Reading Online Novel

My Share of the Task(93)



                Mike’s impact was distinct. He arrived as it became clearer than ever that our fight against Zarqawi was, at its heart, a battle for intelligence. And yet when he and I surveyed TF 714’s outstations and liaisons during the first few weeks of his tenure, we found ourselves largely focused on the fix and the finish—the tactical strikes—even though the exploit-analyze portion of the cycle would determine our success or failure. Some time would pass before the whole force—which saw itself as the best tactical and operational wing of the military—bought into this. Our physical expansion that summer sped the process: We weren’t building more shooting ranges at Balad. We were accruing facilities and resources devoted to collecting intelligence and to understanding the enemy. By the time he left, we had a brigade-size force of intelligence people throughout Iraq, Afghanistan, and elsewhere. This did not happen easily. We often had to scrounge for analysts and interrogators, and Mike built much of this force a pair or a handful at a time.


* * *

                This market we sought to create yielded a product that came online that August and allowed us to curb the growth of Zarqawi’s metastasizing network.

                The product in question was, that August, being installed to a group of aircraft whose motley appearance belied their importance. On the cement runways north of our Iraqi hangar, past the sleek black helicopters of the Night Stalkers lined neatly nose to tail, lay our fleet dedicated to intelligence, surveillance, and reconnaissance, or ISR.* For months I’d been fighting to get more ISR aircraft, and we soon resorted to buying, borrowing, leasing, and modifying an odd array of substitutes to create what we dubbed the Confederate Air Force for the amusing diversity of aircraft types. After a visit to Israel in February, I’d wanted SOCOM to bypass the creaky acquisitions process and buy ready-made Israeli models. The air force had objected and promised to field remotely piloted Predators quickly. Frustrated when the air force didn’t follow through, my boss at SOCOM, Doug Brown, suggested that as a near-term fix we buy manned aircraft and retrofit them with the ISR packages.

                We purchased six commercial single-engine, turboprop planes. We gutted the insides of amenities, stripping them down to the metal frames to reduce needless weight—every ounce consumed fuel and shortened the time they could spend over targets—and filled them back up with the necessary communications and surveillance equipment.

                The piece of equipment added that August was the product of the two operators trying not to merely fight the war but to win it. The previous spring, they had come to my office at BIAP and briefed our command that a technology they’d encountered, if slightly tweaked, could prove game changing by allowing us to capitalize on our enemy’s own increasing use of technology—particularly communications devices. Indeed, Zarqawi and his group were the first insurgents in history whose rise and success was inextricable from the emergence of broadband Internet and cell towers. When Zarqawi first arrived in Iraq in 2002, there were hardly any cell phones in use (they were technically illegal under Saddam) but they had quickly spread after the American invasion. They relied on high-speed bandwidth to upload propaganda films to the Internet, as did the recruits and funders who watched these videos. In Iraq, they used cell phones to communicate internally and to terrorize Iraqis by sending gruesome clips of executions and torture phone to phone.

                The potential the two operators described was obvious, and I directed that we develop the capability. After a few short months coordinating with interagency partners and technology experts, our operators had the product in the field. It lacked the elegance of the all-knowing systems depicted in movies, but in the hands of talented operators, it could lead to Zarqawi’s leaders and key lieutenants, who relied on communications to remain networked. To my amazement, the operators invented software that revealed relationships among the owners of captured equipment, giving us a vivid understanding of the enemy’s organization. In short order, it was an accelerant to F3EA and had a distinct impact on those in Zarqawi’s network, forcing them to modify how they communicated and making it much harder to hide in the expanses of Anbar.

                These operators’ mentality and sense of ownership of the outcome in Iraq had also taken root on an organizational level. Shortly after my first visit to the Green compound during the fall of 2003, I had “given” Iraq to them. My guidance was simple: Green would be in charge of TF 16 until we won. They could rotate squadrons and alter deployment schedules, but no outside unit would replace them. We’re not here to fight; we’re here to win. This put whoever was the Green commander in operational control of all TF 16 forces in Iraq—at the time, primarily Green, Rangers, and Special Operations Aviation units. (At the same time, I put TF 328 in Afghanistan, under the rotating command of the Rangers and the SEALs.) Giving the Iraq fight to Green led them to tap their best talent in a way a higher headquarters could not: They brought top officers and NCOs, even when they were technically on their three months of rest, to Iraq to serve in odd but important jobs before returning a few months later to their normal positions within their squadron.