Posts

Cluster Bombs on the Head of a Saudi Pinpoint

Congratulations to the NYT, which offers the superlative version of a story everyone seems to be writing today. It describes a whole host of reasons why we should not trust the Saudis.

That collaboration appears to have intensified over the past two years, despite a long history of mistrust rooted in the role of Saudi hijackers in the attacks of Sept. 11, 2001. The relationship was tested again last year when Saudi leaders responded furiously to American endorsement of the revolt that ousted a Saudi ally, President Hosni Mubarak of Egypt. American diplomats were surprised and angered in turn soon afterward when Saudi Arabia sent troops to help put down unrest in neighboring Bahrain.

[snip]

The counterterrorism cooperation has not been without bumps, officials from both countries acknowledge.

In 2007, the Federal Bureau of Investigation quietly sent a handful of agents to Saudi Arabia to work with officials there on a classified counterterrorism strategy, according to a senior American official who was briefed on the program. After several months, however, the two sides disagreed on a common strategy, and the F.B.I. agents went home.

Internal State Department cables obtained by WikiLeaks and made available to several news organizations revealed American frustration with Saudi Arabia in curtailing financial supporters of many extremist activities.

“It has been an ongoing challenge to persuade Saudi officials to treat terrorist financing emanating from Saudi Arabia as a strategic priority,” said a classified cable sent by Secretary of State Hillary Rodham Clinton in December 2009, concluding that “donors in Saudi Arabia constitute the most significant source of funding to Sunni terrorist groups worldwide.”

But ultimately concludes that in spite of all this evidence, our partnership with the Saudis is working just great.

But when it comes to counterterrorism, the Saudis have been crucial partners, not only for the United States but also for an array of other Western powers.

[snip]

Under pressure from the United States, American officials now say, Saudi Arabia is taking the threat more seriously, holding financiers accountable through prosecutions and making terrorist financing a higher priority.

Like many of these stories, the NYT quotes Mustafa Alani, a counterterrorism analyst at the Gulf Research Center with close ties to the Saudi intelligence establishment, describing the division of labor on counterterrorism: the US conducts electronic surveillance, the Saudis provide HUMINT. And while the NYT gets the prize for the most self-contradictory celebration of US-Saudi counterrorism “cooperation,” my favorite quote from Alani is this one, in the WaPo’s version of the story.

“Even with the drone strikes, the air raids, the Americans need someone on the ground,” Alani said. “The Saudis are the ones who can pinpoint targets for the Americans.”

The Saudis, Alani brags, are responsible for our pinpointed targeting in Yemen. You know? The kind that manages to kill an American teenager but fails to hit its intended target. Or the kind that will become even less pinpointed now that the Saudis have delivered up a bomb plot to convince the President that AQAP is still targeting the US (this CNN story confirms that the bomb plot was delivered up before Obama’s signature strike okay was reported) and therefore needs to be targeted with signature strikes.

But since we’re discussing Saudi pinpointed targeting, let’s look more closely at two other Saudi pinpoints. First, there’s the Saudi strike on a Houthi medical clinic in 2009-2010, which they used to ask for Predator drones. Almost the whole cable is worth reading to see the multiple ways in which Saudi Prince Khaled bin Sultan manipulated us.

USG CONCERNS ABOUT POSSIBLE STRIKES ON CIVILIAN TARGETS

——————————————————-

¶2. (S/NF) Ambassador Smith delivered points in reftel to Prince Khaled on February 6, 2010. The Ambassador highlighted USG concerns about providing Saudi Arabia with satellite imagery of the Yemen border area absent greater certainty that Saudi Arabia was and would remain fully in compliance with the laws of armed conflict during the conduct of military operations, particularly regarding attacks on civilian targets. The Ambassador noted the USG’s specific concern about an apparent Saudi air strike on a building that the U.S. believed to be a Yemeni medical clinic. The Ambassador showed Prince Khaled a satellite image of the bomb-damaged building in question.

 

IF WE HAD THE PREDATOR, THIS MIGHT NOT HAVE HAPPENED

—————————————————-

¶3. (S/NF) Upon seeing the photograph, Prince Khalid remarked, “This looks familiar,” and added, “if we had the Predator, maybe we would not have this problem.” Read more

It Takes an Attempted Terrorist Attack to Actually Test Backscatter Machines

Long after rolling out backscatter machines without proving their efficacy and safety, it looks like the machines will finally be tested. As the AP reports, the government is now testing the underwear bomb Al Qaeda in the Arabian Peninsula planned to use to conduct an Osama bin Laden death anniversary attack to see whether it would have gotten by airport security.

The FBI is examining the latest bomb to see whether it could have passed through airport security and brought down an airplane, officials said. They said the device did not contain metal, meaning it probably could have passed through an airport metal detector. But it was not clear whether new body scanners used in many airports would have detected it.

If the machines wouldn’t have stopped the attack (note, the terrorist had not yet bought a ticket, so it’s not even clear which airports they’d be testing), then we can just take solace in the fact that Michael Chertoff will have a nice comfy retirement. If they would have, then the TSA will feel justified in all the gate grope they’ve been engaging in for years.

Of course, the real lesson is that we’d be better off relying on good intelligence to stop an attack–as it stopped this one–long before a terrorist gets caught at the gate.

John Brennan’s Outdated Drone Speech

The speech John Brennan gave today–purportedly offering a new level of transparency about our drone strikes–would have been more effective coming from someone else, delivered at a different time.

It would have been better for someone else to deliver this speech, because Brennan, a notable sieve of classified information, has no credibility talking about secrecy.

Again, there are some lines we simply will not and cannot cross because, at times, our national security demands secrecy. But we are a democracy. The people are sovereign. And our counterterrorism tools do not exist in a vacuum. They are stronger and more sustainable when the American people understand and support them. They are weaker and less sustainable when the American people do not. As a result of my remarks today, I hope the American people have a better understanding of this critical tool—why we use it, what we do, how carefully we use it, and why it is absolutely essential to protecting our country and our citizens.

All the past times when Brennan happily leaked classified information made it clear the Administration politicizes such claims to secrecy. So there’s no reason for any person to take John Brennan’s claims to secrecy seriously–he’s not a credible messenger on that front. (But hell, at this point every invocation of secrecy might just be a reference to the Wizard of Oz.)

The timing undermines the message too. Brennan made it clear that his comments addressed only strikes targeted at known individuals.

Broadly speaking, the debate over strikes targeted at individual members of al-Qa’ida has centered on their legality, their ethics, the wisdom of using them, and the standards by which they are approved.

[snip]

For example, when considering lethal force we ask ourselves whether the individual poses a significant threat to U.S. interests. Read more

Inadequate Briefing on the Drone Program Shows Congress Hasn’t Fixed the Gloves Come Off MON

I need to finish my series (post 1, post 2, post 3, post 4, post 5, post 6) on the Obama Administration’s efforts to hide what I’ve dubbed the “Gloves Come Off” Memorandum of Notification. As I described, the MON purportedly gave CIA authority to do a whole slew of things, but left it up to the CIA to decide how to implement the programs Bush authorized. And rather than giving the Intelligence Committees written notification of the details of the programs, CIA instead gave just the Gang of Four deceptive briefings on the programs, which not only gave a misleading sense of the programs, but also prevented Congress from being able to limit the programs by refusing to fund the activities.

Yet, as MadDog and I were discussing in the comments to this post, these aspects of the MON set up did not entirely elude the attention of Congressional overseers. In fact, the very first Democrat to be briefed that torture had been used (remember, Pelosi got briefed it might be used prospectively) asked questions that went to the heart of the problem with the structure of the MON.

The CIA won’t tell Jane Harman whether the President approved torture from a policy standpoint

Jane Harman was first briefed on the torture program, with Porter Goss, on February 5, 2003. We don’t actually know what transpired in that briefing because CIA never finalized a formal record of the briefing. But five days after the briefing, Harman wrote a letter to CIA General Counsel Scott Muller. In addition to using a word for the torture program CIA has redacted and objecting to the destruction of the torture tapes, Harman asked questions that should have elicited a response revealing the Gloves Come Off MON was what authorized the torture program.

It is also the case, however, that what was described raises profound policy questions and I am concerned about whether these have been as rigorously examined as the legal questions.  I would like to know what kind of policy review took place and what questions were examined.  In particular, I would like to know whether the most senior levels of the White House have determined that these practices are consistent with the principles and policies of the United States.  Have enhanced techniques been authorized and approved by the President?

The whole point of a MON, after all, was to get the President on the record asserting that the programs authorized by it are “necessary to support identifiable foreign policy objectives of the United States and [are] important to the national security of the United States.” Here, Harman was asking whether the President was part of a policy review on torture.

Just over a week after Harman sent this letter, the CIA met with the White House to decide how to respond to Harman’s letter.

Now, granted, Harman’s question did not explicitly ask about a MON. But the CIA did not even answer the question she did ask. Muller basically told her policy had “been addressed within the Executive Branch” without saying anything about Bush’s role in it.

While I do not think it appropriate for me to comment on issues that are a matter of policy, much less the nature and extent of Executive Branch policy deliberations, I think it would be fair to assume that policy as well as legal matters have been addressed within the Executive Branch.

Kudos to Harman for actually asking questions. But at this point, she should have known that there was something funky about the legally required MON for the torture program.

Two years later, she was still trying to get answers about the MON. In her third briefing on torture (PDF 29-31; see also this post)–on July 13, 2004, which was almost 3 weeks after Harman should have received the Inspector General Report–Muller first claimed that the legal foundation for the torture program were the Bybee Memos (he provided this explanation in the context of explaining considerations of whether the program complied with Article 16 of the Convention against Torture).

The General Counsel said that the effort was working effectively under the DOJ 1 August 2002 memo which was the legal foundation for the debriefings and interrogations.

But later in the briefing, Harman appears to have noted that the MON didn’t authorize torture, it only authorized capture and detention.

Rep. Harman noted that the [redaction] did not specify interrogations and only authorized capture and detention. Read more

Obama’s Signature

Obama’s signature national security policy may well be the embrace of signature strikes. First in Pakistan–until they killed 38 civilians in Shiga, Pakistan, and had to rethink the strategy–and now, according to the WSJ, in Yemen.

The Obama administration has given the Central Intelligence Agency and U.S. military greater leeway to target suspected al Qaeda militants in Yemen with drones, responding to worries a new haven is being established from which to mount attacks on the West.

Mind you, the anonymous sources in this story claim this is “signature lite.” Targets need to fit the profile of High Value Targets, sources claim, to be targeted.

But Obama’s (IMO) ill-considered decision is not the most interesting part of this story.

Rather, it’s a detail that directly contradicts with the WaPo’s version of this story (besides the timing, which also suggested the decision had not yet been made, though it may have been made since). The WaPo said JSOC wasn’t all that interested in having these authorities.

The JSOC has broader authority than the CIA to pursue militants in Yemen and is not seeking permission to use signature strikes, U.S. officials said.

WSJ says JSOC did ask.

The CIA and JSOC asked last year for broader targeting powers, however, which would include leeway to conduct what are known as “signature strikes,” in which targets are identified based on patterns of behavior, such as surveillance showing they are transporting weapons.

[snip]

Recently the CIA and JSOC, citing the fears about an al Qaeda haven, renewed requests to the White House.

Perhaps the most interesting bit, though, is this backwards discussion of how you need to use signature strikes to avoid border incursions against a legitimate defensive issue.

U.S. counterterrorism officials said they are currently tracking several direct threats to the U.S. connected to AQAP. The officials wouldn’t provide further details because that information is classified.

[snip]

Administration officials said the White House has no plans to allow strikes in Yemen to be as broad as those in Pakistan. CIA strikes against low-level fighters in Pakistan’s Federally Administered Tribal Areas, or FATA, are meant to prevent them from crossing the border into neighboring Afghanistan, where they are waging an insurgency against U.S. and Afghan forces.

“This is distinct from the FATA,” a senior administration official said of Yemen. “We’re using these tools judiciously and carefully to scope this as a counterterrorism effort and not an all-out counter-insurgency campaign.”

Granted, US sources claim that this use of signatures is different than the FATA and Pakistan. But given that I suspect the Saudis may be dictating this change to us, I’m rather interested in the suggestion that border incursions present the need to use signature strikes.

Because these are, after all, happening across the border from the Saudis.

Is the Government Worried about Revealing Broader Targeted Killing Authority in the Drone FOIAs?

In addition to yesterday’s letter’s explanation that the government needed an extension in ACLU and NYT’s Anwar al-Awlaki drone FOIA because Obama and/or his closest aides–the highest level of the Executive Branch–were getting involved, there was one other interesting phrase I wanted to note: the way in which it portrays the FOIA.

We write respectfully on behalf of the Department of Justice and the Central Intelligence Agency (collectively, the “Government”) to seek a further extension until May 21, 2012, of the Government’s deadline to file its consolidated motion for summary judgment in these related Freedom of Information Act cases seeking records pertaining to alleged targeted lethal operations directed at U.S. citizens and others affiliated with al Qaeda or other terrorist groups. [my emphasis]

That description doesn’t precisely match the request in any of the three FOIAs, which ask for:

ACLU: the legal authority and factual basis of the targeted killing of [Anwar] al-Awlaki, Abdulrahman [al-Awlaki], and [Samir] Khan.

NYT Savage: all Office of Legal Counsel memorandums analyzing the circumstances under which it would be lawful for United States armed forces or intelligence community assets to target for killing a United States citizen who is deemed to be a terrorist.

NYT Shane: all Office of Legal Counsel opinions or memoranda since 2001 that address the legal status of targeted killings, assassination, or killing people suspected of ties to Al-Qaeda or other terrorist groups by employees or contractors of the United States government.

The government seems squeamish, first of all, about repeating the language used in all three of these requests–targeted killing–opting instead for the phrase “targeted lethal operations.” Note, significantly, that these requests, and especially Shane’s, would not be limited to drone strikes, but also would include hit squads.

The government understandably opts not to use the names specified by ACLU, opting instead to use the generic “US citizen” used by Savage.

Equally understandably, it uses Shane’s language to describe the target: “Al-Qaeda or other terrorist groups.” But I find the adoption of Shane’s formulation significant, because it is much broader than the language from the AUMF:

those nations, organizations, or persons he determines planned, authorized, committed, or aided the terrorist attacks that occurred on September 11, 2001, or harbored such organizations or persons

And somewhat broader than the language from the NDAA:

person who was a part of or substantially supported al-Qaeda, the Taliban, or associated forces that are engaged in hostilities against the United States or its coalition partners

Now, it’s not just Shane’s language that broadens the scope here. None of the three requests mention AQAP, which would at least give the government the ability to focus on questions about how it decided that Awlaki was a legitimate target under the AUMF (on that topic, note this exchange between Robert Chesney and Bruce Ackerman). Both NYT requests ask for information about targeting terrorists generally. Which might get into some interesting targeting decisions both specific to Pakistan (for example, the original decision to target Beitullah Mehsud–and therefore the Pakistani Taliban–was based on a potentially erroneous information about a dirty bomb) and more generally in places like Gaza or Iran or Latin America.

In other words, if the government maintains it has the authority to assassinate terrorists, generally, perhaps tied to the Iraq AUMF or perhaps tied to the Gloves Come Off MON, then this language might make it hard for the government to provide a tidy response to this FOIA.

Read more

Yet More White House Involvement in FOIA Responses

As I’ve been writing my series on the Administration’s extensive efforts to hide all mention of what I have decided to call the Gloves Come Off Memorandum of Notification, this passage from Daniel Klaidman’s article on the Administration’s equivocations about revealing information on the Anwar al-Awlaki killing has been nagging me.

Another senior official expressing caution about the plan was Kathryn Ruemmler, the White House counsel. She cautioned that the disclosures could weaken the government’s stance in pending litigation. The New York Times has filed a lawsuit against the Obama administration under the Freedom of Information Act seeking the release of the Justice Department legal opinion in the Awlaki case. (The department has declined to provide the documents requested.)

The suggestion here is that White House Counsel Kathryn Ruemmler didn’t want to affirmatively reveal details about Awlaki’s killing because doing so would mean they’d have to reveal details in the ACLU and NYT’s FOIAs for … the same information.

That never really made sense (though I never dwelt too much on it because the Administration’s stance on secrecy rarely makes sense).

But in the last few days, I’ve been wondering if Ruemmler was thinking not about the drone FOIA–about revealing details of one element authorized by the Gloves Come Off MON–but instead thinking about the MON itself. After all, if the government reveals one (torture) after another (drones) of the programs authorized by the Gloves Come Off MON, then it gets harder and harder to claim the whole MON must remain secret. And remember, still to be litigated in the torture FOIA is the MON itself, in addition to what I believe are references to it in the title of the Tenet memo.

And while this may mean nothing, the government has been stalling on its response to the drone FOIA. Back on April 9, the government asked for 10 more days to respond to the FOIA. Judge Colleen McMahon responded by snipping, “Ok, but dont ask for any more time. If government official can give speeches about this matter without creating security problem, any involved agency can.” Yet in spite of her warning, they asked for an additional month-long extension today.

We write respectfully on behalf of the Department of Justice and the Central Intelligence Agency (collectively, the “Government”) to seek a further extension until May 21, 2012, of the Government’s deadline to file its consolidated motion for summary judgment in these related Freedom of Information Act cases seeking records pertaining to alleged targeted lethal operations directed at U.S. citizens and others affiliated with al Qaeda or other terrorist groups. Attorney General Eric H. Holder, Jr. has personally directed us to seek this additional time to allow the Government to finalize its position with regard to the sensitive national security matters presented in this case.

We are mindful of the Court’s admonition in its April 9, 2012, order that the Government not seek an further extensions of its briefing deadline, and we do not take this request lightly. Given the significance of the matters presented in this case, the Government’s position is being deliberated at the highest level of the Executive Branch. It has become clear that further consultation and discussion at that level of the Executive Branch is necessary before the Government can make its submission to the Court.

Read more

“The Gloves Come Off” Memorandum of Notification

Operational flexibility: This is a highly classified area. All I want to say is that there was “before” 9/11 and “after” 9/11. After 9/11 the gloves come off.

-Cofer Black, 9/11 Congressional Inquiry, September 26, 2002

When Cofer Black, the main author of the plan laid out in the September 17, 2001 Memorandum of Notification that appears to be at issue in the FOIA dispute between the CIA and White House and the ACLU (post 1, post 2, post 3, post 4, post 5), testified before the 9/11 Congressional Inquiry, he described the expanded operational flexibility CIA’s counterterrorism efforts gained after 9/11 by saying “the gloves come off.”

As this post shows, the legal means by which “the gloves come off” was the MON in question. Thus, rather than referring to the MON by its date, perhaps the best way for us to think of it is as the “Gloves Come Off MON.”

Before we get into what the MON did, here’s what the National Security Act, as amended, says such MONs are supposed to do. The NSA requires the President to notify congressional intelligence and appropriations committees (or, in rare cases, the Gang of Eight) of any covert operations he has authorized the CIA to conduct. Some important excerpts:

SEC. 503. [50 U.S.C. 413b] (a) The President may not authorize the conduct of a covert action by departments, agencies, or entities of the United States Government unless the President determines such an action is necessary to support identifiable foreign policy objectives of the United States and is important to the national security of the United States, which determination shall be set forth in a finding that shall meet each of the following conditions:

(1) Each finding shall be in writing, unless immediate action by the United States is required and time does not permit the preparation of a written finding, in which case a written record of the President’s decision shall be contemporaneously made and shall be reduced to a written finding as soon as possible but in no event more than 48 hours after the decision is made.

[snip]

(5) A finding may not authorize any action that would violate the Constitution or any statute of the United States.

[snip]

(d) The President shall ensure that the congressional intelligence committees, or, if applicable, the Members of Congress specified in subsection (c)(2) [the Gang of Eight], are notified of any significant change in a previously approved covert action, or any significant undertaking pursuant to a previously approved finding, in the same manner as findings are reported pursuant to subsection (c).

As used in this title, the term ‘‘covert action’’ means an activity or activities of the United States Government to influence political, economic, or military conditions abroad, where it is intended that the role of the United States Government will not be apparent or acknowledged publicly, but does not include—

(1) activities the primary purpose of which is to acquire intelligence, traditional counterintelligence activities, traditional activities to improve or maintain the operational security of United States Government programs, or administrative activities;

Basically, the MONs are supposed to provide an up-to-date written notice of all the  potentially very embarrassing things the CIA is doing. And given that MONs cannot authorize unconstitutional or illegal (within the US) actions, it should impose some legal limits to covert operations.

Dick Cheney, in a 1989 speech complaining about Congressional overreach in foreign policy (Charlie Savage just posted this), described how this requirement to inform Congress of covert ops provided a way for Congress to oppose such actions by defunding any ongoing ones.

The 1980 law [requiring notice] did not challenge the President’s inherent constitutional authority to initiate covert actions. In fact, that law specifically denied any intention to require advance congressional approval for such actions.

[snip]

Any time Congress feels that an operation is unwise, it may step in to prohibit funds in the coming budget cycle from being used for that purpose. As a result, all operations of extended duration have the committees’ tacit support.

That’s the understanding of the limitations MONs might impose on Presidents that Cheney brought to discussions of the Gloves Come Off MON.

Bob Woodward provides an extensive discussion of what George Tenet and Cofer Black requested in this MON in Bush at War.

At the heart of the proposal was a recommendation that the president give what Tenet labeled “exceptional authorities” to the CIA to destroy al Qaeda in Afghanistan and the rest of the world. He wanted a broad intelligence order permitting the CIA to conduct covert operations without having to come back for formal approval for each specific operation. The current process involved too much time, lawyering, reviews and debate. The CIA needed new, robust authority to operate without restraint. Tenet also wanted encouragement from the president to take risks.

Another key component, he said, was to “use exceptional authorities to detain al Qaeda operatives worldwide.” That meant the CIA could use foreign intelligence services or other paid assets. Tenet and his senior deputies would be authorized to approve “snatch” operations abroad, truly exceptional power.

Tenet had brought a draft of a presidential intelligence order, called a finding, that would give the CIA power to use the full range of covert instruments, including deadly force. For more than two decades, the CIA had simply modified previous presidential findings to obtain its formal authority for counterterrorism. His new proposal, technically called a Memorandum of Notification, was presented as a modification to the worldwide counterterrorism intelligence finding signed by Ronald Reagan in 1986. As if symbolically erasing the recent past, it superseded five such memoranda signed by President Clinton.

Woodward describes other things included in Tenet’s request:

  • Providing hundreds of millions to “heavily subsidize Arab liaison services,” effectively “buying” key services in Egypt, Jordan, and Algeria
  • Equipping Predator drones with Hellfire missiles for lethal missions to take out top al Qaeda figures Read more

Judy Miller, Barabara Starr, and an Influx of Intelligence

I’m going to disappoint Jim by not dedicating a full post to Judy Miller’s graceless rant about the AP’s Pulitzer win, in which she whines that the AP hasn’t taken Ray Kelly’s insistence that his NYPD’s spying is legal seriously enough. I already had to fisk Miller’s credulous regurgitation of Ray Kelly’s defense of the NYPD here and then remind her that journalists should be in the business of sorting out false claims from true ones here. Given her past failures to write credibly on the AP’s NYPD series, I trust no one will make the mistake of doing anything but dismissing everything she has to say about the AP series.

But since I’ve already started a post about mouthpieces for those in power, maybe I should take a look at what Miller’s close kin, Barbara Starr, had to say about expanded drone strikes in Yemen.

The lead in Greg Miller’s story on this emphasized how little intelligence we would have on the expanded drone strikes.

The CIA is seeking authority to expand its covert drone campaign in Yemen by launching strikes against terrorism suspects even when it does not know the identities of those who could be killed, U.S. officials said.

Securing permission to use these “signature strikes” would allow the agency to hit targets based solely on intelligence indicating patterns of suspicious behavior, such as imagery showing militants gathering at known al-Qaeda compounds or unloading explosives.

Compare that with the headline and lead in Barbara Starr’s version.

Intel influx leads to increased U.S. strikes in Yemen

The increased pace of counterterrorism strikes in Yemen by U.S. drones and aircraft is a result of what U.S. military and intelligence officials describe as improved intelligence about the leadership of the al Qaeda movement in that country.

Read more

Saleh: “I have given you an open door on terrorism, so I am not responsible.”

[youtube]Uk-40vkDnGw[/youtube]

In a meeting on September 6, 2009–at a time when Umar Farouk Abdulmutallab was already in Yemen, seeking Anwar al-Awlaki–President Ali Abdullah Saleh assured John Brennan that the US Government had unfettered access in Yemen for counterterrorism efforts, but with that bore all responsibility in case of an attack on US targets.

(S/NF) In a September 6 meeting with Deputy National Security Advisor John Brennan, President Saleh insisted that Yemen’s national territory is available for unilateral CT operations by the U.S. Dissatisfied with current levels of USG funding and military training provided to the ROYG’s CT forces, Saleh asserted that the USG has produced “only words, but no solutions” to the terrorism issue in Yemen. Saleh repeatedly requested more funds and equipment to fight al-Qaeda in the Arabian Peninsula (AQAP), while at the same time placing responsibility for any future AQAP attacks on the shoulders of the USG now that it enjoys unfettered access to Yemeni airspace, coastal waters and land. (NOTE. The USG has been actively engaged since 2001 in training elements of Yemen’s CT forces, including the Counter-Terrorism Unit (CTU), the Yemen Special Operations Force (YSOF), the Presidential Guard, the Yemeni Border Troops, Yemen Air Force (YAF), and the Yemen Coast Guard (YCG). The USG has expended over $115 million equipping CT forces since FY02. In 2009 alone, U.S. teams have instructed Yemeni CT forces in training valued at $5 million. END NOTE.)

(S/NF) While Saleh offered assurances that the ROYG is “determined to continue the war against al-Qaeda because they’re targeting U.S. and Yemeni interests,” he continued to link increased U.S. access to AQAP targets with full responsibility for achieving CT goals. Highlighting the potential for a future AQAP attack on the U.S. Embassy or other Western targets, Saleh said, “I have given you an open door on terrorism, so I am not responsible.” [my emphasis]

The public availability of the cable reporting this conversation is just one of the things that makes ACLU’s (with CCR) FOIA of details on the December 17, 2009 missile strike in Yemen so interesting.

The FOIA asks, for example, for details of the understanding between Yemen and the US at the time of the strike.

All records pertaining to agreements, understandings, cooperation or coordination between the United States and the government of Yemen regarding the strike on al-Majalah, including but not limited to records regarding:

Read more