Verrassend nieuws van het roofvogelfront: De Nationale Politie stopt met de inzet van roofvogels tegen ongewenste drones. Zoals hier eerder beschreven heeft de politie een onbekend aantal kuikens van de Amerikaanse zeearend gekocht. Het innovatieve anti-dronebedrijf Guard from Above zou deze opleiden, om net als steenarend Cayenne en nog een andere vogel, die mogelijk ‘Hunter’ heet, drones uit de lucht te halen. Dat er in dit project ook maar één Amerikaanse zeearend een drone heeft onderschept is niet erg waarschijnlijk. Er is in elk geval geen bewijs van. Er zouden ook honderd politiemensen worden opgeleid tot roofvogelgeleider, deze training was al begonnen.
Buro Jansen & Janssen Postbus 10591, 1001EN Amsterdam, 020-6123202, 06-34339533, signal +31684065516, firstname.lastname@example.org (pgp)
Steun Buro Jansen & Janssen. Word donateur, NL43 ASNB 0856 9868 52 of NL56 INGB 0000 6039 04 ten name van Stichting Res Publica, Postbus 11556, 1001 GN Amsterdam.
- Observant#80 2022 Protesteren is Terrorisme
- Observant#79 2022 VASTech / Cyberupt
- Observant#78 2021 De burger is staatsgevaarlijk
- Observant#77 2021 Fox-IT in Rusland
- Observant#76 2021 Integrale Nepwetenschap
- Observant#75 2020 Fox-IT en exportvergunningen
- Observant#74 2020 Stasi NL Benaderingen in 2019
- Observant#73 2019 Fox-IT in het Midden-Oosten
- Arrestantenhandleiding 2018
- Observant#72 2018 Geheime politie van Nederland
- Referendum WIV 2017 magazine 2018
- Observant#71 2018 Niet Transparante Wetenschap
- Observant#70 2017 Social Media Surveillance
- Observant#69 2017 Politie Mercenaries
- Observant#68 2016 Wetenschappers en Politie
- Observant#67 2015 Data Bedrog
- Observant#66 2015 Terroriseren politiek protest
- Observant#65 2014 G4S, Facebook en de AIVD
- Observant#64 2014 Vreemdelingendetentie
- Observant#63 2013 Ideologische orde, Chiquita
- Observant#62 2012 De Psyche van een Mol
- Observant#61 2012 RID bespioneert jongeren
- Observant#60 2012 Duurzaam afwimpelen
- Security Industry: Israel - the Netherlands 2011
- Observant#59 2011 RID protest Twente
- Observant#58 2011 Kraaijer, AIVD, De Telegraaf
- Observant#57 2011 Shell, imago AIVD, India
- Europese politie en Justitie Infozine 2010
- Observant#56 2010 Ochtendgloren, politie phishing
- Observant#55 2010 Politieke Politie
- Observant#54 2009 ID-plicht, Demonstratierecht
- Observant#53 2009 Haags Fouilleren
- Observant#52 2009 200.000 professionals?
- Observant#51 2009 Chocolade spionnen
- Observant#50 2008 Sloop Deporatiemachine
- Observant#49 2008 Bewaarplicht en Onmacht
- Observant#48 2008 De Onschuld is Dood
- Identificatieplicht Infozine 2007
- Observant#47 2007 WUID & buitenland
- Observant#46 2007 Aanslagen, Prüm, toezicht
- Observant#45 2007 Blauw Waas, terrorisme
- Observant#44 2007 Preventief Strafrecht
- Terrorismebestrijding in Nederland infozine 2006
- Ruimte voor het recht 2006 Demonstratierecht
- Onder Druk, Terrorismebestrijding NL 2006
- Observant#43 2006 Kiezen verdwijnen terreur
- Observant#42 2006 Schaduw terreur
- Observant#41 2006 Willekeurig Strafrecht
- Observant#40 2006 Vuile terreur oorlog
- Observant#39 2006 Terreur van grootmachten
- Gestraft zonder veroordeling 2005
- Observant#38 2005 Bedrijfsspionage terrorisme
- Observant#37 2005 Terrorisme fabels
- Observant#36 2005 Terroristen lijsten
- Observant#35 2005 EU Grondwet
- Observant#34 2005 Gewist AIVD bewijs
- Observant#33 2005 ID-weigeraars Nat. Recherche
- Observant#32 2005 Misleidende inlichtingen
- Observant#31 2005 Cyclopisch Recht
- Observant#30 2004 Bedrijfsspionage acties
- Observant#29 2004 Rasterfahndung NL
- Observant#28 2004 Veganisten barbeque
- Observant#27 2004 EU2004, dieren en camera's
- Observant#26 2004 Vreemdelingen inlichtingen
- Observant#25 2004 Incidentenpolitiek
- Observant#24 2004 Europese Terreur
- Observant#23 2004 Boeven en buitenlui
- Observant#22 2004 Terroristische Activist
- Misleidende methode 14 november 2003
- Keizer in lompen, 1 november 2003
- Observant#21 2003 Vreemdelingen en de AIVD
- Observant#20 2003 Snuffelstaat
- Observant#19 2003 Globalisten onder de loep
- Observant#18 2003 EU & AIVD, list & bedrog
- De Snuffelstaat, NL en de BVD 1 november 2002
- Schone schijn, 1 juni 2002
- Observant#17 2002 Schone Schijn
- Observant#16 2002 EU Europol snuffelen
- Observant#15 2002 Politie betaalt studie
- Observant#14 2002 Op jacht naar links
- Observant#13 2002 IMSI DNA BVD kip
- Observant#12 2002 De vader van de bruid
- Observant#11 2001 War on Terror
- Observant#10 2001 Europa tegen demonstranten
- Observant#9 2001 Burenruzie en oliegiganten
- Observant#8 2001 Veiligheid en zekerheid
- Observant#7 2001 Camus Echelon Greenpeace
- Zoom, cameratoezicht, 1 augustus 2000
- Tips tegen tralies, 1 juli 2000
- Dossier Cryptografie, 1 mei 2000
- Dossier Cryptografie (GB), 1 mei 2000
- Dossier Pepperspray, 1 maart 2000
- Observant#6 2000 BVD en vluchtelingen
- Observant#5 2000 Begrotingen politie justitie
- Observant#4 2000 Zoom: dossier cameratoezicht
- Observant#3 2000 Europol
- Observant#2 2000 Crypto Pepperspray
- Observant#1 2000 Crime in Cyberspace, EK2000
- Luisterrijk, 1 november 1999
- Dossier Europol II, 1 april 1999
- Het Europese asielbeleid, 1 september 1999
- VD-Amok inlichtingendiensten, 1 december 1998
- Dossier Europol I, 1 mei 1997
- Welingelichte Kringen, 1 juli 1995
- Nederland, open U, 1 juli 1994
- De muren hebben oren 1 januari 1994
- Opening van Zaken, 1 maart 1993
- De vluchteling achtervolgd, 1 april 1991
- Regenjassendemokratie, 1 april 1990
- Administratieve Apartheid
- Adrian Franks, infiltrant in actiegroepen
- AIVD en vreemdelingen
- Artikel 140
- Cryptografie, cyberwar in 2000
- De tragiek van de geheime dienst
- De zaak Bosio
- Demonstratierecht, Is er ruimte voor het recht
- Dossier CICI
- Dossier RaRa
- Etnisch Profileren
- Europese Politie en Justitie
- Europese regelgeving
- Koppelingswet, uitsluiting van vreemdelingen
- Louis Sévèke, vermoorde Nijmeegse activist
- Informanten & Infiltranten
- Openbare Orde
- Oud Papier Affaire
- Paola, Italiaanse repressie
- Particuliere Recherche
- Paul Kraaijer, informant of fantast
- Preventief Fouilleren
- RCID Kennemerland
- Van Traa
23 augustus 2017 was een aantal nieuwsrubrieken uitgenodigd om te komen filmen in Limburg. Boerenbond LLTB zou laten zien hoe maisvelden vanuit de lucht worden gecontroleerd op wietplanten. De cannabis zou daar zijn geplant door criminele organisaties, en als de mais hoog staat is de wiet onzichtbaar vanaf de weg. Bijzonder dit jaar is dat de politie niet meer mee wil doen. Daarom laat de LLTB op eigen kosten drones vliegen. Intussen blijkt dat bij de planning geen rekening was gehouden met regels over drones in de buurt van hoogspanningsmasten. Daardoor kon maar een kwart van de aangemelde maisvelden worden bekeken. Er is geen hennep aangetroffen.
De Nationale politie gaat een roofvogel uitlenen om de NAVO top in Brussel op hemelvaartsdag 2017 te beveiligen. Volgens de politie is dat niet de eerste inzet, ook bij de huldiging van Feyenoord in mei 2017 is een roofvogel achter de hand gehouden, schrijft de Telegraaf. U las hier eerder over.
Over roofvogel-subsidie voor een pet-project van de Nationale politie en media die vol trots vogel-shotjes kopiëren zonder kritische vragen te stellen
De Nederlandse politie heeft een onbekend aantal zeearend-kuikens gekocht en leidt 100 politiefunctionarissen op om met deze vogels ongewenste drones uit de lucht te halen. Dat was zonder twijfel het best verspreide politienieuws van 2016. U las hier eerder over. 18 april 2017 begon de eerste ‘birdhandling-class‘. Laten we de gebeurtenissen op een rijtje zetten.
14 februari 2011: Hielko van Rijthoven, valkenier bij roofvogelmanege ‘de Roofvogelboerderij’ koopt een vrouwelijke steenarend. De vorige eigenaar wilde van haar af, mogelijk omdat ze te agressief was. Hij noemt de arend Cayenne. In april gaat hij met haar trainen met een kunstprooi. Dit staat op zijn blog.
Eén van de beveiligers van de dienst Bewaking en Beveiliging (DBB) wordt verdacht van het lekken van vertrouwelijke informatie uit de politiecomputer aan een criminele organisatie. Premier Rutte zegt dat de veiligheid van Geert Wilders, die ook door deze dienst wordt bewaakt, niet in het geding is geweest. Twee chefs van de DBB zijn zojuist opgestapt.
Wij keken welk nieuws we konden vinden over de gebeurtenissen en hoe plausibel het is wat er wordt gezegd door de politie.
De Nationale Politie steekt veel energie in beeldvorming. Het opsporen en vervolgen van strafbare feiten is lastig en tijdrovend. Verder is het onzichtbaar voor het publiek en ondankbaar, net als veel ander werk dat mensen doen voor geld. Met de opsporing is het slecht gesteld.
Toch wordt er veel tijd gestoken in preventief politiewerk. Op basis van ‘data’ en intuïtie zoeken naar strafbare feiten voordat ze zijn gepleegd. Dan kan je de politie op straat iets zien doen. Mogelijk geeft het mensen een gevoel van veiligheid, denken ze.
Dat er al genoeg te doen was, dat hierdoor duizenden onschuldige mensen gediscrimineerd worden en van hun tijd beroofd, en dat bovendien de opbrengst in strafrechtelijke zin niet spectaculair is, weegt voor de Nationale Politie niet op tegen het voordeel van in beeld te zijn. Het lijkt een doel op zich.
“U hoort sirenes, er is blijkbaar iets aan de hand verderop! U stuurt uw drone de lucht in om even een kijkje te gaan nemen… mag dat? NEE NATUURLIJK MAG DAT NIET!!” — aldus de overheidscampagne eerder dit jaar waarin ons een nieuw plichtsbesef wordt opgedrongen omtrent het gebruik van afstandsbestuurbare helikoptertjes. Ja, de techniek gaat snel: drones worden steeds krachtiger, goedkoper en hebben betere camera’s aan boord, en de overheid doet haar best om de ontwikkelingen bij te benen.
Last week, The Intercept published the most in-depth look at the U.S. drone assassination program to date. “The Drone Papers” exposed the inner workings of how the drone war is waged, from how targets are identified to who decides to kill. They reveal a number of flaws, including that strikes have resulted in large part from electronic communications data, or “signals intelligence,” that officials acknowledge is unreliable. We are joined by Clive Stafford Smith, founder and director of the international legal charity Reprieve, who says the British government also has a secret kill list in Afghanistan.
This is a rush transcript. Copy may not be in its final form.
AMY GOODMAN: Last week, The Intercept published this in-depth look at the U.S. drone assassination program, called “The Drone Papers,” exposing the inner workings of how the drone war is waged, from how targets are identified to who decides to kill. They reveal a number of flaws, including that strikes have resulted in large part from electronic communications data, or “signals intelligence,” that officials acknowledge is unreliable. We spoke to Jeremy Scahill, co-founder of The Intercept, one of the lead reporters on the series.
JEREMY SCAHILL: One of the most significant findings of this—and my colleague, Cora Currier, really dug deep into this—is we published for the first time the kill chain, what the bureaucracy of assassination looks like. And what you see is that all of these officials, including people like the treasury secretary, are part of signing off on all of this, where they have these secret meetings and they discuss who’s going to live and die around the world. And at the end of that process, it is the president of the United States who signs what amounts to a death warrant for whoever they’ve decided should die.
AMY GOODMAN: The kill list is what Jeremy Scahill is talking about. Clive Stafford Smith, as we wrap up, your response?
CLIVE STAFFORD SMITH: Well, it’s something that just horrifies me, that, you know, I voted for President Obama, twice, and yet every Tuesday they have “Terror Tuesday,” where there’s a PowerPoint display in the White House, and they decide, much like Nero did back in the Colosseum in Rome, whether to give the thumbs-up or the thumbs-down for human beings who we’re just going to murder around the world. And, you know, it begins with terrorism, but it will move on. The British, horrifyingly, have already got a list of people on their list in Afghanistan, where they’re saying they’re going to kill pedophiles, for goodness’ sake. I mean, where does this end, that we just murder people worldwide? I mean, we plan to do a lot to publicize that in the upcoming months.
NERMEEN SHAIKH: When did you learn that Britain has a kill list, to begin with?
CLIVE STAFFORD SMITH: It was only a couple of weeks ago. Frankly, I’m very pleased, because when both the Brits and the Americans are doing it, we can illustrate the folly of both instead of just picking on the U.S.
AMY GOODMAN: Clive Stafford Smith, I want to thank you very much for being with us. Clive Stafford Smith has been Shaker Aamer’s attorney for 10 years at Guantánamo. He’s a human rights lawyer, founder and director of the international legal charity called Reprieve.
This is Democracy Now!, democracynow.org, The War and Peace Report. When we come back, we’re going to talk about Benghazi. Former Secretary of State Hillary Clinton is expected to testify today for up to 10 hours in Congress. We’re going to be talking about the four men who died—the ambassador, Chris Stevens, and three of the other Americans who died. We’ll be speaking with their friends. Stay with us.
OCTOBER 22, 2015STORY
The Intercept series “The Drone Papers” exposes the inner workings of how the drone war is waged, from how targets are identified to who decides to kill. They expose a number of flaws, including that strikes have resulted in large part from electronic communications data, or “signals intelligence,” that officials acknowledge is unreliable. We speak to Intercept reporter Cora Currier, whose article “The Kill Chain,” reveals how the U.S. identifies and selects assassination targets, from the collection of data and human intelligence all the way to President Obama’s desk.
This is a rush transcript. Copy may not be in its final form.
JUAN GONZÁLEZ: Well, today we are looking at “The Drone Papers,” an explosive new exposé by The Intercept based on a cache of secret documents that expose the inner workings of the U.S. military’s assassination program in Afghanistan, Yemen and Somalia. It raises the question: Is there a new Edward Snowden?
AMY GOODMAN: We’re joined by three reporters who worked on “The Drone Papers.” Cora Currier is staff reporter for The Intercept. Her contributions to the “Drone Papers” series include the pieces “The Kill Chain” and “Firing Blind.” Ryan Devereaux, also a staff reporter at The Intercept, wrote “Manhunting in the Hindu Kush.” Also still with us for the hour, Jeremy Scahill, co-founder of the The Intercept, author of—is also author on this series.
Cora Currier, I wanted to turn to your piece, “The Kill [Chain].” How do the targets get chosen?
CORA CURRIER: So this is the first time that we’ve seen documentary evidence of how the Obama White House picks and chooses targets for—to kill them by drone or any other—or other kinds of airstrikes. And this is for operations in Yemen and Somalia. And the slide that we have shows how task force personnel, so people working on the ground in Yemen or Somalia, JSOC task force personnel, working with other intelligence community members, establish—make a package on a target, on a potential target, collecting intelligence, doing reconnaissance. So these people are already under surveillance of various types. And then they put them together, they package them in what they call a “baseball card” on the target, and that passes up the ranks of the military, up the chain of command. It goes through the Joint Chiefs of Staff, secretary of defense, then sends them to the White House.
And there, they’re examined by counsels of senior administration officials, known as the Principals Committee, which is—of the National Security Council, which is basically sort of all the top Cabinet heads of the Obama administration, all his closest advisers, and their deputies, which is called the Deputies Committee. And that’s reportedly where actually a lot of the work gets done, where they really pour over the targets and they think about sort of the—both the legal cases and also the sort of political ramifications and reasons to kill or not to kill somebody. So this is all happening in—this sort of really interagency process happens at the White House. And then, we know from outside reporting that this is the time when, during the period of this study in 2012, 2013, John Brennan, who then became CIA director, was super influential in these discussions. And it was often him that was bringing the baseball cards to the president to finally sign off on giving JSOC operatives then a 60-day window to go after the target.
AMY GOODMAN: The baseball cards?
CORA CURRIER: Mm-hmm, so they would sign off on a “package,” what they called it, a targeting—an operations package, which would have the baseball card, which was all the intelligence on the target, and then a sort of concept of operations about how they might go about getting them. And then they’d have a 60-day window in which they could take a strike against the target. And that is counter to some previous reporting about whether or not the president sort of—you hear this rhetoric that the president personally signs off on each drone strike. It’s not clear that that’s exactly what was meant by that. It seems more likely that he signs off on these packages, and then the actual decision to take a strike goes through the military chain of command.
JUAN GONZÁLEZ: And a key part of these baseball cards are the SIM cards and the cellphone numbers and—in other words, the signals intelligence attached to each of these individuals?
CORA CURRIER: Right. It’s going to have, you know, everything that they know about them, so from a variety of sources. And one thing that we learned in the documents is that they are heavily reliant on signals intelligence, heavily reliant on communications intelligence, to build a picture of who they think this person is and why they think he’s important.
AMY GOODMAN: Now, in your piece, “The Kill Chain: The Lethal Bureaucracy Behind Obama’s Drone War,” you talk about the different officials who sign off. Jeremy mentioned earlier, for example, the treasury secretary. Why would the treasury secretary be involved with naming who should be killed?
CORA CURRIER: Well, I think, in practice—I mean, by the letter, the Principals Committee of the National Security Council includes all of these—all of these top officials, like the treasury secretary, like the secretary of energy. Is the secretary of energy actually really, you know, a deciding factor in who gets killed in Yemen? No. It’s going to be the—you know, Hillary Clinton at the time of this study was secretary of state, and she would sort of represent the State Department’s opinions about this. Again, would she actually probably have all the background on these individuals? No, it would have been prepared for her by, you know, her second-in-commands or whoever was below her, and they would sort of be representing the views of their agency. So, while all those Cabinet members are, on paper, in the—on the Principals Committee, in practice, it was a smaller circle of advisers.
AMY GOODMAN: Now, Jeremy, so, the president is making these decisions on the others below him based on—I mean, it’s very much shaped on the information he’s getting on his desk.
JEREMY SCAHILL: Right. And, I mean, you know, one of the things that we also see in the documents is that a great deal of the intelligence that they’re basing these packages on come from foreign intelligence sources. So it could be from the Saudis, it could be from Yemenis, it could be from another entity, from Qatar—
AMY GOODMAN: From the Saudis, for example, who want a protester, a pro-democracy protester, dead.
JEREMY SCAHILL: Right. Right. And, I mean—well, yes, that’s part of it, but more specifically to this, there are cases where it seems as though the U.S. was intentionally fed bad intelligence to—in the effort to try to eliminate a domestic political opponent of the former dictator of Yemen, for instance, where someone that was actually trying to negotiate with al-Qaeda, but was a political opponent of the Yemeni dictator at the time, Ali Abdullah Saleh, was killed in a U.S. drone strike, and it seems quite likely that it was—you know, Yemen had fed that intelligence to try to eliminate one of their opponents. I mean, the WikiLeaks cables were rife with examples of the Yemeni president trying to get the United States to take up his own political cause against the Houthis at the time, who are now controlling parts of Yemen. But the Saudis have a huge influence over who the U.S. targets in that region. And foreign intelligence—they have their own agenda. And if we’re basing a lot of our decision on who should sort of live or die in these cases on foreign intelligence and unreliable signals intelligence, it raises serious questions about who we’re actually killing.
JUAN GONZÁLEZ: Well, and it seems to me the other aspect of this, as your report shows, is that the government’s own reviews shows—states the unreliability of this information. So they’re not only making decisions without any kind of judicial process to kill people, the evidence that they’re using, they themselves acknowledge, is unreliable.
JEREMY SCAHILL: Well, remember, this task force, the ISR Task Force, that did these studies that are in the document—
AMY GOODMAN: And ISR stands for?
JEREMY SCAHILL: Intelligence, Surveillance, Reconnaissance. And so, this task force is basically an advocacy wing for more drones, more surveillance platforms, and so you have to view it in the context of this is the Pentagon trying to get all the toys and to make themselves, you know, the boss of everything—and they largely are the boss of everything, because they have the biggest budget and they have the most personnel. But what there—you know, what the point there is, is that there’s this not-so-subtle agitation to start being able to do a lot more capturing. I think it’s true what they’re saying about the unreliability of it. But there’s also—you know, there’s a turf war at play here with the CIA, so I think you have to take it with a grain of salt and read it in the context of that.
AMY GOODMAN: Now, the issue of innocent civilians—I mean, there’s also an issue of the people who they believe are absolutely guilty, whether or not, Cora, the president should be the judge and the jury and the executioner. But this percentage that Juan raised earlier of 90 percent innocents killed in a drone strike, explain further what you learned on who lives and who dies.
CORA CURRIER: So what was actually striking about the Pentagon study, which was one of the documents that we had—Ryan looked in detail at these campaigns in Afghanistan, where that 90 percent figure comes from. In Yemen and Somalia, in this Pentagon study, they actually—it was pretty striking for how little they talk about civilian casualties, how little it seems to be an issue. The whole gist of the study was, “Give us”—as Jeremy was saying, “Give us more drones, give us better equipment, so that we can get these high-value targets.” And there was sort of little discussion of what the consequences are if you hit the—of hitting the wrong person. It was more about, like, “We’ve got to be more efficient at getting the people that we want,” and there was very little mention of civilian casualties.
There were a few times that it mentioned that low CDE, or collateral damage estimate, which is military speak for how many civilians might be harmed, was mentioned a few times as kind of a restraining factor on strikes and something that was explaining why they were moving more slowly, because they had these low CDE requirements. And that’s actually really—that word, that standard, low CDE, is interesting, because at the same time as this study was circulated in May 2013 was when the president gave his big speech about how, before the U.S. would take a strike, there had to be near certainty that no civilians would be harmed or injured. And near certainty is not the same as low CDE. And the White House told us that, you know, the standards of the May 2013 speech are still in place, but they wouldn’t explain that discrepancy as to why these internal documents at the same time had this different standard for civilian deaths.
AMY GOODMAN: And, Jeremy Scahill, what was the White House’s reaction to this explosive series?
JEREMY SCAHILL: Well, the White House was—you know, basically said, “We’re not going to comment on purported internal documents.” And, you know, I mean, Ryan had sort of a funny interaction with the Special Operations Command that he can explain. But at the end of the day, the Pentagon ended up being the one that kind of spoke for all of them and said, you know, “These are internal classified documents, and we’re not going to speak about it.” I mean, they’ll speak about classified material all the time when it benefits their position, like John Brennan leaking things after bin Laden, but, you know, they’re not going to address these things. Or even—I mean, Cora had very concrete questions: Is this still the case? Is this true? You know, they wouldn’t answer a single question.
AMY GOODMAN: We’re going to go to break and then come back, and when we come back, we’re going to talk about Afghanistan. And that’s where Ryan Devereaux comes in. With President Obama now reversing course, the longest war in U.S. history is about to get longer. How do “The Drone Papers” weigh in here? What do they tell us about Afghanistan? And much more. We’re speaking with three of the authors of this series, this stunning series at The Intercept: Jeremy Scahill, Ryan Devereaux and Cora Currier. Stay with us.
OCTOBER 16, 2015STORY
The Obama administration has portrayed drones as an effective and efficient weapon in the ongoing war with al Qaeda and other radical groups. Yet classified Pentagon documents obtained by The Intercept reveal that the U.S. military has faced “critical shortfalls” in the technology and intelligence it uses to find and kill suspected terrorists in Yemen and Somalia.
THOSE SHORTFALLS STEM from the remote geography of Yemen and Somalia and the limited American presence there. As a result, the U.S. military has been overly reliant on signals intelligence from computers and cellphones, and the quality of those intercepts has been limited by constraints on surveillance flights in the region.
The documents are part of a study by a Pentagon Task Force on Intelligence, Surveillance, and Reconnaissance. They provide details about how targets were tracked for lethal missions carried out by the Joint Special Operations Command, or JSOC, in Yemen and Somalia between January 2011 and summer 2012. When the study was circulated in 2013, the Obama administration was publicly floating the idea of moving the bulk of its drone program to the Pentagon from the CIA, and the military was eager to make the case for more bases, more drones, higher video quality, and better eavesdropping equipment.
Yet by identifying the challenges and limitations facing the military’s “find, fix, finish” operations in Somalia and Yemen — the cycle of gathering intelligence, locating, and attacking a target — the conclusions of the ISR study would seem to undermine the Obama administration’s claims of a precise and effective campaign, and lend support to critics who have questioned the quality of intelligence used in drone strikes.
The study made specific recommendations for improving operations in the Horn of Africa, but a Pentagon spokesperson, Cmdr. Linda Rojas, declined to explain what, if any, measures had been taken in response to the study’s findings, saying only that “as a matter of policy we don’t comment on the details of classified reports.”
THE TYRANNY OF DISTANCE
One of the most glaring problems identified in the ISR study was the U.S. military’s inability to carry out full-time surveillance of its targets in the Horn of Africa and Yemen. Behind this problem lies the “tyranny of distance” — a reference to the great lengths that aircraft must fly to their targets from the main U.S. air base in Djibouti, the small East African nation that borders Somalia and sits just across the Gulf of Aden from Yemen.
Surveillance flights are limited by fuel — and, in the case of manned aircraft, the endurance of pilots. In contrast with Iraq, where more than 80 percent of “finishing operations” were conducted within 150 kilometers of an air base, the study notes that “most objectives in Yemen are ~ 500 km away” from Djibouti and “Somalia can be over 1,000 km.” The result is that drones and planes can spend half their air time in transit, and not enough time conducting actual surveillance.
A Pentagon chart showing that as of June 2012 manned spy planes accounted for the majority of flights over Yemen, even though drones were more efficient, since they could spend more time over a target. Over Somalia, the military used a mix of manned and unmanned aircraft. AP = Arabian Peninsula; EA = East Africa.
Compounding the tyranny of distance, the ISR study complained, was the fact that JSOC had too few drones in the region to meet the requirements mandated for carrying out a finishing operation. The military measures surveillance flights in orbits — meaning continuous, unbroken coverage of a target — and JSOC chronically failed to meet “minimum requirements” for orbits over Yemen, and in the case of Somalia had never met the minimum standards. On average, 15 flights a day, by multiple aircraft relieving or complementing one another, were needed to complete three orbits over Yemen.
The “sparse” available resources meant that aircraft had to “cover more potential leads — stretching coverage and leading to [surveillance] ‘blinks.’” Because multiple aircraft needed to be “massed” over one target before a strike, surveillance of other targets temporarily ceased, thus breaking the military’s ideal of a “persistent stare” or the “unblinking eye” of around-the-clock tracking.
When the military was focused on a “finish” — meaning kill — operation, drones were taken off the surveillance of other targets.
JSOC relied on manned spy planes to fill the orbit gap over Yemen. In June 2012 there were six U-28 spy planes in operation in East Africa and the Arabian Peninsula, as well as several other types of manned aircraft. The U-28s in Djibouti were “referred to as the ‘Chiclet line,’” according to the ISR study, and “compounded Djiboutian air control issues” because of their frequent flights.
Only in the summer of 2012, with the addition of contractor-operated drones based in Ethiopia and Fire Scout unmanned helicopters, did Somalia have the minimum number of drones commanders wanted. The number of Predator drones stationed in Djibouti doubled over the course of the study, and in 2013, the fleet was moved from the main U.S. air base, Camp Lemonnier, to another Djibouti airstrip because of overcrowding and a string of crashes.
“Blinking” remained a concern, however, and the study recommended adding even more aircraft to the area of operations. Noting that political and developmental issues hampered the military’s ability to build new bases, it suggested expanding the use of aircraft launched from ships. JSOC already made use of Fire Scout helicopter drones and small Scan Eagle drones off the coast of Somalia, as well as “Armada Sweep,” which a 2011 document from the National Security Agency, provided by former contractor Edward Snowden, describes as a “ship-based collection system” for electronic communications data. (The NSA declined to comment on Armada Sweep.)
Lt. Gen. Michael Flynn, who was head of the Defense Intelligence Agency from July 2012 to August 2014, told The Intercept that the surveillance requirements he outlined for tracking al Qaeda while in office had never been met. “We end up spending money on other stupid things instead of actually the capabilities that we need,” he said. “This is not just about buying more drones, it’s a whole system that’s required.”
According to Micah Zenko, a senior fellow at the Council on Foreign Relations who has closely studied the drone war, resource constraints in Africa “mean less time for the persistent stare that counterterrorism analysts and commanders want, and got used to in the Afghanistan-Pakistan theater.”
FIND, FIX, FINISH
The find, fix, finish cycle is known in the military as FFF, or F3. But just as critical are two other letters: E and A, for “exploit and analyze,” referring to the use of materials collected on the ground and in detainee interrogations.
F3EA became doctrine in counterinsurgency campaigns in Iraq and Afghanistan in the mid-2000s. Gen. Stanley McChrystal wrote in his memoir that the simplicity of those “five words in a line … belied how profoundly it would drive our mission.” In 2008, Flynn, who worked closely with McChrystal before becoming head of the Defense Intelligence Agency, wrote that “Exploit-Analyze starts the cycle over again by providing leads, or start points, into the network that could be observed and tracked using airborne ISR.”
Deadly strikes thus truncate the find, fix, finish cycle without exploitation and analysis — precisely the components that were lacking in the drone campaign waged in East Africa and Yemen. That shortfall points to one of the contradictions at the heart of the drone program in general: Assassinations are intelligence dead ends.
The ISR study shows that after a “kill operation” there is typically nobody on the ground to collect written material or laptops in the target’s house, or the phone on his body, or capture suspects and ask questions. Yet collection of on-the-ground intelligence of that sort — referred to as DOMEX, for “document and media exploitation,” and TIR, for “tactical interrogation report” — is invaluable for identifying future targets.
A slide from a Pentagon study notes that deadly strikes in Yemen and Somalia reduce the amount of intelligence for future operations. AUMF = 2001 Authorization for Use of Military Force; FMV = Full Motion Video; F3EA = Find, Fix, Finish, Exploit, Analyze; HOA = Horn of Africa
Stating that 75 percent of operations in the region were strikes, and noting that “kill operations significantly reduce the intelligence available from detainees and captured material,” the study recommended an expansion of “capture finishes via host-nation partners for more ‘finish-derived’ intelligence.” One of the problems with that scenario, however, is that security forces in host nations like Yemen and Somalia are profoundly unreliable and have been linked to a wide variety of abuses, including the torture of prisoners.
A report last year by retired Gen. John Abizaid and former Defense Department official Rosa Brooks noted that the “enormous uncertainties” of drone warfare are “multiplied further when the United States relies on intelligence and other targeting information provided by a host nation government: How can we be sure we are not being drawn into a civil war or being used to target the domestic political enemies of the host state leadership?”
In 2011, for example, U.S. officials told the Wall Street Journal that they had killed a local governor because Yemeni officials didn’t tell them he was present at a gathering of al Qaeda figures. “We think we got played,” one official said. (The Yemeni government disputed the report.)
Despite such warnings, the drone program has relied heavily on intelligence from other countries. One slide describes signals intelligence, or SIGINT, as coming “often from foreign partners,” and another, titled “Alternatives to Exploit/Analyze,” states that “in the reduced access environment, national intelligence partners often have the best information and access.”
The military relies heavily on intelligence from electronic communications, much of it provided by foreign governments, but acknowledges that the information is “neither as timely nor as focused as tactical intelligence.”
One way to increase the reliability of host-nation intelligence is to be directly involved in its collection — but this can be risky for soldiers on the ground. The study called for “advance force operations,” including “small teams of special force advisors,” to work with foreign forces to capture combatants, interrogate them, and seize any written material or electronic devices they possess. According to public Special Operations guidelines, advance force operations “prepare for near-term” actions by planting tracking devices, conducting reconnaissance missions, and staging for attacks. The documents obtained by The Intercept did not specify an optimum number of advisors or where they should be based or how exactly they should be involved in capture or interrogation operations.
Although the study dates from 2013, current Special Operations Commander Joseph Votel echoed its findings in July 2015. Votel noted that his troops were working closely with African Union forces and the Somali government to battle al Shabaab. He added, “We get a lot more … when we actually capture somebody or we capture material than we do when we kill someone.”
A man walks past destroyed buildings in Zinjibar, capital of Abyan province in southern Yemen on Dec. 5, 2012. Photo: Sami-al-Ansi/AFP/Getty Images
THE POVERTY OF SIGNALS INTELLIGENCE
With limited ability to conduct raids or seize materials from targeted individuals in Yemen and Somalia, JSOC relied overwhelmingly on monitoring electronic communications to discover and ultimately locate targets.
The documents state bluntly that SIGINT is an inferior form of intelligence. Yet signals accounted for more than half the intelligence collected on targets, with much of it coming from foreign partners. The rest originated with human intelligence, primarily obtained by the CIA. “These sources,” the study notes, “are neither as timely nor as focused as tactical intelligence” from interrogations or seized materials.
Making matters worse, the documents refer to “poor” and “limited” capabilities for collecting SIGINT, implying a double bind in which kill operations were reliant on sparse amounts of inferior intelligence.
The disparity with other areas of operation was stark, as a chart contrasting cell data makes clear: In Afghanistan there were 8,900 cell data reports each month, versus 50 for Yemen and 160 for Somalia. Despite that, another chart shows SIGINT comprised more than half the data sources that went into developing targets in Somalia and Yemen in 2012.
Cellphone data was critical for finding and identifying targets, yet a chart from a Pentagon study shows that the military had far less information in Yemen and Somalia than it was accustomed to having in Afghanistan. DOMEX = Document and Media Exploitation; GSM = Global System for Mobile communication; HOA = Horn of Africa; IIRs = Intelligence Information Reports; SIGINT = Signals Intelligence; TIRs = Tactical Interrogation Reports.
Flynn told The Intercept there was “way too much reliance on technical aspects [of intelligence], like signals intelligence, or even just looking at somebody with unmanned aerial vehicles.”
“I could get on the telephone from somewhere in Somalia, and I know I’m a high-value target, and say in some coded language, ‘The wedding is about to occur in the next 24 hours,’” Flynn said. “That could put all of Europe and the United States on a high-level alert, and it may be just total bullshit. SIGINT is an easy system to fool and that’s why it has to be validated by other INTs — like HUMINT. You have to ensure that the person is actually there at that location because what you really intercepted was the phone.”
In addition to using SIGINT to identify and find new targets, the documents detail how military analysts also relied on such intelligence to make sure that they had the correct person in their sights and to estimate the harm to civilians before a strike. After locating a target, usually by his cellphone or other electronics, analysts would study video feeds from surveillance aircraft “to build near-certainty via identification of distinguishing physical characteristics.”
A British intelligence document on targeted killing in Afghanistan, which was among the Snowden files, describes a similar process of “monitoring a fixed location, and tracking any persons moving away from that location, and identifying if a similar pattern is experienced through SIGINT collect.” The document explains that “other visual indicators may be used to aid the establishment of [positive identification]” including “description of clothing” or “gait.” After a shot, according to the British document and case studies in the Pentagon’s ISR report, drones would hover to determine if their target had been hit, collecting video and evidence of whether the cellphone had been eliminated. (The British intelligence agency, GCHQ, declined to comment on the document.)
A chart comparing the surveillance capabilities of the various drones and aircraft flying over Yemen and Somalia in 2012. APG = Aerial Precision Geolocation; DNR COMINT = Dial Network Recognition Communications Intelligence; ISR = Intelligence, Surveillance, and Reconnaissance; FMV = Full Motion Video; PTT COMINT = Push-to-Talk Communications Intelligence.
Yet according to the ISR study, the military faced “critical shortfalls of capabilities” in the technologies enabling that kind of precise surveillance and post-strike assessment. At the time of the study, only some of the Reaper drones had high-definition video, and most of the aircraft over the region lacked the ability to collect “dial number recognition” data.
The study cites these shortcomings as an explanation for the low rate of successful strikes against the targets on the military’s kill list in Yemen and Somalia, especially in comparison with Iraq and Afghanistan. It presents the failings primarily as an issue of efficiency, with little mention of the possible consequence of bad intelligence leading to killing the wrong people.
THE DRONE PAPERS
Cora Currier, Peter Maass
Oct. 15 2015, 1:58 p.m.
Additional reporting: Jeremy Scahill
From his first days as commander in chief, the drone has been President Barack Obama’s weapon of choice, used by the military and the CIA to hunt down and kill the people his administration has deemed — through secretive processes, without indictment or trial — worthy of execution. There has been intense focus on the technology of remote killing, but that often serves as a surrogate for what should be a broader examination of the state’s power over life and death.
DRONES ARE A TOOL, not a policy. The policy is assassination. While every president since Gerald Ford has upheld an executive order banning assassinations by U.S. personnel, Congress has avoided legislating the issue or even defining the word “assassination.” This has allowed proponents of the drone wars to rebrand assassinations with more palatable characterizations, such as the term du jour, “targeted killings.”
When the Obama administration has discussed drone strikes publicly, it has offered assurances that such operations are a more precise alternative to boots on the ground and are authorized only when an “imminent” threat is present and there is “near certainty” that the intended target will be eliminated. Those terms, however, appear to have been bluntly redefined to bear almost no resemblance to their commonly understood meanings.
The first drone strike outside of a declared war zone was conducted more than 12 years ago, yet it was not until May 2013 that the White House released a set of standards and procedures for conducting such strikes. Those guidelines offered little specificity, asserting that the U.S. would only conduct a lethal strike outside of an “area of active hostilities” if a target represents a “continuing, imminent threat to U.S. persons,” without providing any sense of the internal process used to determine whether a suspect should be killed without being indicted or tried. The implicit message on drone strikes from the Obama administration has been one of trust, but don’t verify.
Photo: The Intercept
SMALL FOOTPRINT OPERATIONS 2/13Document
SMALL FOOTPRINT OPERATIONS 5/13Document
GEOLOCATION-WATCHLISTThe Intercept has obtained a cache of secret slides that provides a window into the inner workings of the U.S. military’s kill/capture operations at a key time in the evolution of the drone wars — between 2011 and 2013. The documents, which also outline the internal views of special operations forces on the shortcomings and flaws of the drone program, were provided by a source within the intelligence community who worked on the types of operations and programs described in the slides. The Intercept granted the source’s request for anonymity because the materials are classified and because the U.S. government has engaged in aggressive prosecution of whistleblowers. The stories in this series will refer to the source as “the source.”
The source said he decided to provide these documents to The Intercept because he believes the public has a right to understand the process by which people are placed on kill lists and ultimately assassinated on orders from the highest echelons of the U.S. government. “This outrageous explosion of watchlisting — of monitoring people and racking and stacking them on lists, assigning them numbers, assigning them ‘baseball cards,’ assigning them death sentences without notice, on a worldwide battlefield — it was, from the very first instance, wrong,” the source said.
“We’re allowing this to happen. And by ‘we,’ I mean every American citizen who has access to this information now, but continues to do nothing about it.”
The Pentagon, White House, and Special Operations Command all declined to comment. A Defense Department spokesperson said, “We don’t comment on the details of classified reports.”
The CIA and the U.S. military’s Joint Special Operations Command (JSOC) operate parallel drone-based assassination programs, and the secret documents should be viewed in the context of an intense internal turf war over which entity should have supremacy in those operations. Two sets of slides focus on the military’s high-value targeting campaign in Somalia and Yemen as it existed between 2011 and 2013, specifically the operations of a secretive unit, Task Force 48-4.
Additional documents on high-value kill/capture operations in Afghanistan buttress previous accounts of how the Obama administration masks the true number of civilians killed in drone strikes by categorizing unidentified people killed in a strike as enemies, even if they were not the intended targets. The slides also paint a picture of a campaign in Afghanistan aimed not only at eliminating al Qaeda and Taliban operatives, but also at taking out members of other local armed groups.
One top-secret document shows how the terror “watchlist” appears in the terminals of personnel conducting drone operations, linking unique codes associated with cellphone SIM cards and handsets to specific individuals in order to geolocate them.
A top-secret document shows how the watchlist looks on internal systems used by drone operators.
The costs to intelligence gathering when suspected terrorists are killed rather than captured are outlined in the slides pertaining to Yemen and Somalia, which are part of a 2013 study conducted by a Pentagon entity, the Intelligence, Surveillance, and Reconnaissance Task Force. The ISR study lamented the limitations of the drone program, arguing for more advanced drones and other surveillance aircraft and the expanded use of naval vessels to extend the reach of surveillance operations necessary for targeted strikes. It also contemplated the establishment of new “politically challenging” airfields and recommended capturing and interrogating more suspected terrorists rather than killing them in drone strikes.
The ISR Task Force at the time was under the control of Michael Vickers, the undersecretary of defense for intelligence. Vickers, a fierce proponent of drone strikes and a legendary paramilitary figure, had long pushed for a significant increase in the military’s use of special operations forces. The ISR Task Force is viewed by key lawmakers as an advocate for more surveillance platforms like drones.
The ISR study also reveals new details about the case of a British citizen, Bilal el-Berjawi, who was stripped of his citizenship before being killed in a U.S. drone strike in 2012. British and American intelligence had Berjawi under surveillance for several years as he traveled back and forth between the U.K. and East Africa, yet did not capture him. Instead, the U.S. hunted him down and killed him in Somalia.
Taken together, the secret documents lead to the conclusion that Washington’s 14-year high-value targeting campaign suffers from an overreliance on signals intelligence, an apparently incalculable civilian toll, and — due to a preference for assassination rather than capture — an inability to extract potentially valuable intelligence from terror suspects. They also highlight the futility of the war in Afghanistan by showing how the U.S. has poured vast resources into killing local insurgents, in the process exacerbating the very threat the U.S. is seeking to confront.
FIND, FIX, FINISH These secret slides help provide historical context to Washington’s ongoing wars, and are especially relevant today as the U.S. military intensifies its drone strikes and covert actions against ISIS in Syria and Iraq. Those campaigns, like the ones detailed in these documents, are unconventional wars that employ special operations forces at the tip of the spear.
The “find, fix, finish” doctrine that has fueled America’s post-9/11 borderless war is being refined and institutionalized. Whether through the use of drones, night raids, or new platforms yet to be unleashed, these documents lay bare the normalization of assassination as a central component of U.S. counterterrorism policy.
“The military is easily capable of adapting to change, but they don’t like to stop anything they feel is making their lives easier, or is to their benefit. And this certainly is, in their eyes, a very quick, clean way of doing things. It’s a very slick, efficient way to conduct the war, without having to have the massive ground invasion mistakes of Iraq and Afghanistan,” the source said. “But at this point, they have become so addicted to this machine, to this way of doing business, that it seems like it’s going to become harder and harder to pull them away from it the longer they’re allowed to continue operating in this way.”
The articles in The Drone Papers were produced by a team of reporters and researchers from The Intercept that has spent months analyzing the documents. The series is intended to serve as a long-overdue public examination of the methods and outcomes of America’s assassination program. This campaign, carried out by two presidents through four presidential terms, has been shrouded in excessive secrecy. The public has a right to see these documents not only to engage in an informed debate about the future of U.S. wars, both overt and covert, but also to understand the circumstances under which the U.S. government arrogates to itself the right to sentence individuals to death without the established checks and balances of arrest, trial, and appeal.
Among the key revelations in this series:
HOW THE PRESIDENT AUTHORIZES TARGETS FOR ASSASSINATION
KILL CHAINIt has been widely reported that President Obama directly approves high-value targets for inclusion on the kill list, but the secret ISR study provides new insight into the kill chain, including a detailed chart stretching from electronic and human intelligence gathering all the way to the president’s desk. The same month the ISR study was circulated — May 2013 — Obama signed the policy guidance on the use of force in counterterrorism operations overseas. A senior administration official, who declined to comment on the classified documents, told The Intercept that “those guidelines remain in effect today.”
U.S. intelligence personnel collect information on potential targets, as The Intercept has previously reported, drawn from government watchlists and the work of intelligence, military, and law enforcement agencies. At the time of the study, when someone was destined for the kill list, intelligence analysts created a portrait of a suspect and the threat that person posed, pulling it together “in a condensed format known as a ‘baseball card.’” That information was then bundled with operational information and packaged in a “target information folder” to be “staffed up to higher echelons” for action. On average, it took 58 days for the president to sign off on a target, one slide indicates. At that point, U.S. forces had 60 days to carry out the strike. The documents include two case studies that are partially based on information detailed on baseball cards.
The system for creating baseball cards and targeting packages, according to the source, depends largely on intelligence intercepts and a multi-layered system of fallible, human interpretation. “It isn’t a surefire method,” he said. “You’re relying on the fact that you do have all these very powerful machines, capable of collecting extraordinary amounts of data and information,” which can lead personnel involved in targeted killings to believe they have “godlike powers.”
ASSASSINATIONS DEPEND ON UNRELIABLE INTELLIGENCE AND HURT INTELLIGENCE GATHERING
FIRING BLINDIn undeclared war zones, the U.S. military has become overly reliant on signals intelligence, or SIGINT, to identify and ultimately hunt down and kill people. The documents acknowledge that using metadata from phones and computers, as well as communications intercepts, is an inferior method of finding and finishing targeted people. They described SIGINT capabilities in these unconventional battlefields as “poor” and “limited.” Yet such collection, much of it provided by foreign partners, accounted for more than half the intelligence used to track potential kills in Yemen and Somalia. The ISR study characterized these failings as a technical hindrance to efficient operations, omitting the fact that faulty intelligence has led to the killing of innocent people, including U.S. citizens, in drone strikes.
The source underscored the unreliability of metadata, most often from phone and computer communications intercepts. These sources of information, identified by so-called selectors such as a phone number or email address, are the primary tools used by the military to find, fix, and finish its targets. “It requires an enormous amount of faith in the technology that you’re using,” the source said. “There’s countless instances where I’ve come across intelligence that was faulty.” This, he said, is a primary factor in the killing of civilians. “It’s stunning the number of instances when selectors are misattributed to certain people. And it isn’t until several months or years later that you all of a sudden realize that the entire time you thought you were going after this really hot target, you wind up realizing it was his mother’s phone the whole time.”
Within the special operations community, the source said, the internal view of the people being hunted by the U.S. for possible death by drone strike is: “They have no rights. They have no dignity. They have no humanity to themselves. They’re just a ‘selector’ to an analyst. You eventually get to a point in the target’s life cycle that you are following them, you don’t even refer to them by their actual name.” This practice, he said, contributes to “dehumanizing the people before you’ve even encountered the moral question of ‘is this a legitimate kill or not?’”
By the ISR study’s own admission, killing suspected terrorists, even if they are “legitimate” targets, further hampers intelligence gathering. The secret study states bluntly: “Kill operations significantly reduce the intelligence available.” A chart shows that special operations actions in the Horn of Africa resulted in captures just 25 percent of the time, indicating a heavy tilt toward lethal strikes.
STRIKES OFTEN KILL MANY MORE THAN THE INTENDED TARGET
MANHUNTING IN THE HINDU KUSH The White House and Pentagon boast that the targeted killing program is precise and that civilian deaths are minimal. However, documents detailing a special operations campaign in northeastern Afghanistan, Operation Haymaker, show that between January 2012 and February 2013, U.S. special operations airstrikes killed more than 200 people. Of those, only 35 were the intended targets. During one five-month period of the operation, according to the documents, nearly 90 percent of the people killed in airstrikes were not the intended targets. In Yemen and Somalia, where the U.S. has far more limited intelligence capabilities to confirm the people killed are the intended targets, the equivalent ratios may well be much worse.
“Anyone caught in the vicinity is guilty by association,” the source said. When “a drone strike kills more than one person, there is no guarantee that those persons deserved their fate. … So it’s a phenomenal gamble.”
THE MILITARY LABELS UNKNOWN PEOPLE IT KILLS AS “ENEMIES KILLED IN ACTION”
MANHUNTING IN THE HINDU KUSH The documents show that the military designated people it killed in targeted strikes as EKIA — “enemy killed in action” — even if they were not the intended targets of the strike. Unless evidence posthumously emerged to prove the males killed were not terrorists or “unlawful enemy combatants,” EKIA remained their designation, according to the source. That process, he said, “is insane. But we’ve made ourselves comfortable with that. The intelligence community, JSOC, the CIA, and everybody that helps support and prop up these programs, they’re comfortable with that idea.”
The source described official U.S. government statements minimizing the number of civilian casualties inflicted by drone strikes as “exaggerating at best, if not outright lies.”
THE NUMBER OF PEOPLE TARGETED FOR DRONE STRIKES AND OTHER FINISHING OPERATIONS
KILL CHAINAccording to one secret slide, as of June 2012, there were 16 people in Yemen whom President Obama had authorized U.S. special operations forces to assassinate. In Somalia, there were four. The statistics contained in the documents appear to refer only to targets approved under the 2001 Authorization for Use of Military Force, not CIA operations. In 2012 alone, according to data compiled by the Bureau of Investigative Journalism, there were more than 200 people killed in operations in Yemen and between four and eight in Somalia.
HOW GEOGRAPHY SHAPES THE ASSASSINATION CAMPAIGN
FIRING BLINDIn Afghanistan and Iraq, the pace of U.S. strikes was much quicker than in Yemen and Somalia. This appears due, in large part, to the fact that Afghanistan and Iraq were declared war zones, and in Iraq the U.S. was able to launch attacks from bases closer to the targeted people. By contrast, in Somalia and Yemen, undeclared war zones where strikes were justified under tighter restrictions, U.S. attack planners described a serpentine bureaucracy for obtaining approval for assassination. The secret study states that the number of high-value targeting operations in these countries was “significantly lower than previously seen in Iraq and Afghanistan” because of these “constraining factors.”
Even after the president approved a target in Yemen or Somalia, the great distance between drone bases and targets created significant challenges for U.S. forces — a problem referred to in the documents as the “tyranny of distance.” In Iraq, more than 80 percent of “finishing operations” were conducted within 150 kilometers of an air base. In Yemen, the average distance was about 450 kilometers and in Somalia it was more than 1,000 kilometers. On average, one document states, it took the U.S. six years to develop a target in Somalia, but just 8.3 months to kill the target once the president had approved his addition to the kill list.
INCONSISTENCIES WITH WHITE HOUSE STATEMENTS ABOUT TARGETED KILLING
KILL CHAINThe White House’s publicly available policy standards state that lethal force will be launched only against targets who pose a “continuing, imminent threat to U.S. persons.” In the documents, however, there is only one explicit mention of a specific criterion: that a person “presents a threat to U.S. interest or personnel.” While such a rationale may make sense in the context of a declared war in which U.S. personnel are on the ground in large numbers, such as in Afghanistan, that standard is so vague as to be virtually meaningless in countries like Yemen and Somalia, where very few U.S. personnel operate.
While many of the documents provided to The Intercept contain explicit internal recommendations for improving unconventional U.S. warfare, the source said that what’s implicit is even more significant. The mentality reflected in the documents on the assassination programs is: “This process can work. We can work out the kinks. We can excuse the mistakes. And eventually we will get it down to the point where we don’t have to continuously come back … and explain why a bunch of innocent people got killed.”
The architects of what amounts to a global assassination campaign do not appear concerned with either its enduring impact or its moral implications. “All you have to do is take a look at the world and what it’s become, and the ineptitude of our Congress, the power grab of the executive branch over the past decade,” the source said. “It’s never considered: Is what we’re doing going to ensure the safety of our moral integrity? Of not just our moral integrity, but the lives and humanity of the people that are going to have to live with this the most?”
Oct. 15 2015, 1:57 p.m.
The FBI insists that it uses drone technology in the U.S. to conduct surveillance in “very limited circumstances.” What those particular circumstances are remain a mystery, because the Bureau refuses to identify instances where agents deployed unmanned aerial vehicles, even as far back as 2006.
The obscurity of the FBI drone missions, like that of other domestic law enforcement agencies, has frustrated advocates for transparency and privacy. In a letter to Senator Rand Paul in July 2013, the agency indicated that it had used drones a total of ten times since late 2006—eight criminal cases and two national security cases—and had authorized drone deployments in three additional cases, but did not actually fly them.
The only specific case where the FBI is willing to confirm using a drone was in February 2013, as surveillance support for a child kidnapping case in Alabama. After this and a previous flight in 2012, the agency found its drone missions “strikingly sucessful.”
But new documents obtained by MuckRock as part of the Drone Census flesh out the timeline of FBI drone deployments in detail that was previously unavailable. While heavily redacted—censors deemed even basic facts that were already public about the Alabama case to be too sensitive for release, apparently—these flight orders, after action reviews and mission reports contain new details of FBI drone flights.
New details, summarized in the timeline above, include FBI drone flights as part of investigations into dog fighting operations and drug trafficking rings in 2011, as well as to track a top ten most wanted fugitive in 2012. The documents confirm nine flown missions (ones with after action reports or actual flight orders), as well as five drone mission approvals and one mission proposal, without any confirmation that the FBI actually deployed the drone as proposed.
Previously, the FBI had acknowledged that its first operational deployment of drones took place in October 2006:
These new documents include confirmations of another eight drone operations between February 2011 and February 2013, plus an additional five drone mission approvals and one proposal without confirmation that the FBI actually deployed the drone as proposed.
There was also an instance in April 2011 where FBI aviation managers rejected a drone flight request based on safety concerns:
The FBI redacted location and case details from these operational documents save for the dates, even for operations now three year. This has been the normsince a judge ordered the release of thousands of pages of documents on FBI drone deployments last year. FBI records officers have tried redacting information from documents already published in full online, and withheldvirtually all UAV purchasing and invoice data.
But a handful of details escaped the censors in these latest documents.
In August 2011, the FBI’s Field Flight Operations Unit approved drone surveillance to investigate a “large-scale dog fighting operation” at a redacted location, based on “a review of the case Agent’s surveillance objectives and the nature of the terrain and airspace.”
While there are no after-action documents to confirm the mission took place, FBI aviation managers suggested that agents ask the Federal Aviation Administration for “as large a COA [Certificate of Authorization] as possible” for this mission, suggesting that the drone was meant to survey a wide region.
A few months later, in November 2011, the FBI held a meeting at Quantico to consider flying drones as part of Organized Crime Drug Enforcement Task Forces (OCDETF) investigations of Mexican organizations:
Again, the FBI has not confirmed whether the proposed mission took place, or where.
In a mission hailed by agency officials as “a signal achievement in the history of the FBI,” the FBI drone team was deployed on short notice on May 9, 2012 as part of a kidnapping investigation. The mission was slated to “serve both as a tactical resource and a technology demonstration.”
The after-action report hails the operation as a “strikingly successful” milestone, in that it “marked the first use of a UAS [unmanned aerial system] to pursue a top ten fugitive.”
That same day, on May 9, 2012, the FBI added Adam Mayes to its Ten Most Wanted list. Mayes was wanted for the kidnap and murder of a Tennessee woman and one of her daughters, as well as for unlawful flight to avoid prosecution.
The FBI and state investigators found Mayes and the two remaining young girls the next day—the day after its drone team was scrambled to a kidnap-murder-unlawful-flight investigation—in heavy woods a few miles from Mayes’s home in Mississippi.
Media reports indicate that the long search was brought to an end after a Mississippi Highway Patrol officer “spotted a small blonde child peeking over a ridge.” No outlets reported the involvement of a drone in the manhunt. When law enforcement closed in, Mayes reportedly shot himself in the head, and the two girls were recovered without serious injuries.
While report details point to the involvement of drones in this manhunt, the FBI has refused to confirm whether its “signal achievement” centered around Mayes.
“Other than the hostage crisis site in Alabama, involving a kidnapper who abducted a boy and held him hostage in a bunker,” wrote FBI Special Agent Ann Todd in response to our request for confirmation, “we have not publicly identified specific cases where we have used unmanned aerial vehicles (UAVs).”
It’s not only the general public that the FBI keeps in the dark regarding drone deployments. Even the FAA and agency partners do not receive details.
An FBI dossier on drone use from April 2007 indicates that the FAA has urged the FBI to maintain “the same standards as manned fixed-wing aircraft.” But it says the FBI may forgo notifying the FAA in “exigent circumstances”:
In a July 30, 2012 email to the FAA and a redacted agency at the close of a drone operation at a redacted location for a redacted purpose, an FBI aviation administrator begged pardon for keeping its partners in the dark:
“While details of the mission intent must remained guarded for now,” the aviation manager wrote, “I hope to release full details in the future.” As with most of the FBI’s drone deployments, those details have yet to see the light.
April 16, 2014 // 04:30 PM EST
© 2014 Vice Media Inc
Former drone operators claim in new documentary that CIA missions flown by USAF’s 17th Reconnaissance Squadron
A regular US air force unit based in the Nevada desert is responsible for flying the CIA’s drone strike programme in Pakistan, according to a new documentary to be released on Tuesday.
The film – which has been three years in the making – identifies the unit conducting CIA strikes in Pakistan’s tribal areas as the 17th Reconnaissance Squadron, which operates from a secure compound in a corner of Creech air force base, 45 miles from Las Vegas in the Mojave desert.
Several former drone operators have claimed that the unit’s conventional air force personnel – rather than civilian contractors – have been flying the CIA’s heavily armed Predator missions in Pakistan, a 10-year campaign which according to some estimates has killed more than 2,400 people.
Hina Shamsi, director of the American Civil Liberties Union’s National Security Project, said this posed questions of legality and oversight. “A lethal force apparatus in which the CIA and regular military collaborate as they are reportedly doing risks upending the checks and balances that restrict where and when lethal force is used, and thwart democratic accountability, which cannot take place in secrecy.”
The Guardian approached the National Security Council, the CIA and the Pentagon for comment last week. The NSC and CIA declined to comment, while the Pentagon did not respond.
The role of the squadron, and the use of its regular air force personnel in the CIA’s targeted killing programme, first emerged during interviews with two former special forces drone operators for a new documentary film, Drone.
Brandon Bryant, a former US Predator operator, told the film he decided to speak out after senior officials in the Obama administration gave a briefing last year in which they said they wanted to “transfer” control of the CIA’s secret drones programme to the military.
Bryant said this was disingenuous because it was widely known in military circles that the US air force was already involved.
“There is a lie hidden within that truth. And the lie is that it’s always been the air force that has flown those missions. The CIA might be the customer but the air force has always flown it. A CIA label is just an excuse to not have to give up any information. That is all it has ever been.”
Referring to the 17th squadron, another former drone operator, Michael Haas, added: “It’s pretty widely known [among personnel] that the CIA controls their mission.”
Six other former drone operators who worked alongside the unit, and who have extensive knowledge of the drone programme, have since corroborated the claims. None of them were prepared to go on the record because of the sensitivity of the issue.
Bryant said public scrutiny of the programme had focused so far on the CIA rather than the military, and it was time to acknowledge the role of those who had been carrying out missions on behalf of the agency’s civilian analysts.
“Everyone talks about CIA over Pakistan, CIA double-tap, CIA over Yemen, CIA over Somalia. But I don’t believe that they deserve the entirety of all that credit for the drone programme,” he said. “They might drive the missions; they might say that these are the objectives – accomplish it. They don’t fly it.”
Another former drone operator based at Creech said members of the 17th were obsessively secretive.
“They don’t hang out with anyone else. Once they got into the 17th and got upgraded operationally, they pretty much stopped talking to us. They would only hang out among themselves like a high school clique, a gang or something.”
Shamsi said the revelations, if true, raised “a host of additional pressing questions about the legal framework under which the targeted killing programme is carried out and the basis for the secrecy that continues to shroud it.”
She added: “It will come as a surprise to most Americans if the CIA is directing the military to carry out warlike activities. The agency should be collecting and analysing foreign intelligence, not presiding over a massive killing apparatus.
“We don’t know precisely what rules the CIA is operating under, but what we do know makes clear that it’s not abiding by the laws that strictly limit extrajudicial killing both in and out of traditional battlefields. Now we have to ask whether the regular military is violating those laws as well, under the secrecy that the CIA wields as sword and shield over its killing activities.
“Congressional hearings in the last year have made it embarrassingly clear that Congress has not exercised much oversight over the lethal programme.”
In theory, the revelation could expose serving air force personnel to legal challenges based on their direct involvement in a programme that a UN special rapporteur and numerous other judicial experts are concerned may be wholly or partly in violation of international law.
Sitting 45 miles north-west of Las Vegas in the Mojave desert, Creech air force base has played a key role in the US drone programme since the 1990s.
The 432d wing oversees four conventional US air force Predator and Reaper squadrons, which carry out surveillance missions and air strikes in Afghanistan.
There is another, far more secretive cluster of units within the wing called the 732nd Operations Group, which states that it “employs remotely piloted aircraft in theatres across the globe year-round”.
This operations group has four drone squadrons, which all appear to be linked with the CIA.
The 30th Reconnaissance Squadron “test-flies” the RQ-170 Sentinel, the CIA’s stealth drone which made headlines after one was captured over Iran in December 2011.
The 22nd and 867th Reconnaissance Squadrons each fly Reaper drones, the more heavily armed successor to the Predator.
But it is the last of the four units – the 17th Reconnaissance Squadron – that is now under the most scrutiny.
It is understood to have 300 air crew and operates about 35 Predator drones – enough to provide five or six simultaneous missions during any 24-hour period.
It operates from within an inner compound at Creech, which even visiting military VIPs are unable to access, say former base personnel. Former workers at Creech say the unit was treated as the “crown jewels” of the drone programme.
“They wouldn’t even let us walk by it, they were just so protective of it,” said Haas, who for two years was a drone operator. He was also an operational trainer at Creech.
“From what I was able to gather, it was pretty much confirmed they were flying missions almost exclusively in Pakistan with the intent to strike.”
In the Operations Cell, which receives video feeds from every drone “line” in progress at Creech, mission co-ordinators from the 17th were kept segregated from all the others.
Established as a regular drone squadron in 2002, the unit transitioned to its new “customer” in 2004 at the same time that CIA drone strikes began in Pakistan, former personnel have said.
The operators receive their orders from civilian CIA analysts who ultimately decide whether – and against whom – to carry out a strike, according to one former mid-level drone commander.
Creech air force base would only confirm that the 17th squadron was engaged in “global operations”.
“The 732nd Operations Group oversees global operations of four squadrons – the 17th Reconnaissance Squadron, 22nd Reconnaissance Squadron, 30th Reconnaissance Squadron and the 867th Reconnaissance Squadron. These squadrons are all still active … their mission is to perform high-quality, persistent, multi-role intelligence, surveillance, and reconnaissance in support of combatant commanders’ needs.”
Although the agency’s drone strikes have killed a number of senior figures in al-Qaida and the Taliban, the CIA also stands accused by two United Nations investigators of possible war crimes for some of its activities in Pakistan. They are probing the targeting of rescuers and the bombing of a public funeral.
• Tonje Schei’s film Drone premieres on Arte on 15 April.
• Chris Woods is the author of Sudden Justice: America’s Secret Drone Wars, which is published next winter in the US and Europe.
The Guardian, Monday 14 April 2014 14.30 BST
© 2014 Guardian News and Media Limited or its affiliated companies. All rights reserved.
A poster of a young child has appeared in north-west Pakistan to raise awareness of the numerous drone attacks the region suffered. Artists who created the image hope military commanders will think twice about shooting after seeing the portrait.
More than 200 children are believed to have died in the heavily-bombed Khyber Pukhtoonkhwa according to the website notabugsplat.com. ‘Bug splat’ is the name given by the military to a person who has been killed by a drone. Viewing the body through a grainy computer image gives the impression that an insect has been crushed.
Now a giant portrait of a young child has been produced to try and raise awareness of civilian casualties in the region. The hope is now the drone operator will see a child’s face on his or her computer screen, rather than just a small white dot and may think twice before attacking indiscriminately.
The child featured in the poster is nameless, but according to the Foundation for Fundamental Rights, who helped to launch the project in collaboration with a number of artists, both parents were lost to a drone attack.
Drone raids in Pakistan started in 2004 under George W. Bush’s administration as part of the US War on Terror. The vast majority of strikes have focused on the Federally Administered Tribal Area’s and the Khyber Pukhtoonkhwa area due to their proximity to Afghanistan, which the country invaded following the September 11 terrorist attacks.
Image from notabugsplat.comImage from notabugsplat.com
The United States says drones, which have been continued under Barak Obama’s presidency are more accurate than any other weapon and a vital tool for killing Al-Qaeda and Taliban leaders. But Pakistani deaths from drone strikes are estimated at between 2,537 and 3,646 over the period from 2004 to 2013, the Bureau of Investigative Journalism says, drawing on media reports.
Civilian deaths have long strained relations between the United States and Pakistan. The issue of drone strikes, while remaining largely out of US headlines, has become one of the most polarizing in Pakistan. While previous reports have made it clear that Pakistani leaders have authorized at least some drone strikes, they publicly maintain that that American unmanned aerial vehicles constantly buzzing in the skies undermine Pakistan’s sovereignty.
Islamabad has tried to convince the United Nations Human Rights Council to pass a resolution that would force US drone strikes to adhere to international law. However, America has not been forthcoming and boycotted recent talks in Geneva.
The number of drone strikes in Pakistan has at least fallen over the last month as the Pakistani government asked the US to limit the number of attacks as they entered peace talks with the Pakistani Taliban.
Published time: April 07, 2014 13:29
Edited time: April 08, 2014 15:04 Get short URL
© Autonomous Nonprofit Organization “TV-Novosti”, 2005–2014
A German national died in a US drone strike in Pakistan, a report revealed on Monday. The 27-year-old convert to Islam claimed to have close links with German authorities and even to be in contact with security officials.
The strike occurred on February 16, 2012, some 35 km south of the Pakistani town of Mir Ali, which itself is about 30 kilometers south east of the Afghan border.
However, it is only now that details have begun to emerge. The man in question has been identified as Patrick K., from Hesse, central Germany, according to the German paper, Süddeutsche Zeitung and the NDR broadcaster.
An entry at a jihadist forum, which also produced video evidence of his death, stated the man’s full name was Patrick Klaus. Two separate German-language video messages (Part one; Part two) posted by German Islamists show Klaus smiling at the camera as he calls on his compatriots with the same beliefs to: “Follow me”.
The German national apparently switched to Islam at the age of 14, reports Die Welt. In 2011, he moved to Waziristan, a mountainous region near Afghanistan’s border back in 2011 to live with his wife, who is thought to be a Pakistani national.
The reports state that at the time of the strike Patrick K. had been travelling in a pick-up truck alongside several Uzbek fighters. They were heading in the direction of South Waziristan when a MQ-1 Predator drone missile hit the vehicle. Nine others died alongside Patrick K., and the vehicle itself was left completely burnt out.
“He says that he was in close contact with an official from the BKA [Federal Criminal Police Office] in Hesse, who allegedly recruited him successfully,” claims the SZ paper, a link to which can be found in German.
It is also thought that an official from the domestic intelligence agency – the Federal Office for the Protection of the Constitution – had made efforts to communicate with him.
Patrick KlausPatrick Klaus
Patrick K. had previously been arrested in Bonn in 2011, according to Süddeutsche Zeitung, in the run-up to the Social Democrat’s German Festival to celebrate 150 years of the party’s existence. Security services were on high alert and feared a possible attack. However, suspicions about him were quickly dispelled and the possibility of an attack was dismissed.
Patrick K. travelled to Pakistan a few days afterwards, according to the paper, and subsequently lost contact with the officials that he had allegedly been in contact with. Whilst in Pakistan, he was in contact with the notorious Chouka brothers – Yassin and Mounir Chouka – two German militants of Moroccan descent, who are part of the Islamic Movement of Uzbekistan, deemed a terrorist organization by the UK, US and Russia.
At the time of the 2012 attack’s occurrence, there had been over 260 US drone strikes in the previous eight years. A week prior to the strike, several senior leaders were also killed in an attack in North Waziristan. The area is known for high militant activity, and the US government deems the strikes a necessary and carefully considered part of the struggle against militant groups in its “War against Terror” operation.
Pakistan has repeatedly condemned US drone strikes in the country, with a high court ruling in May last year that strikes in the tribal belt should be considered war crimes. Demonstrations against strikes have also taken place, with a former cricket star-turned politician, Imran Khan, leading a road block demonstration in November against the practice, of which he is a harsh critic.
Published time: January 13, 2014 17:12
Edited time: January 13, 2014 17:49 Get short URL
© Autonomous Nonprofit Organization “TV-Novosti”, 2005–2014