Skip to main content

DECODING THE LANGUAGE OF COVERT WARFARE

Josh Begley

This is a labyrinth with 12 entrances and no exit. It is built on a cache of documents provided toThe Intercept by a source within the intelligence community.




DRONES ARE A TOOL, not a policy. The policy is assassination. While every president since Gerald Ford has upheld an executive order banning assassinations by U.S. personnel, Congress has avoided legislating the issue or even defining the word “assassination.” This has allowed proponents of the drone wars to rebrand assassinations with more palatable characterizations, such as the term du jour, “targeted killings.”

When the Obama administration has discussed drone strikes publicly, it has offered assurances that such operations are a more precise alternative to boots on the ground and are authorized only when an “imminent” threat is present and there is “near certainty” that the intended target will be eliminated. Those terms, however, appear to have been bluntly redefined to bear almost no resemblance to their commonly understood meanings.

The first drone strike outside of a declared war zone was conducted more than 12 years ago, yet it was not until May 2013 that the White House released a set of standards and procedures for conducting such strikes. Those guidelines offered little specificity, asserting that the U.S. would only conduct a lethal strike outside of an “area of active hostilities” if a target represents a “continuing, imminent threat to U.S. persons,” without providing any sense of the internal process used to determine whether a suspect should be killed without being indicted or tried. The implicit message on drone strikes from the Obama administration has been one of trust, but don’t verify.


Photo: The Intercept

Document SMALL FOOTPRINT OPERATIONS 2/13Document SMALL FOOTPRINT OPERATIONS 5/13Document OPERATION HAYMAKER

T

he Intercept has obtained a cache of secret slides that provides a window into the inner workings of the U.S. military’s kill/capture operations at a key time in the evolution of the drone wars — between 2011 and 2013. The documents, which also outline the internal views of special operations forces on the shortcomings and flaws of the drone program, were provided by a source within the intelligence community who worked on the types of operations and programs described in the slides. The Intercept granted the source’s request for anonymity because the materials are classified and because the U.S. government has engaged in aggressive prosecution of whistleblowers. The stories in this series will refer to the source as “the source.”

The source said he decided to provide these documents to The Interceptbecause he believes the public has a right to understand the process by which people are placed on kill lists and ultimately assassinated on orders from the highest echelons of the U.S. government. “This outrageous explosion of watchlisting — of monitoring people and racking and stacking them on lists, assigning them numbers, assigning them ‘baseball cards,’ assigning them death sentences without notice, on a worldwide battlefield — it was, from the very first instance, wrong,” the source said.
“We’re allowing this to happen. And by ‘we,’ I mean every American citizen who has access to this information now, but continues to do nothing about it.”

The Pentagon, White House, and Special Operations Command all declined to comment. A Defense Department spokesperson said, “We don’t comment on the details of classified reports.”

The CIA and the U.S. military’s Joint Special Operations Command (JSOC) operate parallel drone-based assassination programs, and the secret documents should be viewed in the context of an intense internal turf warover which entity should have supremacy in those operations. Two sets of slides focus on the military’s high-value targeting campaign in Somalia and Yemen as it existed between 2011 and 2013, specifically the operations of a secretive unit, Task Force 48-4.

Additional documents on high-value kill/capture operations in Afghanistan buttress previous accounts of how the Obama administration masks the true number of civilians killed in drone strikes by categorizing unidentified people killed in a strike as enemies, even if they were not the intended targets. The slides also paint a picture of a campaign in Afghanistan aimed not only at eliminating al Qaeda and Taliban operatives, but also at taking out members of other local armed groups.

One top-secret document shows how the terror “watchlist” appears in the terminals of personnel conducting drone operations, linking unique codes associated with cellphone SIM cards and handsets to specific individuals in order to geolocate them.


The costs to intelligence gathering when suspected terrorists are killed rather than captured are outlined in the slides pertaining to Yemen and Somalia, which are part of a 2013 study conducted by a Pentagon entity, the Intelligence, Surveillance, and Reconnaissance Task Force. The ISR study lamented the limitations of the drone program, arguing for more advanced drones and other surveillance aircraft and the expanded use of naval vessels to extend the reach of surveillance operations necessary for targeted strikes. It also contemplated the establishment of new “politically challenging” airfields and recommended capturing and interrogating more suspected terrorists rather than killing them in drone strikes.

The ISR Task Force at the time was under the control of Michael Vickers, the undersecretary of defense for intelligence. Vickers, a fierce proponent of drone strikes and a legendary paramilitary figure, had long pushed for a significant increase in the military’s use of special operations forces. The ISR Task Force is viewed by key lawmakers as an advocate for more surveillance platforms like drones.

The ISR study also reveals new details about the case of a British citizen, Bilal el-Berjawi, who was stripped of his citizenship before being killed in a U.S. drone strike in 2012. British and American intelligence had Berjawi under surveillance for several years as he traveled back and forth between the U.K. and East Africa, yet did not capture him. Instead, the U.S. hunted him down and killed him in Somalia.

Taken together, the secret documents lead to the conclusion that Washington’s 14-year high-value targeting campaign suffers from an overreliance on signals intelligence, an apparently incalculable civilian toll, and — due to a preference for assassination rather than capture — an inability to extract potentially valuable intelligence from terror suspects. They also highlight the futility of the war in Afghanistan by showing how the U.S. has poured vast resources into killing local insurgents, in the process exacerbating the very threat the U.S. is seeking to confront.


These secret slides help provide historical context to Washington’s ongoing wars, and are especially relevant today as the U.S. militaryintensifies its drone strikes and covert actions against ISIS in Syria and Iraq. Those campaigns, like the ones detailed in these documents, are unconventional wars that employ special operations forces at the tip of the spear.

The “find, fix, finish” doctrine that has fueled America’s post-9/11 borderless war is being refined and institutionalized. Whether through the use of drones, night raids, or new platforms yet to be unleashed, these documents lay bare the normalization of assassination as a central component of U.S. counterterrorism policy.
“The military is easily capable of adapting to change, but they don’t like to stop anything they feel is making their lives easier, or is to their benefit. And this certainly is, in their eyes, a very quick, clean way of doing things. It’s a very slick, efficient way to conduct the war, without having to have the massive ground invasion mistakes of Iraq and Afghanistan,” the source said. “But at this point, they have become so addicted to this machine, to this way of doing business, that it seems like it’s going to become harder and harder to pull them away from it the longer they’re allowed to continue operating in this way.”




Most of the time, drone operators are trying to kill someone specific. They call these people—the people being hunted—“objectives.”

What does an objective look like? Here’s an example.


This timeline was for a man named Bilal el-Berjawi. Intelligence agencies watched him for years, then the British government stripped him of his citizenship.

After calling his wife, who had just given birth in a London hospital, Berjawi was killed by an American drone strike. Some people thought the call might have given away his location, but the drones already knew where he was.

This was his car.

JACKPOT

When drone operators hit their target, killing the person they intend to kill, that person is called a “jackpot.”

When they miss their target and end up killing someone else, they label that person EKIA, or “enemy killed in action.”

EKIA

Over a five-month period, U.S. forces used drones and other aircraft to kill 155 people in northeastern Afghanistan. They achieved 19 jackpots. Along the way, they killed at least 136 other people, all of whom were classified as EKIA, or enemies killed in action.


Note the “%” column. It is the number of jackpots (JPs) divided by the number of operations. A 70 percent success rate. But it ignores well over a hundred other people killed along the way.

This means that almost 9 out of 10 people killed in these strikes were not the intended targets.

TOUCHDOWN

Hellfire missiles—the explosives fired from drones—are not always fired at people. In fact, most drone strikes are aimed at phones. The SIM card provides a person’s location—when turned on, a phone can become a deadly proxy for the individual being hunted.

When a night raid or drone strike successfully neutralizes a target’s phone, operators call that a “touchdown.”

BASEBALL CARD

“Baseball cards” (BBCs) are the military’s method for visualizing information—they are used to display data, map relationships between people, and identify an individual’s so-called pattern of life.

This isn’t quite what a baseball card looks like, but they are said to include much of the following information.

BLINK

A “blink” happens when a drone has to move and there isn’t another aircraft to continue watching a target. According to classified documents, this is a major challenge facing the military, which always wants to have a “persistent stare.”


The conceptual metaphor of surveillance is seeing. Perfect surveillance would be like having a lidless eye. Much of what is seen by a drone’s camera, however, appears without context on the ground. Some drone operators describe watching targets as “looking through a soda straw.”

FOOTPRINT

Drones are not magic. They have to take off from somewhere. Increasingly that somewhere is on the continent of Africa.

But where exactly?

As of 2012, the Joint Special Operations Command (JSOC) had bases in Djibouti, Kenya, and Ethiopia. 

They operated 11 Predators and five Reaper drones over the Horn of Africa and Yemen.


After crashing multiple Predator drones near Camp Lemonnier, the U.S. military moved operations to a more remote airstrip in Chabelley, Djibouti.




Chabelley, Djibouti. November 2014.



Photo: Google Earth

Here’s a snapshot of how the U.S. views its surveillance capabilities on the continent of Africa more broadly.

ORBITS

The military worries about what it calls the “tyranny of distance.” Compared to the traditional battlefields of Iraq and Afghanistan, U.S. drones have to travel farther to reach their “named areas of interest,” or NAIs, in Yemen and Somalia.


Here’s where the U.S. appears to have “finished” people in Yemen.

KILL CHAIN

For many years, lawyers and human rights advocates have wondered about the chain of command. How are non-battlefield assassinations authorized? Does it fall within the Authorization for Use of Military Force (AUMF), or through some other authority?

The documents we have are not comprehensive, but they suggest a linear chain—all the way up to the president of the United States (POTUS).


WATCHLIST

As we reported last year, U.S. intelligence agencies hunt people primarily on the basis of their cellphones. Equipped with a simulated cell tower called GILGAMESH, a drone can force a target’s phone to lock onto it, and subsequently use the phone’s signals to triangulate that person’s location.

Here is what a watchlist looks like.

FIND, FIX, FINISH

In the end, Intelligence, Surveillance, and Reconnaissance (ISR) is about continuing a cycle: Find a person, Fix a person, Finish them. But there are two other steps in the process: Exploit and Analyze.

Colloquially referred to as “F3EA,” the cycle feeds back into itself. The whole process amounts to human hunting. As soon as a target is finished, the hunt for a new target begins.


1. With thanks to Sven Lindqvist’s A History of Bombing, which served as a template for this narrative. Additional design and illustration by Evan Bissell.

Additional reporting:  Jeremy Scahill

Comments

Popular posts from this blog

Why States Still Use Barrel Bombs

Smoke ascends after a Syrian military helicopter allegedly dropped a barrel bomb over the city of Daraya on Jan. 31.(FADI DIRANI/AFP/Getty Images) Summary Barrel bombs are not especially effective weapons. They are often poorly constructed; they fail to detonate more often than other devices constructed for a similar purpose; and their lack of precision means they can have a disproportionate effect on civilian populations. However, combatants continue to use barrel bombs in conflicts, including in recent and ongoing conflicts in Africa and the Middle East, and they are ideally suited to the requirements of resource-poor states. Analysis Barrel bombs are improvised devices that contain explosive filling and shrapnel packed into a container, often in a cylindrical shape such as a barrel. The devices continue to be dropped on towns all over Syria . Indeed, there have been several documented cases of their use in Iraq over the past months, and residents of the city of Mosul, which was re

Russia Looks East for New Oil Markets

Click to Enlarge In the final years of the Soviet Union, Soviet leader Mikhail Gorbachev began orienting his foreign policy toward Asia in response to a rising Japan. Putin has also piloted a much-touted pivot to Asia, coinciding with renewed U.S. interest in the area. A good expression of intent was Russia's hosting of the Asia-Pacific Economic Cooperation summit in 2012 in Vladivostok, near Russia's borders with China and North Korea. Although its efforts in Asia have been limited by more direct interests in Russia's periphery and in Europe, Moscow recently has been able to look more to the east. Part of this renewed interest involves finding new export markets for Russian hydrocarbons. Russia's economy relies on energy exports, particularly crude oil and natural gas exported via pipeline to the West. However, Western Europe is diversifying its energy sources as new supplies come online out of a desire to reduce its dependence on Russian energy supplies . This has

LONDON POLICE INDIRECTLY ENCOURAGE CRIMINALS TO ATTACK RUSSIAN DIPLOMATIC PROPERTY

ILLUSTRATIVE IMAGE A few days ago an unknown perpetrator trespassed on the territory of the Russian Trade Delegation in London, causing damage to the property and the vehicles belonging to the trade delegation , Russian Foreign Ministry Spokeswoman Maria Zakharova said during the September 12 press briefing. The diplomat revealed the response by the London police was discouraging. Police told that the case does not have any prospects and is likely to be closed. This was made despite the fact that the British law enforcement was provided with video surveillance tapes and detailed information shedding light on the incident. By this byehavior, British law inforcements indirectly encourage criminals to continue attacks on Russian diplomatic property in the UK. Zakharova’s statement on “Trespassing on the Russian Trade Mission premises in London” ( source ): During our briefings, we have repeatedly discussed compliance with the Vienna Convention on Diplomatic Relations, specif