Of course, he could leave it at his grandma’s house.According to a former drone operator for the military’s Joint Special Operations Command (JSOC) who also worked with the NSA, the agency often identifies targets based on controversial metadata analysis and cell-phone tracking technologies. Rather than confirming a target’s identity with operatives or informants on the ground, the CIA or the U.S. military then orders a strike based on the activity and location of the mobile phone a person is believed to be using.
[...]
In one tactic, the NSA “geolocates” the SIM card or handset of a suspected terrorist’s mobile phone, enabling the CIA and U.S. military to conduct night raids and drone strikes to kill or capture the individual in possession of the device.
The Intercept
Another problem:According to the former drone operator, the geolocation cells at the NSA that run the tracking program – known as Geo Cell –sometimes facilitate strikes without knowing whether the individual in possession of a tracked cell phone or SIM card is in fact the intended target of the strike.
And, of course, the obvious problem:[T]argets are increasingly aware of the NSA’s reliance on geolocating, and have moved to thwart the tactic. Some have as many as 16 different SIM cards associated with their identity within the High Value Target system.
[...]
Some top Taliban leaders, knowing of the NSA’s targeting method, have purposely and randomly distributed SIM cards among their units in order to elude their trackers. “They would do things like go to meetings, take all their SIM cards out, put them in a bag, mix them up, and everybody gets a different SIM card when they leave,” the former drone operator says.
That’s not very good odds for drones.The former drone operator also says that he personally participated in drone strikes where the identity of the target was known, but other unknown people nearby were also killed.
“They might have been terrorists,” he says. “Or they could have been family members who have nothing to do with the target’s activities.”
[...]
Based on his experience, he has come to believe that the drone program amounts to little more than death by unreliable metadata.
[...]
“People get hung up that there’s a targeted list of people,” he says. “It’s really like we’re targeting a cell phone.”
[...]
A recent study conducted by a U.S. military adviser found that, during a single year in Afghanistan – where the majority of drone strikes have taken place – unmanned vehicles were 10 times more likely than conventional aircraft to cause civilian casualties.
What a surprise.“Everything they turned into a kinetic strike or a night raid was almost 90 percent that,” [the former JSOC drone operator] says. “You could tell, because you’d go back to the mission reports and it will say ‘this mission was triggered by SIGINT,’ which means it was triggered by a geolocation cell.”
[...]
The JSOC operator’s account is supported by another insider who was directly involved in the drone program. Brandon Bryant spent six years as a “stick monkey” – a drone sensor operator.
[...]
Bryant describes the program as highly compartmentalized: Drone operators taking shots at targets on the ground have little idea where the intelligence is coming from.
[...]
[Caitlin Hayden, a spokesperson for the National Security Council, ] felt free, however, to note the role that human intelligence plays after a deadly strike occurs. “After any use of targeted lethal force, when there are indications that civilian deaths may have occurred, intelligence analysts draw on a large body of information – including human intelligence, signals intelligence, media reports, and surveillance footage – to help us make informed determinations about whether civilians were in fact killed or injured.”
[...]
The NSA declined to respond to questions for this article.
Glenn Greenwald says he is coming to New York this month. Do you think he’ll be hassled at the airport? Met with a subpoena? Handcuffs?[Hayden] also refused to discuss “the type of operational detail that, in our view, should not be published.”
And if you’re wondering how they track cell phones:
This is a full-length magazine article, should you care to read the entire thing.The [NSA] equips drones and other aircraft with devices known as “virtual base-tower transceivers” – creating, in effect, a fake cell phone tower that can force a targeted person’s device to lock onto the NSA’s receiver without their knowledge.
Also in the article is this information about an NSA secret document (I am presuming one that was leaked by Ed Snowden).
Most civilized countries, which do not conduct drone strikes, also have outlawed the use of cluster bombs. Convention on Cluster MunitionsIn one top-secret NSA document from 2010, the head of the agency’s Strategic Planning and Policy Division of the Counterterrorism Mission Management Center recounts the history of the NSA’s involvement in Yemen.
[...]
In December 2009, utilizing the NSA’s metadata collection programs, the Obama administration dramatically escalated U.S. drone and cruise missile strikes in Yemen.
The first strike in the country known to be authorized by Obama targeted an alleged Al Qaeda camp in the southern village of al-Majala.
The strike, which included the use of cluster bombs, resulted in the deaths of 14 women and 21 children. It is not clear whether the strike was based on metadata collection; the White House has never publicly explained the strike or the source of the faulty intelligence that led to the civilian fatalities.
No comments:
Post a Comment