The following story was published today by The Intercept, a digital magazine dedicated to producing fearless, adversarial journalism that brings transparency and accountability to powerful institutions. It is being published here in partnership with The Huffington Post.
This is an excerpt from the first article in The Drone Papers series, produced by a team of Intercept reporters and researchers who spent months analyzing secret government documents. Read the rest of The Drone Papers here.Â
Â
NEW YORK - The Intercept has obtained a cache of secret slides that provides a window into the inner workings of the U.S. militaryâs kill/capture operations at a key time in the evolution of the drone wars â" between 2011 and 2013. The documents, which also outline the internal views of special operations forces on the shortcomings and flaws of the drone program, were provided by a source within the intelligence community who worked on the types of operations and programs described in the slides. The Intercept granted the sourceâs request for anonymity because the materials are classified and because the U.S. government has engaged in aggressive prosecution of whistleblowers. The stories in this series will refer to the source as âthe source.â
Â
The source said he decided to provide these documents to The Intercept because he believes the public has a right to understand the process by which people are placed on kill lists and ultimately assassinated on orders from the highest echelons of the U.S. government. âThis outrageous explosion of watchlisting â" of monitoring people and racking and stacking them on lists, assigning them numbers, assigning them âbaseball cards,â assigning them death sentences without notice, on a worldwide battlefield â" it was, from the very first instance, wrong,â the source said.
Â
READ MORE FROM THE INTERCEPT: Critical intelligence failures and the limits of drone technology
Â
âWeâre allowing this to happen. And by âwe,â I mean every American citizen who has access to this information now, but continues to do nothing about it.â
The Pentagon, White House, and Special Operations Command all declined to comment. A Defense Department spokesperson said, âWe donât comment on the details of classified reports.â
Â
The CIA and the U.S. militaryâs Joint Special Operations Command (JSOC) operate parallel drone-based assassination programs, and the secret documents should be viewed in the context of an intense internal turf war over which entity should have supremacy in those operations. Two sets of slides focus on the militaryâs high-value targeting campaign in Somalia and Yemen as it existed between 2011 and 2013, specifically the operations of a secretive unit, Task Force 48-4.
Â
Additional documents on high-value kill/capture operations in Afghanistan buttress previous accounts of how the Obama administration masks the true number of civilians killed in drone strikes by categorizing unidentified people killed in a strike as enemies, even if they were not the intended targets. The slides also paint a picture of a campaign in Afghanistan aimed not only at eliminating al Qaeda and Taliban operatives, but also at taking out members of other local armed groups.
Â
One top-secret document shows how the terror âwatchlistâ appears in the terminals of personnel conducting drone operations, linking unique codes associated with cellphone SIM cards and handsets to specific individuals in order to geolocate them.
Â
READ MORE FROM THE INTERCEPT: Secret documents expose the inner workings of Obamaâs drone war
The costs to intelligence gathering when suspected terrorists are killed rather than captured are outlined in the slides pertaining to Yemen and Somalia, which are part of a 2013 study conducted by a Pentagon entity, the Intelligence, Surveillance, and Reconnaissance Task Force. The ISR study lamented the limitations of the drone program, arguing for more advanced drones and other surveillance aircraft and the expanded use of naval vessels to extend the reach of surveillance operations necessary for targeted strikes. It also contemplated the establishment of new âpolitically challengingâ airfields and recommended capturing and interrogating more suspected terrorists rather than killing them in drone strikes.
Â
The ISR Task Force at the time was under the control of Michael Vickers, the undersecretary of defense for intelligence. Vickers, a fierce proponent of drone strikes and a legendary paramilitary figure, had long pushed for a significant increase in the militaryâs use of special operations forces. The ISR Task Force is viewed by key lawmakers as an advocate for more surveillance platforms like drones.
Â
The ISR study also reveals new details about the case of a British citizen, Bilal el-Berjawi, who was stripped of his citizenship before being killed in a U.S. drone strike in 2012. British and American intelligence had Berjawi under surveillance for several years as he traveled back and forth between the U.K. and East Africa, yet did not capture him. Instead, the U.S. hunted him down and killed him in Somalia.
Â
READ MORE FROM THE INTERCEPT: Stripped of British citizenship and killed by an American drone
Â
Taken together, the secret documents lead to the conclusion that Washingtonâs 14-year high-value targeting campaign suffers from an over reliance on signals intelligence, an apparently incalculable civilian toll, and â" due to a preference for assassination rather than capture â" an inability to extract potentially valuable intelligence from terror suspects. They also highlight the futility of the war in Afghanistan by showing how the U.S. has poured vast resources into killing local insurgents, in the process exacerbating the very threat the U.S. is seeking to confront.
Â
These secret slides help provide historical context to Washingtonâs ongoing wars, and are especially relevant today as the U.S. military intensifies its drone strikes and covert actions against ISIS in Syria and Iraq. Those campaigns, like the ones detailed in these documents, are unconventional wars that employ special operations forces at the tip of the spear.
Â
The âfind, fix, finishâ doctrine that has fueled Americaâs post-9/11 borderless war is being refined and institutionalized. Whether through the use of drones, night raids, or new platforms yet to be unleashed, these documents lay bare the normalization of assassination as a central component of U.S. counterterrorism policy.
Â
âThe military is easily capable of adapting to change, but they donât like to stop anything they feel is making their lives easier, or is to their benefit. And this certainly is, in their eyes, a very quick, clean way of doing things. Itâs a very slick, efficient way to conduct the war, without having to have the massive ground invasion mistakes of Iraq and Afghanistan,â the source said. âBut at this point, they have become so addicted to this machine, to this way of doing business, that it seems like itâs going to become harder and harder to pull them away from it the longer theyâre allowed to continue operating in this way.â
Â
The articles in The Drone Papers were produced by a team of reporters and researchers from The Intercept that has spent months analyzing the documents. The series is intended to serve as a long-overdue public examination of the methods and outcomes of Americaâs assassination program. This campaign, carried out by two presidents through four presidential terms, has been shrouded in excessive secrecy. The public has a right to see these documents not only to engage in an informed debate about the future of U.S. wars, both overt and covert, but also to understand the circumstances under which the U.S. government arrogates to itself the right to sentence individuals to death without the established checks and balances of arrest, trial, and appeal.
Â
Among the key revelations in this series:
Â
HOW THE PRESIDENT AUTHORIZES TARGETS FOR ASSASSINATION
Â
It has been widely reported that President Obama directly approves high-value targets for inclusion on the kill list, but the secret ISR study provides new insight into the kill chain, including a detailed chart stretching from electronic and human intelligence gathering all the way to the presidentâs desk. The same month the ISR study was circulated â" May 2013 â" Obama signed the policy guidance on the use of force in counterterrorism operations overseas. A senior administration official, who declined to comment on the classified documents, told The Intercept that âthose guidelines remain in effect today.â
Â
U.S. intelligence personnel collect information on potential targets, as The Intercept has previously reported, drawn from government watchlists and the work of intelligence, military, and law enforcement agencies. At the time of the study, when someone was destined for the kill list, intelligence analysts created a portrait of a suspect and the threat that person posed, pulling it together âin a condensed format known as a âbaseball card.ââ That information was then bundled with operational information and packaged in a âtarget information folderâ to be âstaffed up to higher echelonsâ for action. On average, it took 58 days for the president to sign off on a target, one slide indicates. At that point, U.S. forces had 60 days to carry out the strike. The documents include two case studies that are partially based on information detailed on baseball cards.
Â
The system for creating baseball cards and targeting packages, according to the source, depends largely on intelligence intercepts and a multi-layered system of fallible, human interpretation. âIt isnât a surefire method,â he said. âYouâre relying on the fact that you do have all these very powerful machines, capable of collecting extraordinary amounts of data and information,â which can lead personnel involved in targeted killings to believe they have âgodlike powers.â
Â
READ MORE FROM THE INTERCEPT: The lethal bureaucracy behind Obamaâs drone war
Â
ASSASSINATIONS DEPEND ON UNRELIABLE INTELLIGENCE AND HURT INTELLIGENCE GATHERING
Â
In undeclared war zones, the U.S. military has become overly reliant on signals intelligence, or SIGINT, to identify and ultimately hunt down and kill people. The documents acknowledge that using metadata from phones and computers, as well as communications intercepts, is an inferior method of finding and finishing targeted people. They described SIGINT capabilities in these unconventional battlefields as âpoorâ and âlimited.â Yet such collection, much of it provided by foreign partners, accounted for more than half the intelligence used to track potential kills in Yemen and Somalia. The ISR study characterized these failings as a technical hindrance to efficient operations, omitting the fact that faulty intelligence has led to the killing of innocent people, including U.S. citizens, in drone strikes.
Â
The source underscored the unreliability of metadata, most often from phone and computer communications intercepts. These sources of information, identified by so-called selectors such as a phone number or email address, are the primary tools used by the military to find, fix, and finish its targets. âIt requires an enormous amount of faith in the technology that youâre using,â the source said. âThereâs countless instances where Iâve come across intelligence that was faulty.â This, he said, is a primary factor in the killing of civilians. âItâs stunning the number of instances when selectors are misattributed to certain people. And it isnât until several months or years later that you all of a sudden realize that the entire time you thought you were going after this really hot target, you wind up realizing it was his motherâs phone the whole time.â
Â
Â
Within the special operations community, the source said, the internal view of the people being hunted by the U.S. for possible death by drone strike is: âThey have no rights. They have no dignity. They have no humanity to themselves. Theyâre just a âselectorâ to an analyst. You eventually get to a point in the targetâs life cycle that you are following them, you donât even refer to them by their actual name.â This practice, he said, contributes to âdehumanizing the people before youâve even encountered the moral question of âis this a legitimate kill or not?ââ
Â
By the ISR studyâs own admission, killing suspected terrorists, even if they are âlegitimateâ targets, further hampers intelligence gathering. The secret study states bluntly: âKill operations significantly reduce the intelligence available.â A chart shows that special operations actions in the Horn of Africa resulted in captures just 25 percent of the time, indicating a heavy tilt toward lethal strikes.
Â
STRIKES OFTEN KILL MANY MORE THAN THE INTENDED TARGET
Â
The White House and Pentagon boast that the targeting killing program is precise and that civilian deaths are minimal. However, documents detailing a special operations campaign in northeastern Afghanistan, Operation Haymaker, show that between January 2012 and February 2013, U.S. special operations airstrikes killed more than 200 people. Of those, only 35 were the intended targets. During one five-month period of the operation, according to the documents, nearly 90 percent of the people killed in airstrikes were not the intended targets. In Yemen and Somalia, where the U.S. has far more limited intelligence capabilities to confirm the people killed are the intended targets, the equivalent ratios may well be much worse.
Â
âAnyone caught in the vicinity is guilty by association,â the source said. When âa drone strike kills more than one person, there is no guarantee that those persons deserved their fate. ⦠So itâs a phenomenal gamble.â
Â
Â
THE MILITARY LABELS UNKNOWN PEOPLE IT KILLS AS âENEMIES KILLED IN ACTIONâ
Â
The documents show that the military designated people it killed in targeted strikes as EKIA â" âenemy killed in actionâ â" even if they were not the intended targets of the strike. Unless evidence posthumously emerged to prove the males killed were not terrorists or âunlawful enemy combatants,â EKIA remained their designation, according to the source. That process, he said, âis insane. But weâve made ourselves comfortable with that. The intelligence community, JSOC, the CIA, and everybody that helps support and prop up these programs, theyâre comfortable with that idea.â
Â
The source described official U.S. government statements minimizing the number of civilian casualties inflicted by drone strikes as âexaggerating at best, if not outright lies.â
Â
THE NUMBER OF PEOPLE TARGETED FOR DRONE STRIKES AND OTHER FINISHING OPERATIONS
Â
According to one secret slide, as of June 2012, there were 16 people in Yemen whom President Obama had authorized U.S. special operations forces to assassinate. In Somalia, there were four. The statistics contained in the documents appear to refer only to targets approved under the 2001 Authorization for Use of Military Force, not CIA operations. In 2012 alone, according to data compiled by the Bureau of Investigative Journalism, there were more than 200 people killed in operations in Yemen and between four and eight in Somalia.
Â
READ MORE FROM THE INTERCEPT: Inside the CIA and Pentagon turf war over drone supremacy
Â
HOW GEOGRAPHY SHAPES THE ASSASSINATION CAMPAIGN
Â
In Afghanistan and Iraq, the pace of U.S. strikes was much quicker than in Yemen and Somalia. This appears due, in large part, to the fact that the former countries were declared war zones, and in Iraq the U.S. was able to launch attacks from bases closer to the targeted people. By contrast, in Somalia and Yemen, undeclared war zones where strikes were justified under tighter restrictions, U.S. attack planners described a serpentine bureaucracy for obtaining approval for assassination. The secret study states that the number of high-value targeting operations in these countries was âsignificantly lower than previously seen in Iraq and Afghanistanâ because of these âconstraining factors.â
Â
Even after the president approved a target in Yemen or Somalia, the great distance between drone bases and targets created significant challenges for U.S. forces â" a problem referred to in the documents as the âtyranny of distance.â In Iraq, more than 80 percent of âfinishing operationsâ were conducted within 150 kilometers of an air base. In Yemen, the average distance was about 450 kilometers and in Somalia it was more than 1,000 kilometers. On average, one document states, it took the U.S. six years to develop a target in Somalia, but just 8.3 months to kill the target once the president had approved his addition to the kill list.
Â
READ MORE FROM THE INTERCEPT: The U.S. militaryâs expanding drone network in Africa
Â
INCONSISTENCIES WITH WHITE HOUSE STATEMENTS ABOUT TARGETED KILLING
Â
The White Houseâs publicly available policy standards state that lethal force will be launched only against targets who pose a âcontinuing, imminent threat to U.S. persons.â In the documents, however, there is only one explicit mention of a specific criterion: that a person âpresents a threat to U.S. interest or personnel.â While such a rationale may make sense in the context of a declared war in which U.S. personnel are on the ground in large numbers, such as in Afghanistan, that standard is so vague as to be virtually meaningless in countries like Yemen and Somalia, where very few U.S. personnel operate.
Â
While many of the documents provided to The Intercept contain explicit internal recommendations for improving unconventional U.S. warfare, the source said that whatâs implicit is even more significant. The mentality reflected in the documents on the assassination programs is: âThis process can work. We can work out the kinks. We can excuse the mistakes. And eventually we will get it down to the point where we donât have to continuously come back ⦠and explain why a bunch of innocent people got killed.â
Â
The architects of what amounts to a global assassination campaign do not appear concerned with either its enduring impact or its moral implications. âAll you have to do is take a look at the world and what itâs become, and the ineptitude of our Congress, the power grab of the executive branch over the past decade,â the source said. âItâs never considered: Is what weâre doing going to ensure the safety of our moral integrity? Of not just our moral integrity, but the lives and humanity of the people that are going to have to live with this the most?â
Â
No comments:
Post a Comment