SHORTLY AFTER TAKING COMMAND of the JSOTF, I visited one of our teams in Mosul, the largest city in northern Iraq, which was at that time under the able command of then-Maj. Gen. David Petraeus and the troops of the 101st Airborne Division. Although Mosul was still less violent than some other areas of the country, it was clear that al Qaeda was organizing to aggressively contest control of the city -- and, from there, all of northern Iraq.
Our special operations force there was small: about 15 men, supported by a single intelligence analyst. They were set up in a corner of a larger base, operating quietly from a modest white trailer. Although they coordinated with the military forces and civilian (particularly intelligence) agencies on the base, operational security procedures and cultural habits limited the true synergy of their effort against AQI and the fight for the city that lay outside the base's gates.
Moreover, the few antennas that adorned the trailer's roof were unable to pump enough classified information between them and our task force headquarters (or other teams in Iraq) with any timeliness. It wasn't a marooned outpost, thanks to the remarkable team that manned the effort. But it felt like one.
That night, on the plane back to Baghdad, I drew an hourglass on a yellow legal pad. The top half of the hourglass represented the team in Mosul; the other represented our task force HQ. They met at just one narrow point. At the top, our team in Mosul was accumulating knowledge and experience, yet lacked both the bandwidth and intelligence manpower to transmit, receive, or digest enough information either to effectively inform, or benefit from, its more robust task force headquarters. All across the country -- in Tikrit, Ramadi, Fallujah, Diyala -- we were waging similarly compartmentalized campaigns. It made our hard fight excruciatingly difficult, and potentially doomed.
The sketch from that evening -- early in a war against an enemy that would only grow more complex, capable, and vicious -- was the first step in what became one of the central missions in our effort: building the network. What was hazy then soon became our mantra: It takes a network to defeat a network.
But fashioning ourselves to counter our enemy's network was easier said than done, especially because it took time to learn what, exactly, made a network different. As we studied, experimented, and adjusted, it became apparent that an effective network involves much more than relaying data. A true network starts with robust communications connectivity, but also leverages physical and cultural proximity, shared purpose, established decision-making processes, personal relationships, and trust. Ultimately, a network is defined by how well it allows its members to see, decide, and effectively act. But transforming a traditional military structure into a truly flexible, empowered network is a difficult process.
Our first attempt at a network was to physically create one. We convinced the agencies partnered with the JSOTF to join us in a big tent at one of our bases so that we could share and process the intelligence in one location. Operators and analysts from multiple units and agencies sat side by side as we sought to fuse our intelligence and operations efforts -- and our cultures -- into a unified effort. This may seem obvious, but at the time it wasn't. Too often, intelligence would travel up the chain in organizational silos -- and return too slowly for those in the fight to take critical action.
It was clear, though, that in this fusion process we had created only a partial network: Each agency or operation had a representative in the tent, but that was not enough. The network needed to expand to include everyone relevant who was operating within the battlespace. Incomplete or unconnected networks can give the illusion of effectiveness, but are like finely crafted gears whose movement drives no other gears.
This insight allowed us to move closer to building a true network by connecting everyone who had a role -- no matter how small, geographically dispersed, or organizationally diverse they might have been -- in a successful counterterrorism operation. We called it, in our shorthand, F3EA: find, fix, finish, exploit, and analyze. The idea was to combine analysts who found the enemy (through intelligence, surveillance, and reconnaissance); drone operators who fixed the target; combat teams who finished the target by capturing or killing him; specialists who exploited the intelligence the raid yielded, such as cell phones, maps, and detainees; and the intelligence analysts who turned this raw information into usable knowledge. By doing this, we speeded up the cycle for a counterterrorism operation, gleaning valuable insights in hours, not days.
But it took a while to get there. The process started as a linear, relatively inefficient chain. Out of habit (and ignorance), each element gave the next group the minimum amount of information needed for it to be able to complete its task. Lacking sufficient shared purpose or situational awareness, each component contributed far less to the outcome than it could or should have.
This made us, in retrospect, painfully slow and uninformed. The linear process created what we called "blinks" -- time delays and missed junctures where information was lost or slowed when filtered down the line. In the early days of the effort, we had multiple experiences where information we captured could not be exploited, analyzed, or reacted to quickly enough -- giving enemy targets time to flee. A blink often meant a missed opportunity in an unforgiving fight.
The key was to reduce the blinks, and we did so by attempting to create a shared consciousness between each level of the counterterrorism teams. We started by sharing information: Video streamed by the drones was sent to all the participants -- not just the reconnaissance and surveillance analysts controlling them. When an operation was set in motion, information was continuously communicated to and from the combat team, so that intelligence specialists miles away could alert the team on the ground about what they could expect to find of value at the scene and where it might be. Intelligence recovered on the spot was instantly pushed digitally from the target to analysts who could translate it into actionable data while the operators would still be clearing rooms and returning fire. This knowledge was immediately cycled back through the loop to our intelligence and surveillance forces following the results of the raid in real time.
The intelligence recovered on one target in, say, Mosul, might allow for another target to be found, fixed upon, and finished in Baghdad, or even Afghanistan. Sometimes, finding just one initial target could lead to remarkable results: The network sometimes completed this cycle three times in a single night in locations hundreds of miles apart -- all from the results of the first operation. As our operations in Iraq and Afghanistan intensified, the number of operations conducted each day increased tenfold, and both our precision and success rate also rose dramatically.
Although we got our message out differently than did our enemies, both organizations increasingly shared basic attributes that define an effective network. Decisions were decentralized and cut laterally across the organization. Traditional institutional boundaries fell away and diverse cultures meshed. The network expanded to include more groups, including unconventional actors. It valued competency above all else -- including rank. It sought a clear and evolving definition of the problem and constantly self-analyzed, revisiting its structure, aims, and processes, as well as those of the enemy. Most importantly, the network continually grew the capacity to inform itself.
From its birth in Iraq, both the actual network -- and the hard-earned appreciation for that organizational model -- increasingly expanded to Afghanistan, especially as our nation's focus turned toward that theater. When I became the commander there, we set about building a robust communications architecture and worked to establish relationships with key actors, moving frequently around the country to instill the shared consciousness and purpose necessary for a networked modern army. But that was only the first part of the task. As we learned to build an effective network, we also learned that leading that network -- a diverse collection of organizations, personalities, and cultures -- is a daunting challenge in itself. That struggle remains a vital, untold chapter of the history of a global conflict that is still under way.