The NSA’s Secret Role in the U.S. Assassination Program

he National Security Agency is using complex analysis of electronic surveillance, rather than human intelligence, as the primary method to locate targets for lethal drone strikes – an unreliable tactic that results in the deaths of innocent or unidentified people.

According to a former drone operator for the military’s Joint Special Operations Command (JSOC) who also worked with the NSA, the agency often identifies targets based on controversial metadata analysis and cell-phone tracking technologies. Rather than confirming a target’s identity with operatives or informants on the ground, the CIA or the U.S. military then orders a strike based on the activity and location of the mobile phone a person is believed to be using.

The drone operator, who agreed to discuss the top-secret programs on the condition of anonymity, was a member of JSOC’s High Value Targeting task force, which is charged with identifying, capturing or killing terrorist suspects in Yemen, Somalia, Afghanistan and elsewhere.

His account is bolstered by top-secret NSA documents previously provided by whistleblower Edward Snowden. It is also supported by a former drone sensor operator with the U.S. Air Force, Brandon Bryant, who has become an outspoken critic of the lethal operations in which he was directly involved in Iraq, Afghanistan and Yemen.

In one tactic, the NSA “geolocates” the SIM card or handset of a suspected terrorist’s mobile phone, enabling the CIA and U.S. military to conduct night raids and drone strikes to kill or capture the individual in possession of the device.

The former JSOC drone operator is adamant that the technology has been responsible for taking out terrorists and networks of people facilitating improvised explosive device attacks against U.S. forces in Afghanistan. But he also states that innocent people have “absolutely” been killed as a result of the NSA’s increasing reliance on the surveillance tactic.

One problem, he explains, is that targets are increasingly aware of the NSA’s reliance on geolocating, and have moved to thwart the tactic. Some have as many as 16 different SIM cards associated with their identity within the High Value Target system. Others, unaware that their mobile phone is being targeted, lend their phone, with the SIM card in it, to friends, children, spouses and family members.

Some top Taliban leaders, knowing of the NSA’s targeting method, have purposely and randomly distributed SIM cards among their units in order to elude their trackers. “They would do things like go to meetings, take all their SIM cards out, put them in a bag, mix them up, and everybody gets a different SIM card when they leave,” the former drone operator says. “That’s how they confuse us.”

As a result, even when the agency correctly identifies and targets a SIM card belonging to a terror suspect, the phone may actually be carried by someone else, who is then killed in a strike. According to the former drone operator, the geolocation cells at the NSA that run the tracking program – known as Geo Cell –sometimes facilitate strikes without knowing whether the individual in possession of a tracked cell phone or SIM card is in fact the intended target of the strike.

“Once the bomb lands or a night raid happens, you know that phone is there,” he says. “But we don’t know who’s behind it, who’s holding it. It’s of course assumed that the phone belongs to a human being who is nefarious and considered an ‘unlawful enemy combatant.’ This is where it gets very shady.”

The former drone operator also says that he personally participated in drone strikes where the identity of the target was known, but other unknown people nearby were also killed.

Read the rest of the story here

This article is a month or so old but has some good info.

Views: 94

Comment

You need to be a member of 12160 Social Network to add comments!

Join 12160 Social Network

Comment by Central Scrutinizer on March 11, 2014 at 10:31am

Reason #27 Why not to own a mobile ;)

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

Doc Vega posted a blog post
yesterday
Burbia commented on TommyD's group The Chuckle Hut
"The Warriors is one of my favorite movies. I couldn't help but laugh at this spoof."
Thursday
Doc Vega posted a photo
Wednesday
Doc Vega commented on Doc Vega's blog post Are the End Times Drawing Near?
"cheeki kea, You might want to see predictions made by Robert Welch in 1957 and 1974 stating that…"
Wednesday
Doc Vega commented on Doc Vega's blog post Are the End Times Drawing Near?
"cheeki kea, good points. We have a world full of twisted allied agendas that seem contradictory,…"
Wednesday
Sandy posted a video

Ghislaine Maxwell & The Secret "Shadow" 9/11 Commission? | John Kiriakou

In this gripping excerpt from the Julien Dorey podcast, former CIA officer and whistleblower John Kiriakou reacts to a leaked email from 2003. The document r...
Tuesday
cheeki kea left a comment for Holyroller
"Greetings to you Holyroller very awesome you've joined up with us all. I know you'll find…"
Tuesday
cheeki kea commented on Doc Vega's blog post Are the End Times Drawing Near?
"Yes it's a sad and sorry situation we see evolving here. On one front and it's a large…"
Tuesday
Doc Vega commented on tjdavis's video
Thumbnail

When the Communists Take Over America!...Famous 1957 Anti-Communist Movie

"I remember this when I was a little seeing it on TV years after it was filmed and it scared me even…"
Tuesday
tjdavis posted a video

When the Communists Take Over America!...Famous 1957 Anti-Communist Movie

Starring Jack Webb and Robert Conrad, this 1957 movie by the United States Armed Forces Information Agency is perhaps the best known anti-communist movie eve...
Tuesday
Doc Vega posted a blog post

Are the End Times Drawing Near?

Are we seeing the gradual fulfillment of the Battle of Armageddon? Think of it. The US and Israel…See More
Monday
Holyroller is now a member of 12160 Social Network
Monday
tjdavis posted a blog post
Monday
Sandy posted photos
Sunday
Burbia posted a video

Catherine Fitts: Epstein, CIA Black Budget, the Control Grid, and the Banks’ Role in War

Programmable digital currency is the final piece of the global control grid that’s finally snapping into place. Catherine Austin Fitts on how to defeat it. C...
Feb 27
Евеліна posted a status
"цікаво, воно цитатами виділяє, як моє особливе "я""
Feb 27
Евеліна posted a status
"на роботі, сонце світить, потрібно перепочити."
Feb 27
Евеліна posted a blog post

Ключові слова в тексті: як органічно їх вписати в статтю

Що таке ключові слова і чому вони важливіКлючові слова — це слова або фрази, які користувачі…See More
Feb 27
Евеліна is now a member of 12160 Social Network
Feb 26
Burbia left a comment for pohonemas33 team
"Quit promoting gambling on another site"
Feb 26

© 2026   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted