Report: Documents Show NSA Involvement in Drone Program
WHISTLEBLOWING - SURVEILLANCE, 21 Oct 2013
Documents provided by former NSA contractor Edward Snowden show NSA ties to killing program.
Report comes from papers provided by former NSA contractor Edward Snowden
- Documents make clear that NSA worked with CIA on drone campaign
- Operation may have helped track an associate of Osama bin Laden
Documents provided to The Washington Post by former NSA contractor Edward Snowden illustrate the extensive involvement of the National Security Agency in the government’s targeted counterterrorism killing program. They provide the most detailed account of the collaboration between the NSA and the CIA in the drone campaign, the Post reports.
The documents make clear that the drone campaign — which uses armed, unmanned aerial vehicles — frequently presented as exclusive territory of the CIA, depends heavily on the ability of the NSA to sweep up information from e-mails, telephone calls and other pieces of signals intelligence, the Post reports.
Reports of the NSA’s involvement in Americans’ lives have drawn intense criticism, but the latest report on the drone files might support the security agency’s assertion that its work is focused on fighting terrorism and bolstering U.S. operations in other countries.
The public affairs office of the NSA, based at Fort Meade in Maryland responded to the report regarding drones with an e-mailed statement.
“The National Security Agency is a foreign intelligence agency,” the statement read. “We’re focused on discovering and developing intelligence about valid foreign intelligence targets, such as terrorists, human traffickers and drug smugglers. Our activities are directed against valid foreign intelligence targets in response to requirements from U.S. leaders in order to protect the nation and its interests from threats such as terrorism and the proliferation of weapons of mass destruction.”
The NSA has assigned senior analysts to the CIA’s Counterterrorism Center and sent others to work with the CIA at almost every major U.S. embassy or military base overseas, according to the Post.
The drone campaign has killed an estimated 3,000 militants and hundreds of civilians, the Post says independent surveys indicate.
In Pakistan, the NSA was useful in terms of coverage of Pakistan’s Federally Administered Tribal Areas, or FATA, according to the Post report.
The news organization quotes an unidentified former intelligence official as saying, “If you wanted huge coverage of the FATA, NSA had 10 times the manpower, 20 times the budget and 100 times the brainpower” when compared to the CIA Information Operations Center.
The NSA conducts the operations by relying on online attacks or positioning itself in the middle of communications between two computers, the Post reports. In this way, the agency extracts digital information that includes audio files, imagery and keystroke logs, according to the Post.
In one operation, focus on a suspected facilitator for al-Qaeda in Yemen turned up a collection of files that could be used to map out movement of terrorists and would-be terrorists between several countries, according to the documents. “This may enable NSA to better flag the movement of these individuals” for security services for no-fly lists or monitoring, the Post quotes the documents as saying.
The operations also allegedly helped track Hassan Ghul, an associate of Osama bin Laden killed by a drone strike in Pakistan in October 2012. Information provided by Ghul may have led to the capture and death of bin Laden. The U.S. government has never acknowledged killing Ghul, the Post says.
When Ghul tried to enter Iraq in 2004, he was detained by Khurdish authorities directed by the CIA. He told them that Osama bin Laden relied on a courier known as al-Kuwaiti. Ghul; was then taken to a CIA site in Eastern Europe, where he was subjected to sleep deprivation and other tactics to break his will, the Post reports.
DISCLAIMER: The statements, views and opinions expressed in pieces republished here are solely those of the authors and do not necessarily represent those of TMS. In accordance with title 17 U.S.C. section 107, this material is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. TMS has no affiliation whatsoever with the originator of this article nor is TMS endorsed or sponsored by the originator. “GO TO ORIGINAL” links are provided as a convenience to our readers and allow for verification of authenticity. However, as originating pages are often updated by their originating host sites, the versions posted may not match the versions our readers view when clicking the “GO TO ORIGINAL” links. This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc. We believe this constitutes a ‘fair use’ of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml. If you wish to use copyrighted material from this site for purposes of your own that go beyond ‘fair use’, you must obtain permission from the copyright owner.
Click here to go to the current weekly digest or pick another article:
WHISTLEBLOWING - SURVEILLANCE: