{"id":65555,"date":"2015-10-26T12:05:14","date_gmt":"2015-10-26T12:05:14","guid":{"rendered":"https:\/\/www.transcend.org\/tms\/?p=65555"},"modified":"2015-11-01T13:30:17","modified_gmt":"2015-11-01T13:30:17","slug":"the-drone-papers-firing-blind-6-of-8","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2015\/10\/the-drone-papers-firing-blind-6-of-8\/","title":{"rendered":"The Drone Papers &#8211; Firing Blind (6 of 8)"},"content":{"rendered":"<p>[The Intercept<em> has obtained a cache of secret documents detailing the inner workings of the U.S. military\u2019s assassination program in Afghanistan, Yemen, and Somalia. The documents, provided by a whistleblower, offer an unprecedented glimpse into Obama\u2019s drone wars. The source said he decided to provide these documents to <\/em>The Intercept<em> because he believes the public has a right to understand the process by which people are placed on kill lists and ultimately assassinated on orders from the highest echelons of the U.S. government.]<\/em><\/p>\n<p><em>Flawed Intelligence and the Limits of Drone Technology<\/em><\/p>\n<ol>\n<li><a href=\"https:\/\/www.transcend.org\/tms\/2015\/10\/the-drone-papers-the-assassination-complex-1-of-8\/\" > The Assassination Complex<\/a><\/li>\n<li><a href=\"https:\/\/www.transcend.org\/tms\/2015\/10\/the-drone-papers-a-visual-glossary-2-of-8\/\" > A Visual Glossary<\/a><\/li>\n<li><a href=\"https:\/\/www.transcend.org\/tms\/2015\/10\/the-drone-papers-the-kill-chain-3-of-8\/\" > The Kill Chain<\/a><\/li>\n<li><a href=\"https:\/\/www.transcend.org\/tms\/2015\/10\/the-drone-papers-find-fix-finish-4-of-8\/\" > Find, Fix, Finish<\/a><\/li>\n<li><a href=\"https:\/\/www.transcend.org\/tms\/2015\/10\/the-drone-papers-manhunting-in-the-hindu-kush-5-of-8\/\" >Manhunting in the Hindu Kush<\/a><\/li>\n<li><a href=\"https:\/\/www.transcend.org\/tms\/2015\/10\/the-drone-papers-firing-blind-6-of-8\/\" >Firing Blind<\/a><\/li>\n<li><a href=\"https:\/\/www.transcend.org\/tms\/2015\/10\/the-drone-papers-the-life-and-death-of-objective-peckham-7-of-8\/\" > The Life and Death of Objective Peckham<\/a><\/li>\n<li><a href=\"https:\/\/www.transcend.org\/tms\/2015\/10\/the-drone-papers-target-africa-8-of-8\/\" > Target Africa<\/a><\/li>\n<li><a href=\"https:\/\/www.transcend.org\/tms\/2015\/10\/the-drone-papers-the-alphabet-of-assassination-9-glossary-of-terms\/\" >The Alphabet of Assassination (Glossary of Terms)<\/a><\/li>\n<\/ol>\n<p><em>The Obama administration has portrayed drones as an effective and efficient weapon in the ongoing war with al Qaeda and other radical groups. Yet classified Pentagon documents obtained by The Intercept reveal that the U.S. military has faced \u201ccritical shortfalls\u201d in the technology and intelligence it uses to find and kill suspected terrorists in Yemen and Somalia.<\/em><\/p>\n<p><em>15 Oct 2015 &#8211; <\/em>Those shortfalls stem from the remote geography of Yemen and Somalia and the limited American presence there. As a result, the U.S. military has been overly reliant on signals intelligence from computers and cellphones, and the quality of those intercepts has been limited by constraints on surveillance flights in the region.<\/p>\n<p>The documents are part of a <a target=\"_blank\" href=\"https:\/\/theintercept.com\/document\/2015\/10\/14\/small-footprint-operations-2-13\/\" >study<\/a> by a Pentagon Task Force on Intelligence, Surveillance, and Reconnaissance. They provide details about how targets were tracked for lethal missions carried out by the Joint Special Operations Command, or JSOC, in Yemen and Somalia between January 2011 and summer 2012. When the study was circulated in 2013, the Obama administration was publicly <a target=\"_blank\" href=\"https:\/\/www.washingtonpost.com\/world\/national-security\/obamas-new-drone-policy-has-cause-for-concern\/2013\/05\/25\/0daad8be-c480-11e2-914f-a7aba60512a7_story.html\" >floating<\/a> the idea of moving the bulk of its drone program to the Pentagon from the CIA, and the military was eager to make the case for more bases, more drones, higher video quality, and better eavesdropping equipment.<\/p>\n<p>Yet by identifying the challenges and limitations facing the military\u2019s \u201cfind, fix, finish\u201d operations in Somalia and Yemen \u2014 the cycle of gathering intelligence, locating, and attacking a target \u2014 the conclusions of the ISR study would seem to undermine the Obama administration\u2019s claims of a precise and effective campaign, and lend support to critics who have questioned the quality of intelligence used in drone strikes.<\/p>\n<p>The study made specific recommendations for improving operations in the Horn of Africa, but a Pentagon spokesperson, Cmdr. Linda Rojas, declined to explain what, if any, measures had been taken in response to the study\u2019s findings, saying only that \u201cas a matter of policy we don\u2019t comment on the details of classified reports.\u201d<\/p>\n<p><strong>The Tyranny of Distance<\/strong><\/p>\n<p><em>One of the most glaring problems identified in the ISR study was the U.S. military\u2019s inability to carry out full-time surveillance of its targets in the Horn of Africa and Yemen. Behind this problem lies the \u201c<a target=\"_blank\" href=\"https:\/\/theintercept.com\/document\/2015\/10\/14\/small-footprint-operations-2-13\/#page-6\" >tyranny of distance<\/a>\u201d \u2014 a reference to the great lengths that aircraft must fly to their targets from the main U.S. air base in Djibouti, the small East African nation that borders Somalia and sits just across the Gulf of Aden from Yemen.<\/em><\/p>\n<p>Surveillance flights are limited by fuel \u2014 and, in the case of manned aircraft, the endurance of pilots. In contrast with Iraq, where more than 80 percent of \u201cfinishing operations\u201d were conducted within 150 kilometers of an air base, the study notes that \u201cmost objectives in Yemen are ~ 500 km away\u201d from Djibouti and \u201cSomalia can be over 1,000 km.\u201d The result is that drones and planes can spend half their air time in transit, and not enough time conducting actual surveillance.<\/p>\n<div id=\"attachment_65556\" style=\"width: 549px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/10\/drone-papers-firing-blind1.jpg\" ><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-65556\" class=\"size-full wp-image-65556\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/10\/drone-papers-firing-blind1.jpg\" alt=\"A Pentagon chart showing that as of June 2012 manned spy planes accounted for the majority of flights over Yemen, even though drones were more efficient, since they could spend more time over a target. Over Somalia, the military used a mix of manned and unmanned aircraft. AP = Arabian Peninsula; EA = East Africa.\" width=\"539\" height=\"400\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/10\/drone-papers-firing-blind1.jpg 539w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/10\/drone-papers-firing-blind1-300x223.jpg 300w\" sizes=\"auto, (max-width: 539px) 100vw, 539px\" \/><\/a><p id=\"caption-attachment-65556\" class=\"wp-caption-text\">A Pentagon chart showing that as of June 2012 manned spy planes accounted for the majority of flights over Yemen, even though drones were more efficient, since they could spend more time over a target. Over Somalia, the military used a mix of manned and unmanned aircraft.<br \/>AP = Arabian Peninsula; EA = East Africa.<\/p><\/div>\n<p>Compounding the tyranny of distance, the ISR <a target=\"_blank\" href=\"https:\/\/theintercept.com\/document\/2015\/10\/14\/small-footprint-operations-2-13\/#page-16\" >study complained<\/a>, was the fact that JSOC had too few drones in the region to meet the requirements mandated for carrying out a finishing operation. The military measures surveillance flights in orbits \u2014 meaning continuous, unbroken coverage of a target \u2014 and JSOC chronically failed to meet \u201cminimum requirements\u201d for orbits over Yemen, and in the case of Somalia had never met the minimum standards. On average, 15 flights a day, by multiple aircraft relieving or complementing one another, were needed to complete three orbits over Yemen.<\/p>\n<p>The \u201csparse\u201d available resources meant that aircraft had to \u201ccover more potential leads \u2014 stretching coverage and leading to [surveillance] \u2018blinks.\u2019\u201d Because multiple aircraft needed to be \u201c<a target=\"_blank\" href=\"https:\/\/theintercept.com\/document\/2015\/10\/14\/small-footprint-operations-2-13\/#page-32\" >massed<\/a>\u201d over one target before a strike, surveillance of other targets temporarily ceased, thus breaking the military\u2019s ideal of a \u201cpersistent stare\u201d or the \u201c<a target=\"_blank\" href=\"http:\/\/www.dtic.mil\/doctrine\/docnet\/courses\/intelligence\/intel\/jfq_50_art-2.pdf\" >unblinking eye<\/a>\u201d of around-the-clock tracking.<\/p>\n<div id=\"attachment_65557\" style=\"width: 460px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/10\/drone-papers-firing-blind2.jpg\" ><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-65557\" class=\"size-full wp-image-65557\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/10\/drone-papers-firing-blind2.jpg\" alt=\"When the military was focused on a \u201cfinish\u201d \u2014 meaning kill \u2014 operation, drones were taken off the surveillance of other targets.\" width=\"450\" height=\"689\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/10\/drone-papers-firing-blind2.jpg 450w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/10\/drone-papers-firing-blind2-196x300.jpg 196w\" sizes=\"auto, (max-width: 450px) 100vw, 450px\" \/><\/a><p id=\"caption-attachment-65557\" class=\"wp-caption-text\">When the military was focused on a \u201cfinish\u201d \u2014 meaning kill \u2014 operation, drones were taken off the surveillance of other targets.<\/p><\/div>\n<p>JSOC <a target=\"_blank\" href=\"https:\/\/theintercept.com\/document\/2015\/10\/14\/small-footprint-operations-2-13\/#page-29\" >relied on manned spy planes<\/a> to fill the orbit gap over Yemen. In June 2012 there were six U-28 spy planes in operation in East Africa and the Arabian Peninsula, as well as several other types of manned aircraft. The U-28s in Djibouti were \u201creferred to as the \u2018Chiclet line,\u2019\u201d according to the ISR study, and \u201ccompounded Djiboutian air control issues\u201d because of their frequent flights.<\/p>\n<p>Only in the summer of 2012, with the addition of contractor-operated drones based in Ethiopia and Fire Scout unmanned helicopters, did Somalia have the minimum number of drones commanders wanted. The number of Predator drones stationed in Djibouti doubled over the course of the study, and in 2013, the fleet <a target=\"_blank\" href=\"https:\/\/www.washingtonpost.com\/world\/national-security\/drone-safety-concerns-force-us-to-move-large-fleet-from-camp-lemonnier-in-djibouti\/2013\/09\/24\/955518c4-213c-11e3-a03d-abbedc3a047c_story.html\" >was moved<\/a> from the main U.S. air base, Camp Lemonnier, to another Djibouti airstrip because of overcrowding and a string of crashes.<\/p>\n<p>\u201cBlinking\u201d remained a concern, however, and the study recommended adding even more aircraft to the area of operations. Noting that political and developmental issues hampered the military\u2019s ability to build new bases, it suggested expanding the use of aircraft launched from ships. JSOC <a target=\"_blank\" href=\"https:\/\/theintercept.com\/document\/2015\/10\/14\/small-footprint-operations-2-13\/#page-4\" >already made use<\/a> of Fire Scout helicopter drones and small Scan Eagle drones off the coast of Somalia, as well as \u201cArmada Sweep,\u201d which a 2011 document from the National Security Agency, provided by former contractor Edward Snowden, describes as a \u201cship-based collection system\u201d for electronic communications data. (The NSA declined to comment on Armada Sweep.)<\/p>\n<p>Lt. Gen. Michael Flynn, who was head of the Defense Intelligence Agency from July 2012 to August 2014, told <em>The Intercept<\/em> that the surveillance requirements he outlined for tracking al Qaeda while in office had never been met. \u201cWe end up spending money on other stupid things instead of actually the capabilities that we need,\u201d he said. \u201cThis is not just about buying more drones, it\u2019s a whole system that\u2019s required.\u201d<\/p>\n<p>According to Micah Zenko, a senior fellow at the Council on Foreign Relations who has closely studied the drone war, resource constraints in Africa \u201cmean less time for the persistent stare that counterterrorism analysts and commanders want, and got used to in the Afghanistan-Pakistan theater.\u201d<\/p>\n<p><strong>Find, Fix, Finish<\/strong><\/p>\n<p><em>The find, fix, finish cycle is known in the military as FFF, or F3. But just as critical are two other letters: E and A, for \u201cexploit and analyze,\u201d referring to the use of materials collected on the ground and in detainee interrogations.<\/em><\/p>\n<p>F3EA became doctrine in counterinsurgency campaigns in Iraq and Afghanistan in the mid-2000s. Gen. Stanley McChrystal wrote in his memoir that the simplicity of those \u201cfive words in a line \u2026 belied how profoundly it would drive our mission.\u201d In 2008, Flynn, who worked closely with McChrystal before becoming head of the Defense Intelligence Agency, <a target=\"_blank\" href=\"http:\/\/www.dtic.mil\/doctrine\/docnet\/courses\/intelligence\/intel\/jfq_50_art-2.pdf\" >wrote<\/a> that \u201c<em>Exploit-Analyze<\/em> starts the cycle over again by providing leads, or start points, into the network that could be observed and tracked using airborne ISR.\u201d<\/p>\n<p>Deadly strikes thus truncate the find, fix, finish cycle without exploitation and analysis \u2014 precisely the components that were lacking in the drone campaign waged in East Africa and Yemen. That shortfall points to one of the contradictions at the heart of the drone program in general: Assassinations are intelligence dead ends.<\/p>\n<p>The ISR study shows that after a \u201ckill operation\u201d there is typically nobody on the ground to collect written material or laptops in the target\u2019s house, or the phone on his body, or capture suspects and ask questions. Yet collection of on-the-ground intelligence of that sort \u2014 referred to as DOMEX, for \u201cdocument and media exploitation,\u201d and TIR, for \u201ctactical interrogation report\u201d \u2014 is invaluable for identifying future targets.<\/p>\n<div id=\"attachment_65558\" style=\"width: 710px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/10\/drone-papers-firing-blind3.jpg\" ><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-65558\" class=\"wp-image-65558\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/10\/drone-papers-firing-blind3-1024x792.jpg\" alt=\"A slide from a Pentagon study notes that deadly strikes in Yemen and Somalia reduce the amount of intelligence for future operations. AUMF = 2001 Authorization for Use of Military Force; FMV = Full Motion Video; F3EA = Find, Fix, Finish, Exploit, Analyze; HOA = Horn of Africa\" width=\"700\" height=\"541\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/10\/drone-papers-firing-blind3.jpg 1024w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/10\/drone-papers-firing-blind3-300x232.jpg 300w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/a><p id=\"caption-attachment-65558\" class=\"wp-caption-text\">A slide from a Pentagon study notes that deadly strikes in Yemen and Somalia reduce the amount of intelligence for future operations.<br \/> AUMF = 2001 Authorization for Use of Military Force; FMV = Full Motion Video; F3EA = Find, Fix, Finish, Exploit, Analyze; HOA = Horn of Africa<\/p><\/div>\n<p>Stating that 75 percent of operations in the region were strikes, and noting that \u201ckill operations significantly reduce the intelligence available from detainees and captured material,\u201d the study recommended an expansion of \u201ccapture finishes via host-nation partners for more \u2018finish-derived\u2019 intelligence.\u201d One of the problems with that scenario, however, is that security forces in host nations like Yemen and Somalia are profoundly unreliable and have been linked to a wide variety of abuses, including the torture of prisoners.<\/p>\n<p>A <a target=\"_blank\" href=\"http:\/\/www.stimson.org\/images\/uploads\/task_force_report_final_web_062414.pdf\" >report<\/a> last year by retired Gen. John Abizaid and former Defense Department official Rosa Brooks noted that the \u201cenormous uncertainties\u201d of drone warfare are \u201cmultiplied further when the United States relies on intelligence and other targeting information provided by a host nation government: How can we be sure we are not being drawn into a civil war or being used to target the domestic political enemies of the host state leadership?\u201d<\/p>\n<p>In 2011, for example, U.S. officials <a target=\"_blank\" href=\"http:\/\/www.wsj.com\/articles\/SB10001424052970203899504577126883574284126\" >told<\/a> the <em>Wall Street Journal<\/em> that they had killed a local governor because Yemeni officials didn\u2019t tell them he was present at a gathering of al Qaeda figures. \u201cWe think we got played,\u201d one official said. (The Yemeni government disputed the report.)<\/p>\n<p>Despite such warnings, the drone program has relied heavily on intelligence from other countries. One <a target=\"_blank\" href=\"https:\/\/theintercept.com\/document\/2015\/10\/14\/small-footprint-operations-2-13\/#page-9\" >slide<\/a> describes signals intelligence, or SIGINT, as coming \u201coften from foreign partners,\u201d and another, titled \u201c<a target=\"_blank\" href=\"https:\/\/theintercept.com\/document\/2015\/10\/14\/small-footprint-operations-2-13\/#page-14\" >Alternatives to Exploit\/Analyze<\/a>,\u201d states that \u201cin the reduced access environment, national intelligence partners often have the best information and access.\u201d<\/p>\n<div id=\"attachment_65559\" style=\"width: 534px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/10\/drone-papers-firing-blind4.jpg\" ><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-65559\" class=\"wp-image-65559 size-full\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/10\/drone-papers-firing-blind4.jpg\" alt=\"A slide from a Pentagon study notes that deadly strikes in Yemen and Somalia reduce the amount of intelligence for future operations. AUMF = 2001 Authorization for Use of Military Force; FMV = Full Motion Video; F3EA = Find, Fix, Finish, Exploit, Analyze; HOA = Horn of Africa\" width=\"524\" height=\"385\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/10\/drone-papers-firing-blind4.jpg 524w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/10\/drone-papers-firing-blind4-300x220.jpg 300w\" sizes=\"auto, (max-width: 524px) 100vw, 524px\" \/><\/a><p id=\"caption-attachment-65559\" class=\"wp-caption-text\">The military relies heavily on intelligence from electronic communications, much of it provided by foreign governments, but acknowledges that the information is \u201cneither as timely nor as focused as tactical intelligence.\u201d<\/p><\/div>\n<p>One way to increase the reliability of host-nation intelligence is to be directly involved in its collection \u2014 but this can be risky for soldiers on the ground. The study called for \u201cadvance force operations,\u201d including \u201csmall teams of special force advisors,\u201d to work with foreign forces to capture combatants, interrogate them, and seize any written material or electronic devices they possess. According to public Special Operations <a target=\"_blank\" href=\"http:\/\/www.dtic.mil\/doctrine\/new_pubs\/jp3_05.pdf\" >guidelines<\/a>, advance force operations \u201cprepare for near-term\u201d actions by planting tracking devices, conducting reconnaissance missions, and staging for attacks. The documents obtained by <em>The Intercept<\/em> did not specify an optimum number of advisors or where they should be based or how exactly they should be involved in capture or interrogation operations.<\/p>\n<p>Although the study dates from 2013, current Special Operations Commander Joseph Votel <a target=\"_blank\" href=\"http:\/\/aspensecurityforum.org\/wp-content\/uploads\/2015\/07\/A-Look-into-SOCOM.pdf\" >echoed <\/a>its findings in July 2015. Votel noted that his troops were working closely with African Union forces and the Somali government to battle al Shabaab. He added, \u201cWe get a lot more \u2026 when we actually capture somebody or we capture material than we do when we kill someone.\u201d<\/p>\n<div id=\"attachment_65560\" style=\"width: 710px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/10\/drone-papers-firing-blind5.jpg\" ><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-65560\" class=\"wp-image-65560\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/10\/drone-papers-firing-blind5-1024x585.jpg\" alt=\"A man walks past destroyed buildings in Zinjibar, capital of Abyan province in southern Yemen on Dec. 5, 2012. Photo: Sami-al-Ansi\/AFP\/Getty Images\" width=\"700\" height=\"400\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/10\/drone-papers-firing-blind5-1024x585.jpg 1024w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/10\/drone-papers-firing-blind5-300x171.jpg 300w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/10\/drone-papers-firing-blind5.jpg 1440w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/a><p id=\"caption-attachment-65560\" class=\"wp-caption-text\">A man walks past destroyed buildings in Zinjibar, capital of Abyan province in southern Yemen on Dec. 5, 2012.<br \/> Photo: Sami-al-Ansi\/AFP\/Getty Images<\/p><\/div>\n<p><strong>The Poverty of Signals Intelligence<\/strong><\/p>\n<p><em>With limited ability to conduct raids or seize materials from targeted individuals in Yemen and Somalia, JSOC relied overwhelmingly on monitoring electronic communications to discover and ultimately locate targets.<\/em><\/p>\n<p>The documents state bluntly that SIGINT is an inferior form of intelligence. Yet signals accounted for more than half the intelligence collected on targets, with much of it coming from foreign partners. The rest originated with human intelligence, primarily obtained by the CIA. \u201cThese sources,\u201d the study <a target=\"_blank\" href=\"https:\/\/theintercept.com\/document\/2015\/10\/14\/small-footprint-operations-2-13\/#page-9\" >notes<\/a>, \u201care neither as timely nor as focused as tactical intelligence\u201d from interrogations or seized materials.<\/p>\n<p>Making matters worse, the documents <a target=\"_blank\" href=\"https:\/\/theintercept.com\/document\/2015\/10\/14\/small-footprint-operations-2-13\/#page-9\" >refer to \u201cpoor\u201d and \u201climited\u201d<\/a> capabilities for collecting SIGINT, implying a double bind in which kill operations were reliant on sparse amounts of inferior intelligence.<\/p>\n<p>The disparity with other areas of operation was stark, as a chart contrasting cell data makes clear: In Afghanistan there were 8,900 cell data reports each month, versus 50 for Yemen and 160 for Somalia. Despite that, another chart shows SIGINT comprised more than half the data sources that went into developing targets in Somalia and Yemen in 2012.<\/p>\n<div id=\"attachment_65561\" style=\"width: 510px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/10\/drone-papers-firing-blind6.jpg\" ><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-65561\" class=\"size-full wp-image-65561\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/10\/drone-papers-firing-blind6.jpg\" alt=\"Cellphone data was critical for finding and identifying targets, yet a chart from a Pentagon study shows that the military had far less information in Yemen and Somalia than it was accustomed to having in Afghanistan. DOMEX = Document and Media Exploitation; GSM = Global System for Mobile communication; HOA = Horn of Africa; IIRs = Intelligence Information Reports; SIGINT = Signals Intelligence; TIRs = Tactical Interrogation Reports.\" width=\"500\" height=\"437\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/10\/drone-papers-firing-blind6.jpg 500w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/10\/drone-papers-firing-blind6-300x262.jpg 300w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/a><p id=\"caption-attachment-65561\" class=\"wp-caption-text\">Cellphone data was critical for finding and identifying targets, yet a chart from a Pentagon study shows that the military had far less information in Yemen and Somalia than it was accustomed to having in Afghanistan.<br \/>DOMEX = Document and Media Exploitation; GSM = Global System for Mobile communication; HOA = Horn of Africa; IIRs = Intelligence Information Reports; SIGINT = Signals Intelligence; TIRs = Tactical Interrogation Reports.<\/p><\/div>\n<p>Flynn told <em>The Intercept<\/em> there was \u201cway too much reliance on technical aspects [of intelligence], like signals intelligence, or even just looking at somebody with unmanned aerial vehicles.\u201d<\/p>\n<p>\u201cI could get on the telephone from somewhere in Somalia, and I know I\u2019m a high-value target, and say in some coded language, \u2018The wedding is about to occur in the next 24 hours,\u2019\u201d Flynn said. \u201cThat could put all of Europe and the United States on a high-level alert, and it may be just total bullshit. SIGINT is an easy system to fool and that\u2019s why it has to be validated by other INTs \u2014 like HUMINT. You have to ensure that the person is actually there at that location because what you really intercepted was the phone.\u201d<\/p>\n<p>In addition to using SIGINT to identify and find new targets, the documents <a target=\"_blank\" href=\"https:\/\/theintercept.com\/document\/2015\/10\/14\/small-footprint-operations-2-13\/#page-10\" >detail<\/a> how military analysts also relied on such intelligence to make sure that they had the correct person in their sights and to estimate the harm to civilians before a strike. After locating a target, usually by his cellphone or other electronics, analysts would study video feeds from surveillance aircraft \u201cto build near-certainty via identification of distinguishing physical characteristics.\u201d<\/p>\n<p>A British intelligence document on targeted killing in Afghanistan, which was among the Snowden files, describes a similar process of \u201cmonitoring a fixed location, and tracking any persons moving away from that location, and identifying if a similar pattern is experienced through SIGINT collect.\u201d The document explains that \u201cother visual indicators may be used to aid the establishment of [positive identification]\u201d including \u201cdescription of clothing\u201d or \u201cgait.\u201d After a shot, according to the British document and case studies in the Pentagon\u2019s ISR report, drones would hover to determine if their target had been hit, collecting video and evidence of whether the cellphone had been eliminated. (The British intelligence agency, GCHQ, declined to comment on the document.)<\/p>\n<div id=\"attachment_65562\" style=\"width: 710px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/10\/drone-papers-firing-blind7.jpg\" ><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-65562\" class=\"wp-image-65562\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/10\/drone-papers-firing-blind7-1024x794.jpg\" alt=\"A chart comparing the surveillance capabilities of the various drones and aircraft flying over Yemen and Somalia in 2012. APG = Aerial Precision Geolocation; DNR COMINT = Dial Network Recognition Communications Intelligence; ISR = Intelligence, Surveillance, and Reconnaissance; FMV = Full Motion Video; PTT COMINT = Push-to-Talk Communications Intelligence.\" width=\"700\" height=\"543\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/10\/drone-papers-firing-blind7.jpg 1024w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/10\/drone-papers-firing-blind7-300x233.jpg 300w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/a><p id=\"caption-attachment-65562\" class=\"wp-caption-text\">A chart comparing the surveillance capabilities of the various drones and aircraft flying over Yemen and Somalia in 2012.<br \/> APG = Aerial Precision Geolocation; DNR COMINT = Dial Network Recognition Communications Intelligence; ISR = Intelligence, Surveillance, and Reconnaissance; FMV = Full Motion Video; PTT COMINT = Push-to-Talk Communications Intelligence.<\/p><\/div>\n<p>Yet according to the ISR study, the military faced \u201ccritical shortfalls of capabilities\u201d in the technologies enabling that kind of precise surveillance and post-strike assessment. At the time of the study, only some of the Reaper drones had high-definition video, and most of the aircraft over the region lacked the ability to collect \u201cdial number recognition\u201d data.<\/p>\n<p>The study cites these shortcomings as an explanation for the low rate of successful strikes against the targets on the military\u2019s kill list in Yemen and Somalia, especially in comparison with Iraq and Afghanistan. It presents the failings primarily as an issue of efficiency, with little mention of the possible consequence of bad intelligence leading to killing the wrong people.<\/p>\n<p>______________________________<\/p>\n<p><em>Additional reporting: <a target=\"_blank\" href=\"https:\/\/theintercept.com\/staff\/jeremy-scahill\/\" >Jeremy Scahill<\/a><\/em><\/p>\n<p><em>Contact the authors:<\/em><\/p>\n<p><em><a target=\"_blank\" href=\"https:\/\/theintercept.com\/staff\/cora\/\" >Cora Currier<\/a> &#8211; <u><a href=\"mailto:cora.currier@\u200btheintercept.com\">cora.currier@\u200btheintercept.com<\/a><\/u> <\/em><\/p>\n<p><em><a target=\"_blank\" href=\"https:\/\/theintercept.com\/staff\/peter-maass\/\" >Peter Maass<\/a> &#8211; <u><a href=\"mailto:peter.maass@\u200btheintercept.com\">peter.maass@\u200btheintercept.com<\/a><\/u> <\/em><\/p>\n<p><a target=\"_blank\" href=\"https:\/\/theintercept.com\/drone-papers\/firing-blind\/\" >Go to Original \u2013 theintercept.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Flawed Intelligence and the Limits of Drone Technology<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[197],"tags":[],"class_list":["post-65555","post","type-post","status-publish","format-standard","hentry","category-special-feature"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/65555","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=65555"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/65555\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=65555"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=65555"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=65555"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}