201
views
0
recommends
+1 Recommend
1 collections
    1
    shares

      From January 2024, all of our readers will be able to access every part of ROAPE as well as its archive without a paywall. This will make ROAPE accessible to a much wider readership, especially in Africa. We need subscriptions and donations to make this revolutionary intiative work. 

      Subscribe and Donate now!

       

      scite_
       
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      ‘We recommend compliance’: bargaining and leverage in Ethiopian–US intelligence cooperation Translated title: « Nous recommandons la mise en conformité » : négociation et influence dans la coopération Ethiopie-États-Unis en matière de renseignement

      Published
      research-article
      Bookmark

            ABSTRACT

            Disputes over the costs and benefits of intelligence liaisons between the US and its African allies are routine. The contentious and largely overlooked bargaining processes that stem from these disputes call into question prominent depictions of US–African security partnerships as rigidly hierarchical alliances. Through an assessment of compliance bargaining between Ethiopia and the US over the terms of their intelligence liaison, this article posits that, despite the vast power asymmetry between these allies, Ethiopia routinely dictated and policed the terms of this liaison, while consistently leveraging it as means to acquire political concessions from the US.

            RÉSUMÉ

            Les différents liés aux coûts et aux bénéfices des relations entre les États-Unis et ses alliés africains en matière de renseignement sont habituels. Les processus controversés et largement négligés de négociation à l’origine de ces différents remettent en question les représentations connues des partenariats États-Unis-Afrique en matière de sécurité comme des alliances strictement hiérarchiques. A travers une évaluation de la négociation entre l’Ethiopie et les États-Unis pour la mise en conformité des conditions de leur relation en matière de renseignement, cet article avance que, malgré la grande asymétrie des pouvoirs entre ces alliés, l’Ethiopie a dicté et contrôlé les conditions de cette relation, tout en en tirant profit comme un moyen d’acquérir des concessions politiques de la part des États-Unis.

            Main article text

            Recently declassified documents starkly illustrate the horse-trading and quid pro quos that were endemic to intelligence liaisons between the US and its African allies during the Cold War. To take one example, in 1976 the US Ambassador to Kenya sought authorisation from the Pentagon to provide Kenyan defence officials with secret intelligence ‘on Soviet military activity in Somalia as a quid [pro quo]’ that demonstrated the value of closer ties with Washington (US Embassy Nairobi to US Secretary of Defense 1976).1 More recent accounts of negotiations that lead to intelligence cooperation between the US and its African security partners remain largely classified. Insights can be gleaned, however, into the bargaining that ensues after these intelligence liaisons are in place.2

            Despite formal intelligence sharing agreements between the US and its African allies, once the passing of secrets begins, disputes often arise that are addressed through improvisation and bargaining. Ethiopia, in particular, has deployed a range of tactics to assert its interests in the context of these disputes. For example, since the beginning of the US campaign against Al-Qaeda, Ethiopia has stalled US intelligence gathering initiatives within its borders, pulled Ethiopian liaison officers from joint intelligence operations with the US and used shared intelligence in ways contrary to US expectations. US officials have responded to these actions with a mixture of concessions, aimed at preserving the intelligence liaison, and threats, intended to constrain the more self-interested impulses of their Ethiopian ally. Examining this type of bargaining casts much needed light on the trajectories and outcomes of intelligence cooperation between the US and its African allies. Toward this end, using the analytical framework of compliance bargaining, this article investigates US and Ethiopian intelligence cooperation aimed at neutralising insurgents in Somalia during the first decade of the ‘War on Terror’.

            Primarily used by scholars to examine trade agreements, using compliance bargaining as an analytical framework elucidates the process through which states bargain over the terms and obligations of an agreement that has already been established. I contend that the application of this framework to bargaining over intelligence cooperation helps to meaningfully revise our understanding of liaisons between the US and its African allies. Assessing these relationships through the lens of compliance bargaining calls into question prominent depictions of US–African security partnerships as rigidly hierarchical alliances in which the US calls the shots and its African allies have little choice but to comply. The application of this framework to disputes over intelligence cooperation between Ethiopia and the US will be guided by two central questions. How successful has Ethiopia been in compelling the US to comply with its reading of the terms of the intelligence liaison between these two states? And how effectively has Ethiopia used this liaison as a source of bargaining leverage to acquire political concessions from the US? I argue that despite the vast power asymmetries between these states Ethiopia has routinely dictated and policed the terms of its intelligence liaison with the US while consistently finding ways to leverage this liaison in pursuit of its regional objectives.

            This case study underscores the increasingly prominent role intelligence cooperation plays within the rapidly expanding array of security partnerships the US has established with African states over the course of the last decade. Defence officials, particularly those associated with the United States Africa Command and the Combined Joint Task Force-Horn of Africa, routinely highlight US efforts to work with and strengthen the intelligence services of their African security partners. However, scant scholarly attention has been paid to the implications of this form of cooperation, the dependencies and vulnerabilities it creates for both the US and African states, or the dangers it may pose to the security and civil liberties of civilians throughout Africa.

            Liaison disputes and compliance bargaining

            The most expansive and widely accepted use of the term intelligence liaison references a broad range of collaborative efforts between the military and civilian intelligence services of allied states. These efforts include sharing information, engaging in joint covert operations, providing or receiving access to intelligence collection infrastructure, and offering or receiving assistance in the form of funding, training and expertise (Westerfield 1996; see also Johnson and Freyberg 1997). While these activities bolster security cooperation between states, they also give rise to disputes over the terms, obligations and expectations that each state associates with the liaison. I argue that these disputes are often addressed through compliance or post-agreement bargaining processes.

            Compliance bargaining, as a political phenomenon and an analytical framework that aims to explain this phenomenon, has been most clearly delineated in the work of Jönsson and Tallberg (1998; see also Jackson 2012). As a framework, compliance bargaining calls attention to the mechanisms of both management and enforcement that states mobilise when they share an interest in maintaining an agreement but have conflicting views on how the agreement should be implemented. It is a process-oriented line of inquiry that pays special attention to the ways states test the limits of compliance, respond to violations of agreements and use tactics to generate bargaining leverage.

            While compliance bargaining as an analytical framework has been primarily applied to studies of international trade agreements, I contend that its explanatory power can be substantively extended to intelligence liaisons. Scholars have long suggested that bargaining is inherent in intelligence liaisons. Westerfield (1996) contends that the US largely applies a ‘bargaining style of management’ (524) to its liaisons with other states. As such, the US relies on intelligence agents from allied states to gather human intelligence in their respective regions and in exchange provides signals intelligence about shared targets and threats. Narrowing the definition of the term, Sims (2006) posits that at its core liaison is ‘subcontracted intelligence collection based on barter’ (196). Hence, any assistance that one liaison partner offers another is offered with the expectation that political or intelligence gains will result. My application of the compliance bargaining framework builds on these insights and underscores that political or intelligence gains do not spring fully formed from the texts of liaison agreements but are secured over time as states police the implementation of their cooperative intelligence initiatives and respond to suspected or actual violations by their liaison partners.

            When the focus is shifted from the premise of intelligence cooperation to the actual practice of it, intelligence studies literature tends to overlook the significance of bargaining processes between allies as liaisons endure. Two strands of analysis largely dominate accounts of intelligence cooperation. One strand focuses on the benefits and costs of intelligence liaisons, the other on symmetry and asymmetry within these partnerships. To the extent that either of these approaches addresses bargaining, the focus tends to be negotiations that lead to intelligence cooperation, while disputes over compliance with the terms of this cooperation are rarely interrogated. This works to the detriment of our understanding of liaisons because bargaining processes over the course of liaisons can be of pivotal significance to the consequences of these partnerships for states, their shared enemies, and civilians in regions where covert operations are conducted.

            The cost–benefit school of intelligence analysis generally concludes that states can shape the risks and rewards of intelligence liaisons by carefully negotiating the terms of these agreements, such as the type and degree of intelligence that will be shared, the status of personnel and facilities, and how intelligence will be used and protected once exchanged (Richelson 1990; Clough 2004).3 However, because intelligence liaisons are laced with both cooperative and competitive impulses, compliance with these terms can rarely be taken for granted. (For a discussion of the lack of trust that hinders intelligence cooperation between even the closest of allies, see Aldrich 2004.) As I illustrate, bargaining thus extends far beyond the establishment of liaisons.

            The secrecy inherent in intelligence collection and the high stakes of many of these operations often offer strong incentives for non-compliance or for testing the limits of compliance. Compliance bargaining is thus an important process in which states not only consider their own security interests and the expectations of their intelligence partners, but also respond to changing international threats and conditions. Within this dynamic, risks and dependencies for one state in a liaison can be ready sources of leverage for the other.

            Analysis that accounts for symmetry or asymmetry within liaisons tends to highlight the distribution of labour and power between partnering states. Hence, there is greater discussion of the competitive impulses and divergent interests that characterise alliances (Walsh 2007; see also Walsh 2010; Sims 2006).4 The propensity of states to establish hierarchies in intelligence cooperation and manipulate liaisons to gain influence is made clear in this research. However, because much of this analysis seeks to establish typologies of intelligence cooperation, liaisons are often depicted as rigidly adversarial or hierarchical. To the extent that the adversarial impulses within asymmetrical liaisons are noted, the emphasis is quite often on the ways that more powerful states consistently strong-arm their weaker partners.

            The compliance bargaining framework, by contrast, is more carefully attuned to extended processes of persuasion and retaliation in which weaker states attempt to challenge the imposition of hierarchy by their stronger allies. Even in liaisons such as the one I examine between Ethiopia and the US which cannot be considered primarily adversarial, weaker states often deploy adversarial bargaining tactics, large and small, against their stronger partners. A focus on compliance bargaining highlights these tactics – such as the weaker partner suddenly pulling its operatives out of joint intelligence gathering operations – and examines the leverage that may be derived from their application.

            Assessing intelligence cooperation through the analytical lens of compliance bargaining also helps to bridge the long-standing divide between international relations theory and intelligence studies literature. International relations research on why states comply with the terms of their agreements, most prominently the enforcement and management schools with their respective emphases on sanctions and ‘jawboning’,5 both find analytical purchase within studies of compliance bargaining (Downs, Rocke, and Barsoom 1996; Chayes and Chayes 1993; see also Underdal 1998). These mechanisms for securing compliance are often noted in the literature on intelligence liaisons. Yet they have not been integrated into an analytical framework, anchored in international relations theory, that identifies their broader salience as tactics in extended bargaining processes that are pivotal to the trajectories of liaisons, security alliances and relations between allies as a whole. (For further discussion, see Svendsen 2009.)

            The origins of US–Ethiopian intelligence liaison

            In the immediate wake of the 2001 US intervention in Afghanistan, Bush administration officials began to identify the Horn of Africa, Somalia in particular, as a potential safe haven where Al-Qaeda could reconstitute itself, train fighters and plan attacks. At the time, US civil and military intelligence services confronted a paucity of human intelligence networks in Somalia. As the term suggests, human intelligence is information collected and provided by human sources, ranging from paid informants to foreign government officials (Joint Chiefs of Staff 2015). This intelligence aims to identify the ‘intentions, composition, strength, disposition, tactics, equipment, personnel and capabilities’ (Jones 2002, 29) of US adversaries.

            Garrett Jones, former US Central Intelligence Agency (CIA) station chief in Mogadishu, expressed little doubt that the Bush administration was forced to monitor Somalia through ‘second and third hand sources’ because the CIA had lacked a dedicated presence there for nearly a decade. Gayle Smith, Senior Director for African Affairs at the National Security Council during the Clinton administration, noted that US intelligence on Africa was generally ‘woefully weak and limited’. Intelligence gathering in Somalia, she suggested, was all the more constrained by the acute dearth of Somali speakers among US forces (Kelly 2005).

            As the US began to turn its attention to the Horn of Africa, regional experts asserted that Ethiopia had been ‘fairly pivotal’ in providing the Pentagon with ‘exaggerated’ intelligence that identified Somalia as a haven for Al-Qaeda operatives (Cobb 2001; Menkhaus 2002). Ethiopia’s running conflict with Somalia and irredentist Somali insurgents in its Ogaden region dates to the founding of the Somali state and has been punctuated by three major wars. These tensions have provided Ethiopia with ongoing motive and opportunity to maintain an active intelligence gathering presence in Somalia (Bryden 2003; Tareke 2000; Mesfin 2010). Moreover, by helping to establish and sustain the Somali Reconciliation and Restoration Council, a warlord coalition founded in 2001, Ethiopia was able to keep a close watch on and play a hand in steering the course of events in Mogadishu (Dagne 2002). In short, Ethiopia’s human intelligence network in Somalia far surpassed that of the US in sophistication and entrenchment.

            US officials, however, were determined to ‘get smarter’ (La Guardia 2001). Toward this end, in November 2002, the Pentagon established the Combined Joint Task Force-Horn of Africa (CJTF-HOA) and by 2003 had based the majority of its personnel in Djibouti. The widely touted mission of the task force, according to Pentagon officials, was ‘waging peace’ by conducting humanitarian aid missions in the Horn of Africa and strengthening regional military forces (Mahnken 2005). However, from the very outset these were secondary goals for the commander of the task force, who declared upon its founding that his primary focus was to ‘detect, disorganize, and defeat’ terrorists groups in the region (Agence France Presse 2002). Indeed, the task force provided a headquarters and, intelligence officials suggest, a ‘blanket of cover’ for troops from the Pentagon’s Joint Special Operations Command who gathered intelligence and tracked down terrorist suspects, quite often in joint operations with Ethiopian soldiers (Naylor 2011b).

            While they downplayed the more kinetic aims of the task force, US defence officials made no secret of their efforts to further consolidate ‘military and intelligence cooperation’ with Ethiopia (Deutsche Presse-Agentur 2003). Ethiopia, for its part, was receptive to these overtures and began to work closely with the Combined Joint Task Force, seconding a liaison officer to the task force’s intelligence sharing fusion cell.6 This rapidly evolving, tight-knit intelligence cooperation between Ethiopia and the United States would soon serve as a valuable source of leverage for the administration of the late Ethiopian prime minister, Meles Zenawi.

            Conceding territory: the Ethiopia–Eritrea border dispute

            From 1998 to 2000 Ethiopia and Eritrea fought a war that resulted in an estimated 50,000 casualties due to a long-running dispute regarding the delineation of the border between the two states (Iyob 2000; Lacina and Gleditsch 2005). As a provision of the Algiers Agreement that ended this bloody conflict, Eritrea and Ethiopia agreed to abide by the rulings of an independent boundary commission based in the Hague. In 2002, when the Eritrea–Ethiopia Boundary Commission (EEBC) issued its findings, it largely sided with Eritrea’s view of where the border between the states lies. After refusing for two years to recognise the Commission’s ‘illegal and unjust’ findings, in 2004 the Meles administration agreed to accept the Commission’s ruling ‘in principle’ as part of a five-point plan Ethiopia proposed to bring peace to the region (Mitchell 2004). According to the US Embassy in Addis Ababa, the five-point plan was based on a US proposal, but State Department officials insisted that the Meles administration should accept the Boundary Commission’s ruling without conditions, rather than ‘in principle’ (US Embassy Addis Ababa to CIA 2007a).

            As such, when Meles announced his five-point plan in 2004, while the African Union, the UN and several European states encouraged the prime minister’s initiative, US officials initially refused to publicly support the plan. The Ethiopians were outraged. According to the US Embassy in Addis Ababa, in ‘retaliation’ as a clear ‘signal of dissatisfaction’, Meles temporarily withdrew Ethiopia’s liaison officers from the CJTF-HOA. These officers were a central link between the task force and the Ethiopian Ministry of Defence and facilitated the sharing of classified intelligence between the two agencies (US Embassy Addis Ababa to US CIA 2007a; for discussion of role of liaison officers see CJTF-HOA 2012 and CJTF-HOA 2015).

            At the time, the US largely lacked what one Bush administration official termed ‘human intelligence on a fundamental level’ in Somalia, and the cooperation of the Ethiopians in this regard had been of significant assistance (Naylor 2011a). The CIA had been establishing contacts with Somali warlords since 2002, and in 2005 began channelling funds to these warlords in the hope that they would initiate a campaign to kill and capture Al-Qaeda operatives. This effort has been widely characterised as ill conceived and ineffective by both administration officials and regional analysts. Moreover, because of the relatively new and clearly mercenary nature of these ties, the information provided by these warlords could not be as trusted as the intelligence which Ethiopia had routinely shared. As such, Meles’ act of retaliation was particularly well timed. By manipulating US access to Ethiopia’s human intelligence, Meles intended to express his anger at the muted response the US had given his plan and influence the State Department’s decision making with regard to the border dispute between Ethiopia and Eritrea. This bargaining tactic appears to have captured the attention of US officials.

            By early 2005 Bush administration officials began to issue statements suggesting that their initial silence was not a refutation of Meles’ five-point plan. In a May 2005 Congressional hearing, the Deputy Assistant Secretary of State for African Affairs, Donald Yamamoto, asserted that the State Department’s lack of comment was ‘not to say that the five point plan is bad or it lacks merit or positive issues’ (Federal News Service 2005). Rather, the silence was simply an attempt to encourage the leadership in Ethiopia and Eritrea to engage each other more directly. It is worth noting that in the same month when Yamamoto began to back-pedal before the US Congress, the Meles administration began to publicly declare to the international press that Ethiopia had evidence of a ‘very active al Qaeda cell’ in Somalia (Tomlinson 2005a). This view was almost immediately echoed by senior US defence officials interested in adding substance to often vague pronouncements about the use of Somalia as a terrorist safe haven (Tomlinson 2005b).

            Eritrea’s growing intransigence on the border issue also strengthened Ethiopia’s hand. Much of the international community responded to Meles’ five-point plan as an avenue for dialogue between Ethiopia and Eritrea. Eritrea, however, refused to engage in any negotiations until Ethiopia committed to demarcating the border in precise accordance with the Boundary Commission’s initial ruling. In late 2005 Eritrea announced travel and flight restrictions on the UN border-monitoring force that had been established as part of the Algiers Agreement and demanded that all of the force’s North American and European staff be withdrawn. Eritrea’s president also condemned US efforts to mediate the conflict as ‘pro-Ethiopian’ (Healy and Plaut 2007, 6).

            In many ways this was a fair assessment. By November 2005, intelligence cooperation between Ethiopia and the US had resumed. That month, in a meeting with Prime Minister Meles, Deputy Assistant Secretary of State for African Affairs Yamamoto conveyed the Bush administration’s appreciation for ‘the successful intelligence sharing program between the US and Ethiopia on Somalia’ (US Embassy Addis Ababa 2005). At the same meeting, Meles asserted that the time was not right to move forward on negotiations with Eritrea over the border and refused to send an Ethiopian delegation to a mediation conference called by the Boundary Commission and strongly backed by the US. Moreover, Meles clung to the position that he only accepted the Commission’s ruling ‘in principle’.

            In early 2006 Jendayi Frazer, US Assistant Secretary of State for African Affairs, after visiting the Ethiopian–Eritrean border alongside Ethiopian forces, began to lobby UN officials in support of Meles’ position. She claimed to understand the difficulties Ethiopia was having implementing the Boundary Commission’s ruling. The villages she had visited that had been ruled to be on Eritrean territory were populated by people who, Frazer claimed, strongly identified with Ethiopia. However, despite Meles’ belief that the president of the EEBC was ‘biased’ against Ethiopia, Frazer contended that the prime minister was showing increased flexibility and amenability to diplomacy (US Embassy Addis Ababa to US Embassy Eritrea 2006; for further discussion, see Bolton 2007).

            In January 2006, Meles had submitted a memorandum to the UN Security Council that dispensed with the caveat ‘in principle’ with regard to Ethiopia’s decision to accept the EEBC ruling. However, in practice he was still demanding that the demarcation of the border not follow a strict reading of the Commission’s ruling and that implementation of the ruling be refined in accordance with Ethiopia’s interests.

            In a cable to Washington the US Embassy in Addis Ababa claimed that by 2006 this ‘misunderstanding’ between the US and Ethiopia had been ‘resolved’ (US Embassy Addis Ababa to CIA 2007a). Throughout the course of this bargaining episode, US officials consistently made it clear to their Ethiopian counterparts that the Bush administration saw Ethiopia as an anchor state and key security partner in the fight against terrorism in Somalia. The linchpin of this partnership was the intelligence liaison between the two states, and the US was determined to preserve it. However, new tensions were emerging that would threaten the liaison and give rise to a new round of bargaining.

            ‘Waging peace’ in the Ogaden

            Since 2002 the CJTF-HOA has initiated a number of humanitarian projects in the Horn of Africa. Civil affairs teams have built and renovated schools, dug wells, vaccinated cattle and provided flood relief. Whether these projects have made a lasting contribution to the US hearts and minds campaign in the region is heavily disputed (United States Government Accountability Office 2010; Bradbury and Kleinman 2010; Bachman 2014). What is clear is that these humanitarian initiatives afford valuable intelligence gathering opportunities to US forces in areas that they deem vulnerable to extremism. These projects can be seen as part of a larger US attempt to map the terrain, establish local sources of human intelligence and prepare the battlespace in the Horn of Africa (Thomas 2004).

            Civil affairs personnel are often accompanied by intelligence and force protection officers. These teams establish contact with local populations, observe the host government’s activities in the region, gain insights into potential threats to US national security and conduct counterintelligence to protect the task force’s personnel and operating locations. The CJTF-HOA Intelligence Section, one of the task force’s largest units, collects and interprets raw data throughout the region. Some of these data are gathered when the task force’s teams accompanied by soldiers of the Ethiopian National Defence Force establish ‘person to person contact’ with civilians in Ethiopia’s Somali Region. According to the Intelligence Section’s Analyst Chief, his unit provides intelligence to the task force’s leadership, ‘so they can come up with ways to deal with anything that needs attention, whether that be monitoring terrorist targets or doing some sort of humanitarian mission’ (Fitzgerald 2003).

            CJTF-HOA civil affairs teams maintained a persistent presence in Ethiopia’s Ogaden region from 2003 to 2006. This provided US soldiers with the opportunity to come into contact with the Ogaden National Liberation Front (ONLF), secessionist insurgents whom the Ethiopian government considers terrorists. The United States saw the Ogaden insurgency as a domestic issue and did not support Ethiopia’s attempts to quell the rebellion. Interactions between CJTF-HOA teams and the Ogadeni insurgents were an ongoing source of tension in the relations between Ethiopia and the US. In 2006 when the Ethiopian military initiated a crackdown on the ONLF, US civil affairs teams were expelled from the Ogaden. Ethiopian officials asserted that US troops were barred from the Ogaden due to concerns for their safety. Yet these restrictions were also the result of suspicions among Ethiopia’s military brass that CJTF-HOA teams were not randomly encountering Ogadeni fighters at roadblocks, but were actually reaching out to them as a matter of force protection and intelligence gathering (US Embassy Addis Ababa to CIA 2009).

            These tensions within the liaison, due to Ethiopia’s suspicions of unsanctioned US intelligence gathering in the Ogaden, served to compromise both the humanitarian and information collection efforts of the CJTF-HOA civil affairs teams. The restrictions instituted by Ethiopia’s Ministry of Defence made explicit that this form of intelligence gathering was not in compliance with Ethiopia’s expectations of the liaison, particularly as Ethiopia was acting aggressively to dismantle the Ogadeni insurgency.

            In 2006, even though Ethiopia demanded that US civil affairs teams leave the Ogaden, the towns of Gode and Kebri Dehar in particular, CJTF-HOA teams were allowed to remain in Ethiopia’s Somali Region at Hurso to train Ethiopian forces, and a US Special Operations team was authorised to remain at a cooperative security location in Bilate. Hence military and intelligence cooperation continued, but Ethiopia deployed the first of several tactics to serve notice that it would not idly tolerate US efforts to gather intelligence from the ONLF.

            In May 2007 another incident in the Ogaden served to exemplify the tensions within the liaison between Ethiopia and the US. A Combined Joint Task Force human intelligence team operating ‘beyond the wire’ was apprehended in a restricted area of the Ogaden by Ethiopian troops. Whether this mission was fully authorised by the task force’s commanders remains unclear. Similarly, US officials disagree as to whether the human intelligence team was on a clandestine or overt mission. The human intelligence soldiers were, however, wearing civilian clothes and when Ethiopian forces initially stopped and questioned them, the US soldiers claimed to be Red Cross officials. When the Ethiopian troops discovered that their detainees were armed, which the Red Cross forbids, the US troops were forced to reveal their identities (Naylor 2011a; see also US Embassy Addis Ababa to CIA 2007b).

            The Human Intelligence team was taken into Ethiopian custody and held for several days before appeals from high-level officials at the State Department and Pentagon secured their release. Nonetheless, this incident angered the Ethiopians and fuelled suspicions that, despite the ban on CJTF-HOA teams in the Ogaden, the US was making efforts to maintain contacts with the ONLF. Additionally, the Ethiopians were able to conduct some unsanctioned intelligence gathering of their own by seizing all of the documents the Human Intelligence team were carrying, which offered evidence of tightly guarded US intelligence collection techniques and objectives in the region. More broadly, this incident had a chilling effect on military intelligence cooperation between the two countries (Naylor 2011a).

            The Ethiopian intervention in Somalia

            In December 2006 Ethiopia sent a large military force into Somalia to dismantle the Islamic Courts Union, a coalition that had consolidated power in Somalia the previous year and brought stability to Mogadishu. Ethiopia’s stated aim was to provide support for the Western-backed Somali Transitional Federal Government by unseating the Muslim clerics. The Meles administration also saw the Islamic Courts Union as a proxy force of Ethiopia’s enemy to the north, Eritrea, which it accused of arming and funding Somali jihadists (Abbink 2003).

            From the outset of the intervention the US provided Ethiopian troops with intelligence support, primarily in the form of satellite imagery, and US Special Operations teams were deployed to Somalia on covert missions alongside Ethiopian Special Forces (Stevenson 2007). Ethiopia, in return, provided the US with information about the movements of suspected Al-Qaeda operatives in Somalia, many of whom fled toward the Kenyan border once the Ethiopian intervention gained ground. This was the US–Ethiopian intelligence liaison at its most fruitful for both states. The US Embassy in Addis Ababa wrote at the time, ‘Ethiopia’s military gave us complete and unprecedented access to information they obtained in Somalia’ (US Embassy Addis Ababa to CIA 2007a).

            Yet the initiation of covert US operations from Ethiopian facilities would soon stoke renewed tensions between the liaison partners. The literature on intelligence liaisons suggests that a classic point of contention for liaison partners arises when one partnering state does not effectively protect the confidentiality of joint covert activities, hence endangering the security and interests of its partner (Richelson 1990). This concern became paramount for the Ethiopians days after their incursion into Somalia when the US began to launch covert airstrikes from Ethiopian airfields.

            On 7, 9 and 23 January 2007, US AC-130 gunships operating from airstrips in eastern Ethiopia struck suspected Al-Qaeda operatives and training camps in southern Somalia (Bureau of Investigative Journalism 2015). In the days immediately following the first two airstrikes the Meles administration publicly denied that they had been launched from Ethiopia, yet behind closed doors Prime Minister Meles suggested that he was pleased that the US was targeting militants in Somalia and was largely unconcerned about leaks to the US press that were bringing attention to these covert operations (US Embassy Addis Ababa to CIA 2007c). However, in the run-up to the third strike in late January, the Ethiopians began to urge the US to maintain a lower profile. Ethiopian officials expressed concerns that news of the bombing campaign might lead to terrorist reprisals against Ethiopia, as well as African countries that were considering contributing to a peacekeeping force that was preparing to enter Somalia. In the days following the 23 January airstrike in Somalia, also widely reported in the US press, the Ethiopians made it clear that they could no longer tolerate US leaks about these operations. The Meles administration demanded that the US end the airstrikes and remove its AC-130 gunships from Ethiopian territory. In a move that strengthened this demand the Ethiopians also temporarily shut down the fusion cell that served as a vehicle through which Ethiopian liaison officers shared intelligence on Somalia with their US counterparts (US Embassy Addis Ababa to CIA 2007c).

            Prime Minister Meles suggested that these leaks compromised ‘operational security’ and led to headlines that detracted from the diplomatic efforts that African states were initiating to bring peace to Somalia. The prime minister indicated that, rather than facilitating covert US strikes, the Ethiopians would take a more independent approach. While he welcomed any information that the US could provide, Ethiopian forces would act on their own to neutralise extremist elements in Somalia and engage terrorists that the Pentagon deemed high-value targets.

            In a January 2007 cable to Washington, the US Embassy in Addis Ababa noted the importance of the intelligence fusion cell, which was scheduled to resume its activities the following day, to Ethiopian–US military cooperation and recommended ‘compliance with the Prime Minister’s request for removal of the AC-130 aircraft’ (US Embassy Addis Ababa to CIA 2007c). Another senior Pentagon official was more blunt about the conclusion of these covert airstrikes: the Ethiopians warned the US to keep the operations quiet, and when the US didn’t: ‘They got told to go home’ (Naylor 2011c).

            By the middle of 2007 relations between the militaries of the US and Ethiopia had grown increasingly fraught. US security assistance to Ethiopia was a particular point of contention between the two states. The US failure to deliver promised military aid, such as C-130 aircraft and Humvees, and the closure of a US-funded Command and Staff College to train Ethiopian officers were symptomatic of sharp declines in US security assistance to Ethiopia (Serafino 2014). Ethiopia’s military brass, in turn, viewed the US as an increasingly unreliable partner.

            The US Embassy in Addis Ababa implored the Department of Defense and the Defense Intelligence Agency to act quickly to provide funding for security assistance initiatives directed at the Ethiopian National Defence Force. This was particularly important, according to the Embassy, because while other facets of the security partnership were faltering, intelligence sharing was actually expanding. Military intelligence cooperation between the US and Ethiopia remained one of ‘the strongest and most mutually beneficial relationships on the continent’ (US Embassy Addis Ababa to CIA 2007a).

            While the Embassy’s appraisal overlooks the tensions and bargaining that had characterised the intelligence liaison between the states, it was reasonable to contend that by the middle of 2007 the liaison was the most critical facet of the security partnership between Ethiopia and the US. Moreover, the ‘beneficial’ character of the liaison also implied a US dependency on the results produced by this intelligence cooperation. Ethiopia had proven its willingness to exploit this US dependency on its human intelligence in Somalia. While the intelligence provided by US spy satellites to the Ethiopians was of assistance, as early as 2005 in the run-up to brutal post-election crackdowns in Addis Ababa, an internal memo circulated among Ethiopia’s ruling party made explicit that the Meles administration was fully prepared for the ‘US to turn its back on us’ (Indian Ocean Newsletter 2005).

            Renditions and reciprocity

            Ethiopia’s intervention in Somalia led to the capture of a number of suspected extremists who had been associated with the Islamic Courts Union. Many of these suspects were transferred to secret detention facilities, or ‘black sites’, in Addis Ababa for interrogation by Ethiopian and US intelligence officials (Open Society Justice Initiative 2013). These renditions and the opportunities they provided for FBI and CIA officials to interrogate suspects reinforced Ethiopia’s status as a key American ally in the ‘War on Terror’. Throughout much of its campaign in Somalia, Ethiopia routinely provided American agents with access to suspected extremists captured by its forces. Yet by early 2008 when Ethiopian and US security cooperation was clearly showing signs of strain, this element of the liaison also became a means for the Ethiopians to impose costs on their stronger ally. At the time, Ethiopian State Security officials refused to grant the FBI the opportunity to interrogate a suspect who was in their custody, despite more than a month-long effort by the American agency to acquire access to the detainee (US Embassy Addis Ababa to CIA 2008).

            On the heels of this refusal, the Meles administration would again test the limits of compliance with the terms of the liaison by using intelligence provided by the US in a manner completely inconsistent with US aims. In February 2008, Ethiopian forces detained and placed under house arrest a team of Médecins Sans Frontières (MSF) personnel, including one American citizen. The Ethiopians charged that while operating in the Ogaden, the MSF team had made contact with and provided medical care to Ogadeni insurgents. When the US Embassy raised the issue with Prime Minister Meles in an attempt to have the American citizen released, the prime minster was not only well aware of the details of the arrests but, to the surprise of the US ambassador, indicated that Ethiopian forces had taken the team into custody using ‘intelligence shared by the United States Government with the GoE [Government of Ethiopia] as part of our established intelligence sharing relationship’ (US Embassy Addis Ababa to US Embassy Belgium Brussels 2008). In short, Ethiopia had used US intelligence to detain a US citizen. The arrests were not only an indication of the Meles administration’s antipathy toward MSF, which had widely declared that the Ethiopian military was engaging in human rights abuses in the Ogaden. Meles’ openness about the arrests and the intelligence used to execute them, more importantly, were a clear signal that he was willing to misuse intelligence provided by the US to advance Ethiopian interests.

            Over the course of 2008 and 2009 the bargaining tactics Ethiopia had been deploying to capitalise on its liaison with the US continued to bear fruit. The US became increasingly responsive to Ethiopia’s demands for security assistance funding and equipment. It delivered on a promise to assist in the maintenance of Ethiopia’s C-130 aircraft, reimbursed Ethiopia for some of the expenses associated with its campaign in Somalia, and donated equipment to Ethiopian peacekeepers (US Embassy Addis Ababa to CIA 2008). Just as critically, during this time the US began construction of a base for unmanned aerial vehicles or drones at Arba Minch in Ethiopia. This drone base would become an important node in US intelligence collection and covert operations infrastructure, further strengthening the liaison between the two states.

            Secret analysis conducted by the Pentagon’s Intelligence Surveillance and Reconnaissance Task Force suggests that until it was shuttered in September 2015 this drone base was vital to US counterterrorism operations in the Horn of Africa. The Pentagon’s analysis also made clear that the US continued to confront a dearth of human intelligence in Somalia and faced considerable challenges using drones to maintain ongoing surveillance over the vast stretches of territory of the Horn of Africa. As a result, the cooperation of host state partners, such as Ethiopia, in supplying intelligence that facilitated drone strikes was critical (Intercept Drone Papers 2015). Moreover, the Pentagon’s assessment pointed to a growing need for ‘finish derived’ intelligence that could be gained by interrogating suspects who had been captured instead of killed.7 Yet capturing these suspects in the Horn of Africa, which is not a defined theatre of armed conflict, ‘requires the assistance of host nation partners’ (Intercept Drone Papers 2015). As such, the report recommended that more Special Forces teams be deployed alongside the troops of partnering states to engage in Advance Force Operations, such as intelligence gathering, that enabled captures instead of kills.

            Conclusion

            It is clear that both Ethiopia and the US shared an interest in maintaining their intelligence liaison. Yet in terms of actual intelligence gains and access to military infrastructure the US was more reliant on this cooperation than Ethiopia. For the US, by 2008 intelligence cooperation was, in fact, the central pillar of its security partnership with Ethiopia. Ethiopia’s willingness to run the risk of leveraging this liaison was in part derived from the divergence of interests with regard to Somalia between the two states. While Ethiopia perceived the presence of Al-Qaeda operatives in Somalia as a threat, it was even more concerned with preventing Eritrea from funding and supporting a strong coalition of militants in Somalia that could transit Ethiopia’s porous borders. In short, for Ethiopia the conflict in Somalia quickly became a proxy war with Eritrea, rendering Al-Qaeda a secondary concern. For Pentagon and State Department officials, Al-Qaeda operatives were the primary concern and a prominent view among these officials was that the US required the human intelligence that Ethiopia gathered through its clandestine activities in Somalia (Lyons 2009).

            I have argued that it was this dependency that the Meles administration manipulated, not only as means of compelling the US to comply with its reading of the terms and limits of the liaison, but also in an effort to gain broader political concessions. There is no direct evidence that the Meles administration threatened to disrupt intelligence cooperation with the US in response to State Department or Congressional criticisms of his regime’s track record on electoral politics and civil liberties. However, a clear interest in preserving the liaison at the very core of the US strategic partnership with Ethiopia in all likelihood influenced the Bush administration’s efforts to oppose US legislation sanctioning the Meles administration for its increasingly authoritarian policies. Bush administration officials, in part swayed by Ethiopia’s lobbyists in Washington, consistently expressed their opposition to Congressional criticisms in an ongoing effort to placate a valued ally in the ‘War on Terror’.

            The intelligence liaison was certainly not the only factor influencing US policies toward Ethiopia. From an economic standpoint, for example, Ethiopian officials garnered the approval of State Department officials by entertaining the possibility of purchasing Boeing, instead of Airbus, aircraft for the state airline (Federal News Service 2005; for an alternative explanation of the durability of the US–Ethiopian security partnership, see Lefebvre 2012). More importantly, the Meles administration’s pronouncements, in the press and international organisations, were invariably supportive of the Bush administration’s ‘War on Terror’. Yet at the heart of Ethiopian–US relations was their security partnership, and the operational core of this partnership was the intelligence liaison. Ethiopia’s efforts to compel the US to comply with its reading of the terms of this liaison and its attempts to use the liaison as a source of leverage to gain political concessions have both been largely successful.

            Notes

            1

            African states, likewise, offered intelligence quid pro quos (see US Embassy Mogadiscio to Secretary of State 1978).

            2

            The title of this article is a quote from US State Department Cable 07ADDISABABA233, 25 January 2007 (US Embassy Addis Ababa to CIA 2007c), in which the US Embassy Addis Ababa recommends that the US Department of Defense comply with Ethiopian Prime Minister Meles Zenawi's demands regarding covert security cooperation.

            3

            Both authors note that liaison partners can ‘extort’ benefits from each other but they do not explore in detail how extortion attempts can become elements of extended bargaining processes.

            4

            Sims draws particular attention to the prospect of states using liaisons as vehicles for ‘blackmailing’ or ‘hostage-taking’ yet does not offer an extended treatment of the cases she notes.

            5

            ‘Jawboning’, a term of art in the literature on compliance in International Relations, refers to a process of persuasion and negotiation rather than more punitive measures.

            6

            ‘Fusion cell’: an ad hoc division of intelligence analysts from different US agencies and allied states.

            7

            The Pentagon task force found that due to the number of terrorist suspects killed in kinetic strikes, rather than captured, there was very little opportunity to gather intelligence through interrogations or by confiscating documents and media from suspects upon their capture.

            Acknowledgements

            The author would like to thank Irving Leonard Markovitz, Kwame Akonor, Seth Markle, Donald Robotham, George Andreopoulos, Aaron Shapiro, Benjamin Alexander, ROAPE’s two anonymous reviewers, and the participants of the 2017 International Studies Association panel on International Intelligence Cooperation for their helpful comments.

            Disclosure statement

            No potential conflict of interest was reported by the author.

            Note on contributor

            Sobukwe Odinga completed his doctoral studies in Political Science at the City University of New York Graduate Center and is a Vice Provost’s Postdoctoral Fellow at the University of Pennsylvania.

            References

            1. 2003 . “ Ethiopia–Eritrea: Proxy Wars and Prospects of Peace in the Horn of Africa .” Journal of Contemporary African Studies 21 ( 3 ): 407 – 426 . doi: [Cross Ref]

            2. Agence France Presse . 2002 . “ US-led Anti-terrorism Outfit Up and Running in Horn of Africa .” Agence France Presse, Paris, December 13 .

            3. 2004 . “ Transatlantic Intelligence and Security Cooperation .” International Affairs 80 ( 4 ): 731 – 753 . doi: [Cross Ref]

            4. 2014 . “ Policing Africa: The US Military and Visions of Crafting ‘Good Order’ .” Security Dialogue 45 ( 2 ): 119 – 136 . doi: [Cross Ref]

            5. 2007 . Surrender Is Not an Option: Defending America at the United Nations . New York : Threshold Editions .

            6. , and . 2010 . “ Winning Hearts and Minds? Examining the Relationship between Aid and Security in Kenya .” Feinstein International Center, April. Accessed July 3, 2016. http://fic.tufts.edu/assets/WinningHearts-in-Kenya.pdf .

            7. 2003 . “ No Quick Fixes: Coming to Terms with Terrorism, Islam, and Statelessness in Somalia .” Journal of Conflict Studies 23 (2). Accessed July 3, 2016. https://journals.lib.unb.ca/index.php/jcs/article/view/215/373 .

            8. Bureau of Investigative Journalism . 2015 . “ Somalia: Reported US Covert Actions 2001–2015 .” November 22, London. Accessed July 3, 2016. https://www.thebureauinvestigates.com/2012/02/22/get-the-data-somalias-hidden-war/ .

            9. , and . 1993 . “ On Compliance .” International Organization 47 ( 2 ): 175 – 205 . doi: [Cross Ref]

            10. CJTF-HOA [Combined Joint Task Force-Horn of Africa] . 2012 . “ CJTF-HOA Liaison Officers Visit AFRICOM .” CJTF-HOA website, August 6. Accessed July 3, 2016. http://www.hoa.africom.mil/story/7674/ctjfhoa-coalition-liaison-officers-visit-africom .

            11. CJTF-HOA . 2015 . “ Fusion Action Cell Builds Partnerships Throughout Africa .” CJTF-HOA website, June 25. Accessed July 3, 2016. http://www.hoa.africom.mil/story/8484/cjtf-hoa-fusion-action-cells-build-partnerships-across-africa .

            12. 2004 . “ Quid Pro Quo: The Challenges of International Strategic Intelligence Cooperation .” International Journal of Intelligence and CounterIntelligence 17 ( 4 ): 601 – 613 . doi: [Cross Ref]

            13. 2001 . “ United States and Africa: Hints of Military Action Cause Puzzlement, Worry .” Africa News, December 23. Accessed July 3, 2016. http://allafrica.com/stories/200112240001.html .

            14. 2002 . “ Africa and the War on Terrorism: The Case of Somalia .” Mediterranean Quarterly 13 ( 4 ): 62 – 73 . doi: [Cross Ref]

            15. Deutsche Presse-Agentur . 2003 . “ Top US Commander Lauds Ethiopia’s Role in Anti-terrorist Activities .” Deutsche Presse-Agentur, Hamburg, June 26 .

            16. , , and . 1996 . “ Is the Good News about Compliance Good News about Cooperation? ” International Organization 50 ( 3 ): 379 – 406 . doi: [Cross Ref]

            17. Federal News Service . 2005 . “ Hearing of the Africa, Global Human Rights and International Operations Subcommittee of the House International Relations Committee .” May 5. Washington, DC : Federal News Service .

            18. 2003 . “ Intel Troops Keep CJTF-HOA Informed .” Combined Joint Task Force-Horn of Africa, May 10. http://www.hqmc.marines.mil/News/News-Article-Display/Article/551406/intel-troops-keep-cjtf-hoa-informed/ .

            19. , and . 2007 . “ Ethiopia and Eritrea: Allergic to Persuasion .” Chatham House Africa Programme Briefing Paper AFP BP 07/01, January . London : Royal Institute of International Affairs .

            20. Indian Ocean Newsletter . 2005 . “ US Congressmen Write to Meles Zenawi .” Indian Ocean Newsletter, Paris, April 30. Accessed 3 July 2016. http://www.africaintelligence.com/ION/ .

            21. Intercept Drone Papers . 2015 . “ ISR Support to Small Footprint CT Operations – Somalia/Yemen, Department of Defense Intelligence, Surveillance, Reconnaissance Task Force, February 2013 .” The Intercept, October 15. Accessed July 3, 2016. https://theintercept.com/document/2015/10/15/small-footprint-operations-2-13/ .

            22. 2000 . “ The Ethiopian–Eritrean Conflict: Diasporic vs. Hegemonic States in the Horn of Africa, 1991–2000 .” The Journal of Modern African Studies 38 ( 4 ): 659 – 682 . doi: [Cross Ref]

            23. 2012 . “ Small States and Compliance Bargaining in the WTO: An Analysis of the Antigua–US Gambling Services Case .” Cambridge Review of International Affairs 25 ( 3 ): 367 – 385 . doi: [Cross Ref]

            24. , and . 1997 . “ Ambivalent Bedfellows: German–American Intelligence Relations, 1969–1991 .” International Journal of Intelligence and CounterIntelligence 10 ( 2 ): 165 – 179 . doi: [Cross Ref]

            25. Joint Chiefs of Staff [of USA] . 2015 . Department of Defense Dictionary of Military and Associated Terms . Joint Publication 1–02 . Washington, DC : US Department of Defense .

            26. 2002 . “ CI and HUMINT or HUMINT and CI or CI/HUMINT or TAC HUMINT (Confusing, Isn’t It?) ” Military Intelligence Professional Bulletin 28 ( 2 ): 28 – 33 .

            27. , and . 1998 . “ Compliance and Post-agreement Bargaining .” European Journal of International Relations 4 ( 4 ): 371 – 408 . doi: [Cross Ref]

            28. 2005 . “ Is U.S. Government Looking for Next Threat? ” National Public Radio, June 1. Accessed 3 July 2016. http://www.npr.org/templates/story/story.php?storyId=4675911 .

            29. , and . 2005 . “ Monitoring Trends in Global Combat: A New Dataset of Battle Deaths .” European Journal of Population 21 ( 2/3 ): 145 – 166 . doi: [Cross Ref]

            30. 2001 . “ Failed State Torn Apart by Civil War and Clan Politics .” The Telegraph, December 11 .

            31. 2012 . “ Choosing Sides in the Horn of Africa: WikiLeaks, the Ethiopia Imperative, and American Responses to Post-9/11 Regional Conflicts .” Diplomacy & Statecraft 23 ( 4 ): 704 – 727 . doi: [Cross Ref]

            32. 2009 . “ The Ethiopia–Eritrea Conflict and the Search for Peace in the Horn of Africa .” Review of African Political Economy 36 ( 120 ): 167 – 180 . doi: [Cross Ref]

            33. 2005 . “ One Mind – Any Weapon: Proving One’s Metal in the Horn of Africa .” June 29. Washington, DC : US Department of Defense Information .

            34. 2002 . “ Somalia: In the Crosshairs of the War on Terrorism .” Current History 101 ( 655 ): 210 – 218 .

            35. 2010 . “ The Architecture and Conduct of Intelligence in Ethiopia (1974–1991) .” International Journal of Ethiopian Studies 5 (April 1) : 39 – 70 .

            36. 2004 . “ Ethiopian Prime Minister Says Ethiopia Accepts ‘In Principle’ Ruling on Border with Eritrea .” The Associated Press, November 25 .

            37. 2011a . “ Africa Ops May Be Just Starting .” Military Times, Vienna, VA, December 5. https://www.militarytimes.com/2013/03/29/the-secret-war-africa-ops-may-be-just-starting/ .

            38. 2011b . “ Lack of Human Intel Hampered AQ Hunt in Africa .” Military Times, Vienna, VA, November 8. https://www.militarytimes.com/2013/03/29/lack-of-human-intel-hampered-aq-hunt-in-africa-the-second-in-a-series-looking-at-u-s-military-activity-in-the-horn-of-africa/ .

            39. 2011c . “ Tense Ties Plagued Africa Ops .” Military Times, Vienna, VA, November 28. https://www.militarytimes.com/2013/03/29/the-secret-war-tense-ties-plagued-africa-ops/ .

            40. Open Society Justice Initiative . 2013 . “ Globalizing Torture: CIA Secret Detention and Extraordinary Rendition .” February . New York : Open Society Justice Initiative . Accessed July 5, 2016. https://www.opensocietyfoundations.org/reports/globalizing-torture-cia-secret-detention-and-extraordinary-rendition .

            41. 1990 . “ The Calculus of Intelligence Cooperation .” International Journal of Intelligence and CounterIntelligence, 4 ( 3 ): 307 – 323 . doi: [Cross Ref]

            42. 2014 . “ Security Assistance Reform: ‘Section 1206′ Background and Issues for Congress .” Congressional Research Service, December 8 . Washington, DC : Congressional Research Service . Accessed July 3, 2016. https://www.fas.org/sgp/crs/natsec/RS22855.pdf .

            43. 2006 . “ Foreign Intelligence Liaison: Devils, Deals, and Details .” International Journal of Intelligence and CounterIntelligence 19 ( 2 ): 195 – 217 . doi: [Cross Ref]

            44. 2007 . “ The Somali Model? ” The National Interest 90 (July/August) : 41 – 45 .

            45. 2009 . “ Connecting Intelligence and Theory: Intelligence Liaison and International Relations .” Intelligence and National Security 24 ( 5 ): 700 – 729 . doi: [Cross Ref]

            46. 2000 . “ The Ethiopia–Somalia War of 1977 Revisited .” The International Journal of African Historical Studies 33 ( 3 ): 635 – 667 . doi: [Cross Ref]

            47. 2004 . “ Beneath the Surface: Intelligence Preparation of the Battlespace for Counterterrorism .” November . Washington, DC : Center for Strategic Intelligence Research, Joint Military Intelligence College .

            48. 2005a . “ AP Interview: Ethiopian Prime Minister Warns of ‘Very Active’ Al-Qaeda Cell in Somalia .” The Associated Press, May 12 .

            49. 2005b . “ US General Calls Somalia Terror Haven .” Associated Press Online, May 13 .

            50. 1998 . “ Explaining Compliance and Defection: Three Models .” European Journal of International Relations 4 ( 1 ): 5 – 30 . doi: [Cross Ref]

            51. United States Government Accountability Office . 2010 . “ Improved Planning, Training, and Interagency Collaboration Could Strengthen DOD’s Efforts in Africa .” July 28. Accessed July 3, 2016. http://www.gao.gov/assets/310/307759.pdf .

            52. US Embassy Addis Ababa . 2005 . Telegram 003984, November 30. 05ADDISABABA3984. WikiLeaks. https://wikileaks.org/plusd/cables/05ADDISABABA3984_a.html .

            53. US Embassy Addis Ababa to CIA [Central Intelligence Agency] . 2007a . Telegram 001535, May 21. 07ADDISABABA1535. WikiLeaks. https://wikileaks.org/plusd/cables/07ADDISABABA1535_a.html .

            54. US Embassy Addis Ababa to CIA . 2007b . Telegram 003404, November 28. 07ADDISABABA3404. WikiLeaks. https://search.wikileaks.org/plusd/cables/07ADDISABABA3404_a.html .

            55. US Embassy Addis Ababa to CIA . 2007c . Telegram 000233, February 14. 07ADDISABABA233. WikiLeaks. https://wikileaks.org/plusd/cables/07ADDISABABA233_a.html .

            56. US Embassy Addis Ababa to CIA . 2008 . Telegram 001571, June 9. 08ADDISABABA1571. WikiLeaks. https://wikileaks.org/plusd/cables/08ADDISABABA1571_a.html .

            57. US Embassy Addis Ababa to CIA . 2009 . Telegram 001241, May 27. 09ADDISABABA1241. WikiLeaks. https://wikileaks.org/plusd/cables/09ADDISABABA1241_a.html .

            58. US Embassy Addis Ababa to US Embassy Belgium Brussels . 2008 . Telegram 000381, February 14. 08ADDISABABA381. WikiLeaks. https://search.wikileaks.org/plusd/cables/08ADDISABABA381_a.html .

            59. US Embassy Addis Ababa to US Embassy Eritrea . 2006 . Telegram 000385, February 8. 06ADDISABABA385. WikiLeaks. https://wikileaks.org/plusd/cables/06ADDISABABA385_a.html .

            60. US Embassy Mogadiscio to Secretary of State . 1978 . Telegram 02629, October 30. 1978MOGADI02629. Central Foreign Policy Files, 1973–79/Electronic Telegrams. RG 59: General Records of the Department of State, National Archives. https://aad.archives.gov/aad/display-partial-records.jsp?f=4994&mtch=1&q=1978MOGADI02629&cat=all&dt=2694&tf=X.

            61. US Embassy Nairobi to US Secretary of Defense . 1976 . Telegram 07805, July 26. 1976NAIROB07805, Central Foreign Policy Files, 1973–79/Electronic Telegrams, RG 59: General Records of the Department of State, National Archives. https://aad.archives.gov/aad/display-partial-records.jsp?f=4412&mtch=1&q=1976NAIROB07805&cat=all&dt=2082&tf=X.

            62. 2007 . “ Defection and Hierarchy in International Intelligence Sharing .” Journal of Public Policy 27 ( 2 ): 151 – 181 . doi: [Cross Ref]

            63. 2010 . The International Politics of Intelligence Sharing . New York : Columbia University Press .

            64. 1996 . “ America and the World of Intelligence Liaison .” Intelligence and National Security 11 ( 3 ): 523 – 560 . doi: [Cross Ref]

            Author and article information

            Journal
            CREA
            crea20
            Review of African Political Economy
            Review of African Political Economy
            0305-6244
            1740-1720
            September 2017
            : 44
            : 153
            : 432-448
            Affiliations
            [ a ] Graduate School and University Center, City University of New York , New York, USA
            Author notes
            [CONTACT ] Sobukwe Odinga sodinga@ 123456sas.upenn.edu
            Article
            1368472
            10.1080/03056244.2017.1368472
            e488269b-b89a-4aa3-96c3-843d3ae398b8

            All content is freely available without charge to users or their institutions. Users are allowed to read, download, copy, distribute, print, search, or link to the full texts of the articles in this journal without asking prior permission of the publisher or the author. Articles published in the journal are distributed under a http://creativecommons.org/licenses/by/4.0/.

            History
            Page count
            Figures: 0, Tables: 0, Equations: 0, References: 64, Pages: 17
            Categories
            Article
            Articles

            Sociology,Economic development,Political science,Labor & Demographic economics,Political economics,Africa
            liaisons de renseignement,Compliance bargaining,security alliances,alliances de sécurité,Corne de l’Afrique,Négocier sur le respect des conditions de liaisons,Horn of Africa,intelligence liaisons

            Comments

            Comment on this article