{"id":79374,"date":"2016-09-12T12:00:39","date_gmt":"2016-09-12T11:00:39","guid":{"rendered":"https:\/\/www.transcend.org\/tms\/?p=79374"},"modified":"2016-09-11T17:14:07","modified_gmt":"2016-09-11T16:14:07","slug":"inside-menwith-hill-the-nsas-british-base-at-the-heart-of-u-s-targeted-killing","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2016\/09\/inside-menwith-hill-the-nsas-british-base-at-the-heart-of-u-s-targeted-killing\/","title":{"rendered":"Inside Menwith Hill: The NSA\u2019s British Base at the Heart of U.S. Targeted Killing"},"content":{"rendered":"<p><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2016\/09\/06\/a-base-britanica-da-nsa-no-coracao-do-programa-de-assassinatos-seletivos-dos-eua\/\" >Leia em portugu\u00eas \u27f6<\/a><\/p>\n<p><em>6 Sep 2016 &#8211; <\/em>The narrow roads are quiet and winding, surrounded by rolling green fields and few visible signs of life beyond the occasional herd of sheep. But on the horizon, massive white golf ball-like domes protrude from the earth, protected behind a perimeter fence that is topped with piercing razor wire. Here, in the heart of the tranquil English countryside, is the National Security Agency\u2019s largest overseas spying base.<\/p>\n<p>Once known only by the code name Field Station 8613, the secret base \u2014 now called Menwith Hill Station \u2014 is located about nine miles west of the small town of Harrogate in North Yorkshire. Originally used to monitor Soviet communications through the Cold War, its focus has since dramatically shifted, and today it is a vital part of the NSA\u2019s sprawling global surveillance network.<\/p>\n<p>For years, journalists and researchers have speculated about what really goes on inside Menwith Hill, while human rights groups and some politicians have campaigned for more transparency about\u00a0its activities. Yet the British government has steadfastly refused to comment, citing a longstanding policy not to discuss matters related to national security.<\/p>\n<p>Now, however, top-secret documents obtained by <em>The Intercept<\/em> offer an unprecedented glimpse behind Menwith Hill\u2019s razor wire fence. The files reveal for the first time how the NSA has used the British base to aid \u201ca significant number of capture-kill operations\u201d across the Middle East and North Africa, fueled by powerful eavesdropping technology that can harvest data from\u00a0more than 300 million emails and phone calls a day.<\/p>\n<p>Over the past decade, the documents show, the NSA has pioneered groundbreaking new spying programs at Menwith Hill to pinpoint the locations of suspected terrorists accessing the internet in remote parts of the world. The programs \u2014 with names such as GHOSTHUNTER and GHOSTWOLF \u2014 have provided support for conventional British and American military operations in Iraq and Afghanistan. But they have also aided covert missions in countries where the U.S. has not declared war. NSA employees at Menwith Hill have collaborated on a project to help \u201celiminate\u201d terrorism targets in Yemen, for example, where the U.S. has waged a controversial drone bombing campaign that has resulted in dozens of civilian deaths.<\/p>\n<p>The disclosures about Menwith Hill raise new questions about the extent of British complicity in U.S. drone strikes and other so-called targeted killing missions, which may in some cases have violated international laws or constituted war crimes. Successive U.K. governments have publicly stated that all activities at the base are carried out with the \u201cfull knowledge and consent\u201d of British officials.<\/p>\n<p>The revelations are \u201cyet another example of the unacceptable level of secrecy that surrounds U.K. involvement in the U.S. \u2018targeted killing\u2019 program,\u201d Kat Craig, legal director of London-based human rights group <a target=\"_blank\" href=\"http:\/\/www.reprieve.org.uk\/\" >Reprieve<\/a>, told <em>The Intercept<\/em>.<\/p>\n<p>\u201cIt is now imperative that the prime minister comes clean about U.K. involvement in targeted killing,\u201d Craig said, \u201cto ensure that British personnel and resources are not implicated in illegal and immoral activities.\u201d<\/p>\n<p>The British government\u2019s Ministry of Defence, which handles media inquires related to Menwith Hill, declined to comment for this story.<\/p>\n<p>The NSA referred a request for comment to the Director of National Intelligence\u2019s office.<\/p>\n<p>Richard Kolko, a spokesperson for the DNI, said in a statement: \u201cThe men and women serving the intelligence community safeguard U.S. national security by collecting information, conducting analysis, and providing intelligence for informed decision making under a strict set of laws, policies and guidelines. This mission protects our nation and others around the world.\u201d<\/p>\n<div id=\"attachment_79375\" style=\"width: 710px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/MenwithHill_03-surveillance-spy-big-brother-usa-uk-nsa-gchq.jpg\" ><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-79375\" class=\"wp-image-79375\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/MenwithHill_03-surveillance-spy-big-brother-usa-uk-nsa-gchq-1024x683.jpg\" alt=\"Menwith Hill on March 11, 2014. Photo: Trevor Paglen\" width=\"700\" height=\"467\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/MenwithHill_03-surveillance-spy-big-brother-usa-uk-nsa-gchq-1024x683.jpg 1024w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/MenwithHill_03-surveillance-spy-big-brother-usa-uk-nsa-gchq-300x200.jpg 300w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/MenwithHill_03-surveillance-spy-big-brother-usa-uk-nsa-gchq-768x512.jpg 768w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/MenwithHill_03-surveillance-spy-big-brother-usa-uk-nsa-gchq.jpg 1440w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/a><p id=\"caption-attachment-79375\" class=\"wp-caption-text\">Menwith Hill on March 11, 2014.<br \/> Photo: Trevor Paglen<\/p><\/div>\n<p>The equipment at Menwith Hill covers\u00a0roughly\u00a0one square mile, which is patrolled 24 hours a day by armed British military police and monitored by cameras perched on posts that peer down on almost every section of the 10-foot perimeter fence.<\/p>\n<p>Most visible from the outside are a cluster of about 30 of the giant white domes. But the site also houses a self-contained community, accessible only to those with security clearance. Among operations buildings in which analysts listen in on monitored conversations, there is a bowling alley, a small pool hall, a bar, a fast food restaurant, and a general store.<\/p>\n<p>Most of the world\u2019s international phone calls, internet traffic, emails, and other communications are sent over a network of undersea cables that connect countries like giant arteries. At spy outposts across the world, the NSA and its partners tap into these cables to monitor the data flowing through\u00a0them. But Menwith Hill is focused on a different kind of surveillance: eavesdropping on communications as they are being transmitted through the air.<\/p>\n<p>According to top-secret documents obtained by <em>The Intercept<\/em> from NSA whistleblower Edward Snowden, Menwith Hill has two main spying capabilities. The first is called FORNSAT, which uses powerful antennae contained within the golf ball-like domes to eavesdrop on communications as they are being beamed between foreign satellites. The second is called OVERHEAD, which uses U.S. government satellites orbiting above targeted countries to locate and monitor wireless communications on the ground below \u2014 such as cellphone calls and even WiFi traffic.<\/p>\n<div id=\"attachment_79376\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/MenwithHill_03-surveillance-spy-big-brother-usa-uk-nsa-gchq2.jpg\" ><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-79376\" class=\"wp-image-79376\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/MenwithHill_03-surveillance-spy-big-brother-usa-uk-nsa-gchq2-1024x625.jpg\" alt=\"A spy satellite launched in 2009 and operated from Menwith Hill. Its role was to intercept communications flowing across \u201ccommercial satellite uplinks,\u201d according to NSA documents.\" width=\"600\" height=\"366\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/MenwithHill_03-surveillance-spy-big-brother-usa-uk-nsa-gchq2-1024x625.jpg 1024w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/MenwithHill_03-surveillance-spy-big-brother-usa-uk-nsa-gchq2-300x183.jpg 300w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/MenwithHill_03-surveillance-spy-big-brother-usa-uk-nsa-gchq2-768x469.jpg 768w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><p id=\"caption-attachment-79376\" class=\"wp-caption-text\">A spy satellite launched in 2009 and operated from Menwith Hill. Its role was to intercept communications flowing across \u201ccommercial satellite uplinks,\u201d according to NSA documents.<\/p><\/div>\n<p>In the late 1980s, international communication networks were revolutionized by new fiber-optic undersea cables. The technology was cheaper than satellites and could transmit data across the world much faster than ever before, at almost the speed of light. For this reason, according to the NSA\u2019s documents, in the mid-1990s the U.S. intelligence community was convinced that satellite communications would soon become obsolete, to be fully replaced by fiber-optic cable networks.<\/p>\n<p>But the prediction proved to be wrong. And millions of phone calls are still beamed between satellites today, alongside troves of internet data, which the NSA has readily exploited at Menwith Hill.<\/p>\n<p>\u201cThe commercial satellite communication business is alive and well and bursting at the seams with increasingly sophisticated bulk DNI (Digital Network Intelligence) traffic that is largely unencrypted,\u201d the NSA reported in a <a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/3089505-Too-much-of-a-good-thing.html\" >2006 document<\/a>. \u201cThis data source alone provides more data for Menwith Hill analysts to sift through than our entire enterprise had to deal with in the not-so-distant past.\u201d<\/p>\n<p style=\"padding-left: 30px;\"><strong><em>The U.S. and U.K. governments have actively misled the public for years through a \u201ccover story.\u201d<\/em><\/strong><\/p>\n<p>As of 2009, Menwith Hill\u2019s foreign satellite surveillance mission, code-named MOONPENNY, was monitoring 163 different satellite data links. The intercepted communications were funneled into a variety of <a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/3089493-MHS-Databases-as-of-14-Aug-2008.html\" >different repositories<\/a> storing phone calls, text messages, emails, internet browsing histories, and other data.<\/p>\n<p>It is not clear precisely how many communications Menwith Hill is capable of tapping into at any one time, but the NSA\u2019s <a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/3089532-Elegant-Chaos-collect-it-all-exploit-it-all.html\" >documents indicate<\/a> the number is extremely large. In a single 12-hour period in May 2011, for instance, its surveillance systems logged more than 335 million metadata records, which reveal information such as the sender and recipient of an email, or the phone numbers someone called and at what time.<\/p>\n<p>To keep information about Menwith Hill\u2019s surveillance role secret, the U.S. and U.K. governments have actively misled the public for years through a \u201ccover story\u201d portraying the base as a facility used to provide \u201crapid radio relay and conduct communications research.\u201d A classified U.S. document, dated from 2005, <a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/3089521-Menwith-satellite-classification-guide.html\" >cautioned<\/a> spy agency employees against revealing the truth. \u201cIt is important to know the established cover story for MHS [Menwith Hill Station] and to protect the fact that MHS is an intelligence collection facility,\u201d the document stated. \u201cAny reference to satellites being operated or any connection to intelligence gathering is strictly prohibited.\u201d<\/p>\n<div id=\"attachment_79377\" style=\"width: 510px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/MenwithHill_03-surveillance-spy-big-brother-usa-uk-nsa-gchq3.jpg\" ><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-79377\" class=\"wp-image-79377\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/MenwithHill_03-surveillance-spy-big-brother-usa-uk-nsa-gchq3-1024x683.jpg\" alt=\"Menwith Hill Station on March 11, 2014. Photo: Trevor Paglen\" width=\"500\" height=\"333\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/MenwithHill_03-surveillance-spy-big-brother-usa-uk-nsa-gchq3-1024x683.jpg 1024w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/MenwithHill_03-surveillance-spy-big-brother-usa-uk-nsa-gchq3-300x200.jpg 300w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/MenwithHill_03-surveillance-spy-big-brother-usa-uk-nsa-gchq3-768x512.jpg 768w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/MenwithHill_03-surveillance-spy-big-brother-usa-uk-nsa-gchq3.jpg 1440w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/a><p id=\"caption-attachment-79377\" class=\"wp-caption-text\">Menwith Hill Station on March 11, 2014.<br \/> Photo: Trevor Paglen<\/p><\/div>\n<p>The outpost was built in the 1950s as part of a deal made by the British and American governments to house U.S. personnel and surveillance equipment. In its early days, Menwith Hill\u2019s technology was much more primitive. According to Kenneth Bird, who worked at the base in the 1960s during the Cold War, it was focused then on monitoring high frequency radio signals in Eastern Europe. Intercepted conversations were recorded on Ampex tape recorders, Bird noted in his published 1997 account, with some transcribed by analysts in real-time using typewriters.<\/p>\n<p>The modern Menwith Hill is a very different place. Now, not only are its spying systems capable of vacuuming up far more communications, but they also have a far broader geographic reach. In addition, the targets of the surveillance have drastically changed, as have the purposes for which the eavesdropping is carried out.<\/p>\n<p>The documents obtained by <em>The Intercept<\/em> <a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/3089521-Menwith-satellite-classification-guide.html\" >reveal<\/a> that spy satellites operated at Menwith Hill today can target communications in China and Latin America, and also provide \u201ccontinuous coverage of the majority of the Eurasian landmass,\u201d where they intercept \u201ctactical military, scientific, political, and economic communications signals.\u201d But perhaps the most significant role the base has played in recent years has been in the Middle East and North Africa.<\/p>\n<p>Especially in remote parts of the world where there are no fiber-optic cable links, it is common for internet connections and phone calls to be routed over satellite. Consequently, Menwith Hill became a vital asset in the U.S. government\u2019s counterterrorism campaign after the 9\/11 attacks. Since then, the base has been used extensively to tap into communications in otherwise hard-to-reach areas where Islamic extremist groups such as al Qaeda and al Shabaab have been known to operate \u2014 for example, in the Afghanistan-Pakistan border region, Somalia, and Yemen.<\/p>\n<div id=\"attachment_79378\" style=\"width: 710px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/MenwithHill_03-surveillance-spy-big-brother-usa-uk-nsa-gchq4.jpg\" ><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-79378\" class=\"wp-image-79378\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/MenwithHill_03-surveillance-spy-big-brother-usa-uk-nsa-gchq4.jpg\" alt=\"An aerial image captured by a U.S. satellite in support of a covert GHOSTHUNTER operation.\" width=\"700\" height=\"541\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/MenwithHill_03-surveillance-spy-big-brother-usa-uk-nsa-gchq4.jpg 1000w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/MenwithHill_03-surveillance-spy-big-brother-usa-uk-nsa-gchq4-300x232.jpg 300w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/MenwithHill_03-surveillance-spy-big-brother-usa-uk-nsa-gchq4-768x594.jpg 768w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/a><p id=\"caption-attachment-79378\" class=\"wp-caption-text\">An aerial image captured by a U.S. satellite in support of a covert GHOSTHUNTER operation.<\/p><\/div>\n<p>Crucially, however, Menwith Hill has been used for more than just gathering intelligence on people and governments across countries in the Middle East and North Africa. Surveillance tools such as the GHOSTHUNTER system were developed to directly aid military operations, pinpointing the locations of targeted people or groups so that they could then be captured or killed.<\/p>\n<p>The NSA\u2019s documents describe GHOSTHUNTER as a means \u201cto locate targets when they log onto the internet.\u201d It was first developed in 2006 as \u201cthe only capability of its kind\u201d and it <a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/3089509-APPARITION-becomes-a-reality-new-corporate-VSAT.html\" >enabled<\/a> \u201ca significant number of capture-kill operations\u201d against alleged terrorists. Only a few specific examples are given, but those cases give a remarkable insight into the extraordinary power of the technology.<\/p>\n<p>In 2007, for instance, analysts at Menwith Hill used GHOSTHUNTER to help track down a suspected al Qaeda \u201cfacilitator\u201d in Lebanon who was described as \u201chighly actionable,\u201d meaning he had been deemed a legitimate target to kill or capture. The location of the target \u2014 who was known by several names, including Abu Sumayah \u2014 was traced to within a few hundred meters based on intercepts of his communications. Then a spy satellite took an aerial photograph of the neighborhood in Sidon, south Lebanon, in which he was believed to be living, mapping out the surrounding streets and houses. A top-secret document detailing the surveillance indicates that the information was to be passed to a secretive special operations unit known as Task Force 11-9, which would have been equipped to conduct a covert raid to kill or capture Sumayah. The outcome of the operation, however, is unclear, as it is not revealed in the document.<\/p>\n<p>In another case in 2007, GHOSTHUNTER was used to identify an alleged al Qaeda \u201cweapons procurer\u201d in Iraq named Abu Sayf. The NSA\u2019s surveillance systems spotted Sayf logging into Yahoo email or messenger accounts at an internet cafe near a mosque in Anah, a town on the Euphrates River that is about 200 miles northwest of Baghdad. Analysts at Menwith Hill used GHOSTHUNTER to track down his location and spy satellites operated from the British base captured aerial images. This information was passed to U.S. military commanders based in Fallujah to be included as part of a \u201ctargeting plan.\u201d<\/p>\n<p>A few days later, a special operations unit named Task Force-16 stormed two properties, where they detained Sayf, his father, two brothers, and five associates.<\/p>\n<p>By 2008, the apparent popularity of GHOSTHUNTER within the intelligence community meant that it was rolled out at other surveillance bases where NSA has a presence, including in Ayios Nikolaos, Cyprus, and Misawa, Japan. The expansion of the capability to the other bases meant that it now had \u201cnear-global coverage.\u201d But Menwith Hill remained its most important surveillance site. \u201c[Menwith Hill] still supplies about 99% of the FORNSAT data used in GHOSTHUNTER geolocations,\u201d <a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/3089498-Ghosthunter-future-capabilities-2008.html\" >noted<\/a> a January 2008 document about the program.<\/p>\n<p>A 2009 document <a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/3089512-Ghosthunter-and-the-geolocating-of-internet-cafes.html\" >added<\/a> that GHOSTHUNTER\u2019s focus was at that time \u201con geolocation of internet caf\u00e9s in the Middle East\/North Africa region in support of U.S. military operations\u201d and said that it had to date \u201csuccessfully geolocated over 5,000 VSAT terminals in Iraq, Afghanistan, Syria, Lebanon, and Iran.\u201d VSAT, or Very Small Aperture Terminal, is a satellite system commonly used by internet caf\u00e9s and foreign governments in the Middle East to send and receive communications and data. GHOSTHUNTER could also home in on VSATs in Pakistan, Somalia, Algeria, the Philippines, Mali, Kenya, and Sudan, the documents indicate.<\/p>\n<p>Menwith Hill\u2019s unique ability to track down satellite devices across the world at times placed it on the front line of conflicts thousands of miles away. In Afghanistan, for instance, analysts at the base used the VSAT surveillance to help track down suspected members of the Taliban, which led to \u201capproximately 30 enemy killed\u201d during one series of attacks that were <a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/3089519-Afghanistan-30-enemy-killed-Jan-Feb-2012.html\" >mentioned<\/a> in a top-secret July 2011 report. In early 2012, Menwith Hill\u2019s analysts were again called upon to track down a VSAT: this time, to assist British special forces in Afghanistan\u2019s Helmand Province. The terminal was swiftly located, and within an hour an MQ-9 Reaper drone was dispatched to the area, presumably to launch an airstrike.<\/p>\n<p>But the lethal use of the surveillance data does not appear to have been restricted to conventional war zones such as Afghanistan or Iraq. The NSA developed similar methods at Menwith Hill to track down terror suspects in Yemen, where the U.S. has waged a covert drone war against militants associated with al Qaeda in the Northern Peninsula.<\/p>\n<p>In early 2010, the agency revealed in an <a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/3089514-New-technique-geolocates-targets-active-at.html\" >internal report<\/a> that it had launched a new technique at the British base to identify many targets \u201cat almost 40 different geolocated internet caf\u00e9s\u201d in Yemen\u2019s Shabwah province and in the country\u2019s capital, Sanaa. The technique, the document revealed, was linked to a broader classified initiative called GHOSTWOLF, described as a project to \u201ccapture or eliminate key nodes in terrorist networks\u201d by focusing primarily on \u201cproviding actionable geolocation intelligence derived from [surveillance] to customers and their operational components.\u201d<\/p>\n<p>The description of GHOSTWOLF ties Menwith Hill to lethal operations in Yemen, providing the first documentary evidence that directly implicates the U.K. in covert actions in the country.<\/p>\n<div id=\"attachment_79379\" style=\"width: 710px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/MenwithHill_03-surveillance-spy-big-brother-usa-uk-nsa-gchq5.jpg\" ><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-79379\" class=\"wp-image-79379\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/MenwithHill_03-surveillance-spy-big-brother-usa-uk-nsa-gchq5-1024x549.jpg\" alt=\"Menwith Hill, March 13, 2013. Photo: Trevor Paglen\" width=\"700\" height=\"375\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/MenwithHill_03-surveillance-spy-big-brother-usa-uk-nsa-gchq5-1024x549.jpg 1024w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/MenwithHill_03-surveillance-spy-big-brother-usa-uk-nsa-gchq5-300x161.jpg 300w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/MenwithHill_03-surveillance-spy-big-brother-usa-uk-nsa-gchq5-768x412.jpg 768w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/MenwithHill_03-surveillance-spy-big-brother-usa-uk-nsa-gchq5.jpg 1440w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/a><p id=\"caption-attachment-79379\" class=\"wp-caption-text\">Menwith Hill, March 13, 2013.<br \/> Photo: Trevor Paglen<\/p><\/div>\n<p>Menwith Hill\u2019s previously undisclosed role aiding the so-called targeted killing of terror suspects highlights the extent of the British government\u2019s apparent complicity in controversial U.S. attacks \u2014 and raises questions about the legality of the secret operations carried out from the base.<\/p>\n<p>There are some 2,200 personnel at Menwith Hill, the majority of whom are Americans. Alongside NSA employees within the complex, the U.S. National Reconnaissance Office also has a major presence at the site, running its own \u201cground station\u201d from which it controls a number of spy satellites.<\/p>\n<p>But the British government has publicly asserted as recently as 2014 that operations at the base \u201chave always been, and continue to be\u201d carried out with its \u201cknowledge and consent.\u201d Moreover, roughly 600 of the personnel at the facility are from U.K. agencies, including employees of the NSA\u2019s British counterpart Government Communications Headquarters, or GCHQ.<\/p>\n<p>For several years, British human rights campaigners and lawmakers have been pressuring the government to provide information about whether it has had any role aiding U.S. targeted killing operations, yet they have been met with silence. In particular, there has been an attempt to establish whether the U.K. has aided U.S. drone bombings outside of declared war zones \u2014 in countries including Yemen, Pakistan, and Somalia\u00a0\u2014 which have resulted in the deaths of hundreds of civilians and are in some cases considered by United Nations officials to possibly constitute war crimes and violations of international law.<\/p>\n<p>Though the Snowden documents analyzed by <em>The Intercept<\/em> state that Menwith Hill has aided \u201ca significant number\u201d of \u201ccapture-kill\u201d operations, they do not reveal specific details about all of the incidents that resulted in fatalities. What is clear, however, is that the base has targeted countries such as Yemen, Pakistan, and Somalia as part of location-tracking programs like GHOSTHUNTER and GHOSTWOLF \u2014 which were created to help pinpoint individuals so they could be captured or killed \u2014 suggesting it has played a part in drone strikes in these countries.<\/p>\n<p style=\"padding-left: 30px;\"><strong><em>\u201cAn individual involved in passing that information is likely to be an accessory to murder.\u201d<\/em><\/strong><\/p>\n<p>Craig, the legal director at Reprieve, reviewed the Menwith Hill documents \u2014 and said that they indicated British complicity in covert U.S. drone attacks. \u201cFor years, Reprieve and others have sought clarification from the British government about the role of U.K. bases in the U.S. covert drone program, which has killed large numbers of civilians in countries where we are not at war,\u201d she told <em>The Intercept<\/em>. \u201cWe were palmed off with platitudes and reassured that any U.S. activities on or involving British bases were fully compliant with domestic and international legal provisions. It now appears that this was far from the truth.\u201d<\/p>\n<p>Jemima Stratford QC, a leading British human rights lawyer, told <em>The Intercept<\/em> that there were \u201cserious questions to be asked and serious arguments to be made\u201d about the legality of the lethal operations aided from Menwith Hill. The operations, Stratford said, could have violated the <a target=\"_blank\" href=\"http:\/\/rightsinfo.org\/the-rights-in-the-european-convention\/\" >European Convention on Human Rights<\/a>, an international treaty that the U.K. still remains bound to despite its recent vote to leave the European Union. Article 2\u00a0of the Convention protects the \u201cright to life\u201d and states that \u201cno one shall be deprived of his life intentionally\u201d except when it is ordered by a court as a punishment for a crime.<\/p>\n<p>Stratford has previously warned that if British officials have facilitated covert U.S. drone strikes outside of declared war zones, they could even be implicated in murder. In 2014, she advised members of the U.K. Parliament that because the U.S. is not at war with countries such as Yemen or Pakistan, in the context of English and international law, the individuals who are targeted by drones in these countries are not \u201ccombatants\u201d and their killers are not entitled to \u201ccombatant immunity.\u201d<\/p>\n<p>\u201cIf the U.K. government knows that it is transferring data that may be used for drone strikes against non-combatants \u2026 that transfer is probably unlawful,\u201d Stratford <a target=\"_blank\" href=\"http:\/\/www.tom-watson.co.uk\/wp-content\/uploads\/2014\/01\/APPG-Final.pdf\" >told<\/a> the members of Parliament. \u201cAn individual involved in passing that information is likely to be an accessory to murder.\u201d<\/p>\n<p>GCHQ refused to answer questions for this story, citing a \u201clong standing policy that we do not comment on intelligence matters.\u201d A spokesperson for the agency issued a generic statement asserting that \u201call of GCHQ\u2019s work is carried out in accordance with a strict legal and policy framework, which ensures that our activities are authorised, necessary and proportionate, and that there is rigorous oversight.\u201d The spokesperson insisted that \u201cU.K.\u2019s interception regime is entirely compatible with the European Convention on Human Rights.\u201d<\/p>\n<div id=\"attachment_79380\" style=\"width: 710px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/MenwithHill_03-surveillance-spy-big-brother-usa-uk-nsa-gchq6.jpg\" ><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-79380\" class=\"wp-image-79380\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/MenwithHill_03-surveillance-spy-big-brother-usa-uk-nsa-gchq6-1024x769.jpg\" alt=\"A Gate at Menwith Hill Station prohibiting entrance on March 12, 2014. Photo: Trevor Paglen\" width=\"700\" height=\"525\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/MenwithHill_03-surveillance-spy-big-brother-usa-uk-nsa-gchq6-1024x769.jpg 1024w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/MenwithHill_03-surveillance-spy-big-brother-usa-uk-nsa-gchq6-300x225.jpg 300w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/MenwithHill_03-surveillance-spy-big-brother-usa-uk-nsa-gchq6-768x577.jpg 768w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/MenwithHill_03-surveillance-spy-big-brother-usa-uk-nsa-gchq6.jpg 1440w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/a><p id=\"caption-attachment-79380\" class=\"wp-caption-text\">A Gate at Menwith Hill Station prohibiting entrance on March 12, 2014.<br \/> Photo: Trevor Paglen<\/p><\/div>\n<p>In February 2014, the U.S. Department of Defense announced after a review that it was planning to reduce personnel at Menwith Hill by 2016, with about 500 service members and civilians set to be removed from the site. A U.S. Air Force spokesperson told the military newspaper <em><a target=\"_blank\" href=\"http:\/\/www.stripes.com\/technology-led-to-decision-to-cut-menwith-hill-personnel-1.270251\" >Stars and Stripes<\/a><\/em> that the decision was based on technological advances, which he declined to discuss, though he mentioned improvements in \u201cserver capacity to the hardware that we\u2019re using; we\u2019re doing more with less.\u201d<\/p>\n<p>The documents provided by Snowden shine light on some of the specific technological changes. Most notably, they show that there has been significant investment in introducing new and more sophisticated mass surveillance systems at Menwith Hill in recent years. A crucial moment came in 2008, when then-NSA Director Keith Alexander introduced a radical shift in policy. Visiting Menwith Hill in June that year, Alexander set a challenge for employees at the base. \u201cWhy can\u2019t we collect all the signals, all the time?\u201d he <a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/3089503-MHS-initiatives-maximizing-our-access.html\" >said<\/a>, according to NSA documents. \u201cSounds like a good summer homework project for Menwith.\u201d<\/p>\n<p>As a result, a new \u201ccollection posture\u201d was introduced at the base, the aim being to \u201ccollect it all, process it all, exploit it all.\u201d In other words, it would vacuum up as many communications within its reach as technologically possible.<\/p>\n<p>Between 2009 and 2012, Menwith Hill spent more than $40 million on\u00a0a massive new 95,000-square-foot operations building \u2014 nearly twice the size of an average American football field. A large chunk of this space \u2014 10,000 square feet \u2014 was set aside for a data center that boasted the ability to store huge troves of intercepted communications. During the renovations, the NSA shipped in new computer systems and laid 182 miles of cables, enough to stretch from New York City to the outskirts of Boston. The agency also had a 200-seat-capacity auditorium constructed to host classified operations meetings and other events.<\/p>\n<p style=\"padding-left: 30px;\"><strong><em>\u201cHow can Menwith carry out operations of which there is absolutely no accountability to the public?\u201d<\/em><\/strong><\/p>\n<p>Some of the extensive expansion work was visible from the road outside the secure complex, which triggered protests from a local activist group called the Campaign for the Accountability of American Bases. Since the early 1990s, the group has closely monitored activities at Menwith Hill. And for the last 16 years, its members have held a small demonstration every Tuesday outside the base\u2019s main entrance, greeting NSA employees with flags and colorful homemade banners bearing slogans critical of U.S. foreign policy and drone strikes.<\/p>\n<p>Fabian Hamilton, a member of Parliament based in the nearby city of Leeds, has become a supporter of the campaign\u2019s work, occasionally attending events organized by the group and advocating for more transparency at Menwith Hill. Hamilton, who represents the Labour Party, has doggedly attempted to find out basic information about the base, asking the government at least 40 parliamentary questions since 2010 about its activities. He has sought clarification on a variety of issues, such as how many U.S. personnel are stationed at the site, whether it is involved in conducting drone strikes, and whether members of a British parliamentary oversight committee have been given full access to review its operations. But his efforts have been repeatedly stonewalled, with British government officials refusing to provide any details on the grounds of national security.<\/p>\n<p>Hamilton told <em>The Intercept<\/em>\u00a0that he found the secrecy shrouding Menwith Hill to be \u201coffensive.\u201d The revelations about the role it has played in U.S. killing and capture operations, he said, showed there needed to be a full review of its operations. \u201cAny nation-state that uses military means to attack any target, whether it is a terrorist, whether it is legitimate or not, has to be accountable to its electorate for what it does,\u201d Hamilton said. \u201cThat\u2019s the basis of our Parliament, it\u2019s the basis of our whole democratic system. How can we say that Menwith can carry out operations of which there is absolutely no accountability to the public? I don\u2019t buy this idea that you say the word \u2018security\u2019 and nobody can know anything. We need to know what is being done in our name.\u201d<\/p>\n<p>************************<\/p>\n<p><em>Documents published with this article<\/em>:<\/p>\n<ul>\n<li><a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/3089532-Elegant-Chaos-collect-it-all-exploit-it-all.html\" >Elegant Chaos: collect it all, exploit it all<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/3089526-Elegant-Chaos-collect-it-all-exploit-it-all-plus.html\" >Elegant Chaos: collect it all, exploit it all (plus notes)<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/3089523-Ghosthunter-only-capability-of-its-kind.html\" >Ghosthunter: only capability of its kind<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/3089521-Menwith-satellite-classification-guide.html\" >Menwith satellite classification guide<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/3089520-UK-special-forces-Reaper-drone-Jan-Feb-2012.html\" >UK special forces Reaper drone (Jan-Feb-2012)<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/3089519-Afghanistan-30-enemy-killed-Jan-Feb-2012.html\" >Afghanistan 30 enemy killed (Jan-Feb 2012)<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/3089518-Project-Sandstorm-wifi-geolocation-Jan-2011.html\" >Project Sandstorm wifi geolocation (Jan 2011)<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/3089517-Yemen-backhaul-comms-collected-Jan-2011.html\" >Yemen backhaul comms collected (Jan 2011)<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/3089515-New-ops-building-at-MHS-completed-fit-up-begins.html\" >New ops building at Menwith completed, fit up begins<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/3089514-New-technique-geolocates-targets-active-at.html\" >New technique geolocates targets active at Yemeni cafes<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/3089513-Work-is-progressing-on-Menwith-Hill-Station-s.html\" >Work is progressing on Menwith Hill Station\u2019s new operations building<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/3089512-Ghosthunter-and-the-geolocating-of-internet-cafes.html\" >Ghosthunter and the geolocating of internet cafes<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/3089510-Traffic-series-is-your-collection-surveyed-or.html\" >Traffic series: is your collection surveyed or sustained<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/3089509-APPARITION-becomes-a-reality-new-corporate-VSAT.html\" >APPARITION becomes a reality new corporate VSAT geolocation capability sees its first deployment<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/3089508-Ghosthunter-goes-global.html\" >Ghosthunter goes global<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/3089507-MHS-continues-successful-counterterrorism-survey.html\" >Menwith continues successful counterterrorism survey along Af-Pak border<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/3089506-SIGINT-target-package-leads-to-USMC-capture-of.html\" >SIGINT target package leads to USMC capture of al Qaeda weapons procurer<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/3089505-Too-much-of-a-good-thing.html\" >Too much of a good thing?<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/3089503-MHS-initiatives-maximizing-our-access.html\" >Menwith initiatives maximizing our access<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/3089499-GSM-tower-mapping-made-easier-and-more-accurate.html\" >GSM tower mapping made easier and more accurate with new tool<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/3089498-Ghosthunter-future-capabilities-2008.html\" >Ghosthunter future capabilities (2008)<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/3089497-New-tool-combines-multi-int-multi-agency.html\" >New tool combines multi agency databases for complete target snapshot<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/3089496-GSM-tower-geolocation.html\" >GSM tower geolocation<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/3089495-MHS-collection-assets.html\" >Menwith collection assets<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/3089493-MHS-Databases-as-of-14-Aug-2008.html\" >Menwith databases as of Aug 2008<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/3089492-Ghosthunter-tasking-process.html\" >Ghosthunter tasking process<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/3089491-Apparition-Ghosthunter-tasking-info.html\" >Apparition\/Ghosthunter tasking info<\/a><\/li>\n<\/ul>\n<p>_______________________________________<\/p>\n<p><em><a target=\"_blank\" href=\"https:\/\/theintercept.com\/staff\/ryan-gallagher\/\" >Ryan Gallagher<\/a> &#8211; <a href=\"mailto:ryan.gallagher@theintercept.com\">\u2709ryan.gallagher@theintercept.com<\/a><\/em><\/p>\n<p><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2016\/09\/06\/nsa-menwith-hill-targeted-killing-surveillance\/\" >Go to Original \u2013 theintercept.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Documents provided by whistleblower Edward Snowden expose the controversial role of a massive NSA surveillance base in England\u2019s countryside.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[],"class_list":["post-79374","post","type-post","status-publish","format-standard","hentry","category-whistleblowing-surveillance"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/79374","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=79374"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/79374\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=79374"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=79374"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=79374"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}