Plan for Hunting Terrorists Signals U.S. Intends to Keep Adding Names to Kill Lists - the Wa
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Domestic Security: Confronting a Changing Threat to Ensure Public Safety and Civil Liberties 1
Domestic Security: Confronting a Changing Threat to Ensure Public Safety and Civil Liberties 1 Domestic Security: Confronting a Changing Threat to Ensure Public Safety and Civil Liberties 2 Domestic Security: Confronting a Changing Threat to Ensure Public Safety and Civil Liberties BENS Practitioners Panel Michael Allen Thomas Kean Former Majority Staff Director House Perma- Chair, The National Commission on Terrorist nent Select Committee on Intelligence United Attacks Upon the United States States House of Representatives Former Governor of New Jersey Alfred Berkeley Michael Leiter Vice Chair National Infrastructure Advisory Former Director of the National Counterter- Council rorism Center Former President NASDAQ Stock Market, Inc. Joseph Lieberman Michael Chertoff (Vice Chair) Former United States Senator (CT) Former Secretary of Homeland Security Former Chairman Homeland Security and Government Affairs Committee Commissioner Edward Davis United States Senate Former Commissioner, Boston Police Department James Locher Former Assistant Secretary of Defense for Robert Graham (Vice Chair) Special Operations and Low Intensity Conflict Former Governor of Florida Former Chairman Senate Select Committee Steven McCraw (Vice Chair) on Intelligence United States Senate Director, Texas Department of Public Safety Homeland Security Advisor to the Governor David Hall of Texas Director Missouri Information and Analysis Center Norton Schwartz (Chair) President & CEO Business Executives Lee Hamilton for National Security Former United States Representative (IN) Vice Chair The National Commission Maurice Sonnenberg on Terrorist Attacks Upon the United States Former Member President’s Intelligence Advisory Board Michael Hayden Vice Chair Report of the National Former Director CIA Commission on Terrorism Former Director NSA Frances Townsend Brian Michael Jenkins Former Assistant to the President for Home- Senior Advisor to the President RAND land Security and Counterterrorism Corporation Juan Zarate Loch K. -
Article Drone Vision
Article Drone Vision Daniel Greene University of Maryland, US. [email protected] Abstract What does the drone want? What does the drone need? Such questions, posed explicitly and implicitly by anthropomorphized drones in contemporary popular culture, may seem like distractions from more pressing political and empirical projects addressing the Global War on Terror (GWOT). But the artifacts posing these questions offer a different way of viewing contemporary surveillance and violence that helps decouple the work of drones from justifications for drone warfare, and reveals the broader technological and political network of which drones are the most immediate manifestation. This article explores ‘drone vision’ a globally distributed apparatus for finding, researching, fixing and killing targets of the GWOT, and situates dramatizations of it within recent new materialist theoretical debates in surveillance and security studies. I model the tactic of ‘seeing like a drone’ in order to map the networks that support it. This tactic reveals a disconnect between the materials and discourses of drone vision, a disconnect I historicize within a new, imperial visual culture of war distinct from its modernist, disciplinary predecessor. I then explore two specific attempts to see like a drone: the drone art of London designer James Bridle and the Tumblr satire Texts from Drone. I conclude by returning to drone anthropomorphism as a technique for mapping the apparatus of drone vision, arguing that drone meme arises precisely in response to these new subjects -
The Disposition Matrix
افغاوستان آزاد – آزاد افغاوستان AA-AA چو کشور وباشـد ته مه مبـــــــاد بدیه بوم وبر زوده یک ته مــــباد همه سر به سر ته به کشته دهیم از آن به که کشور به دشمه دهیم www.afgazad.com [email protected] زبان های اروپائی European Languages http://www.guardian.co.uk/world/2013/jul/14/obama-secret-kill-list-disposition-matrix/print Obama's secret kill list – the disposition matrix The disposition matrix is a complex grid of suspected terrorists to be traced then targeted in drone strikes or captured and interrogated. And the British government appears to be colluding in it Ian Cobain 7/14/2013 When Bilal Berjawi spoke to his wife for the last time, he had no way of being certain that he was about to die. But he should have had his suspicions. A short, dumpy Londoner who was not, in the words of some who knew him, one of the world's greatest thinkers, Berjawi had been fighting for months in Somalia with al-Shabaab, the Islamist militant group. His wife was 4,400 miles away, at home in west London. In June 2011, Berjawi had almost been killed in a US drone strike on an al-Shabaab camp on the coast. After that he became wary of telephones. But in January last year, when his wife went into labour and was admitted to St Mary's hospital in Paddington, he decided to risk a quick phone conversation. A few hours after the call ended Berjawi was targeted in a fresh drone strike. Perhaps the telephone contact triggered alerts all the way from Camp Lemmonier, the US military's enormous home-from-home at Djibouti, to the National Security Agency's headquarters in Maryland. -
Lessons from Fort Hood: Improving Our Ability to Connect the Dots
LESSONS FROM FORT HOOD: IMPROVING OUR ABILITY TO CONNECT THE DOTS HEARING BEFORE THE SUBCOMMITTEE ON OVERSIGHT, INVESTIGATIONS, AND MANAGEMENT OF THE COMMITTEE ON HOMELAND SECURITY HOUSE OF REPRESENTATIVES ONE HUNDRED TWELFTH CONGRESS SECOND SESSION SEPTEMBER 14, 2012 Serial No. 112–118 Printed for the use of the Committee on Homeland Security Available via the World Wide Web: http://www.gpo.gov/fdsys/ U.S. GOVERNMENT PRINTING OFFICE 81–127 PDF WASHINGTON : 2013 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2250 Mail: Stop SSOP, Washington, DC 20402–0001 COMMITTEE ON HOMELAND SECURITY PETER T. KING, New York, Chairman LAMAR SMITH, Texas BENNIE G. THOMPSON, Mississippi DANIEL E. LUNGREN, California LORETTA SANCHEZ, California MIKE ROGERS, Alabama SHEILA JACKSON LEE, Texas MICHAEL T. MCCAUL, Texas HENRY CUELLAR, Texas GUS M. BILIRAKIS, Florida YVETTE D. CLARKE, New York PAUL C. BROUN, Georgia LAURA RICHARDSON, California CANDICE S. MILLER, Michigan DANNY K. DAVIS, Illinois TIM WALBERG, Michigan BRIAN HIGGINS, New York CHIP CRAVAACK, Minnesota CEDRIC L. RICHMOND, Louisiana JOE WALSH, Illinois HANSEN CLARKE, Michigan PATRICK MEEHAN, Pennsylvania WILLIAM R. KEATING, Massachusetts BEN QUAYLE, Arizona KATHLEEN C. HOCHUL, New York SCOTT RIGELL, Virginia JANICE HAHN, California BILLY LONG, Missouri RON BARBER, Arizona JEFF DUNCAN, South Carolina TOM MARINO, Pennsylvania BLAKE FARENTHOLD, Texas ROBERT L. TURNER, New York MICHAEL J. RUSSELL, Staff Director/Chief Counsel KERRY ANN WATKINS, Senior Policy Director MICHAEL S. TWINCHEK, Chief Clerk I. LANIER AVANT, Minority Staff Director SUBCOMMITTEE ON OVERSIGHT, INVESTIGATIONS, AND MANAGEMENT MICHAEL T. -
Anwar Al-Aulaqi: Targeted Killings, Emergency Executive Powers, and the Rp Inciple of Proportionality Charles John Smith
Seton Hall University eRepository @ Seton Hall Law School Student Scholarship Seton Hall Law 5-1-2014 Anwar al-Aulaqi: Targeted Killings, Emergency Executive Powers, And The rP inciple Of Proportionality Charles John Smith Follow this and additional works at: https://scholarship.shu.edu/student_scholarship Recommended Citation Smith, Charles John, "Anwar al-Aulaqi: Targeted Killings, Emergency Executive Powers, And The rP inciple Of Proportionality" (2014). Law School Student Scholarship. 580. https://scholarship.shu.edu/student_scholarship/580 ANwAR AL-AULAQI: TARGETED KILLINGS, EMERGENCY EXECUTIVE POWERS, AND THE PRINCIPLE OF PROPORTIONALITY INTRODUCTION Between 2002 and 2009, the United States is believed to have conducted over 50 predator drone strikes between Pakistan, Yemen, and Somalia. 1 Since January 2009, that number has increased to a total of over 300 strikes.2 The drone strikes reached their peak in 2010, with 121 confirmed strikes, 117 of which took place in Pakistan. 3 The escalation in the number of drone strikes throughout the Middle East has been part of a concerted effort, beginning with the Bush Administration and intensified under the Obama Administration, to target members of al-Qaeda, al-Qa'ida in the Arabian Peninsula (AQAP), and other terrorist groups included in the broader war against terrorism. However, with the increase in attacks emanating from Yemen, the Obama administration has begun shifting its focus to the Arabian Peninsula. As a result, the strikes in Yemen have so far outnumbered those in Pakistan for the first time in 2012.4 Although President Obama inherited the drone program, because of the increasing frequency of strikes, his administration has become synonymous with the practice. -
Predator Empire: the Geopolitics of US Drone Warfare Ian G
This article was downloaded by: [Virginia Commonwealth University Libraries] On: 26 June 2013, At: 16:12 Publisher: Routledge Informa Ltd Registered in England and Wales Registered Number: 1072954 Registered office: Mortimer House, 37-41 Mortimer Street, London W1T 3JH, UK Geopolitics Publication details, including instructions for authors and subscription information: http://www.tandfonline.com/loi/fgeo20 Predator Empire: The Geopolitics of US Drone Warfare Ian G. R. Shaw a a School of Geographical and Earth Sciences , The University of Glasgow , Scotland Published online: 14 Jun 2013. To cite this article: Ian G. R. Shaw (2013): Predator Empire: The Geopolitics of US Drone Warfare, Geopolitics, DOI:10.1080/14650045.2012.749241 To link to this article: http://dx.doi.org/10.1080/14650045.2012.749241 PLEASE SCROLL DOWN FOR ARTICLE Full terms and conditions of use: http://www.tandfonline.com/page/terms-and-conditions This article may be used for research, teaching, and private study purposes. Any substantial or systematic reproduction, redistribution, reselling, loan, sub-licensing, systematic supply, or distribution in any form to anyone is expressly forbidden. The publisher does not give any warranty express or implied or make any representation that the contents will be complete or accurate or up to date. The accuracy of any instructions, formulae, and drug doses should be independently verified with primary sources. The publisher shall not be liable for any loss, actions, claims, proceedings, demand, or costs or damages whatsoever or howsoever caused arising directly or indirectly in connection with or arising out of the use of this material. Geopolitics,00:1–24,2013 Copyright © Taylor & Francis Group, LLC ISSN: 1465-0045 print / 1557-3028 online DOI: 10.1080/14650045.2012.749241 Predator Empire: The Geopolitics of US Drone Warfare IAN G. -
Keep Adding. on Kill Lists, Drone Warfare and the Politics of Databases
Keep Adding. On Kill Lists, Drone Warfare and the Politics of Databases “The magic of modern technoscience is a lot of hard work, smoke-filled rooms, and boring lists of numbers and settings. Tyranny or democracy, its import on our lives cannot be denied.” Bowker / Star, 2000:50 Jutta Weber, University of Paderborn, [email protected] Preprint version of the article: The final version was published in Environment and Planning D: Society and Space, online first 30th of Dec. 2015 http://epd.sagepub.com/content/early/2015/12/30/0263775815623537.full.pdf+html Keywords: database, data mining, kill list, post-Newtonian rationality, algorithm, drone warfare Abstract Alongside drones and Special Forces, the ‘disposition matrix’ – a kill/capture list and database – is a key device in the US government’s global ‘war on terror,’ in which targeting individuals has become increasingly institutionalized. The majority of studies to date have focused on the human world of the military, insurgents and policy makers with a limited access to reliable knowledge. Using insights from technoscience and software studies, I seek here to develop a material-based perspective focusing on the neglected non-human world of software artefacts which codify, standardize and sort our world. I will first present available knowledge about the ‘disposition matrix’ and the ‘targeting methodology’. Second, I will elaborate on the materiality of databases and data mining algorithms, showing how their technorationality is built on recombination, which fosters the production of possible future targets for a data-driven killing apparatus in which human and non-human decision making processes are intimately intertwined. -
Balancing National Security Policy: Why Congress Must Assert Its Constitutional Check on Executive Power
Florida State University Law Review Volume 42 Issue 1 Article 9 Fall 2014 Balancing National Security Policy: Why Congress Must Assert its Constitutional Check on Executive Power Rebecca Lightle Follow this and additional works at: https://ir.law.fsu.edu/lr Part of the Constitutional Law Commons, and the National Security Law Commons Recommended Citation Rebecca Lightle, Balancing National Security Policy: Why Congress Must Assert its Constitutional Check on Executive Power, 42 Fla. St. U. L. Rev. 255 (2017) . https://ir.law.fsu.edu/lr/vol42/iss1/9 This Comment is brought to you for free and open access by Scholarship Repository. It has been accepted for inclusion in Florida State University Law Review by an authorized editor of Scholarship Repository. For more information, please contact [email protected]. BALANCING NATIONAL SECURITY POLICY: WHY CONGRESS MUST ASSERT ITS CONSTITUTIONAL CHECK ON EXECUTIVE POWER REBECCA LIGHTLE* I. INTRODUCTION .................................................................................................. 255 II. THE BALANCE OF NATIONAL SECURITY AUTHORITY ......................................... 257 A. Constitutional Powers ................................................................................ 257 1. Text and Early Debates ........................................................................ 257 2. Judicial Deference to the Executive...................................................... 259 3. The War Powers Resolution and Congressional Acquiescence ............ 263 B. The War on Terrorism -
Ryan Dukeman ‘17
Ad-Hoc Committee of the Secretary-General United States National Security Council (USNSC) Chair: Ryan Dukeman ‘17 Director: Eli Schechner ‘18 PMUNC 2015 Princeton Model United Nations Conference November 19-22, 2015 18 November 2015 Dear Delegates, Welcome to PMUNC 2015, and the 2015 US National Security Council! My name is Ryan Dukeman, and I’m excited to serve as your chair for the weekend. The Ad Hoc committee will be focusing on a wide variety of regional and global crises and events, and I’m really looking forward to seeing how you come up with policy responses in this fast-paced environment. Just a bit of background on me – I’m a junior from Westwood, MA, majoring in the Woodrow Wilson School of Public and International Affairs, with minors in American Studies and French Language & Culture. In the Wilson School, my primary interests are constitutional and national security law, international history, and international institutions. Other than Model UN, I’m involved with the American Whig-Cliosophic Society, the Princeton Debate Panel, and the Daily Princetonian. If at any point during the conference you have questions about Princeton, feel free to ask me. I’m excited to have Eli Schechner ’18 as my Director for this committee. Eli is a Woodrow Wilson School major from New Jersey, and will be helping out with all aspects of the committee structure, logistics, and content. The National Security Council is the principal organ for high-level US foreign and security policy-making, comprised of relevant Cabinet secretaries, advisors to the President, military representatives, and the President. -
The FBI: Protecting the Homeland in the 21St Century
EMBARGOED until 10 a.m., March 25, 2015 UNCLASSIFIED (U) The FBI: Protecting the Homeland in the 21st Century (U) Report of the Congressionally-directed (U) 9/11 Review Commission To (U) The Director of the Federal Bureau of Investigation By (U) Commissioners Bruce Hoffman Edwin Meese III Timothy J. Roemer EMBARGOED(U) March 2015 EMBARGOED until 10 a.m., March 25, 2015 UNCLASSIFIED EMBARGOED until 10 a.m., March 25, 2015 UNCLASSIFIED EMBARGOED 1 EMBARGOED until 10 a.m., March 25, 2015 UNCLASSIFIED EMBARGOED until 10 a.m., March 25, 2015 UNCLASSIFIED (U) TABLE OF CONTENTS (U) Introduction: The 9/11 Review Commission…..……….………........ p. 3 (U) Chapter I: Baseline: The FBI Today…………………………….. p. 15 (U) Chapter II: The Sum of Five Cases………………….……………. p. 38 (U) Chapter III: Anticipating New Threats and Missions…………....... p. 53 (U) Chapter IV: Collaboration and Information Sharing………………. p. 73 (U) Chapter V: New Information Related to the 9/11 Attacks………… p. 100 (U) Key Findings and Recommendations…………………………………. p. 108 (U) Conclusion: ………………………………………………………… p. 118 (U) Appendix A: Briefs Provided by FBI Headquarters Divisions.…..… p. 119 (U) Appendix B: Interviews Conducted……… ………………………. p. 121 (U) Appendix C: Select FBI Intelligence Program Developments…….… p. 122 (U) Appendix D: Acronyms……………… …………………………… p. 124 EMBARGOED 2 EMBARGOED until 10 a.m., March 25, 2015 UNCLASSIFIED EMBARGOED until 10 a.m., March 25, 2015 UNCLASSIFIED (U) INTRODUCTION THE FBI 9/11 REVIEW COMMISSION (U) The FBI 9/11 Review Commission was established in January 2014 pursuant to a congressional mandate.1 The United States Congress directed the Federal Bureau of Investigation (FBI, or the “Bureau”) to create a commission with the expertise and scope to conduct a “comprehensive external review of the implementation of the recommendations related to the FBI that were proposed by the National Commission on Terrorist Attacks Upon the United States (commonly known as the 9/11 Commission).”2 The Review Commission was tasked specifically to report on: 1. -
The System of Domestic Counterterrorism Law Enforcement
THE SYSTEM OF DOMESTIC COUNTERTERRORISM LAW ENFORCEMENT Steven R. Morrison* Edward Snowden’s recent leaks of the NSA’s telephony metadata collection program, and the Internet surveillance programs PRISM and XKeyscore are only the latest iterations of the “big data” phenomenon. Arriving just in time for 9/11, new technologies have enabled government agencies to collect and aggregate massive amounts of information, usable in counterterrorism and domestic law en- forcement alike. While such moves have probably stopped some terrorist plots, they also entail systemic inefficiencies that lead unavoidably to unjust results, in the form of both false positives and false negatives. This Article explains these in- efficiencies by describing a complex positive feedback loop inherent in domestic counterterrorism law enforcement. INTRODUCTION ....................................................................................................... 342 I. A SHORT HISTORY OF CRIME MAPPING ............................................................ 347 II. LIMITATIONS OF SOCIAL NETWORK MAPPING .................................................. 352 A. Operator Bias .............................................................................................. 352 B. Data Collection ........................................................................................... 353 C. Determining Link Relevance ....................................................................... 354 III. NETWORK ANALYSIS AND ITS POSITIVE FEEDBACK LOOP .............................. -
9/11, Counterterrorism and the Senior Interagency Strategy Team
INTERAGENCY STUDY A SpeciAl Study publiShed by the SimonS center for interAgency cooperAtion • iAS-003 • April 2014 9/11, COUNTERTERRORISM AND THE SENIOR INTERAGENCY STRATEGY TEAM INTERAGENCY SMALL GROUP PERFORMANCE IN STRATEGY FORMULATION AND IMPLEMENTATION by Christopher Lamb and Erin Staine-Pyne President Barrack Obama meets with NCTC Director Michael Leiter (center right) at the National Counterterrorism Center in McLean, Va., Oct. 6, 2009. White House photo by Samantha Appleton 9/11, Counterterrorism, and the Senior Interagency Strategy Team Interagency Small Group Performance in Strategy Formulation and Implementation by Christopher Lamb and Erin Staine-Pyne Arthur D. Simons Center for Interagency Cooperation Fort Leavenworth, Kansas interAgency Study no. 003, April 2014 9/11, Counterterrorism, and the Senior Interagency Strategy Team Interagency Small Group Performance in Strategy Formulation and Implementation by Christopher Lamb and Erin Staine-Pyne Abstract The belief that better information-sharing among national security departments and agencies could have prevented 9/11 motivated the President and Congress to create new institutions to safeguard the nation against catastrophic terrorist attacks. The National Counterterrorism Center in particular was designed to improve interagency coordination for the counterterrorism mission. Inside the Center, a small interagency group called the “Senior Interagency Strategy Team” (SIST) was established to serve as the primary organizational mechanism for interagency collaboration. Initially, the high-level group was successful. Buoyed by the national counterterrorism consensus following 9/11, the group produced the first National Implementation Plan for the War on Terror. However, the plan was poorly received, and the SIST’s prominent role and productivity fell precipitously thereafter, so much so that all subsequent leaders of the group questioned the value of its existence.