• The NSA’s Secret Role in the U.S. Assassination Program

    According to a former drone operator for the military’s Joint Special Operations Command (#JSOC) who also worked with the #NSA, the agency often identifies targets based on controversial #metadata analysis and cell-phone tracking technologies. Rather than confirming a target’s identity with operatives or informants on the ground, the #CIA or the U.S. military then orders a strike based on the activity and location of the #mobile phone a person is believed to be using.

    The #drone operator, who agreed to discuss the top-secret programs on the condition of anonymity, was a member of JSOC’s High Value Targeting task force, which is charged with identifying, capturing or killing terrorist suspects in Yemen, Somalia, Afghanistan and elsewhere.

    His account is bolstered by top-secret NSA documents previously provided by whistleblower Edward #Snowden. It is also supported by a former drone sensor operator with the U.S. Air Force, Brandon Bryant, who has become an outspoken critic of the lethal operations in which he was directly involved in #Iraq, #Afghanistan and #Yemen.


    One problem, he explains, is that targets are increasingly aware of the NSA’s reliance on geolocating, and have moved to thwart the tactic. Some have as many as 16 different #SIM_cards associated with their identity within the High Value Target system. Others, unaware that their mobile phone is being targeted, lend their phone, with the SIM card in it, to friends, children, spouses and family members.

    Some top Taliban leaders, knowing of the NSA’s targeting method, have purposely and randomly distributed SIM cards among their units in order to elude their trackers. “They would do things like go to meetings, take all their SIM cards out, put them in a bag, mix them up, and everybody gets a different SIM card when they leave,” the former drone operator says. “That’s how they confuse us.”

    As a result, even when the agency correctly identifies and targets a SIM card belonging to a terror suspect, the phone may actually be carried by someone else, who is then killed in a strike. According to the former drone operator, the geolocation cells at the NSA that run the tracking program – known as Geo Cell –sometimes facilitate strikes without knowing whether the individual in possession of a tracked cell phone or SIM card is in fact the intended target of the strike.

    “Once the bomb lands or a night raid happens, you know that phone is there,” he says. “But we don’t know who’s behind it, who’s holding it. It’s of course assumed that the phone belongs to a human being who is nefarious and considered an ‘unlawful enemy combatant.’ This is where it gets very shady.”


    What’s more, he adds, the NSA often locates drone targets by analyzing the activity of a SIM card, rather than the actual content of the calls. Based on his experience, he has come to believe that the drone program amounts to little more than death by unreliable metadata.

    “People get hung up that there’s a targeted list of people,” he says. “It’s really like we’re targeting a cell phone. We’re not going after people – we’re going after their phones , in the hopes that the person on the other end of that missile is the bad guy.”


    • En 2011 #Gareth_Porter avait déjà dit l’essentiel

      Although the raids have undoubtedly killed a large number of Taliban commanders and fighters, it is now clear that they also killed and incarcerated thousands of #innocent civilians. The failure to discriminate between combatants and civilians flows directly from a targeting methodology that is incapable of such discrimination.


      ... McChrystal’s operation relied on far more mundane technologies than Woodward’s sensational language suggested. In a new book, “Task Force Black,” by Mark Urban, the diplomatic editor at BBC’s “Newsnight,” reveals that McChrystal’s command gathered intelligence on al-Qaeda and Mahdi Army personnel from three well-known technologies: 24-hour surveillance by drone aircraft, monitoring of mobile phone traffic and pinpointing the physical location of the phones from their signals.


      Targeting Phone Numbers, Not People