were both very familiar with Abu Zubaydah and have successfully interrogated al-Qaeda terrorists. We started interrogating him, supported by CIA officials who were stationed at the location, and within the first hour of the interrogation, using the Informed Interrogation Approach, we gained important actionable intelligence.

The information was so important that, as I later learned from open sources, it went to CIA Director George Tenet who was so impressed that he initially ordered us to be congratulated. That was apparently quickly withdrawn as soon as Mr. Tenet was told that it was FBI agents, who were responsible. He then immediately ordered a CIA CTC interrogation team to leave DC and head to the location to take over from us.

During his capture Abu Zubaydah had been injured. After seeing the extent of his injuries, the CIA medical team supporting us decided they were not equipped to treat him and we had to take him to a hospital or he would die. At the hospital, we continued our questioning as much as possible, while taking into account his medical condition and the need to know all information he might have on existing threats.

We were once again very successful and elicited information regarding the role of KSM as the mastermind of the 9/11 attacks, and lots of other information that remains classified. (It is important to remember that before this we had no idea of KSM's role in 9/11 or his importance in the al Qaeda leadership structure.) All this happened before the CTC team arrived.

A few days after we started questioning Abu Zubaydah, the CTC interrogation team finally arrived from DC with a contractor who was instructing them on how they should conduct the interrogations, and we were removed. Immediately, on the instructions of the contractor, harsh techniques were introduced, starting with nudity. (The harsher techniques mentioned in the memos were not introduced or even discussed at this point.)

The new techniques did not produce results as Abu Zubaydah shut down and stopped talking. At that time nudity and low-level sleep deprivation (between 24 and 48 hours) was being used. After a few days of getting no information, and after repeated inquiries from DC asking why all of sudden no information was being transmitted (when before there had been a steady stream), we again were given control of the interrogation.

We then returned to using the Informed Interrogation Approach. Within a few hours, Abu Zubaydah again started talking and gave us important actionable intelligence.

This included the details of Jose Padilla, the so-called "dirty bomber." To remind you of how important this information was viewed at the time, the then-Attorney General, John Ashcroft, held a press conference from Moscow to discuss the news. Other important actionable intelligence was also gained that remains classified.

After a few days, the contractor attempted to once again try his untested theory and he started to re-implementing the harsh techniques. He moved this time further along the force continuum, introducing loud noise and then temperature manipulation.

Throughout this time, my fellow FBI agent and I, along with a top CIA interrogator who was working with us, protested, but we were overruled. I should also note that another colleague, an operational psychologist for the CIA, had left the location because he objected to what was being done.

Again, however, the technique wasn't working and Abu Zubaydah wasn't revealing any information, so we were once again brought back in to interrogate him. We found it harder to reengage him this time, because of how the techniques had affected him, but eventually, we succeeded, and he re-engaged again.

Once again the contractor insisted on stepping up the notches of his experiment, and this time he requested the authorization to place Abu Zubaydah in a confinement box, as the next stage in the force continuum. While everything I saw to this point were nowhere near the severity later listed in the memos, the evolution of the contractor's theory, along with what I had seen till then, struck me as "borderline torture."

As the Department of Justice IG report released last year states, I protested to my superiors in the FBI and refused to be a part of what was happening. The Director of the FBI, Robert Mueller, a man I deeply respect, agreed passing the message that "we don't do that," and I was pulled out.

As you can see from this timeline, many of the claims made in the memos about the success of the enhanced techniques are inaccurate. For example, it is untrue to claim Abu Zubaydah wasn't cooperating before August 1, 2002. The truth is that we got actionable intelligence from him in the first hour of interrogating him.

In addition, simply by putting together dates cited in the memos with claims made, falsehoods are obvious. For example, it has been claimed that waterboarding got Abu Zubaydah to give up information leading to the capture of Jose Padilla. But that doesn't add up: Waterboarding wasn't approved until 1 August 2002 (verbally it was authorized around mid July 2002), and Padilla was arrested in May 2002.

The same goes for KSM's involvement in 9/11: That was discovered in April 2002, while waterboarding was not introduced until almost three months later. It speaks volumes that the quoted instances of harsh interrogation methods being a success are false.

Nor can it be said that the harsh techniques were effective, which is why we had to be called back in repeatedly. As we know from the memos, the techniques that were apparently introduced after I left did not appear to work either, which is why the memos granted authorization for harsher techniques. That continued for several months right till waterboarding was introduced, which had to be used 83 times – an indication that Abu Zubaydah had called the interrogator's bluff knowing the glass ceiling that existed.

Authoritative CIA, FBI, and military sources have also questioned the claims made by the advocates of the techniques. For example, in one of the recently released Justice Department memos, the author, Stephen Bradbury, acknowledged a (still classified) internal CIA Inspector General report that had found it "difficult to determine conclusively whether interrogations have provided information critical to interdicting specific imminent attacks."

In summary, the Informed Interrogation Approach outlined in the Army Field Manual is the most effective, reliable, and speedy approach we have for interrogating terrorists. It is legal and has worked time and again.

It was a mistake to abandon it in favor of harsh interrogation methods that are harmful, shameful, slower, unreliable, ineffective, and play directly into the enemy's handbook. It was a mistake to abandon an approach that was working and naively replace it with an untested method. It was a mistake to abandon an approach that is based on the cumulative wisdom and successful tradition of our military, intelligence, and law enforcement community, in favor of techniques advocated by contractors with no relevant experience.

The mistake was so costly precisely because the situation was, and remains, too risky to allow someone to experiment with amateurish, Hollywood style interrogation methods- that in reality- taints sources, risks outcomes, ignores the end game, and diminishes our moral high ground in a battle that is impossible to win without first capturing the hearts and minds around the world. It was one of the worst and most harmful decisions made in our efforts against al Qaeda.

For the last seven years, it was not easy objecting to these methods when they had powerful backers. I stood up then for the same reason I'm willing to take on critics now, because I took an oath swearing to protect this great nation. I could not stand by quietly while our country's safety was endangered and our moral standing damaged.

I know you are motivated by the same considerations, and I hope you help ensure that these grave mistakes are never made again.

Thank you.