- Sputnik International
World
Get the latest news from around the world, live coverage, off-beat stories, features and analysis.

#DronePapers: The ABCs of the US Drone Program

© AP Photo / Kirsty WigglesworthGeneral Atomics MQ-9 Reaper drone
General Atomics MQ-9 Reaper drone - Sputnik International
Subscribe
In order to help concerned individuals understand classified Pentagon documents relating to the US drone program, the Intercept has provided a glance at some of the key terms America uses when it kills people in often undeclared conflicts, on foreign soil.

The US Air Force plans to replace Lockheed Martin’s infamous U-2 spy plane with Northrop Grumman’s RQ-4 Global Hawk. - Sputnik International
NATO Plans New Drone Spy Force in 2016 to Monitor Mediterranean
The Intercept, an online magazine launched last year which was established to unveil Snowden's 2014 revelations about NSA, is now focusing on the history and the current state of the Pentagon's unmanned aerial vehicle (UAV) program. It has provided an outline of classified documents which it obtained; these add to a better understanding of the program and the remote attacks it launches. Here are some key terms to keep in mind.

1.Birds

The history of drones can be dated back to November 1, 1911, when Italian Lieutenant Giulio Gavotti became the first aerial bombardier when he leaned out of his airplane and dropped a Haasen hand grenade near the Libyan capital Tripoli. One hundred years on, bombing is being implemented by unmanned planes, which are called "birds" by "people on the inside," according to the Intercept. The drones are controlled remotely by operators who can watch their targets for hours until they get the order to fire. This is where they sit.

© The InterceptScreen01
Screen01 - Sputnik International
Screen01

2. Objectives

These are "specific" people who are being hunted by drone operators. Here' an example of what an objective look like. This timeline pertains to Bilal el-Berjawi, who was wanted by  intelligence agencies for years and who was finally killed by an American drone strike on his car.

© The InterceptScreen02
Screen02 - Sputnik International
Screen02

3. Jackpot

JP, or "jackpot", is a reference to drone operators hitting their target, which typically is the person they plan to kill. When the operators miss the target and kill someone else, they describe the person as EKIA, or "enemy killed in action."

© The Intercept Screen03
Screen03 - Sputnik International
Screen03

4. EKIA

For example, at least 155 people, including 19 "jackpots", were killed by US drones and other aircraft in Afghanistan within a five-month period. Additionally, 136 other people were killed, all of whom were classified as EKIA.

© The Intercept Screen04
Screen04 - Sputnik International
Screen04

The Intercept specifically drew attention to the "%" column, which contains the number of "jackpots", divided by the number of operations. Notably, a 70-percent success rate "ignores well over a hundred other people killed along the way," according to the Intercept, which added that "this means that almost 9 out of 10 people killed in these strikes were not the intended targets."

© The Intercept Screen05
Screen05 - Sputnik International
Screen05

5. Touchdown

This is a word that operators use to report that a night raid or drone strike successfully neutralized a target’s phone. In this regard, it is worth mentioning that drones do not always target people and can be aimed at a mobile phone, especially its SIM card, which provides a person’s location.

© The Intercept Screen06
Screen06 - Sputnik International
Screen06

6. Baseball card

BBCs, or "baseball cards" are the method that the military uses to visualize information. The BBCs are used "to display data, map relationships between people, and identify an individual’s so-called pattern of life," the Intercept explained. They certainly do not look like baseball cards, but they provide the following information.

© The Intercept Screen07
Screen07 - Sputnik International
Screen07

7. Blink

This is something that happens when an UAV has to move and there is no other aircraft to continue watching a target. The Intercept quoted the classified documents as saying that this is a major challenge facing the military, which always seeks to have a "persistent

© The Intercept Screen07
Screen07 - Sputnik International
Screen07

stare."

8. Footprint

According to the Intercept, "drones are not magic," and "they have to take off from somewhere." Since 2012, the US Joint Special Operations Command (JSOC) has had bases in Djibouti, Kenya, and Ethiopia, which operated eleven Predators and five Reaper drones over the Horn of Africa and Yemen.

© The Intercept Screen08
Screen08 - Sputnik International
Screen08

The based were moved to a more remote airstrip in Chabelley, Djibouti after a spate of crashes involving multiple Predator drones near Camp Lemonnier.

© Google EarthChabelley, Djibouti. November 2014
Chabelley, Djibouti. November 2014 - Sputnik International
Chabelley, Djibouti. November 2014

This is how the US views its surveillance capabilities in Africa more broadly.

© The Intercept Screen09
Screen09 - Sputnik International
Screen09

9. Orbits

The Intercept said that the US military is seriously concerned about the so-called "tyranny of distance."

© The Intercept Screen10
Screen10 - Sputnik International
Screen10

Unlike the traditional battlefields of Iraq and Afghanistan, US drones have to cover significant distances so as to reach their "named areas of interest," or NAIs, in Yemen and Somalia. Here's where the US seems to have "finished" people in Yemen, according to the Intercept.

© The Intercept Screen11
Screen11 - Sputnik International
Screen11

10. Kill Chain

Lawyers and human rights activists have repeatedly wondered about how "non-battlefield assassinations are authorized" and whether they fall "within the Authorization for Use of Military Force (AUMF) or through some other authority," the Intercept said. It added that the leaked documents "suggest a linear chain — all the way up to the President of the United States (POTUS)."

© The Intercept Screen12
Screen12 - Sputnik International
Screen12

11. Watchlist
The Intercept explained that a drone, which is equipped with a simulated cell tower called GILGAMESH, can prompt a target’s phone to lock onto it, and then use the phone's signals to "triangulate that person’s location". This is what a watchlist looks like.

© The InterceptScreen13
Screen13 - Sputnik International
Screen13

12. Find, Fix, Finish

This is part of the so-called F3EA doctrine, which includes the "find, fix and finish" cycle, as well as the "exploit and analyze" stage of the Intelligence, Surveillance, and Reconnaissance process. According to the Intercept,"the cycle feeds back into itself", with the entire process "amounting to human hunting". The hunt for a new target starts after an earlier target is finished, the Intercept concluded.

© The Intercept Screen14
Screen14 - Sputnik International
Screen14
Newsfeed
0
To participate in the discussion
log in or register
loader
Chats
Заголовок открываемого материала