• Buro Jansen & Janssen is een onderzoeksburo dat politie, justitie, inlichtingendiensten, de overheid in Nederland en Europa kritisch volgt. Een grond-rechten kollektief dat al 30 jaar publiceert over uitbreiding van repressieve wetgeving, publiek-private samenwerking, bevoegdheden, overheids-optreden en andere staatsaangelegenheden.
    Buro Jansen & Janssen Postbus 10591, 1001EN Amsterdam, 020-6123202, 06-34339533, signal +31684065516, info@burojansen.nl (pgp)
    Steun Buro Jansen & Janssen. Word donateur, NL43 ASNB 0856 9868 52 of NL56 INGB 0000 6039 04 ten name van Stichting Res Publica, Postbus 11556, 1001 GN Amsterdam.
  • Publicaties

  • Migratie

  • Europa

  • Politieklachten

  • Zeearendkuikens alweer afgedankt

    Schulze op Justitie en Veiligheid

    Verrassend nieuws van het roofvogelfront: De Nationale Politie stopt met de inzet van roofvogels tegen ongewenste drones. Zoals hier eerder beschreven heeft de politie een onbekend aantal kuikens van de Amerikaanse zeearend gekocht. Het innovatieve anti-dronebedrijf Guard from Above zou deze opleiden, om net als steenarend Cayenne en nog een andere vogel, die mogelijk ‘Hunter’ heet, drones uit de lucht te halen. Dat er in dit project ook maar één Amerikaanse zeearend een drone heeft onderschept is niet erg waarschijnlijk. Er is in elk geval geen bewijs van. Er zouden ook honderd politiemensen worden opgeleid tot roofvogelgeleider, deze training was al begonnen.

    lees meer

    Lekker vliegen tegen ‘georganiseerde misdaad’

    Schulze op Justitie en Veiligheid

    23 augustus 2017 was een aantal nieuwsrubrieken uitgenodigd om te komen filmen in Limburg. Boerenbond LLTB zou laten zien hoe maisvelden vanuit de lucht worden gecontroleerd op wietplanten. De cannabis zou daar zijn geplant door criminele organisaties, en als de mais hoog staat is de wiet onzichtbaar vanaf de weg. Bijzonder dit jaar is dat de politie niet meer mee wil doen. Daarom laat de LLTB op eigen kosten drones vliegen. Intussen blijkt dat bij de planning geen rekening was gehouden met regels over drones in de buurt van hoogspanningsmasten. Daardoor kon maar een kwart van de aangemelde maisvelden worden bekeken. Er is geen hennep aangetroffen.

    lees meer

    Politiearend ingezet, dan wel achter de hand gehouden. Maar welke arend precies?

    Schulze op Justitie en Veiligheid

    De Nationale politie gaat een roofvogel uitlenen om de NAVO top in Brussel op hemelvaartsdag 2017 te beveiligen. Volgens de politie is dat niet de eerste inzet, ook bij de huldiging van Feyenoord in mei 2017 is een roofvogel achter de hand gehouden, schrijft de Telegraaf. U las hier eerder over.

    lees meer

    Politie nu echt in training met Amerikaanse zeearend-kuikens

    Schulze op Justitie en Veiligheid

    Over roofvogel-subsidie voor een pet-project van de Nationale politie en media die vol trots vogel-shotjes kopiëren zonder kritische vragen te stellen

    De Nederlandse politie heeft een onbekend aantal zeearend-kuikens gekocht en leidt 100 politiefunctionarissen op om met deze vogels ongewenste drones uit de lucht te halen. Dat was zonder twijfel het best verspreide politienieuws van 2016. U las hier eerder over. 18 april 2017 begon de eerste ‘birdhandling-class‘. Laten we de gebeurtenissen op een rijtje zetten.

    14 februari 2011: Hielko van Rijthoven, valkenier bij roofvogelmanege ‘de Roofvogelboerderij’ koopt een vrouwelijke steenarend. De vorige eigenaar wilde van haar af, mogelijk omdat ze te agressief was. Hij noemt de arend Cayenne. In april gaat hij met haar trainen met een kunstprooi. Dit staat op zijn blog.

    lees meer

    Een nucleair lek bij de politie?

    Dupont op Justitie en Veiligheid

    Eén van de beveiligers van de dienst Bewaking en Beveiliging (DBB) wordt verdacht van het lekken van vertrouwelijke informatie uit de politiecomputer aan een criminele organisatie. Premier Rutte zegt dat de veiligheid van Geert Wilders, die ook door deze dienst wordt bewaakt, niet in het geding is geweest. Twee chefs van de DBB zijn zojuist opgestapt.

    Wij keken welk nieuws we konden vinden over de gebeurtenissen en hoe plausibel het is wat er wordt gezegd door de politie.

    lees meer

    Alles voor de kijkcijfers

    Schulze op Justitie en Veiligheid

    De Nationale Politie steekt veel energie in beeldvorming. Het opsporen en vervolgen van strafbare feiten is lastig en tijdrovend. Verder is het onzichtbaar voor het publiek en ondankbaar, net als veel ander werk dat mensen doen voor geld. Met de opsporing is het slecht gesteld.

    Toch wordt er veel tijd gestoken in preventief politiewerk. Op basis van ‘data’ en intuïtie zoeken naar strafbare feiten voordat ze zijn gepleegd. Dan kan je de politie op straat iets zien doen. Mogelijk geeft het mensen een gevoel van veiligheid, denken ze.

    Dat er al genoeg te doen was, dat hierdoor duizenden onschuldige mensen gediscrimineerd worden en van hun tijd beroofd, en dat bovendien de opbrengst in strafrechtelijke zin niet spectaculair is, weegt voor de Nationale Politie niet op tegen het voordeel van in beeld te zijn. Het lijkt een doel op zich.

    lees meer

    De toekomst van drones

    Tjepkema op Justitie en Veiligheid

    “U hoort sirenes, er is blijkbaar iets aan de hand verderop! U stuurt uw drone de lucht in om even een kijkje te gaan nemen… mag dat? NEE NATUURLIJK MAG DAT NIET!!” — aldus de overheidscampagne eerder dit jaar waarin ons een nieuw plichtsbesef wordt opgedrongen omtrent het gebruik van afstandsbestuurbare helikoptertjes. Ja, de techniek gaat snel: drones worden steeds krachtiger, goedkoper en hebben betere camera’s aan boord, en de overheid doet haar best om de ontwikkelingen bij te benen.

    lees meer

    Where Does This End?”: After Drone Papers Leaks, U.K. Gov’t Has a Kill List of Its Own

    Last week, The Intercept published the most in-depth look at the U.S. drone assassination program to date. “The Drone Papers” exposed the inner workings of how the drone war is waged, from how targets are identified to who decides to kill. They reveal a number of flaws, including that strikes have resulted in large part from electronic communications data, or “signals intelligence,” that officials acknowledge is unreliable. We are joined by Clive Stafford Smith, founder and director of the international legal charity Reprieve, who says the British government also has a secret kill list in Afghanistan.

    TRANSCRIPT
    This is a rush transcript. Copy may not be in its final form.
    AMY GOODMAN: Last week, The Intercept published this in-depth look at the U.S. drone assassination program, called “The Drone Papers,” exposing the inner workings of how the drone war is waged, from how targets are identified to who decides to kill. They reveal a number of flaws, including that strikes have resulted in large part from electronic communications data, or “signals intelligence,” that officials acknowledge is unreliable. We spoke to Jeremy Scahill, co-founder of The Intercept, one of the lead reporters on the series.

    JEREMY SCAHILL: One of the most significant findings of this—and my colleague, Cora Currier, really dug deep into this—is we published for the first time the kill chain, what the bureaucracy of assassination looks like. And what you see is that all of these officials, including people like the treasury secretary, are part of signing off on all of this, where they have these secret meetings and they discuss who’s going to live and die around the world. And at the end of that process, it is the president of the United States who signs what amounts to a death warrant for whoever they’ve decided should die.

    AMY GOODMAN: The kill list is what Jeremy Scahill is talking about. Clive Stafford Smith, as we wrap up, your response?

    CLIVE STAFFORD SMITH: Well, it’s something that just horrifies me, that, you know, I voted for President Obama, twice, and yet every Tuesday they have “Terror Tuesday,” where there’s a PowerPoint display in the White House, and they decide, much like Nero did back in the Colosseum in Rome, whether to give the thumbs-up or the thumbs-down for human beings who we’re just going to murder around the world. And, you know, it begins with terrorism, but it will move on. The British, horrifyingly, have already got a list of people on their list in Afghanistan, where they’re saying they’re going to kill pedophiles, for goodness’ sake. I mean, where does this end, that we just murder people worldwide? I mean, we plan to do a lot to publicize that in the upcoming months.

    NERMEEN SHAIKH: When did you learn that Britain has a kill list, to begin with?

    CLIVE STAFFORD SMITH: It was only a couple of weeks ago. Frankly, I’m very pleased, because when both the Brits and the Americans are doing it, we can illustrate the folly of both instead of just picking on the U.S.

    AMY GOODMAN: Clive Stafford Smith, I want to thank you very much for being with us. Clive Stafford Smith has been Shaker Aamer’s attorney for 10 years at Guantánamo. He’s a human rights lawyer, founder and director of the international legal charity called Reprieve.

    This is Democracy Now!, democracynow.org, The War and Peace Report. When we come back, we’re going to talk about Benghazi. Former Secretary of State Hillary Clinton is expected to testify today for up to 10 hours in Congress. We’re going to be talking about the four men who died—the ambassador, Chris Stevens, and three of the other Americans who died. We’ll be speaking with their friends. Stay with us.

    OCTOBER 22, 2015STORY

    Find this story at 22 October 2015

    The Drone Papers” Reveals How Faulty Intel & Secret “Kill Chain” Mark Suspects, Civilians for Death

    The Intercept series “The Drone Papers” exposes the inner workings of how the drone war is waged, from how targets are identified to who decides to kill. They expose a number of flaws, including that strikes have resulted in large part from electronic communications data, or “signals intelligence,” that officials acknowledge is unreliable. We speak to Intercept reporter Cora Currier, whose article “The Kill Chain,” reveals how the U.S. identifies and selects assassination targets, from the collection of data and human intelligence all the way to President Obama’s desk.

    TRANSCRIPT
    This is a rush transcript. Copy may not be in its final form.
    JUAN GONZÁLEZ: Well, today we are looking at “The Drone Papers,” an explosive new exposé by The Intercept based on a cache of secret documents that expose the inner workings of the U.S. military’s assassination program in Afghanistan, Yemen and Somalia. It raises the question: Is there a new Edward Snowden?

    AMY GOODMAN: We’re joined by three reporters who worked on “The Drone Papers.” Cora Currier is staff reporter for The Intercept. Her contributions to the “Drone Papers” series include the pieces “The Kill Chain” and “Firing Blind.” Ryan Devereaux, also a staff reporter at The Intercept, wrote “Manhunting in the Hindu Kush.” Also still with us for the hour, Jeremy Scahill, co-founder of the The Intercept, author of—is also author on this series.

    Cora Currier, I wanted to turn to your piece, “The Kill [Chain].” How do the targets get chosen?

    CORA CURRIER: So this is the first time that we’ve seen documentary evidence of how the Obama White House picks and chooses targets for—to kill them by drone or any other—or other kinds of airstrikes. And this is for operations in Yemen and Somalia. And the slide that we have shows how task force personnel, so people working on the ground in Yemen or Somalia, JSOC task force personnel, working with other intelligence community members, establish—make a package on a target, on a potential target, collecting intelligence, doing reconnaissance. So these people are already under surveillance of various types. And then they put them together, they package them in what they call a “baseball card” on the target, and that passes up the ranks of the military, up the chain of command. It goes through the Joint Chiefs of Staff, secretary of defense, then sends them to the White House.

    And there, they’re examined by counsels of senior administration officials, known as the Principals Committee, which is—of the National Security Council, which is basically sort of all the top Cabinet heads of the Obama administration, all his closest advisers, and their deputies, which is called the Deputies Committee. And that’s reportedly where actually a lot of the work gets done, where they really pour over the targets and they think about sort of the—both the legal cases and also the sort of political ramifications and reasons to kill or not to kill somebody. So this is all happening in—this sort of really interagency process happens at the White House. And then, we know from outside reporting that this is the time when, during the period of this study in 2012, 2013, John Brennan, who then became CIA director, was super influential in these discussions. And it was often him that was bringing the baseball cards to the president to finally sign off on giving JSOC operatives then a 60-day window to go after the target.

    AMY GOODMAN: The baseball cards?

    CORA CURRIER: Mm-hmm, so they would sign off on a “package,” what they called it, a targeting—an operations package, which would have the baseball card, which was all the intelligence on the target, and then a sort of concept of operations about how they might go about getting them. And then they’d have a 60-day window in which they could take a strike against the target. And that is counter to some previous reporting about whether or not the president sort of—you hear this rhetoric that the president personally signs off on each drone strike. It’s not clear that that’s exactly what was meant by that. It seems more likely that he signs off on these packages, and then the actual decision to take a strike goes through the military chain of command.

    JUAN GONZÁLEZ: And a key part of these baseball cards are the SIM cards and the cellphone numbers and—in other words, the signals intelligence attached to each of these individuals?

    CORA CURRIER: Right. It’s going to have, you know, everything that they know about them, so from a variety of sources. And one thing that we learned in the documents is that they are heavily reliant on signals intelligence, heavily reliant on communications intelligence, to build a picture of who they think this person is and why they think he’s important.

    AMY GOODMAN: Now, in your piece, “The Kill Chain: The Lethal Bureaucracy Behind Obama’s Drone War,” you talk about the different officials who sign off. Jeremy mentioned earlier, for example, the treasury secretary. Why would the treasury secretary be involved with naming who should be killed?

    CORA CURRIER: Well, I think, in practice—I mean, by the letter, the Principals Committee of the National Security Council includes all of these—all of these top officials, like the treasury secretary, like the secretary of energy. Is the secretary of energy actually really, you know, a deciding factor in who gets killed in Yemen? No. It’s going to be the—you know, Hillary Clinton at the time of this study was secretary of state, and she would sort of represent the State Department’s opinions about this. Again, would she actually probably have all the background on these individuals? No, it would have been prepared for her by, you know, her second-in-commands or whoever was below her, and they would sort of be representing the views of their agency. So, while all those Cabinet members are, on paper, in the—on the Principals Committee, in practice, it was a smaller circle of advisers.

    AMY GOODMAN: Now, Jeremy, so, the president is making these decisions on the others below him based on—I mean, it’s very much shaped on the information he’s getting on his desk.

    JEREMY SCAHILL: Right. And, I mean, you know, one of the things that we also see in the documents is that a great deal of the intelligence that they’re basing these packages on come from foreign intelligence sources. So it could be from the Saudis, it could be from Yemenis, it could be from another entity, from Qatar—

    AMY GOODMAN: From the Saudis, for example, who want a protester, a pro-democracy protester, dead.

    JEREMY SCAHILL: Right. Right. And, I mean—well, yes, that’s part of it, but more specifically to this, there are cases where it seems as though the U.S. was intentionally fed bad intelligence to—in the effort to try to eliminate a domestic political opponent of the former dictator of Yemen, for instance, where someone that was actually trying to negotiate with al-Qaeda, but was a political opponent of the Yemeni dictator at the time, Ali Abdullah Saleh, was killed in a U.S. drone strike, and it seems quite likely that it was—you know, Yemen had fed that intelligence to try to eliminate one of their opponents. I mean, the WikiLeaks cables were rife with examples of the Yemeni president trying to get the United States to take up his own political cause against the Houthis at the time, who are now controlling parts of Yemen. But the Saudis have a huge influence over who the U.S. targets in that region. And foreign intelligence—they have their own agenda. And if we’re basing a lot of our decision on who should sort of live or die in these cases on foreign intelligence and unreliable signals intelligence, it raises serious questions about who we’re actually killing.

    JUAN GONZÁLEZ: Well, and it seems to me the other aspect of this, as your report shows, is that the government’s own reviews shows—states the unreliability of this information. So they’re not only making decisions without any kind of judicial process to kill people, the evidence that they’re using, they themselves acknowledge, is unreliable.

    JEREMY SCAHILL: Well, remember, this task force, the ISR Task Force, that did these studies that are in the document—

    AMY GOODMAN: And ISR stands for?

    JEREMY SCAHILL: Intelligence, Surveillance, Reconnaissance. And so, this task force is basically an advocacy wing for more drones, more surveillance platforms, and so you have to view it in the context of this is the Pentagon trying to get all the toys and to make themselves, you know, the boss of everything—and they largely are the boss of everything, because they have the biggest budget and they have the most personnel. But what there—you know, what the point there is, is that there’s this not-so-subtle agitation to start being able to do a lot more capturing. I think it’s true what they’re saying about the unreliability of it. But there’s also—you know, there’s a turf war at play here with the CIA, so I think you have to take it with a grain of salt and read it in the context of that.

    AMY GOODMAN: Now, the issue of innocent civilians—I mean, there’s also an issue of the people who they believe are absolutely guilty, whether or not, Cora, the president should be the judge and the jury and the executioner. But this percentage that Juan raised earlier of 90 percent innocents killed in a drone strike, explain further what you learned on who lives and who dies.

    CORA CURRIER: So what was actually striking about the Pentagon study, which was one of the documents that we had—Ryan looked in detail at these campaigns in Afghanistan, where that 90 percent figure comes from. In Yemen and Somalia, in this Pentagon study, they actually—it was pretty striking for how little they talk about civilian casualties, how little it seems to be an issue. The whole gist of the study was, “Give us”—as Jeremy was saying, “Give us more drones, give us better equipment, so that we can get these high-value targets.” And there was sort of little discussion of what the consequences are if you hit the—of hitting the wrong person. It was more about, like, “We’ve got to be more efficient at getting the people that we want,” and there was very little mention of civilian casualties.

    There were a few times that it mentioned that low CDE, or collateral damage estimate, which is military speak for how many civilians might be harmed, was mentioned a few times as kind of a restraining factor on strikes and something that was explaining why they were moving more slowly, because they had these low CDE requirements. And that’s actually really—that word, that standard, low CDE, is interesting, because at the same time as this study was circulated in May 2013 was when the president gave his big speech about how, before the U.S. would take a strike, there had to be near certainty that no civilians would be harmed or injured. And near certainty is not the same as low CDE. And the White House told us that, you know, the standards of the May 2013 speech are still in place, but they wouldn’t explain that discrepancy as to why these internal documents at the same time had this different standard for civilian deaths.

    AMY GOODMAN: And, Jeremy Scahill, what was the White House’s reaction to this explosive series?

    JEREMY SCAHILL: Well, the White House was—you know, basically said, “We’re not going to comment on purported internal documents.” And, you know, I mean, Ryan had sort of a funny interaction with the Special Operations Command that he can explain. But at the end of the day, the Pentagon ended up being the one that kind of spoke for all of them and said, you know, “These are internal classified documents, and we’re not going to speak about it.” I mean, they’ll speak about classified material all the time when it benefits their position, like John Brennan leaking things after bin Laden, but, you know, they’re not going to address these things. Or even—I mean, Cora had very concrete questions: Is this still the case? Is this true? You know, they wouldn’t answer a single question.

    AMY GOODMAN: We’re going to go to break and then come back, and when we come back, we’re going to talk about Afghanistan. And that’s where Ryan Devereaux comes in. With President Obama now reversing course, the longest war in U.S. history is about to get longer. How do “The Drone Papers” weigh in here? What do they tell us about Afghanistan? And much more. We’re speaking with three of the authors of this series, this stunning series at The Intercept: Jeremy Scahill, Ryan Devereaux and Cora Currier. Stay with us.

    OCTOBER 16, 2015STORY

    Find this story at 13 October 2015

    FIRING BLIND FLAWED INTELLIGENCE AND THE LIMITS OF DRONE TECHNOLOGY (the drone papers)

    The Obama administration has portrayed drones as an effective and efficient weapon in the ongoing war with al Qaeda and other radical groups. Yet classified Pentagon documents obtained by The Intercept reveal that the U.S. military has faced “critical shortfalls” in the technology and intelligence it uses to find and kill suspected terrorists in Yemen and Somalia.
    THOSE SHORTFALLS STEM from the remote geography of Yemen and Somalia and the limited American presence there. As a result, the U.S. military has been overly reliant on signals intelligence from computers and cellphones, and the quality of those intercepts has been limited by constraints on surveillance flights in the region.

    The documents are part of a study by a Pentagon Task Force on Intelligence, Surveillance, and Reconnaissance. They provide details about how targets were tracked for lethal missions carried out by the Joint Special Operations Command, or JSOC, in Yemen and Somalia between January 2011 and summer 2012. When the study was circulated in 2013, the Obama administration was publicly floating the idea of moving the bulk of its drone program to the Pentagon from the CIA, and the military was eager to make the case for more bases, more drones, higher video quality, and better eavesdropping equipment.

    Yet by identifying the challenges and limitations facing the military’s “find, fix, finish” operations in Somalia and Yemen — the cycle of gathering intelligence, locating, and attacking a target — the conclusions of the ISR study would seem to undermine the Obama administration’s claims of a precise and effective campaign, and lend support to critics who have questioned the quality of intelligence used in drone strikes.

    The study made specific recommendations for improving operations in the Horn of Africa, but a Pentagon spokesperson, Cmdr. Linda Rojas, declined to explain what, if any, measures had been taken in response to the study’s findings, saying only that “as a matter of policy we don’t comment on the details of classified reports.”

    THE TYRANNY OF DISTANCE

    One of the most glaring problems identified in the ISR study was the U.S. military’s inability to carry out full-time surveillance of its targets in the Horn of Africa and Yemen. Behind this problem lies the “tyranny of distance” — a reference to the great lengths that aircraft must fly to their targets from the main U.S. air base in Djibouti, the small East African nation that borders Somalia and sits just across the Gulf of Aden from Yemen.
    Surveillance flights are limited by fuel — and, in the case of manned aircraft, the endurance of pilots. In contrast with Iraq, where more than 80 percent of “finishing operations” were conducted within 150 kilometers of an air base, the study notes that “most objectives in Yemen are ~ 500 km away” from Djibouti and “Somalia can be over 1,000 km.” The result is that drones and planes can spend half their air time in transit, and not enough time conducting actual surveillance.

    A Pentagon chart showing that as of June 2012 manned spy planes accounted for the majority of flights over Yemen, even though drones were more efficient, since they could spend more time over a target. Over Somalia, the military used a mix of manned and unmanned aircraft. AP = Arabian Peninsula; EA = East Africa.
    Compounding the tyranny of distance, the ISR study complained, was the fact that JSOC had too few drones in the region to meet the requirements mandated for carrying out a finishing operation. The military measures surveillance flights in orbits — meaning continuous, unbroken coverage of a target — and JSOC chronically failed to meet “minimum requirements” for orbits over Yemen, and in the case of Somalia had never met the minimum standards. On average, 15 flights a day, by multiple aircraft relieving or complementing one another, were needed to complete three orbits over Yemen.

    The “sparse” available resources meant that aircraft had to “cover more potential leads — stretching coverage and leading to [surveillance] ‘blinks.’” Because multiple aircraft needed to be “massed” over one target before a strike, surveillance of other targets temporarily ceased, thus breaking the military’s ideal of a “persistent stare” or the “unblinking eye” of around-the-clock tracking.

    When the military was focused on a “finish” — meaning kill — operation, drones were taken off the surveillance of other targets.
    JSOC relied on manned spy planes to fill the orbit gap over Yemen. In June 2012 there were six U-28 spy planes in operation in East Africa and the Arabian Peninsula, as well as several other types of manned aircraft. The U-28s in Djibouti were “referred to as the ‘Chiclet line,’” according to the ISR study, and “compounded Djiboutian air control issues” because of their frequent flights.

    Only in the summer of 2012, with the addition of contractor-operated drones based in Ethiopia and Fire Scout unmanned helicopters, did Somalia have the minimum number of drones commanders wanted. The number of Predator drones stationed in Djibouti doubled over the course of the study, and in 2013, the fleet was moved from the main U.S. air base, Camp Lemonnier, to another Djibouti airstrip because of overcrowding and a string of crashes.

    “Blinking” remained a concern, however, and the study recommended adding even more aircraft to the area of operations. Noting that political and developmental issues hampered the military’s ability to build new bases, it suggested expanding the use of aircraft launched from ships. JSOC already made use of Fire Scout helicopter drones and small Scan Eagle drones off the coast of Somalia, as well as “Armada Sweep,” which a 2011 document from the National Security Agency, provided by former contractor Edward Snowden, describes as a “ship-based collection system” for electronic communications data. (The NSA declined to comment on Armada Sweep.)

    Lt. Gen. Michael Flynn, who was head of the Defense Intelligence Agency from July 2012 to August 2014, told The Intercept that the surveillance requirements he outlined for tracking al Qaeda while in office had never been met. “We end up spending money on other stupid things instead of actually the capabilities that we need,” he said. “This is not just about buying more drones, it’s a whole system that’s required.”

    According to Micah Zenko, a senior fellow at the Council on Foreign Relations who has closely studied the drone war, resource constraints in Africa “mean less time for the persistent stare that counterterrorism analysts and commanders want, and got used to in the Afghanistan-Pakistan theater.”

    FIND, FIX, FINISH

    The find, fix, finish cycle is known in the military as FFF, or F3. But just as critical are two other letters: E and A, for “exploit and analyze,” referring to the use of materials collected on the ground and in detainee interrogations.
    F3EA became doctrine in counterinsurgency campaigns in Iraq and Afghanistan in the mid-2000s. Gen. Stanley McChrystal wrote in his memoir that the simplicity of those “five words in a line … belied how profoundly it would drive our mission.” In 2008, Flynn, who worked closely with McChrystal before becoming head of the Defense Intelligence Agency, wrote that “Exploit-Analyze starts the cycle over again by providing leads, or start points, into the network that could be observed and tracked using airborne ISR.”

    Deadly strikes thus truncate the find, fix, finish cycle without exploitation and analysis — precisely the components that were lacking in the drone campaign waged in East Africa and Yemen. That shortfall points to one of the contradictions at the heart of the drone program in general: Assassinations are intelligence dead ends.

    The ISR study shows that after a “kill operation” there is typically nobody on the ground to collect written material or laptops in the target’s house, or the phone on his body, or capture suspects and ask questions. Yet collection of on-the-ground intelligence of that sort — referred to as DOMEX, for “document and media exploitation,” and TIR, for “tactical interrogation report” — is invaluable for identifying future targets.

    A slide from a Pentagon study notes that deadly strikes in Yemen and Somalia reduce the amount of intelligence for future operations. AUMF = 2001 Authorization for Use of Military Force; FMV = Full Motion Video; F3EA = Find, Fix, Finish, Exploit, Analyze; HOA = Horn of Africa
    Stating that 75 percent of operations in the region were strikes, and noting that “kill operations significantly reduce the intelligence available from detainees and captured material,” the study recommended an expansion of “capture finishes via host-nation partners for more ‘finish-derived’ intelligence.” One of the problems with that scenario, however, is that security forces in host nations like Yemen and Somalia are profoundly unreliable and have been linked to a wide variety of abuses, including the torture of prisoners.

    A report last year by retired Gen. John Abizaid and former Defense Department official Rosa Brooks noted that the “enormous uncertainties” of drone warfare are “multiplied further when the United States relies on intelligence and other targeting information provided by a host nation government: How can we be sure we are not being drawn into a civil war or being used to target the domestic political enemies of the host state leadership?”

    In 2011, for example, U.S. officials told the Wall Street Journal that they had killed a local governor because Yemeni officials didn’t tell them he was present at a gathering of al Qaeda figures. “We think we got played,” one official said. (The Yemeni government disputed the report.)

    Despite such warnings, the drone program has relied heavily on intelligence from other countries. One slide describes signals intelligence, or SIGINT, as coming “often from foreign partners,” and another, titled “Alternatives to Exploit/Analyze,” states that “in the reduced access environment, national intelligence partners often have the best information and access.”

    The military relies heavily on intelligence from electronic communications, much of it provided by foreign governments, but acknowledges that the information is “neither as timely nor as focused as tactical intelligence.”
    One way to increase the reliability of host-nation intelligence is to be directly involved in its collection — but this can be risky for soldiers on the ground. The study called for “advance force operations,” including “small teams of special force advisors,” to work with foreign forces to capture combatants, interrogate them, and seize any written material or electronic devices they possess. According to public Special Operations guidelines, advance force operations “prepare for near-term” actions by planting tracking devices, conducting reconnaissance missions, and staging for attacks. The documents obtained by The Intercept did not specify an optimum number of advisors or where they should be based or how exactly they should be involved in capture or interrogation operations.

    Although the study dates from 2013, current Special Operations Commander Joseph Votel echoed its findings in July 2015. Votel noted that his troops were working closely with African Union forces and the Somali government to battle al Shabaab. He added, “We get a lot more … when we actually capture somebody or we capture material than we do when we kill someone.”

    A man walks past destroyed buildings in Zinjibar, capital of Abyan province in southern Yemen on Dec. 5, 2012. Photo: Sami-al-Ansi/AFP/Getty Images
    THE POVERTY OF SIGNALS INTELLIGENCE

    With limited ability to conduct raids or seize materials from targeted individuals in Yemen and Somalia, JSOC relied overwhelmingly on monitoring electronic communications to discover and ultimately locate targets.
    The documents state bluntly that SIGINT is an inferior form of intelligence. Yet signals accounted for more than half the intelligence collected on targets, with much of it coming from foreign partners. The rest originated with human intelligence, primarily obtained by the CIA. “These sources,” the study notes, “are neither as timely nor as focused as tactical intelligence” from interrogations or seized materials.

    Making matters worse, the documents refer to “poor” and “limited” capabilities for collecting SIGINT, implying a double bind in which kill operations were reliant on sparse amounts of inferior intelligence.

    The disparity with other areas of operation was stark, as a chart contrasting cell data makes clear: In Afghanistan there were 8,900 cell data reports each month, versus 50 for Yemen and 160 for Somalia. Despite that, another chart shows SIGINT comprised more than half the data sources that went into developing targets in Somalia and Yemen in 2012.

    Cellphone data was critical for finding and identifying targets, yet a chart from a Pentagon study shows that the military had far less information in Yemen and Somalia than it was accustomed to having in Afghanistan. DOMEX = Document and Media Exploitation; GSM = Global System for Mobile communication; HOA = Horn of Africa; IIRs = Intelligence Information Reports; SIGINT = Signals Intelligence; TIRs = Tactical Interrogation Reports.
    Flynn told The Intercept there was “way too much reliance on technical aspects [of intelligence], like signals intelligence, or even just looking at somebody with unmanned aerial vehicles.”

    “I could get on the telephone from somewhere in Somalia, and I know I’m a high-value target, and say in some coded language, ‘The wedding is about to occur in the next 24 hours,’” Flynn said. “That could put all of Europe and the United States on a high-level alert, and it may be just total bullshit. SIGINT is an easy system to fool and that’s why it has to be validated by other INTs — like HUMINT. You have to ensure that the person is actually there at that location because what you really intercepted was the phone.”

    In addition to using SIGINT to identify and find new targets, the documents detail how military analysts also relied on such intelligence to make sure that they had the correct person in their sights and to estimate the harm to civilians before a strike. After locating a target, usually by his cellphone or other electronics, analysts would study video feeds from surveillance aircraft “to build near-certainty via identification of distinguishing physical characteristics.”

    A British intelligence document on targeted killing in Afghanistan, which was among the Snowden files, describes a similar process of “monitoring a fixed location, and tracking any persons moving away from that location, and identifying if a similar pattern is experienced through SIGINT collect.” The document explains that “other visual indicators may be used to aid the establishment of [positive identification]” including “description of clothing” or “gait.” After a shot, according to the British document and case studies in the Pentagon’s ISR report, drones would hover to determine if their target had been hit, collecting video and evidence of whether the cellphone had been eliminated. (The British intelligence agency, GCHQ, declined to comment on the document.)

    A chart comparing the surveillance capabilities of the various drones and aircraft flying over Yemen and Somalia in 2012. APG = Aerial Precision Geolocation; DNR COMINT = Dial Network Recognition Communications Intelligence; ISR = Intelligence, Surveillance, and Reconnaissance; FMV = Full Motion Video; PTT COMINT = Push-to-Talk Communications Intelligence.
    Yet according to the ISR study, the military faced “critical shortfalls of capabilities” in the technologies enabling that kind of precise surveillance and post-strike assessment. At the time of the study, only some of the Reaper drones had high-definition video, and most of the aircraft over the region lacked the ability to collect “dial number recognition” data.

    The study cites these shortcomings as an explanation for the low rate of successful strikes against the targets on the military’s kill list in Yemen and Somalia, especially in comparison with Iraq and Afghanistan. It presents the failings primarily as an issue of efficiency, with little mention of the possible consequence of bad intelligence leading to killing the wrong people.

    THE DRONE PAPERS
    Cora Currier, Peter Maass
    Oct. 15 2015, 1:58 p.m.
    Additional reporting: Jeremy Scahill

    Find this story at 15 October 2015

    Copyright https://theintercept.com/

    THE DRONE PAPERS: THE ASSASSINATION COMPLEXSECRET MILITARY DOCUMENTS EXPOSE THE INNER WORKINGS OF OBAMA’S DRONE WARS

    From his first days as commander in chief, the drone has been President Barack Obama’s weapon of choice, used by the military and the CIA to hunt down and kill the people his administration has deemed — through secretive processes, without indictment or trial — worthy of execution. There has been intense focus on the technology of remote killing, but that often serves as a surrogate for what should be a broader examination of the state’s power over life and death.
    DRONES ARE A TOOL, not a policy. The policy is assassination. While every president since Gerald Ford has upheld an executive order banning assassinations by U.S. personnel, Congress has avoided legislating the issue or even defining the word “assassination.” This has allowed proponents of the drone wars to rebrand assassinations with more palatable characterizations, such as the term du jour, “targeted killings.”

    When the Obama administration has discussed drone strikes publicly, it has offered assurances that such operations are a more precise alternative to boots on the ground and are authorized only when an “imminent” threat is present and there is “near certainty” that the intended target will be eliminated. Those terms, however, appear to have been bluntly redefined to bear almost no resemblance to their commonly understood meanings.

    The first drone strike outside of a declared war zone was conducted more than 12 years ago, yet it was not until May 2013 that the White House released a set of standards and procedures for conducting such strikes. Those guidelines offered little specificity, asserting that the U.S. would only conduct a lethal strike outside of an “area of active hostilities” if a target represents a “continuing, imminent threat to U.S. persons,” without providing any sense of the internal process used to determine whether a suspect should be killed without being indicted or tried. The implicit message on drone strikes from the Obama administration has been one of trust, but don’t verify.

    Photo: The Intercept
    Document
    SMALL FOOTPRINT OPERATIONS 2/13Document
    SMALL FOOTPRINT OPERATIONS 5/13Document
    OPERATION HAYMAKERDocument
    GEOLOCATION-WATCHLISTThe Intercept has obtained a cache of secret slides that provides a window into the inner workings of the U.S. military’s kill/capture operations at a key time in the evolution of the drone wars — between 2011 and 2013. The documents, which also outline the internal views of special operations forces on the shortcomings and flaws of the drone program, were provided by a source within the intelligence community who worked on the types of operations and programs described in the slides. The Intercept granted the source’s request for anonymity because the materials are classified and because the U.S. government has engaged in aggressive prosecution of whistleblowers. The stories in this series will refer to the source as “the source.”

    The source said he decided to provide these documents to The Intercept because he believes the public has a right to understand the process by which people are placed on kill lists and ultimately assassinated on orders from the highest echelons of the U.S. government. “This outrageous explosion of watchlisting — of monitoring people and racking and stacking them on lists, assigning them numbers, assigning them ‘baseball cards,’ assigning them death sentences without notice, on a worldwide battlefield — it was, from the very first instance, wrong,” the source said.

    “We’re allowing this to happen. And by ‘we,’ I mean every American citizen who has access to this information now, but continues to do nothing about it.”
    The Pentagon, White House, and Special Operations Command all declined to comment. A Defense Department spokesperson said, “We don’t comment on the details of classified reports.”

    The CIA and the U.S. military’s Joint Special Operations Command (JSOC) operate parallel drone-based assassination programs, and the secret documents should be viewed in the context of an intense internal turf war over which entity should have supremacy in those operations. Two sets of slides focus on the military’s high-value targeting campaign in Somalia and Yemen as it existed between 2011 and 2013, specifically the operations of a secretive unit, Task Force 48-4.

    Additional documents on high-value kill/capture operations in Afghanistan buttress previous accounts of how the Obama administration masks the true number of civilians killed in drone strikes by categorizing unidentified people killed in a strike as enemies, even if they were not the intended targets. The slides also paint a picture of a campaign in Afghanistan aimed not only at eliminating al Qaeda and Taliban operatives, but also at taking out members of other local armed groups.

    One top-secret document shows how the terror “watchlist” appears in the terminals of personnel conducting drone operations, linking unique codes associated with cellphone SIM cards and handsets to specific individuals in order to geolocate them.

    A top-secret document shows how the watchlist looks on internal systems used by drone operators.
    The costs to intelligence gathering when suspected terrorists are killed rather than captured are outlined in the slides pertaining to Yemen and Somalia, which are part of a 2013 study conducted by a Pentagon entity, the Intelligence, Surveillance, and Reconnaissance Task Force. The ISR study lamented the limitations of the drone program, arguing for more advanced drones and other surveillance aircraft and the expanded use of naval vessels to extend the reach of surveillance operations necessary for targeted strikes. It also contemplated the establishment of new “politically challenging” airfields and recommended capturing and interrogating more suspected terrorists rather than killing them in drone strikes.

    The ISR Task Force at the time was under the control of Michael Vickers, the undersecretary of defense for intelligence. Vickers, a fierce proponent of drone strikes and a legendary paramilitary figure, had long pushed for a significant increase in the military’s use of special operations forces. The ISR Task Force is viewed by key lawmakers as an advocate for more surveillance platforms like drones.

    The ISR study also reveals new details about the case of a British citizen, Bilal el-Berjawi, who was stripped of his citizenship before being killed in a U.S. drone strike in 2012. British and American intelligence had Berjawi under surveillance for several years as he traveled back and forth between the U.K. and East Africa, yet did not capture him. Instead, the U.S. hunted him down and killed him in Somalia.

    Taken together, the secret documents lead to the conclusion that Washington’s 14-year high-value targeting campaign suffers from an overreliance on signals intelligence, an apparently incalculable civilian toll, and — due to a preference for assassination rather than capture — an inability to extract potentially valuable intelligence from terror suspects. They also highlight the futility of the war in Afghanistan by showing how the U.S. has poured vast resources into killing local insurgents, in the process exacerbating the very threat the U.S. is seeking to confront.

    Read more
    FIND, FIX, FINISH These secret slides help provide historical context to Washington’s ongoing wars, and are especially relevant today as the U.S. military intensifies its drone strikes and covert actions against ISIS in Syria and Iraq. Those campaigns, like the ones detailed in these documents, are unconventional wars that employ special operations forces at the tip of the spear.

    The “find, fix, finish” doctrine that has fueled America’s post-9/11 borderless war is being refined and institutionalized. Whether through the use of drones, night raids, or new platforms yet to be unleashed, these documents lay bare the normalization of assassination as a central component of U.S. counterterrorism policy.

    “The military is easily capable of adapting to change, but they don’t like to stop anything they feel is making their lives easier, or is to their benefit. And this certainly is, in their eyes, a very quick, clean way of doing things. It’s a very slick, efficient way to conduct the war, without having to have the massive ground invasion mistakes of Iraq and Afghanistan,” the source said. “But at this point, they have become so addicted to this machine, to this way of doing business, that it seems like it’s going to become harder and harder to pull them away from it the longer they’re allowed to continue operating in this way.”

    The articles in The Drone Papers were produced by a team of reporters and researchers from The Intercept that has spent months analyzing the documents. The series is intended to serve as a long-overdue public examination of the methods and outcomes of America’s assassination program. This campaign, carried out by two presidents through four presidential terms, has been shrouded in excessive secrecy. The public has a right to see these documents not only to engage in an informed debate about the future of U.S. wars, both overt and covert, but also to understand the circumstances under which the U.S. government arrogates to itself the right to sentence individuals to death without the established checks and balances of arrest, trial, and appeal.

    Among the key revelations in this series:

    HOW THE PRESIDENT AUTHORIZES TARGETS FOR ASSASSINATION

    Read more
    KILL CHAINIt has been widely reported that President Obama directly approves high-value targets for inclusion on the kill list, but the secret ISR study provides new insight into the kill chain, including a detailed chart stretching from electronic and human intelligence gathering all the way to the president’s desk. The same month the ISR study was circulated — May 2013 — Obama signed the policy guidance on the use of force in counterterrorism operations overseas. A senior administration official, who declined to comment on the classified documents, told The Intercept that “those guidelines remain in effect today.”

    U.S. intelligence personnel collect information on potential targets, as The Intercept has previously reported, drawn from government watchlists and the work of intelligence, military, and law enforcement agencies. At the time of the study, when someone was destined for the kill list, intelligence analysts created a portrait of a suspect and the threat that person posed, pulling it together “in a condensed format known as a ‘baseball card.’” That information was then bundled with operational information and packaged in a “target information folder” to be “staffed up to higher echelons” for action. On average, it took 58 days for the president to sign off on a target, one slide indicates. At that point, U.S. forces had 60 days to carry out the strike. The documents include two case studies that are partially based on information detailed on baseball cards.

    The system for creating baseball cards and targeting packages, according to the source, depends largely on intelligence intercepts and a multi-layered system of fallible, human interpretation. “It isn’t a surefire method,” he said. “You’re relying on the fact that you do have all these very powerful machines, capable of collecting extraordinary amounts of data and information,” which can lead personnel involved in targeted killings to believe they have “godlike powers.”

    ASSASSINATIONS DEPEND ON UNRELIABLE INTELLIGENCE AND HURT INTELLIGENCE GATHERING

    Read more
    FIRING BLINDIn undeclared war zones, the U.S. military has become overly reliant on signals intelligence, or SIGINT, to identify and ultimately hunt down and kill people. The documents acknowledge that using metadata from phones and computers, as well as communications intercepts, is an inferior method of finding and finishing targeted people. They described SIGINT capabilities in these unconventional battlefields as “poor” and “limited.” Yet such collection, much of it provided by foreign partners, accounted for more than half the intelligence used to track potential kills in Yemen and Somalia. The ISR study characterized these failings as a technical hindrance to efficient operations, omitting the fact that faulty intelligence has led to the killing of innocent people, including U.S. citizens, in drone strikes.

    The source underscored the unreliability of metadata, most often from phone and computer communications intercepts. These sources of information, identified by so-called selectors such as a phone number or email address, are the primary tools used by the military to find, fix, and finish its targets. “It requires an enormous amount of faith in the technology that you’re using,” the source said. “There’s countless instances where I’ve come across intelligence that was faulty.” This, he said, is a primary factor in the killing of civilians. “It’s stunning the number of instances when selectors are misattributed to certain people. And it isn’t until several months or years later that you all of a sudden realize that the entire time you thought you were going after this really hot target, you wind up realizing it was his mother’s phone the whole time.”

    Within the special operations community, the source said, the internal view of the people being hunted by the U.S. for possible death by drone strike is: “They have no rights. They have no dignity. They have no humanity to themselves. They’re just a ‘selector’ to an analyst. You eventually get to a point in the target’s life cycle that you are following them, you don’t even refer to them by their actual name.” This practice, he said, contributes to “dehumanizing the people before you’ve even encountered the moral question of ‘is this a legitimate kill or not?’”

    By the ISR study’s own admission, killing suspected terrorists, even if they are “legitimate” targets, further hampers intelligence gathering. The secret study states bluntly: “Kill operations significantly reduce the intelligence available.” A chart shows that special operations actions in the Horn of Africa resulted in captures just 25 percent of the time, indicating a heavy tilt toward lethal strikes.

    STRIKES OFTEN KILL MANY MORE THAN THE INTENDED TARGET

    Read more
    MANHUNTING IN THE HINDU KUSH The White House and Pentagon boast that the targeted killing program is precise and that civilian deaths are minimal. However, documents detailing a special operations campaign in northeastern Afghanistan, Operation Haymaker, show that between January 2012 and February 2013, U.S. special operations airstrikes killed more than 200 people. Of those, only 35 were the intended targets. During one five-month period of the operation, according to the documents, nearly 90 percent of the people killed in airstrikes were not the intended targets. In Yemen and Somalia, where the U.S. has far more limited intelligence capabilities to confirm the people killed are the intended targets, the equivalent ratios may well be much worse.

    “Anyone caught in the vicinity is guilty by association,” the source said. When “a drone strike kills more than one person, there is no guarantee that those persons deserved their fate. … So it’s a phenomenal gamble.”

    THE MILITARY LABELS UNKNOWN PEOPLE IT KILLS AS “ENEMIES KILLED IN ACTION”

    Read more
    MANHUNTING IN THE HINDU KUSH The documents show that the military designated people it killed in targeted strikes as EKIA — “enemy killed in action” — even if they were not the intended targets of the strike. Unless evidence posthumously emerged to prove the males killed were not terrorists or “unlawful enemy combatants,” EKIA remained their designation, according to the source. That process, he said, “is insane. But we’ve made ourselves comfortable with that. The intelligence community, JSOC, the CIA, and everybody that helps support and prop up these programs, they’re comfortable with that idea.”

    The source described official U.S. government statements minimizing the number of civilian casualties inflicted by drone strikes as “exaggerating at best, if not outright lies.”

    THE NUMBER OF PEOPLE TARGETED FOR DRONE STRIKES AND OTHER FINISHING OPERATIONS

    Read more
    KILL CHAINAccording to one secret slide, as of June 2012, there were 16 people in Yemen whom President Obama had authorized U.S. special operations forces to assassinate. In Somalia, there were four. The statistics contained in the documents appear to refer only to targets approved under the 2001 Authorization for Use of Military Force, not CIA operations. In 2012 alone, according to data compiled by the Bureau of Investigative Journalism, there were more than 200 people killed in operations in Yemen and between four and eight in Somalia.

    HOW GEOGRAPHY SHAPES THE ASSASSINATION CAMPAIGN

    Read more
    FIRING BLINDIn Afghanistan and Iraq, the pace of U.S. strikes was much quicker than in Yemen and Somalia. This appears due, in large part, to the fact that Afghanistan and Iraq were declared war zones, and in Iraq the U.S. was able to launch attacks from bases closer to the targeted people. By contrast, in Somalia and Yemen, undeclared war zones where strikes were justified under tighter restrictions, U.S. attack planners described a serpentine bureaucracy for obtaining approval for assassination. The secret study states that the number of high-value targeting operations in these countries was “significantly lower than previously seen in Iraq and Afghanistan” because of these “constraining factors.”

    Even after the president approved a target in Yemen or Somalia, the great distance between drone bases and targets created significant challenges for U.S. forces — a problem referred to in the documents as the “tyranny of distance.” In Iraq, more than 80 percent of “finishing operations” were conducted within 150 kilometers of an air base. In Yemen, the average distance was about 450 kilometers and in Somalia it was more than 1,000 kilometers. On average, one document states, it took the U.S. six years to develop a target in Somalia, but just 8.3 months to kill the target once the president had approved his addition to the kill list.

    INCONSISTENCIES WITH WHITE HOUSE STATEMENTS ABOUT TARGETED KILLING

    Read more
    KILL CHAINThe White House’s publicly available policy standards state that lethal force will be launched only against targets who pose a “continuing, imminent threat to U.S. persons.” In the documents, however, there is only one explicit mention of a specific criterion: that a person “presents a threat to U.S. interest or personnel.” While such a rationale may make sense in the context of a declared war in which U.S. personnel are on the ground in large numbers, such as in Afghanistan, that standard is so vague as to be virtually meaningless in countries like Yemen and Somalia, where very few U.S. personnel operate.

    While many of the documents provided to The Intercept contain explicit internal recommendations for improving unconventional U.S. warfare, the source said that what’s implicit is even more significant. The mentality reflected in the documents on the assassination programs is: “This process can work. We can work out the kinks. We can excuse the mistakes. And eventually we will get it down to the point where we don’t have to continuously come back … and explain why a bunch of innocent people got killed.”

    The architects of what amounts to a global assassination campaign do not appear concerned with either its enduring impact or its moral implications. “All you have to do is take a look at the world and what it’s become, and the ineptitude of our Congress, the power grab of the executive branch over the past decade,” the source said. “It’s never considered: Is what we’re doing going to ensure the safety of our moral integrity? Of not just our moral integrity, but the lives and humanity of the people that are going to have to live with this the most?”

    Jeremy Scahill
    Oct. 15 2015, 1:57 p.m.

    Find this story at 15 October 2015

    Copyright https://theintercept.com/