{"id":2368,"date":"2013-10-17T10:33:48","date_gmt":"2013-10-17T16:33:48","guid":{"rendered":"http:\/\/peaceeconomyproject.org\/wordpress\/?p=2368"},"modified":"2013-10-21T10:36:48","modified_gmt":"2013-10-21T16:36:48","slug":"documents-reveal-nsas-extensive-involvement-in-targeted-killing-program","status":"publish","type":"post","link":"https:\/\/peaceeconomyproject.org\/wordpress\/documents-reveal-nsas-extensive-involvement-in-targeted-killing-program\/","title":{"rendered":"Documents Reveal NSA\u2019s Extensive Involvement in Targeted Killing Program"},"content":{"rendered":"<p>by\u00a0<a href=\"http:\/\/www.washingtonpost.com\/world\/national-security\/documents-reveal-nsas-extensive-involvement-in-targeted-killing-program\/2013\/10\/16\/29775278-3674-11e3-8a0e-4e2cf80831fc_story.html\">Greg Miller, Julie Tate and Barton Gellman | The Washington Post<\/a><br \/>\n<a href=\"http:\/\/droneswatch.org\/2013\/10\/17\/documents-reveal-nsas-extensive-involvement-in-targeted-killing-program\/\">click here for original article<\/a><\/p>\n<p>It was an innocuous e-mail, one of millions sent every day by spouses with updates on the situation at home. But this one was of particular interest to the National Security Agency and contained clues that put the sender\u2019s husband in the crosshairs of a CIA drone.Days later, Hassan Ghul \u2014 an associate of Osama bin Laden who provided a critical piece of intelligence that helped the CIA\u00a0<a href=\"http:\/\/www.washingtonpost.com\/world\/national-security\/cia-flew-stealth-drones-into-pakistan-to-monitor-bin-laden-house\/2011\/05\/13\/AF5dW55G_story.html\">find the al-Qaeda leader<\/a>\u00a0\u2014 was killed by a drone strike in Pakistan\u2019s tribal belt.<\/p>\n<article>The U.S. government has never publicly acknowledged killing Ghul. But documents provided to The Washington Post by former NSA contractor Edward Snowden confirm his demise in October 2012 and reveal the agency\u2019s extensive involvement in the targeted killing program that has served as a centerpiece of President Obama\u2019s counterterrorism strategy.An al-Qaeda operative who had a knack for surfacing at dramatic moments in the post-Sept. 11 story line, Ghul was an emissary to Iraq for the terrorist group at the height of that war. He was captured in 2004 and helped expose bin Laden\u2019s courier network before spending two years at a secret CIA prison. Then, in 2006, the United States delivered him to his native Pakistan, where he was released and returned to the al-Qaeda fold.But beyond filling in gaps about Ghul, the documents provide the most detailed account of the intricate collaboration between the CIA and the NSA in\u00a0<a href=\"http:\/\/www.washingtonpost.com\/world\/national-security\/obamas-new-drone-policy-has-cause-for-concern\/2013\/05\/25\/0daad8be-c480-11e2-914f-a7aba60512a7_story.html\">the drone campaign<\/a>.<\/article>\n<article><\/article>\n<article><\/article>\n<article>The Post is withholding many details about those missions, at the request of U.S. intelligence officials who cited potential damage to ongoing operations and national security.The NSA is \u201cfocused on discovering and developing intelligence about valid foreign intelligence targets,\u201d an NSA spokeswoman said in a statement provided to The Post on Wednesday, adding that the agency\u2019s operations \u201cprotect the nation and its interests from threats such as terrorism and the proliferation of weapons of mass destruction.\u201d<\/p>\n<p>In the search for targets, the NSA has draped a surveillance blanket over dozens of square miles of northwest Pakistan. In Ghul\u2019s case, the agency deployed an arsenal of cyber-espionage tools, secretly seizing control of laptops, siphoning audio files and other messages, and tracking radio transmissions to determine where Ghul might \u201cbed down.\u201d<\/p>\n<p>The e-mail from Ghul\u2019s wife \u201cabout her current living conditions\u201d contained enough detail to confirm the coordinates of that household, according to a document summarizing the mission. \u201cThis information enabled a capture\/kill operation against an individual believed to be Hassan Ghul on October 1,\u201d it said.<\/p>\n<p>The file is part of a collection of records in the Snowden trove that make clear that the drone campaign \u2014 often depicted as the CIA\u2019s exclusive domain \u2014 relies heavily on the NSA\u2019s ability to vacuum up enormous quantities of e-mail, phone calls and other fragments of signals intelligence, or SIGINT.<\/p>\n<p>To handle the expanding workload, the NSA created a secret unit known as the Counter-Terrorism Mission Aligned Cell, or CT\u00a0MAC, to concentrate the agency\u2019s vast resources on hard-to-find terrorism targets. The unit spent a year tracking Ghul and his courier network, tunneling into an array of systems and devices, before he was killed. Without those penetrations, the document concluded, \u201cthis opportunity would not have been possible.\u201d<\/p>\n<div id=\"article_body\">\n<div>\n<article>At a time when the NSA is facing intense criticism for gathering data on Americans, the drone files may bolster the agency\u2019s case that its resources are focused on fighting terrorism and supporting U.S. operations overseas.\u201cOurs is a noble cause,\u201d NSA Director Keith B. Alexander said during a public event last month. \u201cOur job is to defend this nation and to protect our civil liberties and privacy.\u201d<\/article>\n<\/div>\n<div id=\"article-side-rail\">\n<div>\n<div><img data-recalc-dims=\"1\"  title=\"\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/www.washingtonpost.com\/rf\/image_296w\/2010-2019\/WashingtonPost\/2013\/10\/17\/Foreign\/Graphics\/296NSAtracker.jpg?w=640\"  alt=\"296NSAtracker Documents Reveal NSA\u2019s Extensive Involvement in Targeted Killing Program\"   \/><\/div>\n<p>(The Washington Post)<\/p>\n<\/div>\n<\/div>\n<div>\n<article>The documents do not explain how the Ghul e-mail was obtained or whether it was intercepted using legal authorities that have emerged as a source of controversy in recent months and enable the NSA to compel technology giants including Microsoft and Google to turn over information about their users. Nor is there a reference to another NSA program facing scrutiny after Snowden\u2019s leaks, its metadata collection of numbers dialed by nearly every person in the United States.To the contrary, the records indicate that the agency depends heavily on highly targeted network penetrations to gather information that wouldn\u2019t otherwise be trapped in surveillance nets that it has set at key Internet gateways.The new documents are self-congratulatory in tone, drafted to tout the NSA\u2019s counterterrorism capabilities. One is titled \u201cCT MAC Hassan Gul Success.\u201d The files make no mention of other agencies\u2019 roles in a drone program that escalated dramatically in 2009 and 2010 before tapering off in recent years.Even so, former CIA officials said the files are an accurate reflection of the NSA\u2019s contribution to finding targets in a campaign that has killed more than 3,000 people, including thousands of alleged militants and hundreds of civilians, in Pakistan, according to independent surveys. The officials said the agency has assigned senior analysts to the CIA\u2019s Counterterrorism Center, and deployed others to work alongside CIA counterparts at almost every major U.S. embassy or military base overseas.\u201cNSA threw the kitchen sink at the FATA,\u201d said a former U.S. intelligence official with experience in Afghanistan and Pakistan, referring to the Federally Administered Tribal Areas, the region in northwest Pakistan where al-Qaeda\u2019s leadership is based.NSA employees rarely ventured beyond the security gates of the U.S. Embassy in Islamabad, officials said. Surveillance operations that required placing a device or sensor near an al-Qaeda compound were handled by the CIA\u2019s Information Operations Center, which specializes in high-tech devices and \u201cclose-in\u201d surveillance work.<\/p>\n<p>\u201cBut if you wanted huge coverage of the FATA, NSA had 10 times the manpower, 20 times the budget and 100 times the brainpower,\u201d the former intelligence official said, comparing the surveillance resources of the NSA to the smaller capabilities of the agency\u2019s IOC. The two agencies are\u00a0<a href=\"http:\/\/www.washingtonpost.com\/world\/national-security\/black-budget-summary-details-us-spy-networks-successes-failures-and-objectives\/2013\/08\/29\/7e57bb78-10ab-11e3-8cdd-bcdc09410972_story.html\">the largest in the U.S. intelligence community<\/a>, with budgets last year of $14.7\u00a0billion for the CIA and $10.8\u00a0billion for the NSA. \u201cWe provided the map,\u201d the former official said, \u201cand they just filled in the pieces.\u201d<\/p>\n<p>In broad terms, the NSA relies on increasingly sophisticated versions of online attacks that are well-known among security experts. Many rely on software implants developed by the agency\u2019s Tailored Access Operations division with code-names such as UNITEDRAKE and VALIDATOR. In other cases, the agency runs \u201cman-in-the-middle\u201d attacks in which it positions itself unnoticed midstream between computers communicating with one another, diverting files for real-time alerts and longer-term analysis in data repositories.<\/p>\n<\/article>\n<\/div>\n<div>\n<article>Through these and other tactics, the NSA is able to extract vast quantities of digital information, including audio files, imagery and keystroke logs. The operations amount to silent raids on suspected safe houses and often are carried out by experts sitting behind desks thousands of miles from their targets.The reach of the NSA\u2019s Tailored Access Operations division extends far beyond Pakistan. Other documents describe efforts to tunnel into systems used by al-Qaeda affiliates in Yemen and Africa, each breach exposing other corridors.<\/article>\n<article><\/article>\n<div>\n<article>An operation against a suspected facilitator for al-Qaeda\u2019s branch in Yemen led to a trove of files that could be used to \u201chelp NSA map out the movement of terrorists and aspiring extremists between Yemen, Syria, Turkey, Egypt, Libya and Iran,\u201d according to the documents. \u201cThis may enable NSA to better flag the movement of these individuals\u201d to allied security services that \u201ccan put individuals on no-fly lists or monitor them once in country.\u201dA single penetration yielded 90 encrypted al-Qaeda documents, 16 encryption keys, 30 unencrypted messages as well as \u201cthousands\u201d of chat logs, according to an inventory described in one of the Snowden documents.The operations are so easy, in some cases, that the NSA is able to start downloading data in less time than it takes the targeted machine to boot up. Last year, a user account on a social media Web site provided an instant portal to an al-Qaeda operative\u2019s hard drive. \u201cWithin minutes, we successfully exploited the target,\u201d the document said.The hunt for Ghul followed a more elaborate path.Ghul, who is listed in other documents as Mustafa Haji Muhammad Khan, had surfaced on U.S. radar as early as 2003, when an al-Qaeda detainee disclosed that Ghul escorted one of the intended hijackers to a Pakistani safe house a year before the Sept. 11, 2001, attacks.A trusted facilitator and courier, Ghul was dispatched to Iraq in 2003 to deliver a message to Abu Musab al-Zarqawi, the al-Qaeda firebrand who angered the network\u2019s leaders in Pakistan by launching attacks that often slaughtered innocent Muslims.<\/p>\n<p>When Ghul made another attempt to enter Iraq in 2004, he was detained by Kurdish authorities in an operation directed by the CIA. Almost immediately, Ghul provided a piece of intelligence that would prove more consequential than he may have anticipated: He disclosed that bin Laden relied on a trusted courier known as al-Kuwaiti.<\/p>\n<p>The ripples from that revelation wouldn\u2019t subside for years. The CIA went on to determine the true identity of al-Kuwaiti and followed him to a heavily fortified compound in Abbottabad, Pakistan, where bin Laden was killed in 2011.<\/p>\n<p>Because of the courier tip, Ghul became an unwitting figure in the contentious debate over CIA interrogation measures. He was held at a CIA black site in Eastern Europe, according to declassified Justice Department memos, where he was slapped and subjected to stress positions and sleep deprivation to break his will.<\/p>\n<p>Defenders of the interrogation program have cited Ghul\u2019s courier disclosure as evidence that the agency\u2019s interrogation program was crucial to getting bin Laden. But others, including former CIA operatives directly involved in Ghul\u2019s case, said that he identified the courier while he was being interrogated by Kurdish authorities, who posed questions scripted by CIA analysts in the background.<\/p>\n<article>The debate resurfaced amid the release of the movie\u00a0<a href=\"http:\/\/www.washingtonpost.com\/world\/national-security\/in-zero-dark-thirty-shes-the-hero-in-real-life-cia-agents-career-is-more-complicated\/2012\/12\/10\/cedc227e-42dd-11e2-9648-a2c323a991d6_story.html\">\u201cZero Dark Thirty\u201d<\/a>\u00a0last year, in which a detainee\u2019s slip after a brutal interrogation sequence is depicted as a breakthrough in the bin Laden hunt. Ghul\u2019s case also has been explored in detail in a 6,000-page investigation of the CIA interrogation program by the Senate Intelligence Committee that has yet to be released.Sen. Dianne Feinstein (D-Calif.), the chairman of the panel, sought to settle the Ghul debate in a statement last year that alluded to his role but didn\u2019t mention him by name.<\/article>\n<article><\/article>\n<div>\n<article>\u201cThe CIA detainee who provided the most significant information about the courier provided the information prior to being subjected to coercive interrogation techniques,\u201d Feinstein said in the statement, which was signed by Sen. Carl Levin (D-Mich.).The George W. Bush administration\u2019s decision to close the secret CIA prisons in 2006 set off a scramble to place prisoners whom the agency did not regard as dangerous or valuable enough to transfer to Guantanamo Bay. Ghul was not among the original 14 high-value CIA detainees sent to the U.S. installation in Cuba. Instead, he was turned over to the CIA\u2019s counterpart in Pakistan, with ostensible assurances that he would remain in custody.A year later, Ghul was released. There was no public explanation from Pakistani authorities. CIA officials have noted that Ghul had ties to Lashkar-e-Taiba, a militant group supported by Pakistan\u2019s intelligence service. By 2007, he had returned to al-Qaeda\u2019s stronghold in Waziristan.In 2011, the Treasury Department named Ghul a target of U.S. counterterrorism sanctions. Since his release, the department said, he had helped al-Qaeda reestablish logistics networks, enabling al-Qaeda to move people and money in and out of the country. The NSA document described Ghul as al-Qaeda\u2019s chief of military operations and detailed a broad surveillance effort to find him.\u201cThe most critical piece\u201d came with a discovery that \u201cprovided a vector\u201d for compounds used by Ghul, the document said. After months of investigation, and surveillance by CIA drones, the e-mail from his wife erased any remaining doubt.Even after Ghul was killed in Mir Ali, the NSA\u2019s role in the drone strike wasn\u2019t done. Although the attack was aimed at \u201can individual believed to be\u201d the correct target, the outcome wasn\u2019t certain until later when, \u201cthrough SIGINT, it was confirmed that Hassan Ghul was in fact killed.\u201d<\/p>\n<\/article>\n<\/div>\n<\/article>\n<\/div>\n<\/div>\n<\/div>\n<\/article>\n","protected":false},"excerpt":{"rendered":"<p>by\u00a0Greg Miller, Julie Tate and Barton Gellman | The Washington Post click here for original article It was an innocuous e-mail, one of millions sent every day by spouses with updates on the situation at home. But this one was of particular interest to the National Security Agency and contained clues that put the sender\u2019s [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2369,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"nf_dc_page":"","om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[8],"tags":[],"class_list":["post-2368","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"acf":[],"aioseo_notices":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/peaceeconomyproject.org\/wordpress\/wp-content\/uploads\/2013\/10\/ghul1381941190.jpg?fit=296%2C352&ssl=1","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/peaceeconomyproject.org\/wordpress\/wp-json\/wp\/v2\/posts\/2368","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/peaceeconomyproject.org\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/peaceeconomyproject.org\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/peaceeconomyproject.org\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/peaceeconomyproject.org\/wordpress\/wp-json\/wp\/v2\/comments?post=2368"}],"version-history":[{"count":2,"href":"https:\/\/peaceeconomyproject.org\/wordpress\/wp-json\/wp\/v2\/posts\/2368\/revisions"}],"predecessor-version":[{"id":2371,"href":"https:\/\/peaceeconomyproject.org\/wordpress\/wp-json\/wp\/v2\/posts\/2368\/revisions\/2371"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/peaceeconomyproject.org\/wordpress\/wp-json\/wp\/v2\/media\/2369"}],"wp:attachment":[{"href":"https:\/\/peaceeconomyproject.org\/wordpress\/wp-json\/wp\/v2\/media?parent=2368"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/peaceeconomyproject.org\/wordpress\/wp-json\/wp\/v2\/categories?post=2368"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/peaceeconomyproject.org\/wordpress\/wp-json\/wp\/v2\/tags?post=2368"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}