Have U.S. Troops Overstayed Their Welcome in Afghanistan?

Afghan President Hamid Karzai heads to a press conference on Nov. 16

Rahmat Gul/AP

AA Font size + Print

Afghan President Hamid Karzai heads to a press conference on Nov. 16

Afghan President Hamid Karzai has hosted U.S. troops for more than a decade, but now his hospitality is running out, putting a post-2014 deal at risk. By Stephanie Gaskell

Back in 2005, when the world was barely paying attention to the war in Afghanistan, President Hamid Karzai complained that U.S. and NATO troops were knocking on doors and entering the homes of Afghans as they pleased. “No coalition forces should go to Afghan homes without the authorization of the Afghan government,” he said. Years later, Karzai railed against night-time raids, which the U.S. military uses to surprise — and capture — high-value terror targets.

Now, as U.S. and NATO forces negotiate a so-called bilateral security agreement with Afghanistan to keep a smaller force in the country after combat operations officially end next year, Karzai’s hospitality again seems to be waning. The main sticking point is whether coalition forces will be able to search Afghan homes, and once again Karzai is wary of allowing foreign troops to disrupt the lives of his people. He has refused the NATO request, Reuters reports, and threatens to derail the negotiations entirely.

They want a window left open to go into Afghan homes, but the president does not accept that — not unilaterally and not joint,” an Afghan official told Reuters. “From our side there is no flexibility on this issue of allowing Americans to search Afghan homes, because this is more important than jurisdiction.”

Jurisdiction — whether Afghanistan has the right to prosecute any U.S. soldier who commits a crime in Afghanistan — is what derailed efforts in Iraq in 2011 to keep U.S. and NATO troops there after that war. Karzai has said he’s not convinced he should give U.S. troops immunity.

This latest impasse emerged just days before Thursday’s scheduled loya jirga, a key gathering of Afghan political and tribal leaders to debate the post-2014 question. The United States has been eager to seal a deal with Afghanistan because there’s worry that as next spring’s presidential election nears, the desire to project Afghan sovereignty will only grow.

The insurgency’s rejection of foreign troops is growing too. A car bomb exploded on Saturday at the site planned for the next loya jirga, killing at least 10 people

Close [ x ] More from DefenseOne
 
 

Thank you for subscribing to newsletters from DefenseOne.com.
We think these reports might interest you:

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • GBC Issue Brief: Supply Chain Insecurity

    Federal organizations rely on state-of-the-art IT tools and systems to deliver services efficiently and effectively, and it takes a vast ecosystem of organizations, individuals, information, and resources to successfully deliver these products. This issue brief discusses the current threats to the vulnerable supply chain - and how agencies can prevent these threats to produce a more secure IT supply chain process.

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Information Operations: Retaking the High Ground

    Today's threats are fluent in rapidly evolving areas of the Internet, especially social media. Learn how military organizations can secure an advantage in this developing arena.

    Download

When you download a report, your information may be shared with the underwriters of that document.