Read The New Spymasters Online
Authors: Stephen Grey
The door was closed and Afridi was turned away empty-handed. But although his mission was a failure that day, by knocking on the door he had played his part in the dramatic finale of a decade of war. The CIA had never managed to get the secret agent it dreamed of, the âman on the rock' next to bin Laden. Indeed, the al-Qaeda leader was no longer sitting on a rock. But instead the CIA had found a secret agent to bang on his metal front door.
This was the climax to the hunt that had begun after the fall of the Twin Towers. The shock, hurt and humiliation of the attacks of 11 September 2001 demanded a big and clever enemy. Consciously or unconsciously, all those who talked about security â whether journalist, politician or spymaster â had enlarged the persona of the bogeyman, Osama bin Laden, a name that had been known to only a few in the world just days before the attacks.
The military and the spies were given the task of hunting him. The public needed a storyline that could be strung out into a worthwhile quest. If he had died too early â for example, when they cornered him in the mountains of Tora Bora, Afghanistan, in December 2001 â the thirst for revenge might not have been quenched. When I asked a young American soldier in 2004 why he was in Iraq, he said, âWe've come to get bin Laden.' The thought of a manhunt helped that small-town boy understand why he was in the war.
But the public also needed him to be caught in the end. Few expected it to take quite so long. Hundreds of people were rounded up and shipped to Cuba, to Egypt and even to Syria. The style of interrogation ranged from the FBI's cold but professional questions to the use of harsh techniques like waterboarding in a secret Polish CIA jail or electric shocks delivered by the Mukhabarat in Egypt (used, for example, on the bin Laden lieutenant Ibn al-Sheikh al-Libi). The methods used were so controversial that, more than a decade after his capture in 2003, Khalid Sheikh Mohamed, the alleged principal ringleader of 9/11, has still not been put on trial. It would be too revealing, too embarrassing. And meanwhile, bin Laden was still out there, his gloomy face staring from the ranks of the Most Wanted gallery. As time went on, the hunt for him was putting all the new ways of gathering intelligence on trial.
Then, on the evening of 1 May 2011, a Sunday, President Obama announced that US forces had killed Osama bin Laden. Helicopters with Navy Seals on board had stolen over the border in the night from Afghanistan to Pakistan. They had killed him, thrown his body into a bag and dumped it into the Arabian Sea, after an appropriate prayer.
So how had they got him? Admiral William McRaven, chief of JSOC and commander of the operation, called the manhunt the best intelligence coup in a century. âI think when the history is finally written [of] how the CIA determined that bin Laden was there, it will be one of the great intelligence operations in the history of intelligence organizations.'
3
Was it the result of a tip-off by a spy? Did they find him by bugging phone calls and deploying all the modern instruments of surveillance? Was it by putting together a puzzle of existing pieces? The answers were neither clear-cut nor convincing. But the aftermath of the assassination and the official accounts of it that were released did throw an extraordinary light on to what had become of spying.
*Â Â Â *Â Â Â *
Before Obama made the announcement, there had been Twitter messages that already guessed at the news. But, as he told his officials, âNo, no, there's no news until I say so. People can leak all they want. But it's not news until I say something.'
4
This had always been, after all, a war of narratives, a clash of storytellers. That was true until the end.
Within a couple of years, at least three best-selling books about bin Laden's killing were written. A blockbuster Hollywood film,
Zero Dark Thirty,
has been made on the subject, as well as numerous documentaries. Obama had to fight a presidential campaign in 2012: his advisers made sure the journalists were fed a good story that maintained his reputation and placated most of those involved.
Billions of dollars of taxpayers' money had been spent on hunting bin Laden. It was convenient to use his end to justify the cost. The explanation that served the purpose was to say that finding him was no flash of brilliance but rather teamwork: all made possible by that time and money. As the Dodo said in
Alice's Adventures in Wonderland,
âEverybody has won, and all must have prizes.'
While the real story remained hidden, killing bin Laden became a victory for anything you chose it to be: for torture, for spycraft, for computer geekery, for soldiering, or for a woman's intuition.
Some said it involved a multi-billion-dollar computer system that sorted complex information and highlighted hidden connections. Plaudits were due to software made by a CIA-funded company called Palantir, which had produced the latest-generation application of the âtotal information awareness' thinking, by which computers were programmed (thanks to multi-billion-dollar grants from the taxpayer) to grab and process huge amounts of âunstructured data' (all kinds of information from multiple sources) and âconnect the dots' to find connections and meaning. In the case of Palantir, there was also a large dose of human intervention in their product â and exaggeration about its value. In his narrative of the raid, Mark Bowden wrote, âPalantir developed a product that actually deserves the popular designation Killer App.'
5
Much attention was paid to âJen', the key counterterrorism analyst (now called a âtargeter') among a team of mostly women. She was found weeping with relief at a military base in Afghanistan after the Seals returned there with bin Laden's body, it was reported.
6
Her character was re-created to star in the
Zero Dark Thirty
movie.
Getting bin Laden had definitely been an intelligence coup. But how much sophistication was involved? So much had been tried â including, arguably, the invasion of two countries, Iraq and Afghanistan. It looked in the end rather like what computer hackers call a âbrute force attack' â trying every combination on a locked safe until one of them succeeds. While with hindsight the detective work did look good, none of what has emerged about it was especially novel. The methods used look quite traditional.
Here is the story in a nutshell. After the attacks of 11 September, President George W. Bush told the CIA to catch bin Laden dead or alive, preferably dead. The message was passed on by Cofer Black, head of the CIA's counterterrorism centre, to the agency team that duly went where bin Laden was, Afghanistan:
I don't want bin Laden and his thugs captured, I want them dead ⦠They must be killed. I want to see photos of their heads on pikes. I want bin Laden's head shipped back in a box filled with dry ice. I want to be able to show bin Laden's head to the president. I promised him I would do that.
7
The US duly toppled the Taliban who ruled that country. But, at the Battle of Tora Bora in December 2001, bin Laden slipped away.
After declaring a so-called War on Terror and rounding up an alliance of nations in support, the US military discovered it was not equipped to fight such a war â al-Qaeda did not have a standing army â so it engaged in largely symptomatic relief. Public anger translated into hunger for war was more than satiated by invading Afghanistan and Iraq, with subsequent attempts at ânation-building' (putting back together the shattered pieces) and then quelling revolts. At the same time specialized military units, such as the guards and interrogators at Guantanamo Bay, could support (and also compete with) the CIA's hunt for the real enemy: those who had actually attacked the US.
After asking a great many people in a variety of ways the simple question, âWhere is bin Laden?' interrogators drew a blank. So the CIA fell back to the typical approach of any professional tracking a missing person, which was to watch out for sightings and to monitor the movement and communications of his inner circle, both his family and aides, including staying on the lookout for messengers. As long as he lived, bin Laden was likely to continue to assert his authority by releasing periodic media statements, typically on video or audio tape, as well as talking to his subordinates. That meant there had to be couriers.
How to identify members of his inner circle? The obvious place to look was in the records of all those âdebriefed' in the various prison camps. The CIA (and other agencies) had for a long time kept a list of known associates of bin Laden. When new interviews took place, analysts would ask interrogators to press for more details on these targets. So far so obvious.
According to briefings given by the CIA and the White House about the manhunt â quoted in books by the journalists Peter Bergen and Mark Bowden and confirmed by a report of the Senate Intelligence Committee
8
â the CIA was finally led to bin Laden by following the trail of a courier named Abu Ahmed al-Kuwaiti. This had not been a shift of approach. âCouriers were tangential to all of the other information we were following, we had been focusing on the courier network for a long time, it was not new,' said Marty Martin, a former head of the bin Laden unit.
9
Bergen reported that a female CIA analyst had penned a memo in 2005 called âInroads', which came up with four âpillars' of what should constitute the hunt for bin Laden in the absence of any concrete leads. These were: his courier network, his family members, his communications with other senior leaders and his outreach to the media.
10
The CIA heard of al-Kuwaiti both from captured materials and from the testimony of captured prisoners, under questioning from foreign governments and the CIA. The prisoners included Khalid Sheikh Mohamed (captured in March 2003, who downplayed any involvement by al-Kuwaiti) and Hassan Ghul (an al-Qaeda courier who was arrested in 2004 and transferred to a CIA black site in Eastern Europe). According to Bergen, Ghul âtold interrogators that the Kuwaiti was bin Laden's courier and frequently travelled with [him]'.
11
These interrogations were the subject of a rather stupid and delusional public argument in the US after bin Laden's killing about whether the name of that courier had emerged from torture.
Those who, like Bowden, have consistently noted since 9/11, as a matter of dispassionate fact, that torture could be effective appeared to be at some pains to point out that torture had been part of getting hold of the courier's name. Bowden wrote, âThe Obama administration has claimed that torture played no role in tracking down bin Laden, but here, in the first two important steps down the trail, that claim crumbles.' He cited the documented torture used against two prisoners.
12
But John McCain, the Republican senator who stood against Obama for president, insisted that, based on a detailed briefing from the CIA:
The first mention of the name Abu Ahmed al-Kuwaiti, as well as a description of him as an important member of al-Qaida, came from a detainee held in another country. The United States did not conduct this detainee's interrogation, nor did we render him to that country for the purpose of interrogation. We did not learn Abu Ahmed's real name or alias as a result of waterboarding or any âenhanced interrogation technique' used on a detainee in U.S. custody.
13
McCain's conclusion was endorsed by the detailed Senate report on the CIA interrogation programme published in December 2014. It found most of the clues that identified al-Kuwaiti came from prisoners in foreign custody or prisoners who had yet to receive âenhanced' CIA treatment,
14
as in the case of Ghul, who was arrested by Kurdish authorities. As the report stated: âSeven of the 13 detainees that the CIA listed as having been subjected to the CIA's enhanced interrogation techniques provided information on Abu Ahmed al-Kuwaiti
prior
to being subjected to the CIA's enhanced interrogation techniques.' But the whole debate was really meaningless. Whether in foreign or CIA custody almost all prisoners had been mistreated.
There was no control sample of untortured high-value prisoners. More importantly â as the official versions make clear â no al-Qaeda prisoner in the CIA's hands gave up al-Kuwaiti's actual identity. As McCain had correctly stated, âNone of the three detainees who were waterboarded provided Abu Ahmed's real name, his whereabouts, or an accurate description of his role in al-Qaida.'
15
The name they did discuss was just a start. Calling someone Abu Ahmed al-Kuwaiti translates literally as âAhmed's dad from Kuwait'. It was about as useful as saying that bin Laden knew a John in New York. It was a long way short of a traceable identity.
The difficult and brilliant part came next, with the discovery of Abu Ahmed's real name and phone number. At the time of writing, how that was accomplished is still a secret. The Senate report indicates, however, that the breakthrough may have occurred by rereading a five-year-old CIA report. A later memo dated 23 November 2007 and headed âProbable Identification of Suspected Bin Laden Facilitator Abu Ahmed al-Kuwaiti', described how âreview of 2002 debriefings of a [foreign government] detainee who claimed to have travelled in 2000 from Kuwait to Afghanistan' with an âAhmed al-Kuwaiti' provided the breakthrough leading to the likely identification of Habib al-Rahman as Abu Ahmed.
16
The foreign government then helped to identify that he operated from the greater Peshawar area. A CIA summary said the name provided by the prisoner turned out to be the name of al-Kuwaiti's dead brother, but it was enough for the CIA to âmap out Abu Ahmed's entire family, including the true name of Abu Ahmed himself'.
17
Having got the courier's real name, the agency also got his mobile phone number. With the help of the National Security Agency, they could start tracking him. Contrary to popular myth, the NSA cannot listen to or track everything on the globe simultaneously. First they need something to attract their attention, what police call a âlead'. But once they have a starting point, with their network of ground stations and access to a constellation of signals intelligence satellites, they do have an incredible capacity to listen into and above all follow specific mobile phones. This was everyday intelligence business. It needed no flash of brilliance or special instructions to put the known numbers of one of bin Laden's inner circle on to a list of what the NSA called âselectors', the priority watch list of phones to track.