Chilcot: False Intelligence Led To Iraq Invasion Which Spawned IS

Allegations that the invasion of Iraq increased the terrorist threat to the UK and helped spawn the terror group Islamic State are supported by intelligence documents released as part of the Chilcot report.

Top-secret reports from the joint intelligence committee, some of which were released for the first time, make clear security services’ concern about the increasing power in Iraq of jihadi groups, some of which were linked directly to al-Qaida.

The reports show that by 2006 the British security services had become worried that Sunni jihadi groups had started to dominate the insurgency against the Shia-led Iraqi government of Nouri al-Maliki.

The invasion of Iraq has horrible consequences even today, a bloodbath in Baghdad and an Islamic State terror war against the world. What is not sure is whether the existence of weapons of mass destruction was the primary motive for the military action. Perhaps regime change, the removal of Saddam Hussein, who was seen by Bush and Blair as part of the evil that had led to 9/11, was the dominant motive. However, eradication of WMD was the aim that the leading governments of the coalition stated as their main justification for the war, and it is therefore natural that we focus on it.

In the months preceding the invasion, the UN inspection force carried out some 700 inspections without finding any WMD, and in the months that followed investigators from the US came to the same conclusion. If the aim was to eradicate WMD the bloodshed, death and destruction has been meaningless. How convinced were the leaders in the US and UK of the existence of the weapons in the days and weeks before the war?

Blair responded that the intelligence was clear: Saddam had revived his WMD programme. However, the French president, Jacques Chirac, had a different view. He he thought there were no WMD and that the various national intelligence agencies had “intoxicated” each other when sharing information. They had. In addition, the cautionary question marks they sometimes provided had been replaced by exclamation marks at the political level. 

MI6 was led to believe Saddam Hussein was continuing to produce weapons of mass destruction (WMD) by a false agent who based his reports on a Hollywood action movie, the Chilcot Inquiry has disclosed.

In September 2002, MI6 chief Sir Richard Dearlove said the agency had acquired information from a new source revealing that Iraq was stepping up production of chemical and biological warfare (CBW) agents.

The source, who was said to have "direct access", claimed senior staff were working seven days a week while the regime was concentrating a great deal of effort on the production of anthrax.

Families of the senior scientists involved were said to have been effectively made hostage to discourage them from deserting or leaking details to the US/UK coalition against Saddam.

What is now clear from some of the intelligence operatives is that a senior member of Saddam’s government wanted to take Saddam down and he falsified and supported the concept that Saddam’s regime had WMD. The British intelligence operations who had the misinformation from the informer concerning WMD knew the information was unsound and had not been backed by other informers. 

However, questions were raised about the agent's claims when it was noticed his description bore a striking resemblance to a scene from the movie The Rock, starring Sean Connery and Nicolas Cage.

"It was pointed out that glass containers were not typically used in chemical munitions, and that a popular movie (The Rock) had inaccurately depicted nerve agents being carried in glass beads or spheres," the Chilcot report stated.

By February 2003 - a month before the invasion of Iraq - MI6 concluded that their source had been lying "over a period of time" but failed to inform No 10 "or others", even though Mr. Blair had been briefed on his intelligence.

However, Blair, and other leaders, used the unsupported ‘information’ and they misrepresented the reality. They used it to urge a war over the faulty picture they had created. 

While the Chilcot report does not express a view on the legality of war, it says that Iraq in 2003 did not pose a threat that justified a war, and that it would have taken years to reconstitute a weapons programme.

It was not launched by the US and UK in self-defence against Iraqi aggression, and it was not authorised by the security council. Saddam was a brutal dictator, but in 2003 he was a threat to no one but his own people, and Iraq was prostrate after more than a decade of international sanctions. Three permanent members of the security council, China, France and Russia, explicitly opposed the action, and hundreds of thousands of people in the streets of New York, London and other cities demonstrated against it.

The Chilcot report noted that the objectives set for the war were not attained. Weapons of mass destruction were not eradicated, as they did not exist; al-Qaida groups were not eliminated, as they were not in Iraq at the time; Iraq was not made into a model of democracy for the Middle East, as members of the US administration had predicted. Saddam was removed but Iraq evolved from tyranny to anarchy, with various alienated Sunni groups later forming a core of Isis. Thirteen years after the US, and UK, led invasion of Iraq, many questions linked to the war remain. Above all, what lessons should we draw?

One lesson relates to the value of international inspection. In the case of Iraq, the US and UK went ahead with the invasion on the basis of their own faulty intelligence. Nevertheless, the broader membership of the security council kept faith with the professional UN inspectors and helped prevent the council from endorsing a war that should never have been waged. That was significant, as independent and competent international inspections remain indispensable, for example in defusing the controversy over Iran’s nuclear programme.

Another lesson concerns the readiness of states to resort to armed intervention. The Bush administration was not particularly bothered about UN charter restrictions on the use of armed force. Iraq under Saddam was seen as a part of the “axis of evil”, and as such a legitimate target. Liberated from Saddam, Iraq would become a democracy with friendly ties to the US. Blair, as he had explained in a speech in Chicago in 1999, clearly sympathised with the thought that states capable of acting against odious tyrants could assume the role of global sheriffs and intervene with armed force when other options failed.

However, respecting established UK readings of the UN charter, he made an effort to get a specific security council resolution that might justify armed action in Iraq. The efforts failed and the American train moved on to invasion with the UK on board.

Finally, there may be hope that a disastrous experience in Iraq could be a watershed in the resort by states to armed intervention. We have seen how, in the post-colonial world, the grabbing of land by force is largely over – Iraq’s occupation of Kuwait and Russia’s annexation of Crimea being widely condemned exceptions.

Barack Obama is clearly aware of the popular reluctance in the US to place boots on the ground in faraway places, and of the perils of intervening with armed force without UN authorisation. 

Guardian:   Guardian:   Sky

 

« Tesla Test Driver Dies On Autopilot
Cybersecurity Insurance – What Is It? How Does It Work? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

ITQ

ITQ

ITQ is an IT consulting firm with a focus on the entire VMware-product portfolio with three main services: Professional Services, Support Services and Managed Services.

Certification Europe

Certification Europe

Certification Europe (now Amtivo Ireland) is an accredited certification body which provides ISO management system certification, including ISO 27001.

TechInsurance

TechInsurance

TechInsurance is America's top technology insurance company offering a range of technology related products including Cyber Liability insurance.

Telefonica Tech

Telefonica Tech

Telefónica Cyber Security Tech is focused on the prevention, detection and appropriate response to security incidents aimed at protecting your digital services.

Kivu Consulting

Kivu Consulting

Kivu Consulting combines technical and legal expertise to deliver data breach response, investigative, discovery and forensic solutions worldwide.

PSW Group

PSW Group

PSW Group is a full-service Internet solutions provider with a special focus on Internet security.

Cybersecurity Tech Accord

Cybersecurity Tech Accord

The Cybersecurity Tech Accord promotes a safer online world by fostering collaboration among global technology companies.

Redborder

Redborder

Redborder is an Open Source network visibility, data analytics, and cybersecurity Big Data solution that is scalable up to the needs of enterprise networks and service providers.

C3.ai

C3.ai

The C3 AI Suite supports configurable, pre-built, high value AI applications for predictive maintenance, fraud detection, anti-money laundering, sensor network health and more.

Pyxsoft PowerWAF

Pyxsoft PowerWAF

Pyxsoft PowerWAF responds to the problem of business cybersecurity. We protect our clients' websites and data against attacks and exploitation of all kinds of vulnerabilities.

R3I Ventures - House of DeepTech

R3I Ventures - House of DeepTech

The House of DeepTech is an incubator for deeptech entrepreneurs that are transforming global industries. Areas of interest include cybersecurity.

Periculus

Periculus

Periculus makes managing digital risk simple. Its integrated platform offers access to purchase cyber insurance and cyber security solutions uniquely tailored to fit the needs of every business.

Aegis Security

Aegis Security

Aegis Security helps clients to secure their systems against potential threats through pre-emptive measures, such as security assessments, and cutting-edge solutions to security challenges.

Mindflow

Mindflow

Mindflow is dedicated to bringing answers to the challenges the cybersecurity field and beyond face today.

Autobahn Security

Autobahn Security

Autobahn Security is a growing team of 80+ experts from 25+ nationalities, established in 5 countries. We’re working hard to make Autobahn Security the No. 1 solution for improved hacking-resilience.

Security4Media

Security4Media

Security4Media is a non-profit association set up to reduce risks and support trust in media, in the face of increasing cybersecurity threat levels.