The National Security Agency is using complex
analysis of electronic surveillance, rather than human intelligence, as the
primary method to locate targets for lethal drone strikes – an unreliable
tactic that results in the deaths of innocent or unidentified people.
According to a former drone operator for the
military’s Joint Special Operations Command (JSOC) who also worked with the
NSA, the agency often identifies targets based on controversial metadata
analysis and cell-phone tracking technologies.
Rather than confirming a
target’s identity with operatives or informants on the ground, the CIA or the
U.S. military then orders a strike based on the activity and location of the
mobile phone a person is believed to be using.
The drone operator, who agreed to discuss the
top-secret programs on the condition of anonymity, was a member of JSOC’s High
Value Targeting task force, which is charged with identifying, capturing or
killing terrorist suspects in Yemen, Somalia, Afghanistan and elsewhere.
His account is bolstered by top-secret NSA documents
previously provided by whistleblower Edward Snowden. It is also supported by a
former drone sensor operator with the U.S. Air Force, Brandon Bryant, who has
become an outspoken critic of the lethal operations in which he was directly
involved in Iraq, Afghanistan and Yemen.
In one tactic, the NSA “geolocates” the SIM card or
handset of a suspected terrorist’s mobile phone, enabling the CIA and U.S.
military to conduct night raids and drone strikes to kill or capture the
individual in possession of the device.
The former JSOC drone operator is adamant that the
technology has been responsible for taking out terrorists and networks of
people facilitating improvised explosive device attacks against U.S. forces in
Afghanistan. But he also states that innocent people have “absolutely” been
killed as a result of the NSA’s increasing reliance on the surveillance tactic.
One problem, he explains, is that targets are
increasingly aware of the NSA’s reliance on geolocating, and have moved to
thwart the tactic. Some have as many as 16 different SIM cards associated with
their identity within the High Value Target system.
Others, unaware that their
mobile phone is being targeted, lend their phone, with the SIM card in it, to
friends, children, spouses and family members.
Some top Taliban leaders, knowing of the NSA’s
targeting method, have purposely and randomly distributed SIM cards among their
units in order to elude their trackers.
“They would do things like go to
meetings, take all their SIM cards out, put them in a bag, mix them up, and
everybody gets a different SIM card when they leave,” the former drone operator
says. “That’s how they confuse us.” Read More:
No comments:
Post a Comment