Pentagon Officials Cautious on Iraq, Point to Maliki

A convoy of vehicles carrying ISIS fighters travels to Iraq's Anbar province, on January 7, 2014.

AP Photo/militant website

AA Font size + Print

A convoy of vehicles carrying ISIS fighters travels to Iraq's Anbar province, on January 7, 2014.

At the Pentagon where so many spent years fighting in Iraq, the sense is that this is Iraqi Prime Minister Maliki’s mess to clean up. By Stephanie Gaskell

At a Pentagon briefing on Thursday, reporters peppered a top defense spokesman with question after question about Iraq. “Will there be airstrikes?” “Will you speed up the delivery of Apache helicopters?” “Does the United States have legal authority to conduct military operations in Iraq?” 

And with each question, Army Col. Steve Warren answered calmly that the United States has been providing support to Iraq since the last American troops packed up and went home at the end of 2011. The U.S. has given the Iraqis military training, weapons and equipment, including Hellfire missiles, sniper rifles, M-16s and M-4s and an untold amount of ammunition. A deal for U.S. Apache helicopters is underway, and the delivery of two F-16s will take months to complete. Both deals have been expedited since Iraqi Prime Minister Nouri al-Maliki came to Washington, D.C., in December, with hat in hand, asking for U.S. support.

But with reports that the Islamic State in Iraq and Syria, or ISIS, has seized U.S. military equipment as they rolled into Mosul this week, there’s a clear sense of caution on the part of Pentagon leaders to make sure these new assets don’t fall into the wrong hands. “We are completely aware of the gravity of the situation,” Warren said. “There’s no question that there was a structural breakdown [of Iraqi forces] in Mosul.”

ISIS has posted pictures of what it claims to be U.S. Blackhawk helicopters, but a DOD official said they were doctored photos and pointed out that the U.S. never sold or leased Blackhawks to the Iraqis. “There are no U.S. Blackhawks in Iraq,” the official said. As for pictures of ISIS members on U.S. Humvees, the official said “there is no indication that those are false.”

The Pentagon constantly monitors any foreign weapons sales. “Security is part of the process of transferring weapons systems,” Warren said. But the civil war in Syria is a clear example of how hard it has become to support different, often equally as dangerous, factions in irregular warfare, and even more difficult in the fast-moving situation in that area of the world, where now even al-Qaeda is distancing itself from ISIS.

In the halls of the Pentagon, many service members are disappointed that Iraq has spiraled out of control. But many agree with Army Chief of Staff Gen. Ray Odierno, who said in January that U.S. troops had completed their mission in Iraq.

“Obviously it’s disappointing to all of us to see the deterioration of the security inside of Iraq. I spent a lot of my life over there. From 2006, end of 2006 to September 2010, I was there as we continued to reduce the level of violence and the sectarian violence that was going on. I believe we left it in a place where it was capable to move forward,” he said, at the time.

Close [ x ] More from DefenseOne
 
 

Thank you for subscribing to newsletters from DefenseOne.com.
We think these reports might interest you:

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • GBC Issue Brief: Supply Chain Insecurity

    Federal organizations rely on state-of-the-art IT tools and systems to deliver services efficiently and effectively, and it takes a vast ecosystem of organizations, individuals, information, and resources to successfully deliver these products. This issue brief discusses the current threats to the vulnerable supply chain - and how agencies can prevent these threats to produce a more secure IT supply chain process.

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Information Operations: Retaking the High Ground

    Today's threats are fluent in rapidly evolving areas of the Internet, especially social media. Learn how military organizations can secure an advantage in this developing arena.

    Download

When you download a report, your information may be shared with the underwriters of that document.