Read The Finish Online

Authors: Mark Bowden

The Finish (14 page)

BOOK: The Finish
13.12Mb size Format: txt, pdf, ePub
ads

Now add supercomputers. Convert those millions of bits of intel gathered from all over the world over years of effort into bytes, and suddenly the impossible, finding the needle in a million haystacks, becomes at least a little more probable.

So when we trace the trail to Abbottabad, this is what we are talking about—a sophisticated targeting engine. Viewed backward, from bin Laden’s hideout to the scraps of intel that led to it, the trail seems obvious. Tracing it from end to beginning obscures the level of difficulty: the years of frustration and patient effort, the technological innovation, the lives lost, the mistakes made, the money spent. Just the special ops piece of the story unfolded over a quarter of a century of trial and error, beginning with the improvised mission to rescue American hostages in Iran in 1980.

After Iranian students seized the U.S. embassy in Tehran in November 1979, President Jimmy Carter undertook months of fruitless diplomatic efforts to free the more than fifty Americans held hostage there. During that time, the army’s newly formed counterterrorism unit, Delta Force, cobbled together a daring effort to rescue them. They borrowed helicopters from the navy used for minesweeping, and marine pilots unused to the kind of flying required. The mission called for the choppers to fly to a rendezvous point in the desert outside Tehran, called Desert One, refuel the choppers from large fixed-wing aircraft flown in by air force pilots, and then proceed to a hiding place near the city. The following evening Delta Force would emerge from hiding, raid the embassy compound and free the hostages, then assemble in a soccer stadium across the street from the embassy in central Tehran, where they would be picked up by the helicopters and flown to an airport that was to have been seized by U.S. Army Rangers. From there, the rescuers and hostages would be flown out of the country.

This extraordinary bold and complicated mission never made it past the rendezvous point in the desert. Sandstorms damaged choppers and forced several pilots to turn back. With too few helicopters to proceed, the mission was aborted.

As the aircraft maneuvered to fly quietly out of Iran, one of the choppers collided with a plane on the ground, and both exploded, killing eight American servicemen. The disaster ruined hopes of keeping the aborted rescue effort secret. The subsequent embarrassment condemned the hostages to many more months of captivity, handed Iran a large propaganda coup, (they claimed an American “invasion” had been thwarted by God), and likely destroyed Carter’s hopes of being elected to a second term.

That episode would bear a striking similarity to the one that killed bin Laden, and it would illustrate how far the talents and tools of the special ops community had come. That 1980 disaster, in effect, created the Joint Special Operations Command, by demonstrating cruelly what this nation could not do. Progress can be further traced back to the heroic and bloody firefight in Mogadishu in 1993, the battle documented in
Black Hawk Down,
which resulted when another special ops raid spun off track. Thousands of missions, successful and unsuccessful, large and small, honed the men and machines and tactics that would target the Sheik.

That raid could not be launched until bin Laden was found. Finding him meant reconstituting human spy networks dismantled in the complacent years after the Cold War, when spying was considered unseemly and unlawful and a threat to personal liberties and human rights. After 9/11, the public rediscovered the value of spies on the ground and of eyes and ears overhead. It would speed the development of unblinking aerial platforms and telecommunications networks that would allow constant, real-time surveillance unheard of in the past.

Four months after the attacks, former Admiral John Poindexter was appointed to head a new initiative he had helped devise called Total Information Awareness, which sought to use supercomputers to amass unimaginably huge databases in order to, in essence, collect, as its name suggested,
everything.
With the right software, you could mine that data in order to identify and locate potential terrorists. The admiral’s history of lying to Congress during the Iran-Contra episode did not engender confidence, nor did the inherently scary, Orwellian notion of the government compiling vast pools of data about American citizens. In that sense, the name, Total Information Awareness, was a fatal public relations blunder. The bald, white-mustachioed Poindexter was called the “Pentagon’s Big Brother,” and worse. Congress scotched the program as originally conceived. Poindexter found employment back in the private sector, and the remnants of the project, which was barred from collecting information on American citizens, was tactfully renamed
Terrorism
Information Awareness.

As wrong a choice as Poindexter was to lead this project, and as tone deaf as he may have been in its presentation, he had the right idea. He had been thinking about it for decades. One of the computer’s great contributions—this ability to store and manipulate vast amounts of data—seemed mundane but was in practice so revolutionary that it was transforming modern life, whether performing a Google search, stocking the shelves at a Walmart from an international supply chain, shipping packages anywhere in the world overnight, or mapping the human genome. So why not put that capacity to work tracing a terrorist network—recognizing clues in what would appear, even to teams of skilled analysts, to be random events?

Poindexter’s concept did more than survive. It would come to undergird the entire war effort: storing every scrap of intel about al Qaeda and related groups gathered by the nation’s very active military and spy agencies, transforming them into data, and then plumbing that data for leads. The hunt for bin Laden and others eventually drew on an unfathomably rich database, accessible to anyone in the world with the proper security clearance, whether a marine officer at an outpost in Afghanistan or a team of analysts working in Langley. Sifting through it required software capable of ranging deep and fast and with keen discernment—a problem the government itself proved less effective at solving than were teams of young software engineers in Silicon Valley. A start-up called Palantir, for instance, came up with a program that elegantly accomplished what TIA had set out to do. Founded in 2004 by Alex Karp and Peter Thiel—the latter is the billionaire cocreator of Paypal and an early Facebook investor—Palantir developed a product that actually deserves the popular designation Killer App. Newly minted software engineers from the best computer schools in the country were put up in a seven-thousand-square-foot workspace in Palo Alto. It was stocked with junk food and video games and nicknamed “the Shire,” the home of the Hobbits in Tolkien’s
Lord of the Rings
. (The company itself is named after a magical stone in the Tolkien saga that confers special powers of sight and communication.) The software produced from this very unlikely source would help turn America’s special forces into deadly effective hunters. Palantir is now worth billions, and has contracts with, among others, the CIA, the NSA, the Defense Department, the Defense Intelligence Agency, the FBI, the National Counterterrorism Center, and the Department of Homeland Security.

The pace and urgency of war have always accelerated the development of technology and encouraged novel uses of devices that already exist. After rapid initial success toppling the regime of Saddam Hussein in Iraq, American forces found themselves under increasing attack by Sunni extremist groups, the most violent of which was a new branch of al Qaeda, under the direction of an innovative killer named Abu Musab al-Zarqawi. His group mounted a campaign of roadside bombs and brutal suicide attacks, many of them designed to kill Iraqi civilians indiscriminately—the sort of attacks that bin Laden, in hiding, considered mistakes. Indeed, the mass killings eventually helped turn the Sunni majority in Iraq against the insurgency, marking the turning point in the war. But at the same time, under the direction of General Stanley McChrystal, JSOC was hammering away on insurgent cells of the local al Qaeda killers with increasing effectiveness, mounting mission after mission in rapid succession, capturing and killing at a pace that such operations had never before been able to sustain. They found Saddam Hussein hiding in a hole in the ground in late 2003. Zarqawi himself was killed by an American bomb in 2005. McChrystal’s success, considered to be one of the major military accomplishments of modern times, was something he called “collaborative operations,” by which he meant the fusion of “special operators”—teams of elite shooters from every branch of the service—with this new computational ability, which amassed data from all of the other inputs. The task force built a massive database at Camp Victory in Iraq, and then another at Bagram in Afghanistan, blending the big picture with the small. It meant bringing a different kind of warrior to the front, one more accustomed to clicking a mouse than pulling the trigger.

Guy Filippelli was one of them. A young army captain, a West Point graduate with a master’s degree from Oxford, in 2005 he was asked by his commander in Afghanistan to visit the walled-off facilities of the task force—the special ops unit—and show them what he could do with his computer. Filippelli calls himself a geek. He had started writing computer programs as a high school student before heading to West Point’s growing computer science department. He was helping the command staff at Bagram design systems to better control “information flow,” plugging intel collected from the sites of raids in the field and from the interrogations of detainees into a growing national terror database. He arrived inside the cloistered walls of the task force full of enthusiasm for his work, certain his lecture would excite these frontline troops. The shooters and their staff could not have been less impressed. Filippelli’s subject matter was highly technical and abstract, cutting edge, and very cool to him, but he was talking to a roomful of soldiers whose adrenaline rush came from . . . free falling from high altitudes or getting shot at. Their world was the extreme opposite of virtual. So the next time the young captain got a chance, this time with a smaller group of soldiers, he tried a different tack.

“Listen, I know you guys are a thousand times better at this stuff than I am and are probably already doing all this, but let me show you what I’m doing and I’ll be out of your hair in ten minutes.”

At first it was something easy. The task force was used to simply locking up suspects in the detainment facility as they awaited questioning. Filippelli had built a database for detainees, and had also mapped the facility’s population by tribal affiliation, background, kinship, and other factors. Putting a detainee in the wrong place, for instance, with a group from his own village, meant that his comrades would rapidly coach him. Filippelli could show how those poorly placed were significantly less useful afterward in interrogation. So where you put them in the facility was important.

“Look,” he said. “You’ve picked up this guy. Why did you put him with
these
guys? You could have done this . . .”

And with that, he closed his laptop and started for the door.

“Thanks for your time,” he said. “Let me know if there’s anything else I can do for you.”

“Wait,” the men protested. “Tell us a little more about this.”

Gradually, he found himself working more and more with the task force, showing them how crunching data could vastly improve their efficiency. The applications went way beyond storing detainees. The name of the game in warfare is to learn faster and act faster than the enemy. So, as Filippelli and others doing the same kind of work came to see it, the contest had to do with time cycles. If it’s a detainee who could be held for, say, only twenty-four hours, how do I use that time most efficiently? What questions should he be asked? What do I need to learn in order to ask him the best questions in the time allotted? And that was just one piece of the puzzle. Looking at the larger mission, the special ops teams needed to get inside the information cycle of their enemy. In the past, after a successful night raid where a member of an insurgent cell was killed or arrested, by morning, or even within a few hours, every critical member of that group would know about it and would have taken evasive action. Information spread quickly. Cell phones would be ditched, computer discs destroyed, bomb-making facilities moved—the bad guys would scatter. But if you could get
inside
that response time—if you could beat their information cycle and learn enough from the first raid through either interrogation or, say, scrutinizing a seized cell phone or hard drive—you might be able to launch a new raid or even multiple raids before word of the first one had gotten out.

The databases enabled local scraps to be instantly cross-checked with the larger data pool. Warrior geeks like Filippelli would examine the pocket litter, and plug that into the national collection; it was like jumping from the middle of the woods to a panoramic view of the forest. The warrior geeks helped connect the dots for the shooters, lifting order from disorder. Soon enough, the teams were doing it for themselves. Armed with such rapid intel, the teams got very fast indeed, going out on multiple missions every night, easily lapping the enemy’s information cycle. They had, in strategic terms, “seized the initiative.” This capability turned terrorist hunting from a passive endeavor, characterized by long periods of intel collection and analysis and preparation, punctuated by occasional raids, into an aggressive endeavor. To stay alive, the bad guys had to stay in constant communication with each other and keep moving—two activities that actually made them easier to find. In Iraq, under McChrystal in 2007 and 2008, JSOC teams began dismantling networks at an ever increasing pace, taking them down before they knew what hit them.

BOOK: The Finish
13.12Mb size Format: txt, pdf, ePub
ads

Other books

A Walk in the Woods by Bill Bryson
The Geography of You and Me by JENNIFER E. SMITH
Silver on the Tree by Susan Cooper
The Snow Angel by Michael Graham
Empire of Bones by N. D. Wilson
Riven by Jenkins, Jerry B.
Intimate Betrayal by Donna Hill
Range War (9781101559215) by Cherryh, C. J.
Capturing Callie by Avery Gale