There had been times, off and on, when the United States government knew where Osama bin Laden was. The CIA had been interested in him since 1991, after he moved from Afghanistan to the Sudan. Almost everywhere the agency looked in the expanding Sunni extremist world, his name came up. Not as a commander but as the go-to person for false documents, money, training, weapons, or chemicals that could be made into bombs. In December 1995, the agency created a small bin Laden unit, headed by Michael Scheuer.
A burly, confident man with a full beard and glasses who speaks with a flat Midwestern accent, Scheuer was less inclined than many in the CIA hierarchy to swallow his own opinions. He had not been a typical CIA recruit. A Buffalo native, he had worked as a rigger for Union Carbide while earning two master’s degrees and then a PhD at the University of Manitoba, in Canada. He believed his bin Laden unit was the first ever established to hunt down an individual, and as the effort matured—as he learned more and more about bin Laden—he grew increasingly convinced of the danger al Qaeda posed for the United States. In time, his assessment of that danger outpaced his superiors’. His small group worked out of an office in a business center just a short drive from the main CIA campus at Langley. Scheuer named the office after his son Alec: “ALEC Station.”
The best weapon they had for gathering intelligence at that point was rendition, the practice of arresting a suspect and turning him over to authorities in another country for interrogation. The practice enabled the agency to at least technically abide by rules against torture. The CIA obtained assurances that captives would not be abused, which some foreign governments likely honored more diligently than others. At that point the agency did not have the option of killing suspected senior terrorists: they had to be arrested and held somewhere. Rendition enabled the Clinton administration to avoid the legal difficulties of placing them in U.S. custody. As Scheuer would remember it, this was not so much a matter of explicit policy as it was policy by default. He would seek guidance from the White House about what to do with a target, and the answer would come back, “That’s your problem.” The problem was solved by willing governments in East Africa, the Balkans, and the Middle East.
Rendition did not, as it happens, produce the first big breakthrough for ALEC Station. That came in September 1996, when a Sudanese militant named Jamal al-Fadl, a former close associate of bin Laden’s, turned up at the U.S. embassy in Eritrea offering to tell everything he knew about al Qaeda. He was flown to the United States and placed in the federal witness-protection program. He provided the first trove of fresh information about bin Laden and his organization—about its personalities, structure, and planned operations. His relevations ratcheted up interest in the group, which was clearly willing and able to launch major terror attacks.
By 1999, ALEC Station employed twenty-seven people, many of them women. They ran an unorthodox CIA office, very informal. People dressed casually. Because it maintained informants and contacts worldwide, the office was open twenty-four hours a day. Everyone worked long hours so few formalities of office life took hold. Scheuer would nap every afternoon in his office. As their sense of the threat posed by al Qaeda grew, so did their sense of mission. Some in the office, like Scheuer, passed up offers for promotions in order to stay with the work. Marriages broke up. The place had a cultish feel. Because Scheuer presided over so many dedicated women officers, some started calling his group “the Manson family.”
They couldn’t get bin Laden arrested in the Sudan, so they came up with a plan to harass him. He had a number of large projects under way there—road building, agricultural programs, and businesses. He was also actively underwriting terror attacks throughout the region. So ALEC Station proposed sabotaging his construction equipment. They wanted to spike engines with slurry that would force them to seize up. When the Senate Select Committee on Intelligence was briefed on the plan, one member objected: “If you do that, won’t you be putting some Sudanese farmer out of work?” The project was scrapped.
Not long afterward, when the attempted assassination of the Egyptian President Hosni Mubarak was linked to al Qaeda, the Sudan was pressured by states in the region to expel bin Laden. He relocated to Afghanistan, where he declared his war on the United States. This move pleased ALEC Station, because the NSA could now listen in on phone conversations in Afghanistan; there was also an enormous archive of overhead imagery left over from the mujahidin–Soviet wars, and the CIA had many friendly contacts in that country. In 1997, Mullah Omar, the Taliban leader, invited bin Laden to live in Kandahar, at an experimental agricultural station called Tarnak Farms, south of the city. This was an area where the agency had an especially rich network of spies, a group it called “Tripoints.”
For once they could watch bin Laden closely and listen to him and his people. Lacking the authority to kill him, Scheuer’s group laid plans to kidnap him—that would have been in May or June of 1998, several months before the embassy bombings in East Africa. They intended to hold him in a remote mountainous area for interrogation and then fly him to an Arab state for imprisonment (unless the United States decided to prosecute him directly). They fleshed out a raid in detail, a snatch-and-grab mission inside Afghanistan employing a special ops team delivered by helicopter. But when the plan was run up the chain it was vetoed as too risky. American forces might get killed, and because bin Laden lived with his wives and children, some of the children might be harmed. Scheuer recalled being mystified by the decision. He asked, “How much more of a threat do you need before you finally do something?”
When Director George Tenet paid a visit to ALEC Station not long afterward, one of the women on Scheuer’s staff confronted him angrily: “You and the White House are going to get thousands of Americans killed.”
Tenet told them that he understood their anger, but that it would subside. By now the group’s growing sense of urgency, coupled with its cultish image and high number of female staffers, had begun to work against it. They were seen as overly emotional and alarmist. Tenet’s response reflected this subtle prejudice and rankled ALEC Station still further.
“You will all think clearer in a couple of days,” he said.
In August, after the embassy bombings, Scheuer recalls being asked if the plan to kidnap bin Laden could still be pursued. The answer was no. Bin Laden knew that the chances of America taking action would grow after those attacks. He had gone into hiding. They had missed the chance.
By now, the United States was willing to use lethal force on bin Laden. President Clinton authorized two cruise missile strikes soon after the embassy bombings, one targeting Al-Shifa, a pharmaceutical plant in Khartoum thought to be developing chemical weapons, and the other targeting a bin Laden camp near Khowst. The missiles hit on August 20, fired from ships in the Arabian Sea. The CIA would estimate that twenty to thirty people were killed—but not bin Laden, who had reportedly left the Khowst camp a few hours earlier.
After that, the project for ALEC Station became pinpointing bin Laden long enough in advance to be targeted. They presented the White House with eight such opportunities, Scheuer recalled, and each time the strike was called off, primarily over concerns about collateral damage. The CIA man had always been prickly and eccentric. He was so much more willing to accept collateral casualties than his superiors—was so convinced that the threat posed by bin Laden warranted drastic, immediate action—that he had begun to be regarded with suspicion. He seemed obsessed.
In 1998, on the Sunday before Christmas, ALEC Station learned that bin Laden was staying in the Haji Habash house, part of the governor’s palace in Kandahar. The CIA had a local spy who knew which wing of the building bin Laden was in, and even which room, because he had escorted him there. It was first-rate, firsthand intelligence, and a target that could easily be reached by Tomahawk missiles launched from ships in the Arabian Sea.
“Hit him tonight—we may not get another chance,” advised Gary Schroen, ALEC Station’s field officer.
Scheuer took it directly to the White House, along with Director Tenet and John Gordon, the deputy director. It was snowing. The three men drove from Langley into D.C. together, but inside the White House only Tenet was allowed into the meeting, which the Clinton administration’s principals joined by teleconference. Scheuer and Gordon waited outside for hours. The missile strike was not authorized. According to The 9/11 Commission Report, there was concern that as many as three hundred people might be killed or injured, and that there was thought to be too great a chance of bin Laden moving at the last minute, as he had before. There was also a mosque nearby that might have been damaged. The CIA men drove back up the George Washington Parkway, disappointed yet again. Scheuer was particularly upset by the administration’s worry about damaging a mosque.
The next day, with the opportunity gone, Scheuer wrote to his field officer, Schroen, that he had not been able to sleep. “I’m sure we’ll regret not acting last night.”
“We should have done it last night,” Schroen wrote back. “We may well come to regret the decision not to go ahead.”
Scheuer’s frustration got the better of him. In 1999 he drafted a memo to the heads of the CIA, complaining about the risks being run to collect timely information, the hours of hard work that went into each targeting opportunity, and the unwillingness of the government to take action.
“[It seemed wrong to] me, to some extent, the idea of continually sending your officers into harm’s way to gather information that is credible and usable and to find the government not willing to use it to defend American people for reasons that [exist only in] their own minds,” he explained years later in an interview for this book. “You know, how racist is it to think that 1.4 billion Muslims are going to rise up and attack the United States because some shrapnel hits a stone mosque in Kandahar? You have to have zero respect for the humanity or the common sense of the Muslim world to expect something like that to happen. And yet, that’s the excuse these brilliant Harvard-trained people come up with.”
He was relieved of responsibility for ALEC Station. As he recalled later, he was told, “We want you to tell your people that you are burned out and don’t worry, we’re going to give you a medal and a monetary award.”
Scheuer said he told them, “Stick it in your ass.”
Everything changed after 9/11, of course. Then the questions all became, Why hadn’t the United States acted against bin Laden more aggressively when it could? “Obsessives” like Scheuer and his “cult” at ALEC Station looked prophetic, not overly emotional. The United States had missed its chance to get bin Laden before his biggest plan bore fruit.
After the invasion of Afghanistan there were battlefield leads that pointed American forces toward a rugged redoubt in Tora Bora, which translates to “Black Cave.” It was in the far easternmost part of the country, near the border with Pakistan, and was reputed to have a byzantine maze of caves, natural and man-made. It was also reputed to be bin Laden’s hideout. When American forces and Afghan militiamen took it in 2001, over a five-day siege, they found lots of small caves and some bunkers, but nothing like the fortress they had imagined. It turned out to be another place the Sheik had recently left.
The best reports said he had fled over the White Mountains into Pakistan, probably before the assault even began. After that… nothing.
No, not nothing.
Start with thousands of small bits of information. Names, lots and lots of names. Sightings. Rumors. Interrogation transcripts. Phone numbers. Phone calls. Dates. Addresses. Geographic coordinates. Aerial photographs. Ground surveillance photos. Videos. Faces. Iris images. Gaits. Maps. Fingerprints. Old diaries. E-mails. Web sites. Social media. Text messages. Tweets. Old-fashioned letters. Blogs. News reports. Broadcasts. Bills. Payment schedules. Traffic tickets. Rent payments. Credit card numbers. Charges. Bank account numbers. Deposits. Withdrawals. Transfers. License numbers. Passport numbers. Police reports. Arrests. Travel itineraries. Everything and anything that can be transformed into data. When you’re looking for one person in a world of seven billion, and when that one person does not wish to be found, you cast a wide net.
After 9/11, and after bin Laden escaped Tora Bora, it is safe to say that the United States government was fully engaged in hunting him down. Engaged to a degree that makes the uphill battles of little ALEC Station seem like a basement hobby. The Obama administration might invoke “limited bandwidth” and competing priorities to explain why these efforts fell short, but the truth is that every agency and branch of the vast U.S. military-industrial complex was now fully invested. What did that mean? It meant that finding and eliminating bin Laden was not just a preoccupation of a small group working in a storefront near Langley. It was a central goal. No one would be left waiting in the hall at the White House ever again for permission to strike. But finding bin Laden had also become exponentially more difficult. Tools and networks and units had to be developed to find, fix, and finish al Qaeda and other terror networks like it. What would evolve—this thing they called F3EAD—is worth examining in more detail.
You begin with scraps. Anything that can be transformed into data, those names and numbers and other types of information partially enumerated above. All of that and more, intel from every pipeline: detainee interrogations, HUMINT (human intelligence), SIGINT (signals intelligence), GEOINT (geospatial intelligence), and even something called MASINT (measurement and signature intelligence, which converted into searchable data highly technical things like radar or chemical or sound). Each bit is a potentially useful dot in a vast matrix. Collection flowed from a blizzard of agencies, large and small—CIA, FBI, NSA, NGA, and many more. The SEAL and Delta Force warriors ransacked the hideouts they raided for everything that might contain a lead—they called it “pocket litter.” Who knew which stray fact might lead to bin Laden? Or if any of them ever would? At times the CIA had dozens of analysts working on bin Laden full time, but the sheer number and variety of leads was daunting. There was always a good chance, perhaps a better than even chance, that the Sheik would live out his days in hiding and die peacefully in bed, surrounded by his wives and his many children and the devoted members of his intimate circle, perhaps after leveling one last broadside at the “Head of International Unbelief”—thumbing his nose as he entered paradise. For those who believed in such things, evading the grasp of American justice would lend credence to his claim of divine guidance.
In the end, finding bin Laden would illustrate the most banal of truths about intelligence work. More than genius or courage, it is about effort and patience and will. It is also, of course, about money and time—but when we are talking about a goal assigned top priority by not one but two presidents of the United States, and where time and resources are, in effect, bottomless, it boils down, ultimately, to a steady application of will. President Bush famously kept a chart of wanted terrorists in a desk drawer and would personally X out those who were captured or killed. Bin Laden was always “Number One.” At his regular daily briefings, Bush would routinely ask, “How’re we doing?” and everyone knew what he was talking about. It was the same with Obama. After that impromptu meeting in his office with his new intelligence chiefs in 2009, he would bring it up at nearly every security briefing.
“Are we any closer?”
“What have we learned?”
An intelligence network like America’s is not one but multiple bureaucracies, each with its own specialty—listening, observing, photographing, sensing, probing, analyzing. The strength of such an overlapping structure is that things get looked at more than once, and from every conceivable angle. And the strength of bureaucracy—everyone knows about the weaknesses of bureaucracy but rarely do we consider its strength—is in its limitless capacity for work. Steady, unceasing work, like the trickle of the river that ever so slowly carves a gorge. Hour after hour, day after day, year after year, here was an effort that would consume large chunks of the careers of analysts—analysts replaced at intervals with fresher eyes and ears and minds who would eagerly set off down stale trails with new vigor.
Now add supercomputers. Convert those millions of bits of intel gathered from all over the world over years of effort into bytes, and suddenly the impossible, finding the needle in a million haystacks, becomes at least a little more probable.
So when we trace the trail to Abbottabad, this is what we are talking about—a sophisticated targeting engine. Viewed backward, from bin Laden’s hideout to the scraps of intel that led to it, the trail seems obvious. Tracing it from end to beginning obscures the level of difficulty: the years of frustration and patient effort, the technological innovation, the lives lost, the mistakes made, the money spent. Just the special ops piece of the story unfolded over a quarter of a century of trial and error, beginning with the improvised mission to rescue American hostages in Iran in 1980.
After Iranian students seized the U.S. embassy in Tehran in November 1979, President Jimmy Carter undertook months of fruitless diplomatic efforts to free the more than fifty Americans held hostage there. During that time, the army’s newly formed counterterrorism unit, Delta Force, cobbled together a daring effort to rescue them. They borrowed helicopters from the navy used for minesweeping, and marine pilots unused to the kind of flying required. The mission called for the choppers to fly to a rendezvous point in the desert outside Tehran, called Desert One, refuel the choppers from large fixed-wing aircraft flown in by air force pilots, and then proceed to a hiding place near the city. The following evening Delta Force would emerge from hiding, raid the embassy compound and free the hostages, then assemble in a soccer stadium across the street from the embassy in central Tehran, where they would be picked up by the helicopters and flown to an airport that was to have been seized by U.S. Army Rangers. From there, the rescuers and hostages would be flown out of the country.
This extraordinary bold and complicated mission never made it past the rendezvous point in the desert. Sandstorms damaged choppers and forced several pilots to turn back. With too few helicopters to proceed, the mission was aborted.
As the aircraft maneuvered to fly quietly out of Iran, one of the choppers collided with a plane on the ground, and both exploded, killing eight American servicemen. The disaster ruined hopes of keeping the aborted rescue effort secret. The subsequent embarrassment condemned the hostages to many more months of captivity, handed Iran a large propaganda coup, (they claimed an American “invasion” had been thwarted by God), and likely destroyed Carter’s hopes of being elected to a second term.
That episode would bear a striking similarity to the one that killed bin Laden, and it would illustrate how far the talents and tools of the special ops community had come. That 1980 disaster, in effect, created the Joint Special Operations Command, by demonstrating cruelly what this nation could not do. Progress can be further traced back to the heroic and bloody firefight in Mogadishu in 1993, the battle documented in Black Hawk Down, which resulted when another special ops raid spun off track. Thousands of missions, successful and unsuccessful, large and small, honed the men and machines and tactics that would target the Sheik.
That raid could not be launched until bin Laden was found. Finding him meant reconstituting human spy networks dismantled in the complacent years after the Cold War, when spying was considered unseemly and unlawful and a threat to personal liberties and human rights. After 9/11, the public rediscovered the value of spies on the ground and of eyes and ears overhead. It would speed the development of unblinking aerial platforms and telecommunications networks that would allow constant, real-time surveillance unheard of in the past.
Four months after the attacks, former Admiral John Poindexter was appointed to head a new initiative he had helped devise called Total Information Awareness, which sought to use supercomputers to amass unimaginably huge databases in order to, in essence, collect, as its name suggested, everything. With the right software, you could mine that data in order to identify and locate potential terrorists. The admiral’s history of lying to Congress during the Iran-Contra episode did not engender confidence, nor did the inherently scary, Orwellian notion of the government compiling vast pools of data about American citizens. In that sense, the name, Total Information Awareness, was a fatal public relations blunder. The bald, white-mustachioed Poindexter was called the “Pentagon’s Big Brother,” and worse. Congress scotched the program as originally conceived. Poindexter found employment back in the private sector, and the remnants of the project, which was barred from collecting information on American citizens, was tactfully renamed Terrorism Information Awareness.
As wrong a choice as Poindexter was to lead this project, and as tone deaf as he may have been in its presentation, he had the right idea. He had been thinking about it for decades. One of the computer’s great contributions—this ability to store and manipulate vast amounts of data—seemed mundane but was in practice so revolutionary that it was transforming modern life, whether performing a Google search, stocking the shelves at a Walmart from an international supply chain, shipping packages anywhere in the world overnight, or mapping the human genome. So why not put that capacity to work tracing a terrorist network—recognizing clues in what would appear, even to teams of skilled analysts, to be random events?
Poindexter’s concept did more than survive. It would come to undergird the entire war effort: storing every scrap of intel about al Qaeda and related groups gathered by the nation’s very active military and spy agencies, transforming them into data, and then plumbing that data for leads. The hunt for bin Laden and others eventually drew on an unfathomably rich database, accessible to anyone in the world with the proper security clearance, whether a marine officer at an outpost in Afghanistan or a team of analysts working in Langley. Sifting through it required software capable of ranging deep and fast and with keen discernment—a problem the government itself proved less effective at solving than were teams of young software engineers in Silicon Valley. A start-up called Palantir, for instance, came up with a program that elegantly accomplished what TIA had set out to do. Founded in 2004 by Alex Karp and Peter Thiel—the latter is the billionaire cocreator of Paypal and an early Facebook investor—Palantir developed a product that actually deserves the popular designation Killer App. Newly minted software engineers from the best computer schools in the country were put up in a seven-thousand-square-foot workspace in Palo Alto. It was stocked with junk food and video games and nicknamed “the Shire,” the home of the Hobbits in Tolkien’s Lord of the Rings. (The company itself is named after a magical stone in the Tolkien saga that confers special powers of sight and communication.) The software produced from this very unlikely source would help turn America’s special forces into deadly effective hunters. Palantir is now worth billions, and has contracts with, among others, the CIA, the NSA, the Defense Department, the Defense Intelligence Agency, the FBI, the National Counterterrorism Center, and the Department of Homeland Security.
The pace and urgency of war have always accelerated the development of technology and encouraged novel uses of devices that already exist. After rapid initial success toppling the regime of Saddam Hussein in Iraq, American forces found themselves under increasing attack by Sunni extremist groups, the most violent of which was a new branch of al Qaeda, under the direction of an innovative killer named Abu Musab al-Zarqawi. His group mounted a campaign of roadside bombs and brutal suicide attacks, many of them designed to kill Iraqi civilians indiscriminately—the sort of attacks that bin Laden, in hiding, considered mistakes. Indeed, the mass killings eventually helped turn the Sunni majority in Iraq against the insurgency, marking the turning point in the war. But at the same time, under the direction of General Stanley McChrystal, JSOC was hammering away on insurgent cells of the local al Qaeda killers with increasing effectiveness, mounting mission after mission in rapid succession, capturing and killing at a pace that such operations had never before been able to sustain. They found Saddam Hussein hiding in a hole in the ground in late 2003. Zarqawi himself was killed by an American bomb in 2005. McChrystal’s success, considered to be one of the major military accomplishments of modern times, was something he called “collaborative operations,” by which he meant the fusion of “special operators”—teams of elite shooters from every branch of the service—with this new computational ability, which amassed data from all of the other inputs. The task force built a massive database at Camp Victory in Iraq, and then another at Bagram in Afghanistan, blending the big picture with the small. It meant bringing a different kind of warrior to the front, one more accustomed to clicking a mouse than pulling the trigger.
Guy Filippelli was one of them. A young army captain, a West Point graduate with a master’s degree from Oxford, in 2005 he was asked by his commander in Afghanistan to visit the walled-off facilities of the task force—the special ops unit—and show them what he could do with his computer. Filippelli calls himself a geek. He had started writing computer programs as a high school student before heading to West Point’s growing computer science department. He was helping the command staff at Bagram design systems to better control “information flow,” plugging intel collected from the sites of raids in the field and from the interrogations of detainees into a growing national terror database. He arrived inside the cloistered walls of the task force full of enthusiasm for his work, certain his lecture would excite these frontline troops. The shooters and their staff could not have been less impressed. Filippelli’s subject matter was highly technical and abstract, cutting edge, and very cool to him, but he was talking to a roomful of soldiers whose adrenaline rush came from… free falling from high altitudes or getting shot at. Their world was the extreme opposite of virtual. So the next time the young captain got a chance, this time with a smaller group of soldiers, he tried a different tack.
“Listen, I know you guys are a thousand times better at this stuff than I am and are probably already doing all this, but let me show you what I’m doing and I’ll be out of your hair in ten minutes.”
At first it was something easy. The task force was used to simply locking up suspects in the detainment facility as they awaited questioning. Filippelli had built a database for detainees, and had also mapped the facility’s population by tribal affiliation, background, kinship, and other factors. Putting a detainee in the wrong place, for instance, with a group from his own village, meant that his comrades would rapidly coach him. Filippelli could show how those poorly placed were significantly less useful afterward in interrogation. So where you put them in the facility was important.
“Look,” he said. “You’ve picked up this guy. Why did you put him with these guys? You could have done this…”
And with that, he closed his laptop and started for the door.
“Thanks for your time,” he said. “Let me know if there’s anything else I can do for you.”
“Wait,” the men protested. “Tell us a little more about this.”
Gradually, he found himself working more and more with the task force, showing them how crunching data could vastly improve their efficiency. The applications went way beyond storing detainees. The name of the game in warfare is to learn faster and act faster than the enemy. So, as Filippelli and others doing the same kind of work came to see it, the contest had to do with time cycles. If it’s a detainee who could be held for, say, only twenty-four hours, how do I use that time most efficiently? What questions should he be asked? What do I need to learn in order to ask him the best questions in the time allotted? And that was just one piece of the puzzle. Looking at the larger mission, the special ops teams needed to get inside the information cycle of their enemy. In the past, after a successful night raid where a member of an insurgent cell was killed or arrested, by morning, or even within a few hours, every critical member of that group would know about it and would have taken evasive action. Information spread quickly. Cell phones would be ditched, computer discs destroyed, bomb-making facilities moved—the bad guys would scatter. But if you could get inside that response time—if you could beat their information cycle and learn enough from the first raid through either interrogation or, say, scrutinizing a seized cell phone or hard drive—you might be able to launch a new raid or even multiple raids before word of the first one had gotten out.
The databases enabled local scraps to be instantly cross-checked with the larger data pool. Warrior geeks like Filippelli would examine the pocket litter, and plug that into the national collection; it was like jumping from the middle of the woods to a panoramic view of the forest. The warrior geeks helped connect the dots for the shooters, lifting order from disorder. Soon enough, the teams were doing it for themselves. Armed with such rapid intel, the teams got very fast indeed, going out on multiple missions every night, easily lapping the enemy’s information cycle. They had, in strategic terms, “seized the initiative.” This capability turned terrorist hunting from a passive endeavor, characterized by long periods of intel collection and analysis and preparation, punctuated by occasional raids, into an aggressive endeavor. To stay alive, the bad guys had to stay in constant communication with each other and keep moving—two activities that actually made them easier to find. In Iraq, under McChrystal in 2007 and 2008, JSOC teams began dismantling networks at an ever increasing pace, taking them down before they knew what hit them.
McChrystal would be handed the entire Afghan command soon after Obama’s election, turning over JSOC to Vice Admiral William McRaven, who signed a secret agreement in early 2009 with the new CIA director, Leon Panetta, spelling out guidelines for expanded cooperation. So at the same time Obama was pushing the CIA to find bin Laden, JSOC was deepening its relationship with the spy agency worldwide.
The right weapon had evolved. Just nine years earlier, President Bill Clinton had complained to General Hugh Shelton, then chairman of the Joint Chiefs, about his lack of options in going after Osama bin Laden. “You know, it would scare the shit out of al Qaeda if suddenly a bunch of black ninjas rappelled out of a helicopter into the middle of their camp,” he said. It was the wish of a man who had more experience with the military in movies than real life. In order to rappel into an enemy’s camp, you first had to know where it was and who exactly was there. From time to time, as we have seen, the United States had obtained reasonably current intel about bin Laden’s location, but the ability to act swiftly and effectively on that knowledge, at acceptable levels of risk, did not yet exist.
Now it did. No matter how one felt about the wisdom of invading Iraq, or the seemingly unending conflict in Afghanistan, a near decade of combat had matured a generation of warriors and tools, battle tested and custom-made for finding and killing terrorists. This is what author Bob Woodward had hinted at when he caused a stir in a 2008 interview with 60 Minutes by referring to a “secret operational capability.” It briefly inspired wild speculation about a crash military research program like the Manhattan Project in World War II that produced the atom bomb. Some imagined a “terrifying radar cannon” or a “thermal signature” device that could effectively fingerprint a target from twenty thousand feet. But there was no one secret weapon. The new tool was everything: reconstituted human spy networks, supercomputers, state-of-the-art software, global surveillance, and elite commando units.
There was, however, one more critical piece, one of the most dramatic developments in the history of modern warfare. One that began not at some secret lab with cutting-edge scientists, but on an airstrip in Hungary, with an air force colonel they called Snake.
James Clark had planned on a career in politics when he graduated from Catholic University in 1973. He had it all mapped out: law school, legal practice, then a run for Congress… But he had accepted an ROTC scholarship to help pay for school, and when he graduated the air force invited him to fly fighter jets. It was a thrill he found hard to leave behind, so his four-year commitment turned into ten, and then ten turned into a career. His call sign was “Snake.” He was based in Taszár, Hungary, in 1995 when he got the chance to play with something then called the Gnat. It illustrated how a good idea doesn’t always require a blinding stab into the unknown, because the Gnat was basically a glider with an Austrian skimobile engine. It would improve, of course: its surveillance tools would become state-of-the art and its engine virtually silent. Its hover time would greatly lengthen and its optics would become astonishing. It would eventually carry its own missiles. Called the Predator, it rapidly became the most sought-after weapon in the air force’s multibillion-dollar arsenal.
The drone, or, as the air force prefers, the UAV (unmanned aerial vehicle), was not new. Radio-controlled aircraft were used during World War II. President John F. Kennedy’s older brother, Joe, was killed on a secret mission when his specially engineered B-24, designed to fly itself to a German target after Kennedy had bailed out, exploded prematurely. Drones had been used in Vietnam, and the Israelis had used them to good effect over Lebanon’s Bekaa Valley in 1982. Several of the Israeli models were purchased by the CIA, which turned them over to the San Diego defense contractor General Atomics for further development. Clark got four of them in Hungary during this experimental phase. He housed them in small tents out on the runway at Taszár. They were an immediate hit. Soldiers had long sought the ability to see over the next hill and the Gnat gave them a sixty-mile panorama from a platform that could stay airborne more or less permanently, flown in twelve-hour shifts. Manned aircraft could stay aloft for only as long as a pilot could stand it, or until his fuel ran out. Satellites provided a nice view when they happened to be passing overhead, and were in great demand, but they were expensive and few, and not always overhead. Once Clark’s Gnats started flying missions over Kosovo they never stopped. Demand for them grew and grew. They have been in continual action ever since.
As the air force saw it, the problem during the Cold War had not been finding the enemy; they were, for the most part, in plain sight—tanks, missile silos, armies, and so on. The problem was how to attack them. The war that began in earnest after 9/11 posed the opposite problem. Al Qaeda terrorists made easy targets, if you could find them. At most they were holed up in compounds with a few armed guards. So a capability that allowed you to silently watch a target from fairly close range over days, months, and even years, in real time, was suddenly as valuable, if not more valuable, than a multimillion-dollar piece of hardware in orbit around the Earth.
General James Poss, working with Clark, commanded the first Predator mission over Iraq early in 2001, when the UN was policing a no-fly zone. The Iraqis would occasionally shoot at American planes patrolling the no-fly zones, aided by a large, clumsy Russian Cold War–era portable radar device called “Spoon Rest.” It was mounted on a large van with twelve giant antennae shaped like coat hangers on top. In other words, they were hard to miss. Except that after nine months of trying, the air force could not find any of them. How could something so big and distinctive remain invisible? Whenever an American plane detected it was being tracked by radar, the force would direct an AWACS—Airborne Warning and Control System—to fly over and scan for a Spoon Rest van. None was ever seen. Could the Iraqis be dismantling them after each use? The old Soviet manuals said a unit could not be taken apart in less than twenty minutes, and the AWACS would get overhead a lot faster than that. The air force tried spotting them with a U-2, which also turned up nothing. Poss tried everything he could imagine. He had every large building in the vicinity surveyed. He tried pattern recognition analyses to try to predict where they were likely to show up. Nothing.
The Predator found the answer on the first try. Able to silently watch an Iraqi town where a Spoon Rest van was known to operate, it saw the Iraqis drive the distinctive van through the central market and park it under a bridge. All of the Spoon Rest vans were quickly located and destroyed.
There were other uses for drones. Before the U.S. bombing campaign began over Baghdad in 2003, Poss and Clark flew an old Predator they had planned to retire low and slow over the capital, prompting the Iraqis to fire up the radar at all their antiaircraft installations. This enabled the air force to map the city’s defense system. When the Predator ran out of fuel they plunked it in the Tigris River, prompting the Iraqis to claim they had shot down an American fighter. They never recovered the aircraft. The next day, Poss and Clark did the same thing, but they miscalculated the fuel levels. Instead of splashing it into a lake on the outskirts of the city, the drone made it only to the water’s edge. Alerted again by claims that an American jet had been shot down, film crews the next day recorded the recovery of an old drone painted with graffiti, without a bullet hole in it.
These first experimental models could only transmit TV signals along a line of sight, but before long Predators were bouncing their feed off communications satellites, which meant the view from above could be monitored and analyzed from anywhere, in real time. This was the real breakthrough. Drones provided not just a view from above—balloons had been floated over Civil War battlefields to accomplish that. The revolutionary change came when drone surveillance was tied into the existing global telecommunications system. This allowed the U.S. military to mount “caps,” or permanent stable observation platforms, over whole cities. Tie that capability into supercomputers, with software capable of recognizing the “signature” of a specific target—say, a red pickup truck with a dent on its right rear fender—and you had the ability to track a target night and day.
By 2010, fleets of UAVs—which today include Predators, Reapers, Global Hawks, and a growing variety of others—were part of a worldwide integrated network that enabled remote operators at bases in the United States to fly missions almost anywhere in the world, funneling imagery and sensory data for analysis back to computers at Beale Air Force Base in California and CIA headquarters in Langley. The number of drones was well into the thousands, enough to sustain as many as sixty-five caps at once. For a selected target, the unblinking eye could establish things as simple as: How many people live in a compound? When do they wake up in the morning? When do they go to bed at night? What kind of weapons do they have? The air force was now using drones in teams, producing a system it called Gorgon Stare, that could cover an area four kilometers square—an area the size of Fairfax, Virginia. The image would not have to be monitored continually by human beings; it could be monitored by computers, which never get bored or distracted and are serenely undaunted by complexity. If, say, a vehicle belonging to a suspected terrorist was recognized by the computer—because it had some distinguishing feature that enabled the computer to track it—then the movements of that vehicle could be followed over a small city for months, or even years, permitting a detailed map of the suspect’s travels. Combine that map with cell phone tracking, with human intelligence, and you can begin to assemble a detailed and accurate chart of your target’s connections, or his network. Improvements in optics had enabled such observations from a great distance, so that the UAVs themselves would not have to be directly over a target. They could “stand off,” well outside the restricted airspace over a country such as, say… Pakistan.
The trail to Abbottabad that seemed so clear in retrospect represented a triumph of dot connecting. In this case, it began with a name. It was not even a real name, and the reference was to someone reported, falsely, to be dead.
The name Abu Ahmed al-Kuwaiti was first mentioned to authorities in Mauritania by an al Qaeda operative, Mohamedou Ould Slahi, who went by the nom de guerre “Abu Musab.” Slahi was a veteran mujahid, having fought twice in Afghanistan: first against the Russians and then against the regime left in place when the Russians departed. He had sworn allegiance to bin Laden and was living in Germany in late 1999, pursuing a degree in electrical engineering, when he befriended two of the young Arabs who would become 9/11 hijackers: Ramzi bin al-Shibh and Marwan al-Shehhi. The two were looking to join the jihad in Chechnya, but Slahi advised them first to travel to Afghanistan for training. Joined by Mohammed Atta, who would become the leader of the 9/11 group, the young Mauritanian helped them make travel arrangements to Karachi, launching them on the road that would take them to the United States and flight training. Performing this service placed Slahi at the origins of the 9/11 plot, and he was thus a highly wanted man after the attacks. In just ten days he was located living in his home country and was brought in for questioning by Mauritanian authorities. He was arrested in November 2001 and underwent extensive questioning in Mauritania and then in Jordan, where he claims he was tortured, and probably was. He has been imprisoned at Guantánamo Bay since 2002.
In telling the story of his travels and battles with the mujahidin, one of the names Slahi mentioned—one among many—was this Abu Ahmed al-Kuwaiti, whom he said had been killed. It was obviously a pseudonym. The name meant “the Father of Ahmed from Kuwait.” It was just one name among thousands that were daily being entered into what would become the Terrorism Information Awareness database.
The same pseudonym, and person, would be fleshed out in more detail more than a year later by a true believer named Mohammed al-Qahtani, a baby-faced young Saudi who had pledged himself to al Qaeda and had planned to join the 9/11 hijackers as “muscle”—one of the enforcers trained to seize the plane and keep the passengers under control on the way to impact. He had arrived in Orlando about a month before the attacks—Mohammed Atta was waiting there to pick him up—but was turned away by an immigration officer, whose suspicions, even in that relatively unwary time, were aroused by the fact that Qahtani had a one-way ticket and could not speak English. When Qahtani grew indignant, he earned himself a return flight to Afghanistan. Denied martyrdom, he rejoined bin Laden and fought in the battle of Tora Bora. Fleeing that encounter, he was arrested crossing the border into Pakistan with other mujahidin in December of 2001. Qahtani claimed he had been in Afghanistan to learn the art of falconry. He was turned over to American authorities, who eventually matched his fingerprints with the young Saudi who had been denied entry to the United States in Orlando the previous August. This made him a subject of great interest.
Qahtani was interrogated relentlessly at Guantánamo from early November of 2002 until January of 2003. A daily log of his ordeal reveals a grinding effort to break down the young man’s resistance. He displayed heroic defiance. There were repeated hunger strikes and attacks on his guards and interrogators—he frequently spat at them, head-butted one, and threw himself bodily at others. When doctors tried to administer IV fluids he tore out the needle, and when his hands were strapped to his chair he got the IV line in his mouth and bit it in two.
The Obama administration has claimed that torture played no role in tracking down bin Laden, but here, in the first two important steps down the trail, that claim crumbles. At best it demands a very narrow definition of the word. Slahi’s prosecutor refused to pursue charges against him before a military commission because he found they were based on statements made under torture. And in Qahtani’s case the coercive methods employed are clearly documented and public, and would be described as torture by any disinterested person. Indeed, it was his case that prompted the Department of Defense to draw up guidelines to curb interrogation excesses.
In time Qahtani succumbed to this pressure, however it is defined, and dropped his falconry story and began describing his work with al Qaeda in detail. One of the many names he mentioned as part of bin Laden’s inner circle was this same Abu Ahmed al-Kuwaiti. He did not know the man’s real name, but said he was not only alive and well but had worked closely with Khalid Sheik Mohammed, al Qaeda’s Number Three, and had given Qahtani some preliminary computer instruction at an Internet café in Karachi, showing him how to communicate with the group’s leaders once he was in America. As Peter Bergen reported in his excellent account, Manhunt, Qahtani was taught to compose a letter on an e-mail account, and then store it as a draft instead of sending it. His colleagues, armed with a password to the same account, could then log in and retrieve the draft e-mail without it ever having been sent, presumably avoiding America’s watchful eye. Qahtani would also describe Ahmed the Kuwaiti as a “courier.”
So now the name had come up twice, from two different men in two different countries, separated by more than a year. No one was yet paying attention to it. Many of the early detainee interrogations were not widely distributed, even within the agency—the importance of the single, enormous database would rise only when the software to exploit it appeared in a few years. In the early years of the hunt, even with dozens of analysts working full time, even with President Bush’s list in the drawer of his desk in the Oval Office and his constant prods of “How are we doing?,” and even with the help of the computers, it was nearly impossible to keep up with the flood of tips and “Elvis sightings.” There was a $25 million reward offered by the State Department for information leading to bin Laden, and an additional $2 million put up by an airline trade association and the pilots union, so passing along a tip was like buying a lottery ticket: you can’t win if you don’t play. Tall, slender, olive-skinned Arab men were seen on every continent. The analysts did not have high expectations for any of these leads, but given the national priority assigned to the task, every single one had to be taken seriously. It was a powerful time suck.
In that context, a detail offered up under duress by Qahtani, one that would later prove key, was years away from being recognized as significant. Qahtani himself was not that big a deal. He was a foot soldier, one of thousands rounded up in Afghanistan as they fled across the border. All of them were questioned, and their answers were all swept into the growing database. Qahtani merited more attention than most, though. He was an Arab fighter, after all, and, unlike most detainees, he had been a member of al Qaeda. He had fought at Tora Bora and had tried to enter the United States shortly before the attacks, and if he had not been turned away he might have played a role in them himself. But he was still just muscle, a foot soldier. There was no reason to believe he could point out the location of Osama bin Laden. His mention of this Ahmed the Kuwaiti was noted. The supposed “courier” had helped prepare Qahtani for the 9/11 mission and apparently had worked closely with Khalid Sheik Mohammed, so he was potentially significant. But it was still just a fake name. Whoever the Kuwaiti was, by 2003 his pseudonym remained just another drop of intel in what was fast becoming an ocean of data.
Then Khalid Sheik Mohammed himself was arrested in Pakistan just a few months after Qahtani started talking. This dark, burly, hairy man was easily the most important al Qaeda figure ever apprehended—the terror group’s Number Three, its operations director and the primary architect of 9/11. His arrest stirred a great deal of excitement. Here was someone who could provide a map of the entire organization, possibly cough up the hideouts of bin Laden and al-Zawahiri, or at least lead them closer, and perhaps reveal ongoing plots before they matured into new incidents of mass murder. Khalid Sheik Mohammed got the full treatment. He was interrogated aggressively by both Pakistani and American forces. In between 183 waterboardings at a secret CIA interrogation center in Poland, he was asked about many, many names. One among the many was Ahmed the Kuwaiti. And in addition to the volumes of information Khalid Sheik Mohammed provided—some of it true, some of it false—he acknowledged that such a character existed, but said the man was unimportant and had retired from al Qaeda years earlier.
So it was not as if the teams of analysts at the CIA were now, in 2003, looking at this fellow called “the Kuwaiti” as an important lead. But having been thrice acknowledged, albeit thrice acknowledged under torture, the prospect of his being fiction—someone made up by a detainee spinning stories—became less likely. He existed, or had existed. He may have been dead but was probably still alive. He may even have been, or might be, a member of bin Laden’s inner circle—perhaps even a courier. Even so, the name wasn’t a real name, and it was one of a multitude. It was not yet a lead, because to know so little doesn’t lead or point anywhere.
The teams looking into the matter were smart, dedicated, and possessed the agency’s studied, nondescript style. They were members of a kind of university of analysis, working under the direction of Michael Morell. When the effort settled into a routine, there were more than twenty analysts, men and women. There were more women than usual for this kind of job, partly because the CIA had undertaken to achieve a better balance of gender, but also partly because women were considered especially good at this kind of patient detail work and had a reputation for being sensitive to subtleties that eluded many men—the same insight that had guided Scheuer’s staffing of ALEC Station. The teams tended to be on the youthful side of middle age, and the analysts had the look of people who commute to a job in a cubicle and spend long working hours before a computer screen or in meetings. They got a chuckle out of the depiction of CIA agents in books and movies—jumping from airplanes, leaping from rooftops, speeding through European capitals in sports cars under fire. They were mostly bookish sorts, but seemed less like academics than like accountants or junior business executives. Indeed, that’s probably what they would tell you they did for a living if you asked. Ego and eccentricity were suppressed, sublimated by the clandestine nature of the job.
The Elvis sightings had slowed and then pretty much stopped by 2004. Bin Laden seemed lost. The teams turned more attention to sorting through the accumulated data—sorting it, devising ways to improve how they attacked it. There was his family, his huge family, with a dizzying number of kin and in-laws, any one of whom might become a conduit for a message to his mother (bin Laden had always been very close to her, a point of potential weakness). As the head of al Qaeda, he was known to be sending and receiving messages constantly. People were supplying him with food, medicine, and information… what methods did he use? And those video and audio statements? Who in his inner circle was known to make such recordings? The recordings were scrutinized with great care. What kind of wallpaper is that behind him? What sort of plants are in the room? What is he wearing? Analysts were far more interested in the trappings of bin Laden’s statements than in anything he had to say. Why, if he was living in a cave in the wilds, were his robes so clean? There was a “media” team that focused on clues like that. And who delivered these offerings to Al Jazeera and other outlets? That was the job of the courier team. The agency got to where it could track the chain of couriers back to Number Three—it was Khalid Sheik Mohammed and then his replacement, a Libyan, Mustafa al-’Uzayti, who went by the nickname Abu Faraj al-Libi—but there the trail always went cold.
In January 2004, Kurdish police arrested Hassan Ghul, a known al Qaeda figure, trying to enter Iraq with money and bomb-making schematics. He was carrying a letter from bin Laden to Abu Musab al-Zarqawi, the murderous leader of al Qaeda in Iraq, the local franchise that was just beginning its bloody campaign against Americans and the Iraqi citizenry. During Ghul’s interrogation the name Abu Ahmed al-Kuwaiti surfaced once more; Ghul described him as an important courier, one of the Sheik’s most trusted aides. There were now four mentions of this mystery man, who was looking more and more real. But who was he? What sort of person would he be? The most valuable sort in such a role, if bin Laden were hiding in Pakistan, would be someone fluent in both Pashto and Arabic. Did the Kuwaiti fit that profile? If so, how do you track a nickname?
The public line offered during the remainder of the Bush years was that bin Laden was probably living in a cave somewhere in Waziristan. The CIA teams had stopped believing that in 2002. There were no sightings or even rumors of his presence in the northwest Pakistani territories—not a single report. There were also many stories suggesting that he had a serious kidney disease, and these, too, were discounted early on—these were the stories bin Laden himself had attempted to disprove by feasting before the Pakistani journalist Mir. The CIA rejected them because the logistics of dialysis would have been too difficult to sustain, and the Sheik appeared hardy enough in his videos.
When the analysts weren’t slugging away on their computers, they were in meetings, proposing theories and arguing about theories. Detailed profiles were worked up. How would bin Laden be living? Who was likely with him? How big was his household? Where would it be? What might it look like?
The four most promising avenues seemed to be family, organization, finances, and couriers. The agency had committees focusing on each. And each of these avenues was generating its own collection of data—names, numbers, photos, interviews, etc… . all of it swelling the database, the great pool of potential leads. The work ground on, day after day, week after week, year after year. And nothing seemed especially promising.
The arrest of Abu Faraj al-Libi in May 2005, in Pakistan, raised hopes once again for a breakthrough. The second al Qaeda Number Three to be captured, it was known that he had been in direct communication with bin Laden in the years since the 9/11 attacks. But while he provided a lot of information after his capture, he offered nothing that directly helped the bin Laden teams. He did, indirectly, provide some help, however. Among the many people al-Libi was asked about was the Kuwaiti. Al-Libi said he had never heard of him.
That was interesting. Five different detainees had been asked about him now. Four said they knew of him. Three placed him close to bin Laden (although one of those three said he was dead), and one, Khalid Sheik Mohammed, said he had left al Qaeda. Now al-Libi, who had been with al Qaeda for more than twenty years, said he had never even heard of the man. How could he know nothing about someone Khalid Sheik Mohammed had readily acknowledged? The organization was not that big. Here’s what the analysts gathered: their two most important captives either minimized the importance of the Kuwaiti or denied his existence altogether. This might mean that Ahmed the Kuwaiti was very important indeed. Bin Laden was the crown jewel. If the most important captives would protect anything, it would be information that might lead to him. That was one possible explanation. Add the fact that the Kuwaiti had dropped off the map… just like bin Laden. For the first time the CIA teams began to consider that the Kuwaiti was with the Sheik even now—his primary conduit with the rest of the world.
So among the various avenues still being explored intensely, the Kuwaiti became more important. Again, the name was just one of many and was just an alias. It would be five years before they managed to connect it with a real person. In 2007, the agency learned that the Kuwaiti’s real name was Ibrahim Saeed Ahmed. It will not say how the connection was made. It might have been as simple as an informant, perhaps someone detained and being interrogated in another country, or it might have emerged from the wizardry of its supercomputers—from the Terrorism Information Awareness database—after some conversation on a cell phone somewhere in the world triggered the right connection. One senior official said that the information came from a “third country.” Morell would tell me later, “You could write a book about how we figured it out.” It is a book he is not ready to see written.
However the connection was made, by 2007, in light of the increasing usefulness of human intel networks and the enormous TIA database, a real name was a huge step forward. A real man had a history. Ahmed came from a large Pakistani family that had moved to Kuwait. He and his brothers had grown up speaking Pashto and Arabic. One of his brothers had been killed fighting against the Soviets in Afghanistan. A man with a large family had relatives who had telephones and mail delivery and computers with Internet connections. A man like Ahmed had a network that could be mapped and monitored. With the ability to pore rapidly over every scrap of data and find links in terabytes of intel, one might, say, notice a suspicious cell phone number that made calls home to Kuwait from Pakistan, and then locate the cell towers where the signal originated and comb through the reams of numbers that pinged that tower, looking for telltale patterns of usage. You could also begin routinely recording the conversations on that cell phone, although there is no evidence that anyone was interested enough to listen in just yet.
There still wasn’t that much excitement over Ahmed the Kuwaiti. Again, he was just one of a great number of potential leads, many, many of which looked a lot more promising. Most of the analytical effort focused on finding the new al Qaeda Number Three or other key operational players, which had the added benefit of possibly thwarting ongoing plots. The Kuwaiti was peripheral. Much of what they had heard about him over the years suggested that he had dropped out of the organization altogether. His past associations would have been enough to explain why he kept out of sight. Perhaps it was the renewed pressure generated by President Obama in 2009, or perhaps just a decision by the teams to crank up the courier angle. It might have been that there was no change at all, that the patient collection of information and the growing sophistication of the software used to explore the TIA database finally delivered a key. But in June of 2010, because of either some change in his cell phone or its service package or some improvement in their own capability, the United States was able to pinpoint the phone’s location when it was in use. This meant they could find the Kuwaiti, and watch him.
What they found, and what immediately provoked even more curiosity at Langley, was that Ibrahim and his brother Abrar were extremely careful. They would use their phones only in the car. Ahmed drove a white Suzuki Jimny with a spare tire mounted on the back, which could be watched from above. It turned out that before even turning on his phone he would drive for at least an hour from what turned out to be that very curious compound in Abbottabad. Ibrahim and his brother were using assumed names, Arshad and Tareq Khan. That was interesting, but there could be many explanations for it. Ibrahim’s past associations alone might account for it. It was possible they were involved in some sort of illegal enterprise. Drug smuggling was big business in the Afghan-Pakistan border areas. Or maybe they were still working for al Qaeda.
These insights were sufficient to ramp up interest. If Ahmed the Kuwaiti was still a courier, perhaps he could lead them to where bin Laden was hiding.
The brothers’ recorded phone calls now got close attention. Neither gave away anything in conversation about what they were doing but, significantly, there was that business about telling lies even to close family members about where they were living. And in one of Ibrahim Ahmed’s calls came the brief exchange that appeared to confirm that he was still working with al Qaeda.
“I’m with the same ones as before.”
Now his compound in Abbottabad had the agency’s full attention.