AA | AA | |||
Drone
papers part 1
| ||||
Don't
fight the system. Alle acties komend uit wraak of ego zullen mislukken. Alleen acties vanuit een hart en ziel zullen slagen. In deze blog geef ik mijn zienswijze van de huidige wereld weer. | ||||
| ||||
01 The Assassination Complex
Index: The Drone Papers 01. The Assassination Complex Article 1 of 8 The Drone Papers From his first days as commander in chief, the drone has been President Barack Obamas weapon of choice, used by the military and the CIA to hunt down and kill the people his administration has deemed through secretive processes, without indictment or trial worthy of execution. There has been intense focus on the technology of remote killing, but that often serves as a surrogate for what should be a broader examination of the states power over life and death. DRONES ARE A TOOL, not a policy. The policy is assassination. While every president since Gerald Ford has upheld an executive order banning assassinations by U.S. personnel, Congress has avoided legislating the issue or even defining the word assassination. This has allowed proponents of the drone wars to rebrand assassinations with more palatable characterizations, such as the term du jour, targeted killings. When the Obama administration has discussed drone strikes publicly, it has offered assurances that such operations are a more precise alternative to boots on the ground and are authorized only when an imminent threat is present and there is near certainty that the intended target will be eliminated. Those terms, however, appear to have been bluntly redefined to bear almost no resemblance to their commonly understood meanings. The first drone strike outside of a declared war zone was conducted more than 12 years ago, yet it was not until May 2013 that the White House released a set of standards and procedures for conducting such strikes. Those guidelines offered little specificity, asserting that the U.S. would only conduct a lethal strike outside of an area of active hostilities if a target represents a continuing, imminent threat to U.S. persons, without providing any sense of the internal process used to determine whether a suspect should be killed without being indicted or tried. The implicit message on drone strikes from the Obama administration has been one of trust, but dont verify. Photo: The Intercept Document The Intercept has obtained a cache of secret slides that provides a window into the inner workings of the U.S. militarys kill/capture operations at a key time in the evolution of the drone wars between 2011 and 2013. The documents, which also outline the internal views of special operations forces on the shortcomings and flaws of the drone program, were provided by a source within the intelligence community who worked on the types of operations and programs described in the slides. The Intercept granted the sources request for anonymity because the materials are classified and because the U.S. government has engaged in aggressive prosecution of whistleblowers. The stories in this series will refer to the source as the source. The source said he decided to provide these documents to The Intercept because he believes the public has a right to understand the process by which people are placed on kill lists and ultimately assassinated on orders from the highest echelons of the U.S. government. This outrageous explosion of watchlisting of monitoring people and racking and stacking them on lists, assigning them numbers, assigning them baseball cards, assigning them death sentences without notice, on a worldwide battlefield it was, from the very first instance, wrong, the source said. Were allowing this to happen. And by we, I mean every American citizen who has access to this information now, but continues to do nothing about it. The Pentagon, White House, and Special Operations Command all declined to comment. A Defense Department spokesperson said, We dont comment on the details of classified reports. The CIA and the U.S. militarys Joint Special Operations Command (JSOC) operate parallel drone-based assassination programs, and the secret documents should be viewed in the context of an intense internal turf war over which entity should have supremacy in those operations. Two sets of slides focus on the militarys high-value targeting campaign in Somalia and Yemen as it existed between 2011 and 2013, specifically the operations of a secretive unit, Task Force 48-4. Additional documents on high-value kill/capture operations in Afghanistan buttress previous accounts of how the Obama administration masks the true number of civilians killed in drone strikes by categorizing unidentified people killed in a strike as enemies, even if they were not the intended targets. The slides also paint a picture of a campaign in Afghanistan aimed not only at eliminating al Qaeda and Taliban operatives, but also at taking out members of other local armed groups. One top-secret document shows how the terror watchlist appears in the terminals of personnel conducting drone operations, linking unique codes associated with cellphone SIM cards and handsets to specific individuals in order to geolocate them. A top-secret document shows how the watchlist looks on internal systems used by drone operators. The costs to intelligence gathering when suspected terrorists are killed rather than captured are outlined in the slides pertaining to Yemen and Somalia, which are part of a 2013 study conducted by a Pentagon entity, the Intelligence, Surveillance, and Reconnaissance Task Force. The ISR study lamented the limitations of the drone program, arguing for more advanced drones and other surveillance aircraft and the expanded use of naval vessels to extend the reach of surveillance operations necessary for targeted strikes. It also contemplated the establishment of new politically challenging airfields and recommended capturing and interrogating more suspected terrorists rather than killing them in drone strikes. The ISR Task Force at the time was under the control of Michael Vickers, the undersecretary of defense for intelligence. Vickers, a fierce proponent of drone strikes and a legendary paramilitary figure, had long pushed for a significant increase in the militarys use of special operations forces. The ISR Task Force is viewed by key lawmakers as an advocate for more surveillance platforms like drones. The ISR study also reveals new details about the case of a British citizen, Bilal el-Berjawi, who was stripped of his citizenship before being killed in a U.S. drone strike in 2012. British and American intelligence had Berjawi under surveillance for several years as he traveled back and forth between the U.K. and East Africa, yet did not capture him. Instead, the U.S. hunted him down and killed him in Somalia. Taken together, the secret documents lead to the conclusion that Washingtons 14-year high-value targeting campaign suffers from an overreliance on signals intelligence, an apparently incalculable civilian toll, and due to a preference for assassination rather than capture an inability to extract potentially valuable intelligence from terror suspects. They also highlight the futility of the war in Afghanistan by showing how the U.S. has poured vast resources into killing local insurgents, in the process exacerbating the very threat the U.S. is seeking to confront. Read more These secret slides help provide historical context to Washingtons ongoing wars, and are especially relevant today as the U.S. military intensifies its drone strikes and covert actions against ISIS in Syria and Iraq. Those campaigns, like the ones detailed in these documents, are unconventional wars that employ special operations forces at the tip of the spear. The find, fix, finish doctrine that has fueled Americas post-9/11 borderless war is being refined and institutionalized. Whether through the use of drones, night raids, or new platforms yet to be unleashed, these documents lay bare the normalization of assassination as a central component of U.S. counterterrorism policy. The military is easily capable of adapting to change, but they dont like to stop anything they feel is making their lives easier, or is to their benefit. And this certainly is, in their eyes, a very quick, clean way of doing things. Its a very slick, efficient way to conduct the war, without having to have the massive ground invasion mistakes of Iraq and Afghanistan, the source said. But at this point, they have become so addicted to this machine, to this way of doing business, that it seems like its going to become harder and harder to pull them away from it the longer theyre allowed to continue operating in this way. The articles in The Drone Papers were produced by a team of reporters and researchers from The Intercept that has spent months analyzing the documents. The series is intended to serve as a long-overdue public examination of the methods and outcomes of Americas assassination program. This campaign, carried out by two presidents through four presidential terms, has been shrouded in excessive secrecy. The public has a right to see these documents not only to engage in an informed debate about the future of U.S. wars, both overt and covert, but also to understand the circumstances under which the U.S. government arrogates to itself the right to sentence individuals to death without the established checks and balances of arrest, trial, and appeal. Among the key revelations in
this series: Read more U.S. intelligence personnel collect information on potential targets, as The Intercept has previously reported, drawn from government watchlists and the work of intelligence, military, and law enforcement agencies. At the time of the study, when someone was destined for the kill list, intelligence analysts created a portrait of a suspect and the threat that person posed, pulling it together in a condensed format known as a baseball card. That information was then bundled with operational information and packaged in a target information folder to be staffed up to higher echelons for action. On average, it took 58 days for the president to sign off on a target, one slide indicates. At that point, U.S. forces had 60 days to carry out the strike. The documents include two case studies that are partially based on information detailed on baseball cards. The system for creating baseball
cards and targeting packages, according to the source, depends largely
on intelligence intercepts and a multi-layered system of fallible, human
interpretation. It isnt a surefire method, he said.
Youre relying on the fact that you do have all these very
powerful machines, capable of collecting extraordinary amounts of data
and information, which can lead personnel involved in targeted killings
to believe they have godlike powers. Read more The source underscored the unreliability of metadata, most often from phone and computer communications intercepts. These sources of information, identified by so-called selectors such as a phone number or email address, are the primary tools used by the military to find, fix, and finish its targets. It requires an enormous amount of faith in the technology that youre using, the source said. Theres countless instances where Ive come across intelligence that was faulty. This, he said, is a primary factor in the killing of civilians. Its stunning the number of instances when selectors are misattributed to certain people. And it isnt until several months or years later that you all of a sudden realize that the entire time you thought you were going after this really hot target, you wind up realizing it was his mothers phone the whole time. Within the special operations community, the source said, the internal view of the people being hunted by the U.S. for possible death by drone strike is: They have no rights. They have no dignity. They have no humanity to themselves. Theyre just a selector to an analyst. You eventually get to a point in the targets life cycle that you are following them, you dont even refer to them by their actual name. This practice, he said, contributes to dehumanizing the people before youve even encountered the moral question of is this a legitimate kill or not? By the ISR studys own
admission, killing suspected terrorists, even if they are legitimate
targets, further hampers intelligence gathering. The secret study states
bluntly: Kill operations significantly reduce the intelligence available.
A chart shows that special operations actions in the Horn of Africa resulted
in captures just 25 percent of the time, indicating a heavy tilt toward
lethal strikes. Read more Anyone caught in the
vicinity is guilty by association, the source said. When a
drone strike kills more than one person, there is no guarantee that those
persons deserved their fate.
So its a phenomenal gamble. Read more The source described official
U.S. government statements minimizing the number of civilian casualties
inflicted by drone strikes as exaggerating at best, if not outright
lies. Read more Read more Even after the president approved
a target in Yemen or Somalia, the great distance between drone bases and
targets created significant challenges for U.S. forces a problem
referred to in the documents as the tyranny of distance. In
Iraq, more than 80 percent of finishing operations were conducted
within 150 kilometers of an air base. In Yemen, the average distance was
about 450 kilometers and in Somalia it was more than 1,000 kilometers.
On average, one document states, it took the U.S. six years to develop
a target in Somalia, but just 8.3 months to kill the target once the president
had approved his addition to the kill list. Read more While many of the documents provided to The Intercept contain explicit internal recommendations for improving unconventional U.S. warfare, the source said that whats implicit is even more significant. The mentality reflected in the documents on the assassination programs is: This process can work. We can work out the kinks. We can excuse the mistakes. And eventually we will get it down to the point where we dont have to continuously come back and explain why a bunch of innocent people got killed. The architects of what amounts to a global assassination campaign do not appear concerned with either its enduring impact or its moral implications. All you have to do is take a look at the world and what its become, and the ineptitude of our Congress, the power grab of the executive branch over the past decade, the source said. Its never considered: Is what were doing going to ensure the safety of our moral integrity? Of not just our moral integrity, but the lives and humanity of the people that are going to have to live with this the most?
02 A Visual Glossary Article 2 of 8The Drone Papers This is a labyrinth with 12 entrances and no exit. It is built on a cache of documents provided to The Intercept by a source within the intelligence community. Click any arrow to enter a rabbit hole. Each serves as a back door into one of our stories.
The first bomb dropped from an airplane exploded in an oasis outside Tripoli on November 1, 1911.¹ While flying over Ain Zara, Libya, Lieutenant Giulio Gavotti leaned out of his airplane, which looked like a dragonfly, and dropped a Haasen hand grenade. It landed in the camp of the enemy, with good results. Photo: U.S. Air Force One hundred years later, the bombing is done by pilotless planes. They are controlled remotely, often half a world away. We have come to call them drones. On the inside, people call them birds. Operators can watch their targets for hours, often from air-conditioned rooms, until they receive the order to fire. When the time is right, a room full of people watch as the shot is taken. This is where they sit.
Most of the time, drone operators are trying to kill someone specific. They call these peoplethe people being huntedobjectives. What does an objective look like? Heres an example. This timeline was for a man named Bilal el-Berjawi. Intelligence agencies watched him for years, then the British government stripped him of his citizenship. After calling his wife, who had just given birth in a London hospital, Berjawi was killed by an American drone strike. Some people thought the call might have given away his location, but the drones already knew where he was. This was his car.
When drone operators hit their target, killing the person they intend to kill, that person is called a jackpot. When they miss their target and end up killing someone else, they label that person EKIA, or enemy killed in action.
Over a five-month period, U.S. forces used drones and other aircraft to kill 155 people in northeastern Afghanistan. They achieved 19 jackpots. Along the way, they killed at least 136 other people, all of whom were classified as EKIA, or enemies killed in action. Note the % column. It is the number of jackpots (JPs) divided by the number of operations. A 70 percent success rate. But it ignores well over a hundred other people killed along the way. This means that almost 9 out of 10 people killed in these strikes were not the intended targets.
Hellfire missilesthe explosives fired from dronesare not always fired at people. In fact, most drone strikes are aimed at phones. The SIM card provides a persons locationwhen turned on, a phone can become a deadly proxy for the individual being hunted. When a night raid or drone strike successfully neutralizes a targets phone, operators call that a touchdown.
Baseball cards (BBCs) are the militarys method for visualizing informationthey are used to display data, map relationships between people, and identify an individuals so-called pattern of life. This isnt quite what a baseball card looks like, but they are said to include much of the following information.
A blink happens when a drone has to move and there isnt another aircraft to continue watching a target. According to classified documents, this is a major challenge facing the military, which always wants to have a persistent stare. The conceptual metaphor of surveillance is seeing. Perfect surveillance would be like having a lidless eye. Much of what is seen by a drones camera, however, appears without context on the ground. Some drone operators describe watching targets as looking through a soda straw.
Drones are not magic. They have to take off from somewhere. Increasingly that somewhere is on the continent of Africa. But where exactly? As of 2012, the Joint Special Operations Command (JSOC) had bases in Djibouti, Kenya, and Ethiopia. They operated 11 Predators and five Reaper drones over the Horn of Africa and Yemen. After crashing multiple Predator drones near Camp Lemonnier, the U.S. military moved operations to a more remote airstrip in Chabelley, Djibouti. Chabelley, Djibouti. November 2014. Photo: Google Earth Heres a snapshot of how the U.S. views its surveillance capabilities on the continent of Africa more broadly.
The military worries about what it calls the tyranny of distance. Compared to the traditional battlefields of Iraq and Afghanistan, U.S. drones have to travel farther to reach their named areas of interest, or NAIs, in Yemen and Somalia. Heres where the U.S. appears to have finished people in Yemen.
For many years, lawyers and human rights advocates have wondered about the chain of command. How are non-battlefield assassinations authorized? Does it fall within the Authorization for Use of Military Force (AUMF), or through some other authority? The documents we have are not comprehensive, but they suggest a linear chainall the way up to the president of the United States (POTUS).
As we reported last year, U.S. intelligence agencies hunt people primarily on the basis of their cellphones. Equipped with a simulated cell tower called GILGAMESH, a drone can force a targets phone to lock onto it, and subsequently use the phones signals to triangulate that persons location. Here is what a watchlist looks like.
In the end, Intelligence, Surveillance, and Reconnaissance (ISR) is about continuing a cycle: Find a person, Fix a person, Finish them. But there are two other steps in the process: Exploit and Analyze. Colloquially referred to as F3EA, the cycle feeds back into itself. The whole process amounts to human hunting. As soon as a target is finished, the hunt for a new target begins.
With a special thanks
to: Jeremy Scahill, Josh Begley and
the people who made the amages
|
||||
| ||||
| ||||
|
We
are not responsible for the posts of the members
|