George Friedman over at STRATFOR has had a couple of very interesting articles on the subject of, and fallout from, the 30 December Khost suicide bombing attack at FOB Chapman. In his first article, Friedman made several excellent points regarding security procedures, complacency, and the sophistication of the attack. His second article is re-posted below. I would submit that we should take notice that we have been on the short end of the Intelligence War in Afghanistan, and should not be enamored of such new phrases as “information dominance” until we can do the most basic of tasks in war, which is to tell friend from foe.
PAKISTAN, U.S.: RUMORS AND FALLOUT FROM THE KHOST BOMBING
According to widespread rumors in the United States, Pakistan’s Inter-Services Intelligence had a hand in the Dec. 30, 2009, attack in Khost, Afghanistan, which killed several CIA agents. While luck played a definite role in the attack, the skill in preparing the double agent who detonated the suicide bomb used in the attack has led some to see a state role. Such a role is unlikely, however, as Pakistan has little to gain by enraging the United States. Even so, the rumors alone will harm U.S.-Pakistani relations, perhaps giving the Taliban some breathing room.
Speculation is rife in the United States about the possible role played by the Inter-Services Intelligence (ISI) directorate, Pakistan’s foreign intelligence service, in the Dec. 30, 2009, suicide attack on Forward Operating Base Chapman in eastern Afghanistan that killed multiple CIA agents. Much of this discussion traces back to a report citing unnamed U.S. and Afghan government sources as saying a chemical analysis of explosive residue suggesting the use of military-grade equipment points to ISI
involvement in the incident.
This is a faulty basis to establish an ISI link, as the Pakistani Taliban have used military-grade explosives in numerous attacks against the Pakistani security establishment since late 2006. Still, rumors alone of ISI involvement will suffice to harm U.S.-Pakistani relations, which will serve the jihadists’ ends quite nicely.
To a large extent, chance aided the Tehrik-i-Taliban Pakistan (TTP) in carrying out the attack. Khalil Abu-Mulal al-Balawi’s arrival gave the group the opportunity to carry out an attack at a heavily fortified facility belonging to the world’s most powerful intelligence organization. That said, the preparation of the double agent for the attack showed definite skill. While it has shown a great degree of skill in pulling off attacks against major army, intelligence and other security installations in Pakistan, the TTP previously has not been seen as being capable of handling a foreign double agent for a complex operation outside Pakistan.
In this incident, the TTP managed to conceal al-Balawi’s true activities while in Pakistan. Admittedly, keeping close track of al-Balawi in Pakistan would have been a challenge to the CIA due to the agency’s fairly weak humint capabilities there, and because his jihadist hosts would have been extremely cautious about using communications devices that would show up on sigint monitoring. And while remaining below the radar while in jihadist country in the Pakistani northwest is one thing, circumventing all CIA countermeasures is quite another — and is something previously thought beyond the TTP’s known capabilities. Such sophistication rises to the level of the skills held by a national-level intelligence organization with tremendous resources and experience at this kind of tradecraft.
However, even this does not mean the ISI was involved in the attack. The ISI falls under the control of the Pakistani army and the government, and the Pakistani state has no interest in carrying out actions against the United States, as this could seriously threaten Pakistani national interests. Also, it is clear that the ISI is at war with the TTP. For its part, the main Pakistani Taliban rebel group has specifically declared war on the ISI, leveling three key ISI facilities in the last eight months. It is therefore most unlikely this could have been an officially sanctioned Pakistani operation.
The possibility that jihadist sympathizers in the lower ranks of the Pakistani intelligence complex may have offered their services to the TTP cannot be ruled out, however. Given its history of dealing with Islamist nonstate proxies, the Pakistani intelligence apparatus is penetrated by the jihadists, which partially explains the ability of the TTP to mount a ferocious insurgency against the state.
Even though there is no clear smoking gun pointing at the ISI, rumors of its involvement alone will harm the already-fragile U.S.-Pakistani relationship. Concerns similar to those in the aftermath of the November 2008 Mumbai attack — that the situation in Pakistan has reached a point where the state no longer has control over its own security apparatus and now represents an intolerable threat to U.S. national security — will emerge again.
While the situation in Islamabad might not be dire, a U.S.-Pakistani and Indian-Pakistani breakdown is exactly what that the jihadists want so they can survive the U.S. and Pakistani offensives they currently face.
C) STRATFOR 2010
We are clearly dealing with an enemy who knows our Center of Gravity far better than we know his. And one who is sophisticated enough to attack the critical vulnerabilities associated with that CG. As was pointed out in a previous article, in the badlands of Pakistan, where US agents could not and did not have the ability to observe or control Khalil Abu-Malal al-Balawi, the TTP (and anyone who offered clandestine help) “ran circles around” the CIA in turning al-Balawi into a double agent for their uses. I would further state that they did so with startling ease, without arousing a bit of suspicion from the Americans so eager to exploit him.
I would suggest that what Tehrik-i-Taliban Pakistan (TTP) and others accomplished with this operation truly represents what we have come, somewhat arrogantly, to call “Information Dominance”. And has very little whatever to do with technological sophistication. The 30 December attack on FOB Chapman and the ripples it created should serve as an impetus for a harsh and uncompromising internal examination of theories, assumptions, techniques, and training. From Langley (and Foggy Bottom) on down. We shall see if it does.
- Sexism and Sexual Assault: Connecting the Dots
- Sorry, no Program Sponsor for that …
- The Cyber Day After: Will the Advent of Cyber Warfare Destroy the Global Internet?
- On Midrats 3 May 2015 – Episode 278: Betrayal, leadership, loyalty, and redemption: Task Force VIOLENT
- A â€śHollow Forceâ€ť or a â€śHollow Strategyâ€ť?