It’s Time for Better Options for Rescuing US Hostages

John and Diane Foley, parents of slain journalist James Foley, are photographed at their home in Rochester, N.H., May 18, 2011 before holding a press conference about the release of their son.

Cheryl Senter/AP

AA Font size + Print

John and Diane Foley, parents of slain journalist James Foley, are photographed at their home in Rochester, N.H., May 18, 2011 before holding a press conference about the release of their son.

The murders of James Foley and Steven Sotloff make it clear the U.S. needs alternative ways to save its own from terrorist hostage takers. By Rep. Duncan Hunter

The deaths of American journalists James Foley and Steven Sotloff give good reason why the Islamic State group must be crushed. Though less apparent in these tragedies is what the U.S. government must do differently to support Americans in captivityspecifically those held in hostile territory.

At this very moment, there are Americans in the custody of extremist organizations from Iraq and Syria, to Afghanistan and Pakistan. No different than what Foley and Sotloff experienced, these individuals are under constant threat and their lives are at risk every day.

The U.S. does not pay ransoms and is unwilling to make concessions with terrorist organizations. There is sometimes an opportunity for a rescue mission, but not always. And when a rescue is not feasible or unsuccessful, there is a presumption that other options are generally within reach to bring these Americans home. That assumption is wrong.

The unfortunate reality is that alternate efforts are not systematically developed and rarely exhausted when introduced. The problem is not a shortage of creative thinkingthere is plenty of that already. The real problem is the lack of leadership and the fact that no single institution or line of authority exists within the federal government to support captives. 

This often results in recovery operations with limited organization and difficulties due to the involvement of multiple government entities with varying degrees of interest and purview. The White House, the State Department, the Central Intelligence Agency, the National Security Agency, the FBI, the Pentagon and the military services are almost always uniquely involved in some way. Mostly, for non-uniformed individuals, it is the State Department and the FBI that lead operations despite possessing limited assets and access to the captor network.

One of the most vivid illustrations of this dynamic involves Army Sergeant Bowe Bergdahl. To compete with the State Department-focused prisoner swap and to disassociate from infighting, a separate cell was created within the Pentagon – led  by experienced and battle-tested individualsto develop non-combat oriented solutions, more formally known as non-kinetic options, to do more than just recover Bergdahl. The objective was to recover all Americans held in the Afghanistan-Pakistan region.

The planning produced viable options that included no ransom payments to terrorists or disproportionate trades. The cell focused on Pakistan as the key element and presented ideas that leveraged Pakistan’s security apparatus and its influence with various captors. 

The proposals were briefed, only to be passed over and ignored by mid-level bureaucrats. The ideas never reached the secretary of defense and they most certainly never reached the president, who approved the prisoner swap without knowledge of additional efforts under consideration within the Pentagon. The proposals were shelved and there has been no attempt or interest to reintroduce them. Some have application beyond Afghanistan-Pakistan and could prove useful for Americans held by the Islamic State group.  

In the case of Foley, Sotloff and others, the Defense Department has taken a backseat to the State Department and FBI. But as proven by the cell that developed non-combat options for Bergdahl, it is the Defense Department that is best positioned to lead these efforts.

This starts with directing a single line of authority through the Defense Department, empowered by the president, to maintain control and oversight, and guarantee efforts are properly developed, coordinated and sufficiently resourced. Further, the authority would pursue the full range of optionsmilitary and diplomatic. And a process should also be established to determine the most appropriate lead-department or agency for cases in non-contested areas.

The U.S. cannot stop the Islamic State and other organizations from taking Americans captive, unless these groups are decimated altogether. That day may come, but until it does the U.S. should not sit around and wait while there are Americans in enemy hands and the threat exists that more might be taken captive.  

Rep. Duncan Hunter is a Republican member of the U.S. House of Representatives from California’s 52nd District and a member of the House Armed Services Committee. He deployed twice to Iraq and once to Afghanistan and is a major in the U.S. Marine Corps Reserve. 


Read his entire letter to President Barack Obama (excerpted below) here.


  

Close [ x ] More from DefenseOne
 
 

Thank you for subscribing to newsletters from DefenseOne.com.
We think these reports might interest you:

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • GBC Issue Brief: Supply Chain Insecurity

    Federal organizations rely on state-of-the-art IT tools and systems to deliver services efficiently and effectively, and it takes a vast ecosystem of organizations, individuals, information, and resources to successfully deliver these products. This issue brief discusses the current threats to the vulnerable supply chain - and how agencies can prevent these threats to produce a more secure IT supply chain process.

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Information Operations: Retaking the High Ground

    Today's threats are fluent in rapidly evolving areas of the Internet, especially social media. Learn how military organizations can secure an advantage in this developing arena.

    Download

When you download a report, your information may be shared with the underwriters of that document.