web-page-parser 1.1.0 → 1.2.2

Sign up to get free protection for your applications and to get access to all the features.
Files changed (37) hide show
  1. checksums.yaml +5 -5
  2. checksums.yaml.gz.sig +0 -0
  3. data.tar.gz.sig +0 -0
  4. data/lib/web-page-parser/parsers/bbc_news_page_parser.rb +56 -3
  5. data/lib/web-page-parser/parsers/guardian_page_parser.rb +33 -3
  6. data/lib/web-page-parser/parsers/independent_page_parser.rb +2 -2
  7. data/lib/web-page-parser/parsers/new_york_times_page_parser.rb +8 -3
  8. data/lib/web-page-parser/parsers/rt_page_parser.rb +49 -0
  9. data/lib/web-page-parser/parsers/the_intercept_page_parser.rb +6 -1
  10. data/lib/web-page-parser/parsers/washingtonpost_page_parser.rb +38 -2
  11. data/spec/fixtures/bbc_news/31014941.html +1123 -0
  12. data/spec/fixtures/bbc_news/32271505.html +1168 -0
  13. data/spec/fixtures/bbc_news/32275608.html +1142 -0
  14. data/spec/fixtures/guardian/duplicate-headline.html +2735 -0
  15. data/spec/fixtures/guardian/julian-assange-donald-trump-hillary-clinton-interview.html +1752 -0
  16. data/spec/fixtures/guardian/university-extremist-speakers.html +1590 -0
  17. data/spec/fixtures/independent/boris-johnson.html +1086 -0
  18. data/spec/fixtures/independent/lord-burns.html +726 -0
  19. data/spec/fixtures/new_york_times/show-banned-french-comedian-has-new-one-2018.html +305 -0
  20. data/spec/fixtures/new_york_times/trump-kim-policy.html +305 -0
  21. data/spec/fixtures/rt/338045.html +682 -0
  22. data/spec/fixtures/rt/338237.html +682 -0
  23. data/spec/fixtures/theintercept/pentagon-missionary.html +211 -0
  24. data/spec/fixtures/washingtonpost/israeli-ambassador.html +747 -0
  25. data/spec/fixtures/washingtonpost/sgt-bowe-bergdahls-capture-remains-amystery-2018.html +381 -0
  26. data/spec/fixtures/washingtonpost/trump-kim-summit.html +379 -0
  27. data/spec/fixtures/washingtonpost/will-a-bust-follow-the-boom-in-britain-2018.html +386 -0
  28. data/spec/parsers/bbc_news_page_spec.rb +132 -11
  29. data/spec/parsers/guardian_page_spec.rb +100 -0
  30. data/spec/parsers/independent_page_parser_spec.rb +52 -0
  31. data/spec/parsers/new_york_times_page_parser_spec.rb +75 -10
  32. data/spec/parsers/rt_page_parser_spec.rb +87 -0
  33. data/spec/parsers/the_intercept_page_parser_spec.rb +30 -0
  34. data/spec/parsers/washingtonpost_page_parser_spec.rb +93 -1
  35. data/spec/web-page-parser +1 -0
  36. metadata +98 -56
  37. metadata.gz.sig +0 -0
@@ -0,0 +1,211 @@
1
+ <!DOCTYPE html>
2
+ <!--
3
+ ______ __ ______ __ __
4
+ /\__ _\/\ \ /\__ _\ /\ \__ /\ \__
5
+ \/_/\ \/\ \ \___ __\/_/\ \/ ___\ \ ,_\ __ _ __ ___ __ _____\ \ ,_\
6
+ \ \ \ \ \ _ `\ /'__`\ \ \ \ /' _ `\ \ \/ /'__`\/\`'__\/'___\ /'__`\/\ '__`\ \ \/
7
+ \ \ \ \ \ \ \ \/\ __/ \_\ \__/\ \/\ \ \ \_/\ __/\ \ \//\ \__//\ __/\ \ \L\ \ \ \_
8
+ \ \_\ \ \_\ \_\ \____\ /\_____\ \_\ \_\ \__\ \____\\ \_\\ \____\ \____\\ \ ,__/\ \__\
9
+ \/_/ \/_/\/_/\/____/ \/_____/\/_/\/_/\/__/\/____/ \/_/ \/____/\/____/ \ \ \/ \/__/
10
+ \ \_\
11
+ \/_/
12
+ -->
13
+ <html>
14
+ <head>
15
+ <title>U.S. Military Used Christian NGO as Front for North Korea Espionage</title>
16
+
17
+ <meta property="og:url" content="https://theintercept.com/2015/10/26/pentagon-missionary-spies-christian-ngo-front-for-north-korea-espionage/">
18
+
19
+ <meta property="og:type" content="article">
20
+
21
+ <meta property="og:locale" content="en_US">
22
+
23
+ <meta property="og:site_name" content="The Intercept">
24
+
25
+ <meta property="og:title" content="U.S. Military Used Christian NGO as Front for North Korea Espionage">
26
+
27
+ <meta property="og:description" content="Leaving his own employees in the dark, the leader of an award-winning Christian NGO helped the Pentagon conduct espionage in North Korea while hiding the source of the organization&#39;s funding, according to sources interviewed for this special investigation.">
28
+
29
+ <meta property="og:image" content="https://prod01-cdn05.cdn.firstlook.org/wp-uploads/sites/1/2015/10/bush-hiramine-feature-hero.jpg">
30
+
31
+
32
+ <meta name="twitter:card" content="summary_large_image">
33
+
34
+ <meta name="twitter:site" content="@the_intercept">
35
+
36
+ <meta name="twitter:creator" content="@the_intercept">
37
+
38
+ <meta name="twitter:title" content="U.S. Military Used Christian NGO as Front for North Korea Espionage">
39
+
40
+ <meta name="twitter:domain" content="The Intercept">
41
+
42
+ <meta name="twitter:description" content="Leaving his own employees in the dark, the leader of an award-winning Christian NGO helped the Pentagon conduct espionage in North Korea while hiding the source of the organization&#39;s funding, according to sources interviewed for this special investigation.">
43
+
44
+ <meta name="twitter:image" content="https://prod01-cdn05.cdn.firstlook.org/wp-uploads/sites/1/2015/10/bush-hiramine-feature-hero.jpg">
45
+
46
+
47
+ <link rel="canonical" href="https://theintercept.com/2015/10/26/pentagon-missionary-spies-christian-ngo-front-for-north-korea-espionage/"/>
48
+
49
+ <meta charset="utf-8">
50
+ <meta http-equiv="X-UA-Compatible" content="IE=edge">
51
+ <meta name="viewport" content="width=device-width, initial-scale=1, maximum-scale=1, user-scalable=no">
52
+
53
+ <link rel="apple-touch-icon" sizes="57x57" href="https://prod01-cdn07.cdn.firstlook.org/assets/static/apple-touch-icon-57x57.png">
54
+ <link rel="apple-touch-icon" sizes="60x60" href="https://prod01-cdn07.cdn.firstlook.org/assets/static/apple-touch-icon-60x60.png">
55
+ <link rel="apple-touch-icon" sizes="72x72" href="https://prod01-cdn07.cdn.firstlook.org/assets/static/apple-touch-icon-72x72.png">
56
+ <link rel="apple-touch-icon" sizes="76x76" href="https://prod01-cdn07.cdn.firstlook.org/assets/static/apple-touch-icon-76x76.png">
57
+ <link rel="apple-touch-icon" sizes="114x114" href="https://prod01-cdn07.cdn.firstlook.org/assets/static/apple-touch-icon-114x114.png">
58
+ <link rel="apple-touch-icon" sizes="120x120" href="https://prod01-cdn05.cdn.firstlook.org/assets/static/apple-touch-icon-120x120.png">
59
+ <link rel="apple-touch-icon" sizes="144x144" href="https://prod01-cdn05.cdn.firstlook.org/assets/static/apple-touch-icon-144x144.png">
60
+ <link rel="apple-touch-icon" sizes="152x152" href="https://prod01-cdn07.cdn.firstlook.org/assets/static/apple-touch-icon-152x152.png">
61
+ <link rel="apple-touch-icon" sizes="180x180" href="https://prod01-cdn05.cdn.firstlook.org/assets/static/apple-touch-icon-180x180.png">
62
+ <link rel="icon" type="image/png" href="https://prod01-cdn05.cdn.firstlook.org/assets/static/favicon-32x32.png" sizes="32x32">
63
+ <link rel="icon" type="image/png" href="https://prod01-cdn05.cdn.firstlook.org/assets/static/android-chrome-192x192.png" sizes="192x192">
64
+ <link rel="icon" type="image/png" href="https://prod01-cdn05.cdn.firstlook.org/assets/static/favicon-96x96.png" sizes="96x96">
65
+ <link rel="icon" type="image/png" href="https://prod01-cdn05.cdn.firstlook.org/assets/static/favicon-16x16.png" sizes="16x16">
66
+ <link rel="manifest" href="https://prod01-cdn04.cdn.firstlook.org/assets/static/manifest.json">
67
+ <link rel="shortcut icon" href="https://prod01-cdn06.cdn.firstlook.org/assets/static/favicon.ico">
68
+ <meta name="msapplication-TileColor" content="#000000">
69
+ <meta name="msapplication-TileImage" content="https://prod01-cdn07.cdn.firstlook.org/assets/static/mstile-144x144.png">
70
+ <meta name="msapplication-config" content="https://prod01-cdn06.cdn.firstlook.org/assets/static/browserconfig.xml">
71
+ <meta name="theme-color" content="#ffffff">
72
+
73
+
74
+ <!--[if !IE]><!-->
75
+ <link rel="stylesheet" type="text/css" href="https://prod01-cdn05.cdn.firstlook.org/assets/app766ba4ad9a54803a9adc.css">
76
+ <!--<![endif]-->
77
+ <!--[if gte IE 9]>
78
+ <link rel="stylesheet" type="text/css" href="https://prod01-cdn05.cdn.firstlook.org/assets/app766ba4ad9a54803a9adc.css">
79
+ <![endif]-->
80
+ <!--[if lte IE 8]>
81
+ <link rel="stylesheet" type="text/css" href="https://prod01-cdn04.cdn.firstlook.org/assets/ie8766ba4ad9a54803a9adc.css">
82
+ <![endif]-->
83
+
84
+
85
+ <!--[if lte IE 8]>
86
+ <script>
87
+ document.createElement('header');
88
+ document.createElement('nav');
89
+ document.createElement('section');
90
+ document.createElement('article');
91
+ document.createElement('aside');
92
+ document.createElement('footer');
93
+ document.createElement('hgroup');
94
+ </script>
95
+ <![endif]-->
96
+ </head>
97
+ <body>
98
+ <script src="https://prod01-cdn07.cdn.firstlook.org/assets/sniffer766ba4ad9a54803a9adc.js"></script>
99
+ <div id="Root"><div class="InterceptWrapper" data-reactid=".ti" data-react-checksum="1631026529"><div class="Header Header--route-theintercept Header--route-post" data-reactid=".ti.0"><div class="Header-hamburger" data-reactid=".ti.0.0"><a class="Header-hamburger-link" href="/2015/10/26/pentagon-missionary-spies-christian-ngo-front-for-north-korea-espionage?menu=1" style="color:;" data-reactid=".ti.0.0.0">≡</a></div><nav class="Header-menu" data-reactid=".ti.0.1"><div class="Logo" data-reactid=".ti.0.1.0"><div class="Logo-bg-block" data-reactid=".ti.0.1.0.0"><div class="GridContainer" data-reactid=".ti.0.1.0.0.0"><div class="GridRow" data-reactid=".ti.0.1.0.0.0.0"><div class="Logo-bg" data-reactid=".ti.0.1.0.0.0.0.0"></div></div></div></div><div class="Logo-block" data-reactid=".ti.0.1.0.1"><a class="" href="/" data-reactid=".ti.0.1.0.1.0"><span class="Logo-fallback" style="color:#111;" data-reactid=".ti.0.1.0.1.0.0"><span data-reactid=".ti.0.1.0.1.0.0.0">The</span><br data-reactid=".ti.0.1.0.1.0.0.1"/><span data-reactid=".ti.0.1.0.1.0.0.2">Intercept_</span></span><svg class="Logo-svg" version="1.1" width="140px" height="50px" viewBox="0 0 140 50" data-reactid=".ti.0.1.0.1.0.1"><g data-reactid=".ti.0.1.0.1.0.1.0"><path class="Logo-path" fill="#111" d="M51.731,30.458c1.246,0,2.264,1.425,2.264,3.206l-4.605,0.56C49.517,31.781,50.28,30.458,51.731,30.458 M40.789,8.601 c1.247,0,2.265,1.424,2.265,3.206l-4.606,0.559C38.575,9.924,39.339,8.601,40.789,8.601 M92.774,30.458 c1.247,0,2.264,1.425,2.264,3.206l-4.605,0.56C90.56,31.781,91.323,30.458,92.774,30.458 M128.295,46.463H140v-2.188h-11.705 V46.463z M106.642,31.679c0.279-0.101,0.61-0.178,1.272-0.178c2.544,0,4.275,1.68,4.275,5.42c0,3.104-1.705,5.216-4.173,5.216 c-0.408,0-0.891-0.076-1.374-0.229V31.679z M68.652,33.206h3.18v-4.097c-0.61-0.254-1.017-0.356-1.603-0.356 c-0.992,0-2.188,0.662-3.435,1.654l-0.916,0.713v-2.367h-0.661l-6.285,1.272v0.967l2.112,0.637v10l-2.112,0.763v0.865h9.313v-0.865 l-2.367-0.763v-9.39c0.611-0.229,1.68-0.407,1.934-0.407L68.652,33.206z M80.484,28.753c-3.995,0-8.372,2.494-8.372,8.066 c0,4.631,3.079,6.82,6.412,6.82c1.146,0,2.469-0.153,4.402-0.967l2.341-0.993l-0.33-0.916c-0.586,0.229-1.4,0.382-2.545,0.382 c-3.155,0-5.547-1.883-5.547-6.132c0-2.952,1.705-4.555,3.257-4.555c0.153,0,0.331,0.025,0.484,0.102l1.399,2.646h2.926v-3.613 C83.741,29.16,82.138,28.753,80.484,28.753 M123.792,26.489h-1.171l-5.521,3.18v1.069l1.857,0.178v10.076 c0,1.807,1.425,2.647,3.435,2.647c0.942,0,2.697-0.306,3.868-0.662l2.035-0.636l-0.178-0.941c-0.33,0.076-0.916,0.101-1.246,0.101 c-1.858,0-3.079-0.687-3.079-2.977v-7.455l4.351,0.229v-2.163h-4.351V26.489z M40.128,26.489h-1.171l-5.522,3.18v1.069l1.858,0.178 v10.076c0,1.807,1.425,2.647,3.435,2.647c0.942,0,2.697-0.306,3.868-0.662l2.035-0.636L44.453,41.4 c-0.331,0.076-0.916,0.101-1.247,0.101c-1.857,0-3.078-0.687-3.078-2.977v-7.455l4.351,0.229v-2.163h-4.351V26.489z M58.626,35.293 v-0.407c0-2.189-1.476-6.133-6.437-6.133c-3.766,0-7.558,2.494-7.558,8.066c0,4.555,3.334,6.82,6.972,6.82 c1.069,0,2.621-0.178,4.428-0.967l2.264-0.993l-0.33-0.916c-0.586,0.229-1.4,0.382-2.596,0.382c-2.799,0-5.878-1.628-6.005-5.852 H58.626z M99.67,35.293v-0.407c0-2.189-1.476-6.133-6.438-6.133c-3.766,0-7.557,2.494-7.557,8.066c0,4.555,3.333,6.82,6.972,6.82 c1.068,0,2.62-0.178,4.427-0.967l2.265-0.993l-0.331-0.916c-0.585,0.229-1.4,0.382-2.596,0.382c-2.798,0-5.877-1.628-6.005-5.852 H99.67z M47.685,13.435v-0.407c0-2.188-1.476-6.132-6.438-6.132c-3.766,0-7.557,2.493-7.557,8.066c0,4.555,3.333,6.819,6.972,6.819 c1.069,0,2.621-0.178,4.427-0.967l2.265-0.992l-0.331-0.916c-0.585,0.229-1.399,0.382-2.595,0.382 c-2.799,0-5.878-1.629-6.005-5.853H47.685z M6.438,25.598v15.725L3.97,42.265v0.992h10.865v-0.992l-2.468-0.942V25.598l2.468-0.942 v-0.992H3.97v0.992L6.438,25.598z M31.781,41.629V33.74c0-2.926-1.094-4.987-4.045-4.987c-1.222,0-2.138,0.382-3.334,0.916 l-2.163,0.942v-1.858h-0.661l-6.285,1.272v0.967l2.112,0.637v10l-2.112,0.763v0.865h8.804v-0.865l-1.858-0.763v-9.924 c0.458-0.127,1.247-0.204,1.833-0.204c1.577,0,2.875,0.865,2.875,3.461v6.667l-1.858,0.763v0.865h8.804v-0.865L31.781,41.629z M106.642,28.753h-0.662l-6.285,1.272v0.967l2.112,0.637v15.598l-2.112,0.763v0.865h9.567V47.99l-2.62-0.763v-3.588h0.992 c5.954,0,9.287-3.614,9.287-8.626c0-4.301-3.002-6.26-5.241-6.26c-0.891,0-2.443,0.535-3.868,1.247l-0.967,0.483h-0.203V28.753z M31.527,19.771v-7.888c0-2.926-1.094-4.987-4.046-4.987c-1.221,0-2.137,0.381-3.333,0.916l-2.163,0.941V0h-0.662l-4.911,1.807H0 v4.911h2.316L3.257,3.69h3.181v15.776L3.97,20.407V21.4h10.61v-0.993l-2.213-0.941V3.69h4.783v16.081l-1.857,0.763V21.4h8.55 v-0.866l-1.858-0.763V9.873c0.458-0.127,1.247-0.229,1.832-0.229c1.578,0,2.875,0.865,2.875,3.46v6.667l-1.857,0.763V21.4h8.804 v-0.866L31.527,19.771z" data-reactid=".ti.0.1.0.1.0.1.0.0"></path></g></svg></a></div></div><div class="Header-search-block" data-reactid=".ti.0.1.1"><form action="/search" type="get" data-reactid=".ti.0.1.1.0"><label class="Header-search-label" for="search" data-reactid=".ti.0.1.1.0.0"><span class="Icon Icon--Search" data-reactid=".ti.0.1.1.0.0.0">🔍</span></label><input id="search" class="Header-search-input" name="s" data-reactid=".ti.0.1.1.0.1"/></form></div><ul class="Header-menu-list" data-reactid=".ti.0.1.2"><li class="Header-menu-list-item" data-reactid=".ti.0.1.2.$/greenwald/"><a class="Header-menu-link" href="/greenwald/" data-reactid=".ti.0.1.2.$/greenwald/.0">Glenn Greenwald</a></li><li class="Header-menu-list-item" data-reactid=".ti.0.1.2.$/unofficial-sources/"><a class="Header-menu-link" href="/unofficial-sources/" data-reactid=".ti.0.1.2.$/unofficial-sources/.0">Unofficial Sources</a></li><li class="Header-menu-list-item" data-reactid=".ti.0.1.2.$/fieldofvision/"><a class="Header-menu-link" href="/fieldofvision/" data-reactid=".ti.0.1.2.$/fieldofvision/.0">Field of Vision</a></li><li class="Header-menu-list-item" data-reactid=".ti.0.1.2.$/features/"><a class="Header-menu-link" href="/features/" data-reactid=".ti.0.1.2.$/features/.0">Features</a></li><li class="Header-menu-list-item" data-reactid=".ti.0.1.2.$/documents/"><a class="Header-menu-link" href="/documents/" data-reactid=".ti.0.1.2.$/documents/.0">Documents</a></li><li class="Header-menu-list-item" data-reactid=".ti.0.1.2.$/staff/"><a class="Header-menu-link" href="/staff/" data-reactid=".ti.0.1.2.$/staff/.0">About &amp; Contacts</a></li></ul><div class="Header-footer" data-reactid=".ti.0.1.3"><div class="Header-social-links" data-reactid=".ti.0.1.3.0"><a class="Header-social-link" href="https://www.facebook.com/theinterceptflm" target="_blank" data-reactid=".ti.0.1.3.0.0"><span class="Icon Icon--Facebook" data-reactid=".ti.0.1.3.0.0.0">f</span></a><a class="Header-social-link" href="https://twitter.com/the_intercept" target="_blank" data-reactid=".ti.0.1.3.0.1"><span class="Icon Icon--Twitter" data-reactid=".ti.0.1.3.0.1.0">t</span></a><a class="Header-social-link" href="/feeds/" data-reactid=".ti.0.1.3.0.2"><span class="Icon Icon--RSS" data-reactid=".ti.0.1.3.0.2.0"></span></a></div><cite class="Header-copyright" data-reactid=".ti.0.1.3.1">© First Look Media. All rights reserved</cite><ul class="Header-footer-list" data-reactid=".ti.0.1.3.2"><li class="Header-footer-list-item" data-reactid=".ti.0.1.3.2.$0"><a class="Header-footer-link" href="/terms-use/" data-reactid=".ti.0.1.3.2.$0.0">Terms of use</a></li><li class="Header-footer-list-item" data-reactid=".ti.0.1.3.2.$1"><a class="Header-footer-link" href="/privacy-policy/" data-reactid=".ti.0.1.3.2.$1.0">Privacy</a></li><li class="Header-footer-list-item" data-reactid=".ti.0.1.3.2.$2"><a href="/sitemap_index.xml" class="Header-footer-link" data-reactid=".ti.0.1.3.2.$2.0">Sitemap</a></li></ul></div></nav></div><div data-reactid=".ti.1"><div class="Post Post--feature" data-reactid=".ti.1.0"><div class="Post-header" data-reactid=".ti.1.0.0"><div class="PostLogo" data-reactid=".ti.1.0.0.0"><div class="Post-logo-sticky-container" data-reactid=".ti.1.0.0.0.0"><div class="Post-logo-sticky" data-reactid=".ti.1.0.0.0.0.0"><div class="Logo" data-reactid=".ti.1.0.0.0.0.0.0"><div class="Logo-bg-block" data-reactid=".ti.1.0.0.0.0.0.0.0"><div class="GridContainer" data-reactid=".ti.1.0.0.0.0.0.0.0.0"><div class="GridRow" data-reactid=".ti.1.0.0.0.0.0.0.0.0.0"><div class="Logo-bg" data-reactid=".ti.1.0.0.0.0.0.0.0.0.0.0"></div></div></div></div><div class="Logo-block" data-reactid=".ti.1.0.0.0.0.0.0.1"><a class="" href="/" data-reactid=".ti.1.0.0.0.0.0.0.1.0"><span class="Logo-fallback" style="color:#fff;" data-reactid=".ti.1.0.0.0.0.0.0.1.0.0"><span data-reactid=".ti.1.0.0.0.0.0.0.1.0.0.0">The</span><br data-reactid=".ti.1.0.0.0.0.0.0.1.0.0.1"/><span data-reactid=".ti.1.0.0.0.0.0.0.1.0.0.2">Intercept_</span></span><svg class="Logo-svg" version="1.1" width="140px" height="50px" viewBox="0 0 140 50" data-reactid=".ti.1.0.0.0.0.0.0.1.0.1"><g data-reactid=".ti.1.0.0.0.0.0.0.1.0.1.0"><path class="Logo-path" fill="#fff" d="M51.731,30.458c1.246,0,2.264,1.425,2.264,3.206l-4.605,0.56C49.517,31.781,50.28,30.458,51.731,30.458 M40.789,8.601 c1.247,0,2.265,1.424,2.265,3.206l-4.606,0.559C38.575,9.924,39.339,8.601,40.789,8.601 M92.774,30.458 c1.247,0,2.264,1.425,2.264,3.206l-4.605,0.56C90.56,31.781,91.323,30.458,92.774,30.458 M128.295,46.463H140v-2.188h-11.705 V46.463z M106.642,31.679c0.279-0.101,0.61-0.178,1.272-0.178c2.544,0,4.275,1.68,4.275,5.42c0,3.104-1.705,5.216-4.173,5.216 c-0.408,0-0.891-0.076-1.374-0.229V31.679z M68.652,33.206h3.18v-4.097c-0.61-0.254-1.017-0.356-1.603-0.356 c-0.992,0-2.188,0.662-3.435,1.654l-0.916,0.713v-2.367h-0.661l-6.285,1.272v0.967l2.112,0.637v10l-2.112,0.763v0.865h9.313v-0.865 l-2.367-0.763v-9.39c0.611-0.229,1.68-0.407,1.934-0.407L68.652,33.206z M80.484,28.753c-3.995,0-8.372,2.494-8.372,8.066 c0,4.631,3.079,6.82,6.412,6.82c1.146,0,2.469-0.153,4.402-0.967l2.341-0.993l-0.33-0.916c-0.586,0.229-1.4,0.382-2.545,0.382 c-3.155,0-5.547-1.883-5.547-6.132c0-2.952,1.705-4.555,3.257-4.555c0.153,0,0.331,0.025,0.484,0.102l1.399,2.646h2.926v-3.613 C83.741,29.16,82.138,28.753,80.484,28.753 M123.792,26.489h-1.171l-5.521,3.18v1.069l1.857,0.178v10.076 c0,1.807,1.425,2.647,3.435,2.647c0.942,0,2.697-0.306,3.868-0.662l2.035-0.636l-0.178-0.941c-0.33,0.076-0.916,0.101-1.246,0.101 c-1.858,0-3.079-0.687-3.079-2.977v-7.455l4.351,0.229v-2.163h-4.351V26.489z M40.128,26.489h-1.171l-5.522,3.18v1.069l1.858,0.178 v10.076c0,1.807,1.425,2.647,3.435,2.647c0.942,0,2.697-0.306,3.868-0.662l2.035-0.636L44.453,41.4 c-0.331,0.076-0.916,0.101-1.247,0.101c-1.857,0-3.078-0.687-3.078-2.977v-7.455l4.351,0.229v-2.163h-4.351V26.489z M58.626,35.293 v-0.407c0-2.189-1.476-6.133-6.437-6.133c-3.766,0-7.558,2.494-7.558,8.066c0,4.555,3.334,6.82,6.972,6.82 c1.069,0,2.621-0.178,4.428-0.967l2.264-0.993l-0.33-0.916c-0.586,0.229-1.4,0.382-2.596,0.382c-2.799,0-5.878-1.628-6.005-5.852 H58.626z M99.67,35.293v-0.407c0-2.189-1.476-6.133-6.438-6.133c-3.766,0-7.557,2.494-7.557,8.066c0,4.555,3.333,6.82,6.972,6.82 c1.068,0,2.62-0.178,4.427-0.967l2.265-0.993l-0.331-0.916c-0.585,0.229-1.4,0.382-2.596,0.382c-2.798,0-5.877-1.628-6.005-5.852 H99.67z M47.685,13.435v-0.407c0-2.188-1.476-6.132-6.438-6.132c-3.766,0-7.557,2.493-7.557,8.066c0,4.555,3.333,6.819,6.972,6.819 c1.069,0,2.621-0.178,4.427-0.967l2.265-0.992l-0.331-0.916c-0.585,0.229-1.399,0.382-2.595,0.382 c-2.799,0-5.878-1.629-6.005-5.853H47.685z M6.438,25.598v15.725L3.97,42.265v0.992h10.865v-0.992l-2.468-0.942V25.598l2.468-0.942 v-0.992H3.97v0.992L6.438,25.598z M31.781,41.629V33.74c0-2.926-1.094-4.987-4.045-4.987c-1.222,0-2.138,0.382-3.334,0.916 l-2.163,0.942v-1.858h-0.661l-6.285,1.272v0.967l2.112,0.637v10l-2.112,0.763v0.865h8.804v-0.865l-1.858-0.763v-9.924 c0.458-0.127,1.247-0.204,1.833-0.204c1.577,0,2.875,0.865,2.875,3.461v6.667l-1.858,0.763v0.865h8.804v-0.865L31.781,41.629z M106.642,28.753h-0.662l-6.285,1.272v0.967l2.112,0.637v15.598l-2.112,0.763v0.865h9.567V47.99l-2.62-0.763v-3.588h0.992 c5.954,0,9.287-3.614,9.287-8.626c0-4.301-3.002-6.26-5.241-6.26c-0.891,0-2.443,0.535-3.868,1.247l-0.967,0.483h-0.203V28.753z M31.527,19.771v-7.888c0-2.926-1.094-4.987-4.046-4.987c-1.221,0-2.137,0.381-3.333,0.916l-2.163,0.941V0h-0.662l-4.911,1.807H0 v4.911h2.316L3.257,3.69h3.181v15.776L3.97,20.407V21.4h10.61v-0.993l-2.213-0.941V3.69h4.783v16.081l-1.857,0.763V21.4h8.55 v-0.866l-1.858-0.763V9.873c0.458-0.127,1.247-0.229,1.832-0.229c1.578,0,2.875,0.865,2.875,3.46v6.667l-1.857,0.763V21.4h8.804 v-0.866L31.527,19.771z" data-reactid=".ti.1.0.0.0.0.0.0.1.0.1.0.0"></path></g></svg></a></div></div></div></div></div><div class="Post-image-block" data-reactid=".ti.1.0.0.1"><div class="ResponsiveImage Post-image" style="padding-top:100%;" data-reactid=".ti.1.0.0.1.0"><noscript data-reactid=".ti.1.0.0.1.0.0"><img src="https://prod01-cdn04.cdn.firstlook.org/wp-uploads/sites/1/2015/10/bush-hiramine-e1445815598620-440x440.jpg" class="ResponsiveImage-image" height="440" width="440"></noscript></div><div class="Post-feature-title-block" data-reactid=".ti.1.0.0.1.1"><h1 class="Post-feature-title" data-reactid=".ti.1.0.0.1.1.0"><a class="Post-title-link" href="/2015/10/26/pentagon-missionary-spies-christian-ngo-front-for-north-korea-espionage/" data-reactid=".ti.1.0.0.1.1.0.0">The Pentagon’s Missionary Spies</a></h1><h2 class="Post-feature-subtitle" data-reactid=".ti.1.0.0.1.1.1"><a class="Post-title-link" href="/2015/10/26/pentagon-missionary-spies-christian-ngo-front-for-north-korea-espionage/" data-reactid=".ti.1.0.0.1.1.1.0">U.S. Military Used Christian NGO as Front for North Korea Espionage</a></h2></div></div><div class="Post-header-grid" data-reactid=".ti.1.0.0.2"><div class="Post-header-row" data-reactid=".ti.1.0.0.2.0"><div class="PostSocial" data-reactid=".ti.1.0.0.2.0.0"><div class="Post-social-container" data-reactid=".ti.1.0.0.2.0.0.0"><div class="Post-social" data-reactid=".ti.1.0.0.2.0.0.0.0"><div class="Post-social-grid" data-reactid=".ti.1.0.0.2.0.0.0.0.0"><div class="Post-social-row" data-reactid=".ti.1.0.0.2.0.0.0.0.0.0"><div class="Post-social-block" data-reactid=".ti.1.0.0.2.0.0.0.0.0.0.0"><div class="Post-social-inner-block" data-reactid=".ti.1.0.0.2.0.0.0.0.0.0.0.0"><div class="Post-social-link-block" data-reactid=".ti.1.0.0.2.0.0.0.0.0.0.0.0.$facebook"><a class="Post-social-link Post-social-link--facebook" href="https://www.facebook.com/sharer/sharer.php?u=http%3A%2F%2Finterc.pt%2F1LwXM2B" data-reactid=".ti.1.0.0.2.0.0.0.0.0.0.0.0.$facebook.0">f</a></div><div class="Post-social-link-block" data-reactid=".ti.1.0.0.2.0.0.0.0.0.0.0.0.$twitter"><a class="Post-social-link Post-social-link--twitter" href="https://twitter.com/intent/tweet?text=U.S.%20Military%20Used%20Christian%20NGO%20as%20Front%20for%20North%20Korea%20Espionage%20http%3A%2F%2Finterc.pt%2F1LwXM2B%20by%20%40matthewacole" data-reactid=".ti.1.0.0.2.0.0.0.0.0.0.0.0.$twitter.0">t</a></div><div class="Post-social-link-block" data-reactid=".ti.1.0.0.2.0.0.0.0.0.0.0.0.$email"><a class="Post-social-link Post-social-link--email" href="mailto:?subject=U.S.%20Military%20Used%20Christian%20NGO%20as%20Front%20for%20North%20Korea%20Espionage&amp;body=http://interc.pt/1LwXM2B" data-reactid=".ti.1.0.0.2.0.0.0.0.0.0.0.0.$email.0">✉</a></div><div class="Post-social-link-block" data-reactid=".ti.1.0.0.2.0.0.0.0.0.0.0.0.$comments"><a class="Post-social-link Post-social-link--comments" href="/2015/10/26/pentagon-missionary-spies-christian-ngo-front-for-north-korea-espionage/?comments=1#comments" data-reactid=".ti.1.0.0.2.0.0.0.0.0.0.0.0.$comments.0"><span data-reactid=".ti.1.0.0.2.0.0.0.0.0.0.0.0.$comments.0.$1">⎕</span><br data-reactid=".ti.1.0.0.2.0.0.0.0.0.0.0.0.$comments.0.1:$2"/><span class="Post-social-comment-text" data-reactid=".ti.1.0.0.2.0.0.0.0.0.0.0.0.$comments.0.1:$3">93</span></a></div></div></div></div></div></div></div></div><div class="Post-header-block" data-reactid=".ti.1.0.0.2.0.1"><div data-reactid=".ti.1.0.0.2.0.1.0"><div class="Post-thumb-credit-block" data-reactid=".ti.1.0.0.2.0.1.0.0"><div class="Post-thumb-credit" data-reactid=".ti.1.0.0.2.0.1.0.0.0">Photo: Saul Loeb/AFP/Getty Images</div></div><div class="Post-title-block" data-reactid=".ti.1.0.0.2.0.1.0.1"><div class="PostByline PostByline--feature" data-reactid=".ti.1.0.0.2.0.1.0.1.0"><div class="PostByline-names-with-images" data-reactid=".ti.1.0.0.2.0.1.0.1.0.0"><a class="PostByline-image-link" href="/staff/matthewcole/" data-reactid=".ti.1.0.0.2.0.1.0.1.0.0.$81"><img class="PostByline-image" src="https://prod01-cdn04.cdn.firstlook.org/wp-uploads/sites/1/2015/06/250d845-350x350.jpg" width="60" height="60" data-reactid=".ti.1.0.0.2.0.1.0.1.0.0.$81.0"/><span class="PostByline-name" data-reactid=".ti.1.0.0.2.0.1.0.1.0.0.$81.1">Matthew Cole</span></a></div><div class="PostByline-images" data-reactid=".ti.1.0.0.2.0.1.0.1.0.1"><a class="PostByline-image-link" href="/staff/matthewcole/" data-reactid=".ti.1.0.0.2.0.1.0.1.0.1.$81"><img class="PostByline-image" src="https://prod01-cdn04.cdn.firstlook.org/wp-uploads/sites/1/2015/06/250d845-350x350.jpg" width="60" height="60" data-reactid=".ti.1.0.0.2.0.1.0.1.0.1.$81.0"/></a></div><div class="PostByline-names" data-reactid=".ti.1.0.0.2.0.1.0.1.0.2"><a class="PostByline-link" href="/staff/matthewcole/" data-reactid=".ti.1.0.0.2.0.1.0.1.0.2.$81">Matthew Cole</a></div><br data-reactid=".ti.1.0.0.2.0.1.0.1.0.3"/><span class="PostByline-date" data-reactid=".ti.1.0.0.2.0.1.0.1.0.4">2015-10-26T15:05:22+00:00</span></div></div></div></div></div></div></div><div class="Post-body" data-reactid=".ti.1.0.1"><div class="Post-thumb-credit-block" data-reactid=".ti.1.0.1.0"></div><div class="Post-content-block-outer" data-reactid=".ti.1.0.1.1"><div class="GridContainer" data-reactid=".ti.1.0.1.1.0"><div class="GridRow" data-reactid=".ti.1.0.1.1.0.0"><div class="Post-content-block" data-reactid=".ti.1.0.1.1.0.0.0"><div class="Post-content-block-inner" data-reactid=".ti.1.0.1.1.0.0.0.0"><div class="PostContent" data-reactid=".ti.1.0.1.1.0.0.0.0.1"><div data-reactid=".ti.1.0.1.1.0.0.0.0.1.$p-0"><p><span class="dropcap">O</span><u>N MAY 10, 2007,</u> in the East Room of the White House, President George W. Bush presided over a ceremony honoring the nation’s most accomplished community service leaders. Among those collecting a President’s Volunteer Service Award that afternoon was Kay Hiramine, the Colorado-based founder of a multimillion-dollar humanitarian organization.</p>
100
+ <p>Hiramine’s NGO, Humanitarian International Services Group, or HISG, won special praise from the president for having demonstrated how a private charity could step in quickly in response to a crisis. “In the aftermath of Hurricane Katrina,” read Hiramine’s citation, “HISG’s team launched a private sector operation center in Houston that mobilized over 1,500 volunteers into the disaster zone within one month after the hurricane.”</p>
101
+ <p>But as the evangelical Christian Hiramine crossed the stage to shake hands with President Bush and receive his award, he was hiding a key fact from those in attendance: He was a Pentagon spy whose NGO was funded through a highly classified Defense Department program.</p>
102
+ <p><div class='img-wrap align-right width-fixed' style='width:300px'> <img class="alignright size-medium wp-image-41104" src="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2015/10/boykin.jpg" alt="Gen. William Boykin addresses the crowd during a speech at Colorado Christian University on Monday, May 2, 2011. AAron Ontiveroz, The Denver Post" /></p>
103
+ <p class="caption">Lt. Gen. William &#8220;Jerry&#8221; Boykin giving a speech at Colorado Christian University on Monday, May 2, 2011.</p>
104
+ <p><p class='caption source pullright' style=''>Photo: Aaron Ontieroz/Denver Post/Getty Images</p></div>The secret Pentagon program, which dates back to December 2004, continued well into the Obama presidency. It was the brainchild of a senior Defense Department intelligence official of the Bush administration, Lt. Gen. William “Jerry” Boykin. Boykin, an evangelical Christian who ran into criticism <a href="http://www.nytimes.com/2003/10/17/world/rumsfeld-praises-army-general-who-ridicules-islam-as-satan.html">in 2003</a> for his statements about Islam, settled on the ruse of the NGO as he was seeking new and unorthodox ways to penetrate North Korea.</p>
105
+ <p>Long a source of great concern to the U.S. and Western Europe because of its nuclear program, North Korea was the most difficult intelligence target for the U.S. “We had nothing inside North Korea,” one former military official familiar with U.S. efforts in the country told me. “Zero.” But Hiramine’s NGO, by offering humanitarian aid to the country’s desperate population, was able to go where others could not.</p>
106
+ <p>It is unclear how many HISG executives beyond Hiramine knew about the operation; Hiramine did not respond to repeated requests for comment and neither did any of his senior colleagues. Few, if any, of the rest of the organization’s staff and volunteers had any knowledge about its role as a Pentagon front, according to former HISG employees and former military officials.</p>
107
+ <p>The revelation that the Pentagon used an NGO and unwitting humanitarian volunteers for intelligence gathering is the result of a monthslong investigation by <em>The</em> <em>Intercept</em>. In the course of the investigation, more than a dozen current and former military and intelligence officials, humanitarian aid workers, missionaries, U.S. officials, and former HISG staffers were interviewed. The U.S. government officials who were familiar with the Pentagon operation and HISG’s role asked for anonymity because discussing classified military and intelligence matters would put them at risk of prosecution. The Pentagon had no comment on HISG or the espionage operations in North Korea.</p>
108
+ <p>Before it was finally dismantled in 2013, Hiramine’s organization received millions in funding from the Pentagon through a complex web of organizations designed to mask the origin of the cash, according to one of the former military officials familiar with the program, as well as documentation reviewed for this article.</p>
109
+ <p>The use of HISG for espionage was “beyond the pale” of what the U.S. government should be allowed to do, said Sam Worthington, president of InterAction, an association of nearly 200 American NGOs. The practice of using humanitarian workers as spies “violates international principles” and puts legitimate aid and development workers at risk, he argued.</p>
110
+ <p>“It is unacceptable that the Pentagon or any other U.S. agency use nonprofits for intelligence gathering,” Worthington said. “It is a violation of the basic trust between the U.S. government and its civic sector.”</p>
111
+ <iframe width='100%' height='400px' src='//www.youtube.com/embed/_oLJtffyMSo?start=218&amp;end=275' frameborder='0' allowfullscreen></iframe>
112
+ <p class="caption">Kay Hiramine discussing his faith with Dave Yarnes and Gene Strite.</p>
113
+ <p>&nbsp;</p>
114
+ <p><span class="dropcap">H</span><u>ISG WAS ESTABLISHED</u> shortly after 9/11, when Hiramine led a group of three friends in creating a humanitarian organization that they hoped could provide disaster relief and sustainable development in poor and war-torn countries around the world, according to the organization’s incorporation documents.</p>
115
+ <p>In its first two years, HISG was little more than a fledgling faith-based charity. Just after the U.S. invaded Afghanistan, Hiramine and his friends shipped medical supplies to a hospital there. By 2003, HISG had collaborated with a small Pentagon group called the Afghanistan Reachback Office, which was set up to coordinate reconstruction activities.</p>
116
+ <p>That same year, Boykin was named deputy in the newly created office of the undersecretary of defense for intelligence. Boykin had a special operations career that spanned many of the U.S. military’s most high-risk missions prior to 9/11. He served as commander of the Army’s most elite unit, commonly known as Delta Force, and oversaw the Black Hawk Down mission in Somalia in 1993 and the hunt for Pablo Escobar in Colombia.</p>
117
+ <p><div class='img-wrap align-right width-fixed' style='width:219px'> <a href="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2015/10/cambone.jpg"><img class="alignright size-medium wp-image-41106" src="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2015/10/cambone.jpg" alt="WASHINGTON - AUGUST 11: Stephen A. Cambone, Under Secretary of Defense for Intelligence, testifies before the House Armed Services Committee on Capitol Hill August 11, 2004 in Washington, DC. The committee is hearing testimony on the commissions final report and recommondations that was released last month. (Photo by Mark Wilson/Getty Images)" /></a></p>
118
+ <p class="caption">Stephen Cambone, undersecretary of defense for intelligence, on August 11, 2004, in Washington, D.C.</p>
119
+ <p><p class='caption source pullright' style=''>Photo: Mark Wilson/Getty Images</p></div>With the war on terror intensifying, Defense Secretary Donald Rumsfeld charged Boykin and his superior, Stephen Cambone, with the task of increasing the department’s ability to conduct intelligence operations independent from the CIA. Cambone and Boykin concluded that the Pentagon had ceded too much of its intelligence-gathering role in the preceding decades to the CIA, and it was time to recalibrate the balance. The CIA was kept in the loop. Within a year of his arrival to his new position at the Pentagon, Boykin dispatched a Pentagon staffer to the CIA to help coordinate the new and increased human intelligence operations abroad.</p>
120
+ <p>According to former military officials, Boykin took a page from the CIA’s playbook and looked for ways to provide cover for Pentagon espionage operations. Hiramine’s group was one of several NGOs used by the Pentagon in this way. Some, like HISG, already existed as fledgling organizations, while others were created from scratch by the Pentagon.</p>
121
+ <p>The espionage effort was one of the most secretive programs at the Pentagon, called an unacknowledged and waived &#8220;special access program,&#8221; or SAP. The designation meant that Defense Secretary Rumsfeld was required only to brief the chair and ranking members of both appropriations and armed services committees, who were not allowed to take notes or bring in staffers.</p>
122
+ <p>The Defense Department intelligence operations primarily focused on counterterrorism, but the efforts also extended to Iran and North Korea, where the military sought elusive intelligence on those countries’ nuclear programs.</p>
123
+ <p>That’s where HISG came in.</p>
124
+ <p>At the time the Pentagon program launched, the NGO had been responsible for many shipments of medical equipment, clothing, and disaster relief supplies around the world.</p>
125
+ <p>On at least one occasion in the period between 2004 and 2006, Hiramine, through HISG, helped coordinate a humanitarian shipment to North Korea.</p>
126
+ <p>The charity’s offer of donated clothing was the kind of faith-based donation the North Korean government would occasionally accept to help its population endure the country’s harsh winters. Unbeknownst to the North Korean government, however, underneath the clothing was a hidden compartment containing scores of bibles.</p>
127
+ <p>Shipping bibles into North Korea was risky — North Korea severely restricts any religious activities that deviate from communist ideology. But that was the point — if Hiramine’s bibles could make it, the Pentagon would know that it could use the same smuggling method to get military sensors and equipment into the country.</p>
128
+ <p>“We sent the bibles in as a test run,” a former senior Pentagon official told me. “They got through without the North Koreans discovering them.”</p>
129
+ <p>The Pentagon tasked Hiramine with gathering the intelligence it needed inside North Korea, and Hiramine would in turn utilize HISG’s access to the country to complete the assignments, according to two former military officials with knowledge of the effort. Hiramine, in his role as CEO of HISG, tapped Christian missionaries, aid workers, and Chinese smugglers to move equipment into and around North Korea — none of whom had any idea that they were part of a secret Pentagon operation.</p>
130
+ <p>On at least two different occasions, in 2007 and again in 2010, Hiramine entered North Korea under humanitarian cover, according to a former HISG employee familiar with his travel. HISG documents show that the organization boasted of having shipped winter clothing, including &#8220;ski jackets,&#8221; into North Korea during the NGO&#8217;s first 10 years of operation.</p>
131
+ <p><div class='img-wrap align-right width-fixed' style='width:300px'> <a href="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2015/10/hiramine-nkorea.jpg"><img class="alignright size-medium wp-image-41199" src="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2015/10/hiramine-nkorea.jpg" alt="hiramine-nkorea" /></a></p>
132
+ <p class="caption">Kay Hiramine in North Korea, September 24, 2007.</p>
133
+ <p><p class='caption source pullright' style=''>Photo:Kay Hiramine/Twitpic</p></div>Because American intelligence has so few assets inside North Korea, much of Hiramine’s task was to find transportation routes to move military equipment — and potentially clandestine operatives — in and around the country. The Pentagon would eventually move sensors and small radio beacons through Hiramine’s transportation network, according to another former military official. Much of what Hiramine was doing was what the military refers to as “operational preparation of the environment,” or OPE, a category that encompasses clandestine intelligence gathering and prepositioning equipment inside a country for future conflicts.</p>
134
+ <p>“We needed collection devices, spoofers” — used to disrupt North Korean military devices or radio signals — “and [equipment] to measure nuclear anomalies,” the same former military official told me. The military hardware also included shortwave radios that could be used to help a downed pilot to escape in the event of a future conflict with North Korea.</p>
135
+ <p>None of the former officials with knowledge of the program whom I spoke with would say where exactly the equipment was positioned or describe the intelligence that Hiramine was able to gather, citing the sensitivity of the matter. But two former officials said the intelligence and the network used to gain access inside the country were formally distributed to the CIA in what the U.S. intelligence community calls IIRs, or &#8220;intelligence information reports,&#8221; indicating the CIA was aware the Pentagon was using an NGO to conduct the operations. The CIA referred all questions about Hiramine’s intelligence reports to the Pentagon.</p>
136
+ <p>“If true, to use unwitting aid workers on behalf of an intelligence operation, people who genuinely do humanitarian work, to turn their efforts into intel collection is unacceptable,” said Rep. Jan Schakowsky, who served on the House Intelligence Committee from 2007 until this year. Schakowsky said she was unaware of the program, and unaware of any briefings given to the committee chair and ranking members.</p>
137
+ <p>“Now we have people who have been hired to do some good work and become unwitting accomplices to an intelligence mission? They can face all kinds of retaliation. It is completely unacceptable,” Schakowsky said.<div class='img-wrap align-bleed width-auto' style='width:auto'> <a href="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2015/10/hawkins-hiramines.jpg"><img class="alignnone size-large wp-image-41107" src="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2015/10/hawkins-hiramines.jpg" alt="Jack Hawkins, Director of Volunteers for Prosperity (USAID) at the White House celebration of Asian Pacific Heritage Month.Kay Hiramine of Colorado Springs, Colo., recipient of the President's Volunteer Service award and Volunteers for Prosperity participant." /></a></p>
138
+ <p class="caption overlayed">Jack Hawkins of USAID with Julie Hiramine and Kay Hiramine of Colorado Springs, Colo., receiving the President&#8217;s Volunteer Service Award at the White House, May 10, 2007.</p>
139
+ <p><p class='caption source' style=''>Photo: M. T. Harmon/Nation Service</p></div></p>
140
+ <p><span class="dropcap">I</span><u>T IS UNCLEAR</u> how exactly Hiramine became involved in the Pentagon espionage effort, but his nonprofit presented a convenient vehicle for the Pentagon to hide intelligence-gathering missions and shipments of clandestine military equipment into denied areas.</p>
141
+ <p>Using an approach pioneered by the CIA, the Pentagon obscured the origin of the funding for the organization. “If you expose the money, you expose the network,” said a former military official who is critical of the program&#8217;s lack of oversight.</p>
142
+ <p>The organization received one stream of funding via a for-profit company called Private Sector Consulting, which was run by Hiramine, his partner Michael McCausland, and other HISG executives, and shared addresses and phone numbers with HISG in Colorado, according to public records. HISG reported in 2009 that it had no paid employees; its 30 staffers were designated “volunteers.” According to three people who worked for HISG, however, the salaries and benefits of the NGO’s employees were paid by the consulting firm. In 2009, for example, tax records show that Hiramine drew no salary as the head of Humanitarian International Services Group, yet earned $281,351 from Private Sector Consulting.</p>
143
+ <p>“It was our pure funding that made” HISG, one of the former military officials told me, explaining how the Pentagon provided the money for salaries to Private Sector Consulting.</p>
144
+ <p>A second revenue stream arrived at HISG via a private trust and another nonprofit, Working Partners Foundation, which was incorporated in late 2004, around the same time that Private Sector Consulting was launched and the Pentagon program was rolled out.</p>
145
+ <p>Here’s how it worked.</p>
146
+ <p>The Pentagon funneled money to the private fund, which was run out of a law office in Minnetonka, Minnesota, according to a former military official familiar with the arrangement. The fund, called New Millennium Trust, was run by retired Army Col. Thomas Lujan.</p>
147
+ <p>Lujan also had a historical distinction, according to an online <a href="http://www.reformbh.com/new-page-4/">bio</a>: He was the first military lawyer assigned to Delta Force — and would have known Boykin most of his professional career. According to a <a href="http://www.reformbh.com/new-page-4/,">public website</a>, Lujan, who retired in 1998, still maintains top-secret government clearance. Lujan declined to comment.</p>
148
+ <p><div class='img-wrap align-right width-fixed' style='width:300px'> <a href="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2015/10/king-boykin.jpg"><img class="alignright size-medium wp-image-41109" src="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2015/10/king-boykin.jpg" alt="king-boykin" /></a></p>
149
+ <p class="caption">Screen grab of Yale King (center) and Boykin (right) on the Oak Initiative discussing King&#8217;s auto dealership.</p>
150
+ <p><p class='caption source pullright' style=''>Photo: The Oak Initiative</p></div>Next, according to tax filings, New Millennium Trust would donate money to Working Partners Foundation, which was run by a prominent Colorado car dealer named Yale King starting in October 2004. King was also a “dear friend” of Boykin. In his autobiography, <em>Never Surrender</em>, Boykin recalled receiving a fax from King while recuperating from an injury sustained during an attack on the U.S. base at Mogadishu’s airport. The fax consisted of a single Biblical verse. “I can’t explain why Yale sent that fax halfway around the world when he did,” Boykin wrote, “but I felt it was exactly the message God wanted me to hear.”</p>
151
+ <p>By 2006, responsibility for the program shifted away from Boykin. He retired in the summer of 2007. But the former military official critical of the effort called the HISG operation a “jobs program” for Boykin’s friends and former military colleagues. Boykin did not respond to requests for comment.</p>
152
+ <p>King earned $252,000 as the director of Working Partners Foundation in 2006. According to tax records, New Millennium Trust was the sole funder of Working Partners Foundation. The Pentagon money passed through King’s foundation, which made donations to Hiramine and HISG. In total, New Millennium Trust gave Working Partners Foundation $11.9 million between 2005 and 2014. Working Partners Foundation, in turn, passed $6.5 million to HISG between 2005 and 2012, according to tax filings.</p>
153
+ <p>To help Working Partners maintain the appearance of a legitimate charity, each year the foundation donated smaller amounts of cash to bona fide NGOs, such as Catholic Relief Services, which says it had no knowledge of any Pentagon link to the money. In at least one case, according to tax filings, Working Partners gave roughly $200,000 to a U.S.-based ministry that &#8220;deliver[s] Bibles &#8230; to the persecuted church in the Gospel restricted nation of North Korea.&#8221; Working Partners also funneled almost $500,000 to a medical charity run by Yale King&#8217;s wife in the first five years after Working Partners was established, according to tax records.</p>
154
+ <p>(King eventually moved Working Partners to Palm Beach, Florida, where it was transferred to a tax and estate lawyer named Robert Simses. Simses declined to comment, and King did not respond to multiple requests.)</p>
155
+ <p>One of the former military officials estimated that the Pentagon provided at least $15 million to HISG over the course of the program through these revenue streams.</p>
156
+ <p>“Kay never talked about where we got our funding from,” said Tom Jennings, who worked as HISG’s Asia program director for six years. “And I never felt that I was supposed to ask about it.” Jennings said he didn’t know that Hiramine had worked for the Pentagon on a secret espionage program, and now fears the revelations that HISG was funded by the Pentagon could taint the legitimate disaster relief and development programs he helped lead.</p>
157
+ <p>According to Hiramine’s LinkedIn profile, Private Sector Consulting “provided support services,” such as disaster response, to government agencies including the Department of Homeland Security, Department of Defense, and FEMA.</p>
158
+ <p>“I warned them they had to keep Private Sector Consulting separate,” said a former HISG employee, who was familiar with some of the contracts with the U.S. government. (This individual still works in humanitarian aid and did not want to be publicly associated with a Pentagon espionage program so was granted anonymity.) The former employee “didn’t have a clue” the nonprofit group was fronting for the Pentagon.<div class='img-wrap align-bleed width-auto' style='width:auto'> <a href="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2015/10/HISG_NGO-graphic.jpg"><img class="alignnone size-large wp-image-41116" src="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2015/10/HISG_NGO-graphic.jpg" alt="HISG_NGO-graphic" /></a> <p class='caption source' style=''>Photo: Hiramine, Boykin: Getty Images (2); King: AP</p></div></p>
159
+ <p>&nbsp;</p>
160
+ <p><span class="dropcap">A</span><u>SIDE FROM HIRAMINE</u> and possibly other top executives, those who worked for HISG were never aware they were involved in a Pentagon intelligence program, or that Hiramine was working for the U.S. government, according to two former military officials.</p>
161
+ <p>“They were never witting,” said the former senior Pentagon official. “That was the point.”</p>
162
+ <p>In all, HISG operated in more than 30 countries, significantly funded by the Pentagon.</p>
163
+ <p>According to former employees, public records, and HISG’s former website, the nonprofit conducted disaster relief; provided food, medical supplies, and clothing; and helped start small businesses in countries including Niger, Mali, Ethiopia, Kenya, Iran, Lebanon, Yemen, and China.</p>
164
+ <p>“They gave us a tremendous latitude to do tremendous amounts of good,” Jennings said. “We were able to go to the poor in villages, train them how to start businesses and create jobs, so that they could begin to lift themselves out of poverty and regain their self-dignity. Looking back, that was one of the most fulfilling times in my life.”</p>
165
+ <p><div class='img-wrap align-left width-fixed' style='width:300px'> <a href="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2015/10/hiramine-mcclausland.jpg"><img class="alignleft size-medium wp-image-41108" src="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2015/10/hiramine-mcclausland.jpg" alt="" /></a></p>
166
+ <p class="caption">Kay Hiramine and Michael McCausland</p>
167
+ <p><p class='caption source pullright' style=''>Photo: HISG</p></div>But behind all the global charity work was an ulterior motive for military officials: The longer HISG operated and became more legitimate, the more opportunities would be available to U.S. military and intelligence officials to run operations in other countries as they had in North Korea. In other words, Hiramine’s ability to use HISG to form partnerships and working relationships with other unsuspecting aid workers and missionaries would give the Pentagon more places to spy, according to one of the former military officials. That official would not say whether Hiramine was tasked with operating in countries besides North Korea.</p>
168
+ <p>Hiramine and HISG were successful enough in their humanitarian efforts to garner that 2007 honor, the President’s Volunteer Service Award. It is not known if the White House was aware that HISG was part of a Pentagon program.</p>
169
+ <p>“If these people had been caught and tried and executed in downtown Pyongyang you’d really understand the risk,” said Robert Baer, a retired CIA officer who spent more than 20 years conducting espionage operations.</p>
170
+ <p>Using humanitarian and aid workers for gathering intelligence has always been risky. U.S. intelligence policy prohibits using American clergy, journalists, or Peace Corps volunteers as a cover to conduct espionage. Using NGOs is not strictly prohibited, but though it is not unprecedented, it is dangerous.</p>
171
+ <p>In recent years, the risk of using legitimate aid workers as cover for spying has had deadly repercussions.</p>
172
+ <p>In 2011, the CIA directed a Pakistani doctor to collect DNA samples of the suspected family members of Osama bin Laden under the guise of a hepatitis vaccination program in Abbottabad, Pakistan. After the raid, the Pakistani doctor was arrested and imprisoned by Pakistani authorities, and the Taliban later killed several medical professionals who were trying to conduct polio eradication campaigns, along with their guards.</p>
173
+ <p>The Taliban claimed the vaccination program was part of a Western intelligence plot. Cases of polio, which has been eradicated in almost every country in the world, have spiked in Pakistan in recent years. In 2014, a White House adviser informed U.S. public health school deans that the CIA is no longer allowed to use vaccination programs as an intelligence cover.</p>
174
+ <p>“The reward is almost zero given the risk because using NGOs — especially unwitting [ones] — produces very weak intelligence,” said Robert Baer, the retired CIA officer. “This is pure Graham Greene, <em>Our Man in Havana</em> stuff,” he continued, referring to the farcical tale of a vacuum cleaner salesman who was recruited to spy on Cuba’s missile program.</p>
175
+ <p><span class="dropcap">D</span><u>ESPITE STARTING DURING</u> the Bush presidency, the North Korea espionage program continued through Obama’s first term. It’s unclear if the president was briefed. The White House declined to comment.</p>
176
+ <p>In 2012, now-retired Adm. William McRaven, the commander of the Special Operations Command in Tampa, Florida, who oversaw the Osama bin Laden raid, shut down the North Korea spying program.</p>
177
+ <div class='img-wrap align-right width-fixed' style='width:300px'>
178
+ <p><a href="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2015/10/mcraven.jpg"><img class="alignright size-medium wp-image-41110" src="https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2015/10/mcraven.jpg" alt="Image #: 21476399 U.S. Navy Admiral William McRaven testifies before the Senate Armed Services Committee in Washington March 5, 2013, with regard to the Defense Authorization Request for fiscal year 2014. REUTERS/Gary Cameron (UNITED STATES - Tags: MILITARY POLITICS PROFILE HEADSHOT) REUTERS /GARY CAMERON /LANDOV" /></a></p>
179
+ <p class="caption">U.S. Navy Adm. William McRaven testifies before the Senate Armed Services Committee in Washington, March 5, 2013.</p>
180
+ <p><p class='caption source pullright' style=''>Photo: Gary Cameron/Reuters /Landov</p></div>“McRaven told us he shut it down because he was nervous about the flap if it ever got out that the Pentagon had used a bunch of evangelicals and missionaries as spies,” said one former military officer, adding that if the program had produced better intelligence McRaven would have considered keeping it up and running. McRaven did not respond to a request for comment.</p>
181
+ <p>In January 2013, Hiramine and his fellow HISG executives announced to their employees that they were shuttering the organization. “We got no warning,” said Jennings, the former HISG program director. “We had no jobs, no severance, and no explanation. All they said was ‘we lost our funding.’”</p>
182
+ <p>According to Working Partners Foundation tax returns, 2013 was the first year since it began operating in 2005 that no funds were given to HISG. Instead, the nonprofit gave roughly $700,000 &#8212; funds that were likely allocated before McRaven ordered the program ended &#8212; to a range of relief and nonprofit groups, including a Washington-based defense think tank.</p>
183
+ <p>Some of HISG’s infrastructure remained, but Hiramine left and his main partner, Michael McCausland, transformed what was left of HISG into a new organization called Sustainable Communities Worldwide.</p>
184
+ <p>With HISG gone, the Pentagon began to dismantle the funding mechanisms that propped up the organization.</p>
185
+ <p>Private Sector Consulting was dissolved in December 2013, and this year, for the first time since it was created, Working Partners Foundation did not receive any money from New Millennium Trust.</p>
186
+ <p>According to tax filings, Working Partners wrote one final check for $475,500 to the Bureau of the Fiscal Service, a division of the Treasury Department, earlier this year. &#8220;The board of directors elected to terminate the foundation and pay all funds remaining to the United States treasury to be used to reduce the public debt,” according to public tax records. Working Partners was dissolved in January.</p>
187
+ <p>In other words, Working Partners gave its remaining funds as a gift to the federal government, a strange move for a private foundation — though not, perhaps, for one serving as cover for a now-terminated Pentagon program.</p>
188
+ <p><strong>Update: October 28, 2015</strong></p>
189
+ <p>This report makes reference to a donation from Working Partners Foundation to Catholic Relief Services, based on Working Partners Foundation’s tax filings. Catholic Relief Services, which conducted a review after publication, said its own records contained no indication it received money from Working Partners Foundation or HISG.</p>
190
+ <p><em><a href="https://theintercept.com/staff/margotwilliams/">Margot Williams</a> and <a href="https://theintercept.com/staff/leefang/">Lee Fang</a> contributed to this report. </em></p>
191
+ <p><em>Top photo: U.S. President George W. Bush with Kay Hiramine prior to presenting him with a President&#8217;s Volunteer Service Award on May 10, 2007, in the East Room of the White House (photo flipped). </em></p>
192
+ </div></div><div class="Post-contact Post-contact--1" data-reactid=".ti.1.0.1.1.0.0.0.0.2"><h4 class="Post-contact-header" data-reactid=".ti.1.0.1.1.0.0.0.0.2.0">Contact the author:</h4><div class="Post-contact-author" data-reactid=".ti.1.0.1.1.0.0.0.0.2.1:$81"><a class="" href="/staff/matthewcole/" data-reactid=".ti.1.0.1.1.0.0.0.0.2.1:$81.0"><img class="Post-contact-author-image" src="https://prod01-cdn04.cdn.firstlook.org/wp-uploads/sites/1/2015/06/250d845-350x350.jpg" data-reactid=".ti.1.0.1.1.0.0.0.0.2.1:$81.0.0"/></a><p class="Post-contact-details" data-reactid=".ti.1.0.1.1.0.0.0.0.2.1:$81.1"><a class="Post-contact-link Post-contact-link--name" href="/staff/matthewcole/" data-reactid=".ti.1.0.1.1.0.0.0.0.2.1:$81.1.0">Matthew Cole</a><a class="Post-contact-link" href="mailto:matthew.cole@theintercept.com" data-reactid=".ti.1.0.1.1.0.0.0.0.2.1:$81.1.1"><span class="Icon Icon--Envelope" data-reactid=".ti.1.0.1.1.0.0.0.0.2.1:$81.1.1.0">✉</span><span data-reactid=".ti.1.0.1.1.0.0.0.0.2.1:$81.1.1.1">matthew.cole@​theintercept.com</span></a><a class="Post-contact-link" href="//twitter.com/@matthewacole" target="_blank" data-reactid=".ti.1.0.1.1.0.0.0.0.2.1:$81.1.2"><span class="Icon Icon--Twitter" data-reactid=".ti.1.0.1.1.0.0.0.0.2.1:$81.1.2.0">t</span><span data-reactid=".ti.1.0.1.1.0.0.0.0.2.1:$81.1.2.1">@matthewacole</span></a></p></div></div><a id="comments" href="/2015/10/26/pentagon-missionary-spies-christian-ngo-front-for-north-korea-espionage/?comments=1#comments" class="Post-open-comments-link" data-reactid=".ti.1.0.1.1.0.0.0.0.4"><span class="Icon Icon--Arrow_01_Down" data-reactid=".ti.1.0.1.1.0.0.0.0.4.0">˅</span><span data-reactid=".ti.1.0.1.1.0.0.0.0.4.1"> </span><span class="Icon Icon--Comment" data-reactid=".ti.1.0.1.1.0.0.0.0.4.2">⎕</span><span data-reactid=".ti.1.0.1.1.0.0.0.0.4.3"> </span><span data-reactid=".ti.1.0.1.1.0.0.0.0.4.4">93 Comments (closed)</span></a></div><span data-reactid=".ti.1.0.1.1.0.0.0.1"></span></div></div></div></div></div></div><div class="HomeSquirrel" data-reactid=".ti.1.1"><div class="HomeSquirrel-content-block" data-reactid=".ti.1.1.0"><div class="GridContainer" data-reactid=".ti.1.1.0.0"><div class="GridRow" data-reactid=".ti.1.1.0.0.0"><a class="HomeSquirrel-intro" href="/drone-papers/" data-reactid=".ti.1.1.0.0.0.0"><h1 class="HomeSquirrel-title" data-reactid=".ti.1.1.0.0.0.0.0">The Drone Papers</h1><p class="HomeSquirrel-description" data-reactid=".ti.1.1.0.0.0.0.1"><span data-reactid=".ti.1.1.0.0.0.0.1.0">The Intercept has obtained a cache of secret documents detailing the inner workings of the U.S. military’s assassination program in Afghanistan, Yemen, and Somalia. The documents, provided by a whistleblower, offer an unprecedented glimpse into Obama’s drone wars.</span></p><div class="HomeSquirrel-readStories" data-reactid=".ti.1.1.0.0.0.0.2"><span data-reactid=".ti.1.1.0.0.0.0.2.0">Read the stories </span><span class="Icon Icon--Arrow_02_Right" data-reactid=".ti.1.1.0.0.0.0.2.1">⟶</span></div></a><div class="HomeSquirrel-posts" data-reactid=".ti.1.1.0.0.0.1"><div data-reactid=".ti.1.1.0.0.0.1.0:$40294"><div data-reactid=".ti.1.1.0.0.0.1.0:$40294.0"></div><div class="Promo Promo--" data-reactid=".ti.1.1.0.0.0.1.0:$40294.1"><a class="Promo-link" href="/drone-papers/the-assassination-complex/" data-reactid=".ti.1.1.0.0.0.1.0:$40294.1.0"><div class="GridRow" data-reactid=".ti.1.1.0.0.0.1.0:$40294.1.0.0"><div class="Promo-image-container" data-reactid=".ti.1.1.0.0.0.1.0:$40294.1.0.0.0"><div class="Promo-image-block" data-reactid=".ti.1.1.0.0.0.1.0:$40294.1.0.0.0.0"><div class="ResponsiveImage Promo-image" style="padding-top:50%;" data-reactid=".ti.1.1.0.0.0.1.0:$40294.1.0.0.0.0.0"><noscript data-reactid=".ti.1.1.0.0.0.1.0:$40294.1.0.0.0.0.0.0"><img src="https://prod01-cdn04.cdn.firstlook.org/wp-uploads/sites/1/2015/10/SQ01_TheAssassinationComplex01-promo.jpg" class="ResponsiveImage-image" height="220" width="440"></noscript></div></div></div><div class="Promo-text" data-reactid=".ti.1.1.0.0.0.1.0:$40294.1.0.0.1"><div class="Promo-title-block" data-reactid=".ti.1.1.0.0.0.1.0:$40294.1.0.0.1.0"><h4 class="Promo-title" data-reactid=".ti.1.1.0.0.0.1.0:$40294.1.0.0.1.0.0"><span class="Promo-title-wrap" data-reactid=".ti.1.1.0.0.0.1.0:$40294.1.0.0.1.0.0.0">The Assassination Complex</span></h4><div class="Promo-author" data-reactid=".ti.1.1.0.0.0.1.0:$40294.1.0.0.1.0.1"><span data-reactid=".ti.1.1.0.0.0.1.0:$40294.1.0.0.1.0.1.0">Jeremy Scahill</span><span class="Promo-date" data-reactid=".ti.1.1.0.0.0.1.0:$40294.1.0.0.1.0.1.1"><span data-reactid=".ti.1.1.0.0.0.1.0:$40294.1.0.0.1.0.1.1.0"> —</span><span data-reactid=".ti.1.1.0.0.0.1.0:$40294.1.0.0.1.0.1.1.1"> </span><span data-reactid=".ti.1.1.0.0.0.1.0:$40294.1.0.0.1.0.1.1.2">2015-10-15T11:57:44+00:00</span></span></div></div><div class="Promo-excerpt" data-reactid=".ti.1.1.0.0.0.1.0:$40294.1.0.0.1.1"><p class="PostExcerpt" data-reactid=".ti.1.1.0.0.0.1.0:$40294.1.0.0.1.1.0">The whistleblower who leaked the drone papers believes the public is entitled to know how people are placed on kill lists and assassinated on orders from the president.</p></div></div></div></a></div></div><div data-reactid=".ti.1.1.0.0.0.1.0:$40292"><div data-reactid=".ti.1.1.0.0.0.1.0:$40292.0"></div><div class="Promo Promo--" data-reactid=".ti.1.1.0.0.0.1.0:$40292.1"><a class="Promo-link" href="/drone-papers/a-visual-glossary/" data-reactid=".ti.1.1.0.0.0.1.0:$40292.1.0"><div class="GridRow" data-reactid=".ti.1.1.0.0.0.1.0:$40292.1.0.0"><div class="Promo-image-container" data-reactid=".ti.1.1.0.0.0.1.0:$40292.1.0.0.0"><div class="Promo-image-block" data-reactid=".ti.1.1.0.0.0.1.0:$40292.1.0.0.0.0"><div class="ResponsiveImage Promo-image" style="padding-top:50%;" data-reactid=".ti.1.1.0.0.0.1.0:$40292.1.0.0.0.0.0"><noscript data-reactid=".ti.1.1.0.0.0.1.0:$40292.1.0.0.0.0.0.0"><img src="https://prod01-cdn04.cdn.firstlook.org/wp-uploads/sites/1/2015/10/SQ02_AVisualGlossary01-promo.jpg" class="ResponsiveImage-image" height="220" width="440"></noscript></div></div></div><div class="Promo-text" data-reactid=".ti.1.1.0.0.0.1.0:$40292.1.0.0.1"><div class="Promo-title-block" data-reactid=".ti.1.1.0.0.0.1.0:$40292.1.0.0.1.0"><h4 class="Promo-title" data-reactid=".ti.1.1.0.0.0.1.0:$40292.1.0.0.1.0.0"><span class="Promo-title-wrap" data-reactid=".ti.1.1.0.0.0.1.0:$40292.1.0.0.1.0.0.0">A Visual Glossary</span></h4><div class="Promo-author" data-reactid=".ti.1.1.0.0.0.1.0:$40292.1.0.0.1.0.1"><span data-reactid=".ti.1.1.0.0.0.1.0:$40292.1.0.0.1.0.1.0">Josh Begley</span><span class="Promo-date" data-reactid=".ti.1.1.0.0.0.1.0:$40292.1.0.0.1.0.1.1"><span data-reactid=".ti.1.1.0.0.0.1.0:$40292.1.0.0.1.0.1.1.0"> —</span><span data-reactid=".ti.1.1.0.0.0.1.0:$40292.1.0.0.1.0.1.1.1"> </span><span data-reactid=".ti.1.1.0.0.0.1.0:$40292.1.0.0.1.0.1.1.2">2015-10-15T11:58:42+00:00</span></span></div></div><div class="Promo-excerpt" data-reactid=".ti.1.1.0.0.0.1.0:$40292.1.0.0.1.1"><p class="PostExcerpt" data-reactid=".ti.1.1.0.0.0.1.0:$40292.1.0.0.1.1.0">Decoding the language of covert warfare.</p></div></div></div></a></div></div><div data-reactid=".ti.1.1.0.0.0.1.0:$40296"><div data-reactid=".ti.1.1.0.0.0.1.0:$40296.0"></div><div class="Promo Promo--" data-reactid=".ti.1.1.0.0.0.1.0:$40296.1"><a class="Promo-link" href="/drone-papers/the-kill-chain/" data-reactid=".ti.1.1.0.0.0.1.0:$40296.1.0"><div class="GridRow" data-reactid=".ti.1.1.0.0.0.1.0:$40296.1.0.0"><div class="Promo-image-container" data-reactid=".ti.1.1.0.0.0.1.0:$40296.1.0.0.0"><div class="Promo-image-block" data-reactid=".ti.1.1.0.0.0.1.0:$40296.1.0.0.0.0"><div class="ResponsiveImage Promo-image" style="padding-top:50%;" data-reactid=".ti.1.1.0.0.0.1.0:$40296.1.0.0.0.0.0"><noscript data-reactid=".ti.1.1.0.0.0.1.0:$40296.1.0.0.0.0.0.0"><img src="https://prod01-cdn04.cdn.firstlook.org/wp-uploads/sites/1/2015/10/KC_HeadsRedacted01-promo.jpg" class="ResponsiveImage-image" height="220" width="440"></noscript></div></div></div><div class="Promo-text" data-reactid=".ti.1.1.0.0.0.1.0:$40296.1.0.0.1"><div class="Promo-title-block" data-reactid=".ti.1.1.0.0.0.1.0:$40296.1.0.0.1.0"><h4 class="Promo-title" data-reactid=".ti.1.1.0.0.0.1.0:$40296.1.0.0.1.0.0"><span class="Promo-title-wrap" data-reactid=".ti.1.1.0.0.0.1.0:$40296.1.0.0.1.0.0.0">The Kill Chain</span></h4><div class="Promo-author" data-reactid=".ti.1.1.0.0.0.1.0:$40296.1.0.0.1.0.1"><span data-reactid=".ti.1.1.0.0.0.1.0:$40296.1.0.0.1.0.1.0">Cora Currier</span><span class="Promo-date" data-reactid=".ti.1.1.0.0.0.1.0:$40296.1.0.0.1.0.1.1"><span data-reactid=".ti.1.1.0.0.0.1.0:$40296.1.0.0.1.0.1.1.0"> —</span><span data-reactid=".ti.1.1.0.0.0.1.0:$40296.1.0.0.1.0.1.1.1"> </span><span data-reactid=".ti.1.1.0.0.0.1.0:$40296.1.0.0.1.0.1.1.2">2015-10-15T11:57:57+00:00</span></span></div></div><div class="Promo-excerpt" data-reactid=".ti.1.1.0.0.0.1.0:$40296.1.0.0.1.1"><p class="PostExcerpt" data-reactid=".ti.1.1.0.0.0.1.0:$40296.1.0.0.1.1.0">New details about the secret criteria for drone strikes and how the White House approves targets.</p></div></div></div></a></div></div><a class="" href="/drone-papers/" data-reactid=".ti.1.1.0.0.0.1.1"><div class="HomeSquirrel-allStories" data-reactid=".ti.1.1.0.0.0.1.1.0"><span data-reactid=".ti.1.1.0.0.0.1.1.0.0">All stories </span><span class="Icon Icon--Arrow_02_Right" data-reactid=".ti.1.1.0.0.0.1.1.0.1">⟶</span></div></a></div></div></div></div></div><div class="PostLanding-reverse-chron-posts" data-reactid=".ti.1.3"></div><div class="InfiniteScroll InfiniteScroll--inactive" data-reactid=".ti.1.4"><div class="GridContainer" data-reactid=".ti.1.4.0"></div></div></div><div style="display:none;" data-reactid=".ti.3"><svg xmlns:xlink="http://www.w3.org/1999/xlink" xmlns="http://www.w3.org/2000/svg" "viewBox="0 0 500 500" width="500" height="500" aria-labelledby="title desc"><title id="title">Filters SVG</title><defs><filter id="bleed" filterUnits="objectBoundingBox"><feColorMatrix type="matrix" values="1 0 0 0 0, 0 0.15 0 0 0, 0 0 .20 0 0, 0 0 0 1 0"/></filter></defs></svg></div></div></div>
193
+ <script>
194
+ window.initialStoreTree = {"error":null,"loading":false,"routed":false,"host":"theintercept.com","route":{"params":{},"query":{},"path":"","pathname":"","names":[]},"resources":{"posts":{"40288":{"ID":40288,"title":"Target Africa","slug":"target-africa","excerpt":"To reduce the “tyranny of distance,” drones fly from bases in Djibouti, Ethiopia, Kenya, and Navy ships.","content":"\u003cp>\u003cu>\u003cspan class=\"dropcap\">E\u003c/span>RADICATING BLANK SPACES\u003c/u> on maps of the “dark continent” was an obsession of Western powers during the 19th-century scramble for Africa. Today, a new scramble is underway to eradicate a different set of blank spots. The U.S. military has, since 9/11, engaged in a largely covert effort to extend its footprint across the continent with a network of mostly small and mostly low-profile camps. Some serve as \u003ca href=\"http://www.stripes.com/news/africa/staging-sites-enable-africom-to-reach-hot-spots-within-4-hours-leader-says-1.345120\">staging areas\u003c/a> for quick-reaction forces or bare-boned outposts where special ops teams can advise local proxies; some can accommodate large cargo planes, others only small surveillance aircraft. All have one mission in common: to eradicate what the military calls the &#8220;\u003ca href=\"https://theintercept.com/drone-papers/firing-blind/\">tyranny of distance\u003c/a>.” These facilities allow U.S. forces to surveil and operate on larger and larger swaths of the continent — and, increasingly, to strike targets with drones and manned aircraft.\u003c/p>\n\u003cp>\u003ca class=\"sq-article-link\" href=\"/document/2015/10/14/small-footprint-operations-5-13/#page-3\">\u003cimg src=\"/wp-uploads/sites/1/2015/10/ISR-May13-thumb.jpg\" alt=\"\" />\u003cspan class=\"\">Document\u003c/span>\u003cbr />\nTF 48-4 Focus and Organization\u003c/a> According to an internal 2013 \u003ca href=\"/document/2015/10/14/small-footprint-operations-5-13\">Pentagon study\u003c/a> obtained by \u003cem>The Intercept\u003c/em> on secret drone operations in Somalia and Yemen between January 2011 and summer 2012, a secretive unit known as Task Force 48-4 carried out a shadow war in the region. The task force, with its headquarters at Camp Lemonnier in Djibouti, operated from outposts in Nairobi, Kenya, and Sanaa, Yemen. The aircraft it used — manned and remotely piloted — were based out of airfields in Djibouti, Ethiopia, and Kenya, as well as ships off the coast of East Africa.\u003c/p>\n\u003cp>U.S. Africa Command — the umbrella organization for U.S. military activities on the continent, known as Africom — insists that it maintains only a “\u003ca href=\"http://www.voanews.com/content/us-military-pays-close-attention-to-boko-haram-militants/1681488.html\">small footprint\u003c/a>” in Africa and claims that Camp Lemonnier, a former \u003ca href=\"http://archive.defense.gov/news/newsarticle.aspx?id=62927\">French Foreign Legion\u003c/a> outpost, is its only full-fledged base. However, a number of new facilities have been opened in recent years, and even Defense Secretary Ashton Carter has acknowledged that Lemonnier serves as “a hub with lots of spokes out there on the continent and in the region.”\u003c/p>\n\u003cdiv class='img-wrap align-bleed width-auto' style='width:auto'>\u003cimg class=\"max-width\" src=\"/wp-uploads/sites/1/2015/10/AfricaMap01.png\" alt=\"\" width=\"1440\" height=\"1500\" />\u003c/p>\n\u003cp class=\"caption\">Sources: 1) \u003ca>ISR study\u003c/a>; 2) \u003ca>ISR study\u003c/a>; 3) \u003ca>ISR study\u003c/a>; 4) \u003ca>ISR study\u003c/a>; 4) \u003ca>ISR study\u003c/a>; 6) \u003ca href=\"http://foreignpolicy.com/2015/07/02/exclusive-u-s-operates-drones-from-secret-bases-in-somalia-special-operations-jsoc-black-hawk-down/\">Foreign Policy\u003c/a>; 7) \u003ca href=\"https://www.washingtonpost.com/world/national-security/drone-base-in-niger-gives-us-a-strategic-foothold-in-west-africa/2013/03/21/700ee8d0-9170-11e2-9c4d-798c073d7ec8_story.html https://www.washingtonpost.com/world/national-security/pentagon-set-to-open-second-drone-base-in-niger-as-it-expands-operations-in-africa/2014/08/31/365489c4-2eb8-11e4-994d-202962a9150c_story.html\">The Washington Post\u003c/a>; 8) \u003ca href=\"http://foreignpolicy.com/2015/07/02/exclusive-u-s-operates-drones-from-secret-bases-in-somalia-special-operations-jsoc-black-hawk-down/\">Foreign Policy\u003c/a>; 9) \u003ca href=\"https://www.washingtonpost.com/world/national-security/the-african-network/2012/06/13/gJQAmozvaV_graphic.html\">The Washington Post\u003c/a>; 10) \u003ca href=\"https://www.washingtonpost.com/world/national-security/drone-safety-concerns-force-us-to-move-large-fleet-from-camp-lemonnier-in-djibouti/2013/09/24/955518c4-213c-11e3-a03d-abbedc3a047c_story.html\">The Washington Post\u003c/a>; 11) \u003ca href=\"https://www.washingtonpost.com/wp-srv/special/national-security/drones-and-spy-planes-over-Africa/\">The Washington Post\u003c/a>; 12) \u003ca href=\"https://www.washingtonpost.com/wp-srv/special/national-security/drones-and-spy-planes-over-Africa/\">The Washington Post\u003c/a>; 13) \u003ca href=\"http://www.nytimes.com/2014/05/22/world/africa/us-sends-troops-to-aid-hunt-for-nigerian-schoolgirls.html\">The New York Times\u003c/a>; 14) \u003ca href=\"https://www.washingtonpost.com/world/national-security/pentagon-setting-up-drone-base-in-africa-to-track-boko-haram-fighters/2015/10/14/0cbfac94-7299-11e5-8d93-0af317ed58c9_story.html\">The Washington Post\u003c/a>\u003c/p>\n\u003cp>\u003c/div>\n\u003cp>One of those spokes can be found just 10 kilometers southwest of Camp Lemonnier. After numerous \u003ca href=\"http://www.voanews.com/content/us-moves-drones-from-key-africa-base/1756946.html\">mishaps\u003c/a> and crashes, drone operations were moved from the camp to the more \u003ca href=\"http://somturk.com.tr/djibouti-craft-apron-parking-area-construction-logistics\">remote\u003c/a> \u003ca href=\"http://archive.defensenews.com/article/20130925/DEFREG02/309250035/US-Relocates-Drones-Airfield-After-Djibouti-Crashes\">Chabelley Airfield\u003c/a> in September 2013. Predator drones have also been based in the cities of \u003ca href=\"http://www.washingtonpost.com/world/national-security/pentagon-set-to-open-second-drone-base-in-niger-as-it-expands-operations-in-africa/2014/08/31/365489c4-2eb8-11e4-994d-202962a9150c_story.html\">Niamey\u003c/a> in Niger and \u003ca href=\"http://www.nytimes.com/2014/05/31/opinion/dealing-with-boko-haram.html\">N’Djamena\u003c/a> in Chad, while Reaper drones have been \u003ca href=\"http://www.wsj.com/news/articles/SB10001424053111904106704576583012923076634?mg=reno64-wsj&amp;url=http%3A%2F%2Fonline.wsj.com%2Farticle%2FSB10001424053111904106704576583012923076634.html\">flown\u003c/a> out of Seychelles International Airport. The Pentagon study, conducted by the Intelligence, Surveillance, and Reconnaissance Task Force, also notes that, as of June 2012, there were two contractor-operated drones, one Predator and one Reaper, flying out of \u003ca href=\"http://www.washingtonpost.com/world/national-security/us-drone-base-in-ethiopia-is-operational/2011/10/27/gIQAznKwMM_story.html\">Arba Minch\u003c/a>, Ethiopia. Off the coast of East Africa, a detachment equipped to dispatch a \u003ca href=\"http://www.nytimes.com/2013/01/25/us/simple-scaneagle-drones-a-boost-for-us-military.html?_r=0\">Scan Eagle\u003c/a>, a low-cost, low-tech drone used by the Navy, or an \u003ca href=\"http://www.navair.navy.mil/index.cfm?fuseaction=home.display&amp;key=8250AFBA-DF2B-4999-9EF3-0B0E46144D03\">MQ-8 Fire Scout\u003c/a>, a remotely piloted helicopter, added to the regional array of surveillance assets, as did those associated with “Armada Sweep,” a ship-based system for collecting electronic communications. Additionally, two manned fixed-wing aircraft were based in Manda Bay, Kenya. Recent reports also indicate that the military’s Joint Special Operations Command, or JSOC, is now working out of two bases in \u003ca href=\"http://foreignpolicy.com/2015/07/02/exclusive-u-s-operates-drones-from-secret-bases-in-somalia-special-operations-jsoc-black-hawk-down/\">Somalia\u003c/a> — one in Kismayo, the other in Baledogle.\u003c/p>\n\u003cp>While generally austere, many of these bases — including the airfields in \u003ca href=\"https://cryptome.org/2014-info/chabelly/chabelly-drone-base.htm\">Chabelley\u003c/a> and \u003ca href=\"http://www.nti.org/gsn/article/united-states-using-local-soldiers-fight-al-qaida-allies-east-africa/\">Manda Bay\u003c/a> — have expanded in recent years, with more on the way. Last year, for example, Capt. Rick Cook, who at the time was chief of Africom’s engineer division, \u003ca href=\"http://www.tomdispatch.com/blog/175830/tomgram%3A_nick_turse%2C_africom_becomes_a_%22war-fighting_combatant_command%22\">mentioned\u003c/a> the potential for a “base-like facility” that would be “semi-permanent” and “capable of air operations” in Niger. The National Defense Authorization Act for fiscal year 2016, \u003ca href=\"http://thomas.loc.gov/cgi-bin/bdquery/z?d114:H.R.1735:\">introduced\u003c/a> in April, \u003ca href=\"http://thomas.loc.gov/cgi-bin/cpquery/?&amp;sid=cp114llNjh&amp;r_n=hr102.114&amp;dbname=cp114&amp;&amp;sel=TOC_1188734&amp;\">requests\u003c/a> $50 million for construction of an “Airfield and Base Camp at Agadez, Niger … to support operations in western Africa.”\u003c/p>\n\u003cp>Since 9/11, a multitude of other facilities — including staging areas, cooperative security locations and forward operating locations — have also popped up (or been beefed up) in Burkina Faso, \u003ca href=\"https://www.washingtonpost.com/world/national-security/pentagon-setting-up-drone-base-in-africa-to-track-boko-haram-fighters/2015/10/14/0cbfac94-7299-11e5-8d93-0af317ed58c9_story.html\">Cameroon\u003c/a>, Central African Republic, \u003ca href=\"http://www.stripes.com/news/africa/staging-sites-enable-africom-to-reach-hot-spots-within-4-hours-leader-says-1.345120\">Gabon\u003c/a>, \u003ca href=\"http://www.stripes.com/news/africa/staging-sites-enable-africom-to-reach-hot-spots-within-4-hours-leader-says-1.345120\">Ghana\u003c/a>, Kenya, Mali, Senegal, South Sudan, and Uganda. A 2011 report by Lauren Ploch, an analyst in African affairs with the Congressional Research Service, also mentioned U.S. military access to locations in Botswana, Namibia, Sao Tome and Principe, Sierra Leone, Tunisia, and Zambia. According to Sam Cooks, a liaison officer with the Defense Logistics Agency, the U.S. military has \u003ca href=\"http://www.dla.mil/Loglines/Pages/LoglinesJF2013Story06.aspx\">struck\u003c/a> 29 agreements to use international airports in Africa as refueling centers. These locations are only some of the nodes in a growing network of outposts facilitating an increasing number of missions by the \u003ca href=\"http://www.nytimes.com/2014/06/15/magazine/can-general-linders-special-operations-forces-stop-the-next-terrorist-threat.html\">5,000 to 8,000\u003c/a> U.S. troops and civilians who annually operate on the continent.\u003c/p>\n\u003cp>Africom and the Pentagon jealously guard information about their outposts in Africa, making it impossible to ascertain even basic facts — like a simple count — let alone just how many are integral to JSOC operations, drone strikes, and other secret activities. “Due to operational security, I won’t be able to give you the exact size and number,” Lt. Cmdr. Anthony Falvo, an Africom spokesperson, told \u003cem>The Intercept\u003c/em> by email. “What I can tell you is that our strategic posture and presence are premised on the concept of a tailored, flexible, light footprint that leverages and supports the posture and presence of partners and is supported by expeditionary infrastructure.”\u003c/p>\n\u003cdiv class='img-wrap align-none width-auto' style='width:auto'>\u003cimg class=\"alignnone size-thumbnail wp-image-6340\" src=\"/wp-uploads/sites/1/2015/10/CampLemonnier-Aircrafts01.png\" alt=\"\" />\u003c/p>\n\u003cp>\u003cp class='caption source pullright' style=''>Illustration: The Intercept\u003c/p>\u003c/div>\n\u003cp>If you search Africom’s website for news about Camp Lemonnier, you’ll find myriad feel-good stories about \u003ca href=\"http://www.africom.mil/newsroom/article/10020/camp-lemonnier-goes-green-installs-solar-panels-to\">green energy\u003c/a> initiatives, the \u003ca href=\"http://www.africom.mil/newsroom/article/8871/us-army-national-guard-conducts-water-drilling-tes\">drilling\u003c/a> of water wells, and a \u003ca href=\"http://www.africom.mil/newsroom/article/8940/toby-keith-visits-camp-lemonnier\">visit\u003c/a> by country music star Toby Keith. But that’s far from the whole story. The base is a lynchpin for U.S. military action in Africa.\u003c/p>\n\u003cp>“Camp Lemonnier is … an essential regional power projection base that enables the operations of multiple combatant commands,” said Gen. Carter Ham in 2012, then the commander of Africom, in a \u003ca href=\"http://www.africom.mil/newsroom/article/8832/2012-posture-statement-statement-of-general-carter\">statement\u003c/a> to the House Armed Services Committee. “The requirements for Camp Lemonnier as a key location for national security and power projection are enduring.”\u003c/p>\n\u003cp>A map in the Pentagon report indicates that there were 10 MQ-1 Predator drones and four larger, more far-ranging MQ-9 Reapers based at Camp Lemonnier in June 2012. There were also six \u003ca href=\"http://www.hurlburt.af.mil/News/ArticleDisplay/tabid/136/Article/204913/four-hurlburt-airmen-die-in-u-28a-crash-in-djibouti.aspx\">U-28As\u003c/a> — a single-engine aircraft that conducts surveillance for special operations forces — and two \u003ca href=\"http://www.lockheedmartin.com/us/products/p3.html\">P-3 Orions\u003c/a>, a four-engine turboprop aircraft originally developed for maritime patrols but since repurposed for use over African countries. The map also shows the presence of eight F-15E Strike Eagles, manned fighter jets that are much faster and more heavily armed than drones. By August 2012, an average of 16 drones and four fighter jets were \u003ca href=\"http://www.washingtonpost.com/world/national-security/remote-us-base-at-core-of-secret-operations/2012/10/25/a26a9392-197a-11e2-bd10-5ff056538b7c_story.html\">taking off\u003c/a> or landing there each day.\u003c/p>\n\u003cp>Located on the edge of Djibouti-\u003ca href=\"http://www.stripes.com/news/military-responds-to-air-safety-issues-in-djibouti-1.344317\">Ambouli\u003c/a> International Airport, Camp Lemonnier is also the headquarters for Combined Joint Task Force-Horn of Africa (\u003ca href=\"http://www.hoa.africom.mil/\">CJTF-HOA\u003c/a>), which \u003ca href=\"http://www.stripes.com/news/military-responds-to-air-safety-issues-in-djibouti-1.344317\">includes\u003c/a> soldiers, sailors, and airmen, some of them members of special operations forces. The camp — which also \u003ca href=\"http://www.defense.gov/news/newsarticle.aspx?id=128615\">supports\u003c/a> U.S. Central Command (Centcom) — has seen the number of personnel stationed there jump around \u003ca href=\"http://navymedicine.navylive.dodlive.mil/archives/8884\">450 percent\u003c/a> \u003ca href=\"http://archive.defense.gov/news/newsarticle.aspx?id=42401\">since 2002\u003c/a>. The base has \u003ca href=\"http://themilitaryengineer.com/index.php/contacts/2015-marketing-kit/item/352-documenting-utilities-in-djibouti\">expanded\u003c/a> from 88 acres to nearly 600 acres and has seen more than $600 million already allocated or awarded for projects such as aircraft parking aprons, taxiways, and a major \u003ca href=\"http://www.tomdispatch.com/blog/175743/tomgram%3A_nick_turse,_africom's_gigantic_%22small_footprint%22\">special operations compound\u003c/a>. In addition, $1.2 billion in construction and improvements has already been \u003ca href=\"http://themilitaryengineer.com/index.php/contacts/2015-marketing-kit/item/352-documenting-utilities-in-djibouti\">planned\u003c/a> for the future.\u003c/p>\n\u003cp>As it grew, Camp Lemonnier became one of the most critical bases not only for America’s drone assassination campaign in \u003ca href=\"https://www.washingtonpost.com/world/national-security/remote-us-base-at-core-of-secret-operations/2012/10/25/a26a9392-197a-11e2-bd10-5ff056538b7c_story.html\">Somalia\u003c/a> and \u003ca href=\"http://www.thenation.com/article/dangerous-us-game-yemen/\">Yemen\u003c/a> but also for U.S. military operations across the region. The camp is so crucial to long-term military plans that last year the U.S. inked a deal securing its lease until 2044, agreeing to hand over \u003ca href=\"http://www.thenational.ae/world/africa/djibouti-a-safe-harbour-in-the-troubled-horn-of-africa\">$70 million\u003c/a> per year in rent — about \u003ca href=\"http://www.washingtonpost.com/world/national-security/remote-us-base-at-core-of-secret-operations/2012/10/25/a26a9392-197a-11e2-bd10-5ff056538b7c_story.html\">double\u003c/a> what it previously paid to the government of Djibouti.\u003c/p>\n\u003cp>&nbsp;\u003c/p>\n\u003cp class=\"caption\">\u003cem>Top photo: Google Earth\u003c/em>\u003c/p>\n\u003cp class=\"caption\">Additional reporting: \u003ca href=\"/staff/jeremy-scahill/\">\u003cimg class=\"sq-author\" src=\"https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2014/02/Jeremy-Scahill-Original_350_2.jpg\" alt=\"\" width=\"40\" /> Jeremy Scahill\u003c/a>\u003c/p>\n","link":"https://theintercept.com/drone-papers/target-africa/","thumbnail":{"ID":40431,"title":"","excerpt":"","content":"","credit":"","sizes":{"feature_hero":{"path":"wp-uploads/sites/1/2015/10/SQ08_TargetAftica01-feature-hero.jpg","width":1200,"height":800},"promo":{"path":"wp-uploads/sites/1/2015/10/SQ08_TargetAftica01-promo.jpg","width":440,"height":220},"promo_large":{"path":"wp-uploads/sites/1/2015/10/SQ08_TargetAftica01-promo-large.jpg","width":900,"height":450},"top_large":{"path":"wp-uploads/sites/1/2015/10/SQ08_TargetAftica01-top-large.jpg","width":440,"height":440},"top_small":{"path":"wp-uploads/sites/1/2015/10/SQ08_TargetAftica01-top-small.jpg","width":200,"height":200},"square":{"path":"wp-uploads/sites/1/2015/10/SQ08_TargetAftica01-440x440.jpg","width":440,"height":440},"article_header":{"path":"wp-uploads/sites/1/2015/10/SQ08_TargetAftica01-article-header.jpg","width":1440,"height":720},"original":{"path":"wp-uploads/sites/1/2015/10/SQ08_TargetAftica01.jpg","width":"1440","height":"900"}}},"date":"2015-10-15T11:59:32+00:00","authors":[{"ID":"24144","display_name":"Nick Turse","url":"https://theintercept.com/staff/nick-turse/","brief_bio":"","full_bio":"Nick Turse is a contributing writer for The Intercept, reporting on national security and foreign policy. He is the author, most recently, of \"Tomorrow's Battlefield: U.S. Proxy Wars and Secret Ops in Africa,\" as well as \"Kill Anything That Moves: The Real American War in Vietnam.\" He has written for the New York Times, Los Angeles Times, San Francisco Chronicle, The Nation, and Village Voice, among other publications. He has received a Ridenhour Prize for Investigative Reporting, a James Aronson Award for Social Justice Journalism, and a Guggenheim Fellowship. Turse is a fellow at The Nation Institute and the managing editor of TomDispatch.com.\r\n\r\n","email":"","image_350":"https://theintercept.com/wp-uploads/sites/1/2015/09/Turse-photo-2-440x440.jpg","twitter":"","facebook":"","pgp_key":"","pgp_file":"","pgp_fingerprint":"","user_title":"","user_group":"","nicename":"nick-turse"}],"excerpt_type":"","is_feature":"","feature_title":"","is_blog":false,"blog_title":"","comments_number":"15","bitly_url":"http://interc.pt/1RK08gC","comments_open":true,"is_banner_hidden":false,"featured_video_url":"","meta":{"links":[]},"layout":"default","banner_videokey":"","post_type":"squirrel","share_twitter_text":"Target Africa: America’s expanding drone network","yoast_wpseo_canonical":"https://theintercept.com/drone-papers/target-africa/","yoast_wpseo_general_title":"Target Africa: America’s expanding drone network","yoast_wpseo_general_description":"","yoast_wpseo_facebook_title":"Target Africa: America’s expanding drone network","yoast_wpseo_facebook_description":"","yoast_wpseo_facebook_thumbnail":"","yoast_wpseo_twitter_title":"Target Africa: America’s expanding drone network","yoast_wpseo_twitter_description":"","yoast_wpseo_twitter_thumbnail":"","squirrel_subhead":"The U.S. military’s expanding footprint in East Africa and the Arabian Peninsula","squirrel_intro":"“Morning dawns at length in Africa. The night has been long and dark. The opening day has a hopeful outlook and also an aspect of uncertainty. ... For many years little colonies, trading-posts, and slave-marts have fringed its borders; but the vast interior has remained a blank.” — \u003cem>Historical Sketch of the Missions of the American Board in Africa\u003c/em>, Samuel Bartlett (1880)","squirrel_num":"8","squirrel_top_text_color":"red","squirrel_top_meta_color":"red","squirrel_intro_bg_color":"white","squirrel_intro_text_color":"black","squirrel_subhead_offset":"0","squirrel_homepage_hero_location":3,"squirrel_videokey":"fUryXCxy"},"40290":{"ID":40290,"title":"Find, Fix, Finish","slug":"find-fix-finish","excerpt":"The tip of the spear in the Obama administration’s ramped up wars in Somalia and Yemen was a special operations task force called TF 48-4.","content":"\u003cp>\u003cu>\u003cspan class=\"dropcap\">T\u003c/span>HE VIEW AMONG\u003c/u> Obama&#8217;s inner circle was that Iraq and Afghanistan had served as useful laboratories for such tactics, but deploying them outside conventional war zones meant different legal and diplomatic considerations would apply. An all-star team of special operations commanders, war planners, and Pentagon officials pressed the new president to dramatically ramp up the shadow wars in Yemen and Somalia to fight the emerging threats in those countries. They called for sweeping away bureaucratic obstacles and streamlining lethal operations.\u003c/p>\n\u003cp>In short, a new global architecture of assassination was called for, and that meant navigating an increasingly tense turf war between the CIA and the Pentagon over these activities.\u003c/p>\n\u003cp>The CIA had long dominated the covert war in Pakistan, and in 2009 Obama \u003ca href=\"http://www.nytimes.com/2009/12/04/world/asia/04drones.html\">expanded\u003c/a> the agency’s drone resources there and in Afghanistan to regularly pound al Qaeda, the Pakistani Taliban, and other targets. The military, tasked with prosecuting the broader war in Afghanistan, was largely sidelined in the Pakistan theater, save for the \u003ca href=\"http://www.nytimes.com/2010/12/21/world/asia/21intel.html\">occasional\u003c/a> cross-border raid and the Air Force personnel who \u003ca href=\"http://www.theguardian.com/world/2014/apr/14/cia-drones-pakistan-us-air-force-documentary\">operated \u003c/a>the CIA’s drones. But the Pentagon was not content to play a peripheral role in the global drone war, and aggressively positioned itself to lead the developing drone campaigns in Yemen and Somalia.\u003c/p>\n\u003cdiv class='img-wrap align-right width-fixed' style='width:540px'>\u003cimg class=\"alignright size-article-medium wp-image-6419\" src=\"/wp-uploads/sites/1/2015/10/USAE_01-540x720.png\" alt=\"\" />\u003c/p>\n\u003cp class=\"caption\">Altered insignia of the U.S. Special Operations Command.\u003c/p>\n\u003cp>\u003cp class='caption source pullright' style=''>Illustration: The Intercept\u003c/p>\u003c/div>\n\u003cp>In September 2009, then-Centcom Commander Gen. David Petraeus \u003ca href=\"http://www.nytimes.com/2010/05/25/world/25military.html\">issued\u003c/a> a Joint Unconventional Warfare Task Force Execute Order that would lay the groundwork for military forces to conduct expanded clandestine actions in Yemen and other countries. It allowed for U.S. special operations forces to enter friendly and unfriendly countries “to build networks that could ‘penetrate, disrupt, defeat or destroy’ al Qaeda and other militant groups, as well as to ‘prepare the environment’ for future attacks by American or local military forces.”\u003c/p>\n\u003cp>At the same time, al Qaeda in the Arabian Peninsula and al Shabaab both began to escalate their rhetoric — and, in AQAP’s case, to plot terror attacks on U.S. soil. After the failed Christmas Day “underwear” bomb plot over Detroit, the Obama administration \u003ca href=\"http://www.cnn.com/2012/06/11/opinion/bergen-yemen-drone-war/\">responded\u003c/a> by greenlighting special operations commanders’ plans for direct action.\u003c/p>\n\u003cp>In December 2009, the Obama administration signed off on its \u003ca href=\"http://www.thenation.com/article/washingtons-war-yemen-backfires/\">first\u003c/a> covert airstrike in Yemen — a cruise missile attack that killed \u003ca href=\"https://ccrjustice.org/home/what-we-do/our-cases/al-majalah-freedom-information-act-request\">more than 40 people\u003c/a>, most of them women and children. After that strike, as with the CIA’s program in Pakistan, drones would fuel the Joint Special Operations Command&#8217;s high-value targeting campaign in the region.\u003c/p>\n\u003cp>When Obama took office, there had been only \u003ca href=\"http://news.bbc.co.uk/2/hi/2402479.stm\">one\u003c/a> U.S. drone strike in Yemen — in November 2002. By 2012, there was a drone strike \u003ca href=\"http://search.dronestre.am/\">reported\u003c/a> in Yemen every six days. As of August 2015, more than 490 people had been \u003ca>killed\u003c/a> in drone strikes in Yemen alone.\u003c/p>\n\u003cp>“The drone campaign right now really is only about killing. When you hear the phrase ‘capture/kill,’ capture is actually a misnomer. In the drone strategy that we have, ‘capture’ is a lower case ‘c.’ We don’t capture people anymore,” Lt. Gen. Michael Flynn, former head of the Defense Intelligence Agency, told \u003cem>The Intercept\u003c/em>. “Our entire Middle East policy seems to be based on firing drones. That’s what this administration decided to do in its counterterrorism campaign. They’re enamored by the ability of special operations and the CIA to find a guy in the middle of the desert in some shitty little village and drop a bomb on his head and kill him.”\u003c/p>\n\u003cp>\u003c!-- SquirrelMap --\>\u003c/p>\n\u003cp class=\"caption\">\u003cem>Illustration: The Intercept\u003c/em>\u003c/p>\n\u003cp>&nbsp;\u003c/p>\n\u003cp>\u003cu>\u003cspan class=\"dropcap\">T\u003c/span>HE TIP OF THE SPEAR\u003c/u> in the Obama administration’s escalated wars in East Africa and the Arabian Peninsula was a special operations task force known as \u003ca href=\"/document/2015/10/14/small-footprint-operations-5-13/#page-3\">TF 48-4\u003c/a>, according to \u003ca href=\"/document/2015/10/14/small-footprint-operations-2-13/#page-1\">secret documents\u003c/a> provided to \u003cem>The Intercept\u003c/em>. In response to a series of detailed questions, a Defense Department spokesperson said, &#8220;We don&#8217;t comment on the details of classified reports.&#8221;\u003c/p>\n\u003cp>The task force’s primary command center was at the former French Army outpost at Camp Lemonnier in Djibouti, a small African nation nestled between Ethiopia, Eritrea, Somalia, and the Gulf of Aden. With its strategic location, Lemonnier served as the hub for launching actions from military facilities scattered across the region. The task force also utilized a maritime drone platform and a surveillance apparatus positioned in the Arabian Sea, used for intercepting data. TF 48-4 had sites in Nairobi and Sanaa and a drone base in Arba Minch, Ethiopia. A small base in Manda Bay, Kenya — a stone’s throw from Somalia — housed special operations commandos and manned aircraft.\u003c/p>\n\u003cdiv class='img-wrap align-none width-auto' style='width:auto'>\u003ca href=\"/wp-uploads/sites/1/2015/10/03.jpg\">\u003cimg class=\"alignnone size-large wp-image-6433\" src=\"/wp-uploads/sites/1/2015/10/03-1024x790.jpg\" alt=\"\" />\u003c/a>\u003c/p>\n\u003cp class=\"caption\">A slide from a classified Pentagon study outlines the air and naval assets of the secret task force charged with hunting down, killing, and capturing high-value individuals in Somalia and Yemen.\u003c/p>\n\u003cp>\u003c/div>\n\u003cp>The task force’s operations, aimed at hunting down and killing or capturing members of AQAP and al Shabaab, were largely conducted with drones and fixed-wing aircraft. On occasion, small teams of special operators mounted \u003ca href=\"http://www.washingtonpost.com/wp-dyn/content/article/2009/09/14/AR2009091403522.html\">ground operations\u003c/a> inside Somalia and Yemen, or \u003ca href=\"http://www.seattletimes.com/nation-world/us-holds-somali-extremist-for-two-months-on-ship/\">interdicted\u003c/a> ships, snatching suspected terrorists. But drones were the administration’s preferred weapon.\u003c/p>\n\u003cp>“It is the politically advantageous thing to do — low cost, no U.S. casualties, gives the appearance of toughness,” \u003ca href=\"http://www.nytimes.com/2012/05/29/world/obamas-leadership-in-war-on-al-qaeda.html\">said\u003c/a> Adm. Dennis Blair, Obama’s former director of national intelligence, explaining how the administration viewed its policy at the time. “It plays well domestically, and it is unpopular only in other countries. Any damage it does to the national interest only shows up over the long term.”\u003c/p>\n\u003cp>As Yemen’s status began to rise to the top of U.S. counterterrorism priorities, the long-simmering turf war between the Pentagon and the CIA flared up. In 2011, the CIA began using a newly constructed drone base in Saudi Arabia, giving it easier access to targets in Yemen than the military’s bases in East Africa. There were parallel, and competing, target lists and infighting over who should run the drone war in Yemen. At times, this drama played out on the pages of the \u003cem>New York Times\u003c/em> and the \u003cem>Washington Post \u003c/em>— with leaks coming from both sides in an effort to influence policy. The CIA’s backers in Congress argued that the agency showed more “\u003ca href=\"http://www.wsj.com/articles/SB10001424127887324103504578372703357207828\">patience and discretion\u003c/a>” in its drone strikes, while some prominent military advocates portrayed the agency as ill-equipped to conduct military-style operations and less accountable to Congress.\u003c/p>\n\u003cdiv class='img-wrap align-right width-fixed' style='width:540px'>\u003cimg class=\"alignright size-article-medium wp-image-6432\" src=\"/wp-uploads/sites/1/2015/10/AP071116057028_1301082301-540x404.jpg\" alt=\"Michael Vickers\" />\u003c/p>\n\u003cp class=\"caption\">Michael Vickers, former undersecretary of defense for intelligence, was a powerful figure in the world of covert operations.\u003c/p>\n\u003cp>\u003cp class='caption source pullright' style=''>Photo: Haraz N. Ghanbari/AP\u003c/p>\u003c/div>\n\u003cp>At the peak of this bureaucratic civil war, in 2012, an \u003ca href=\"http://intelligence.house.gov/sites/intelligence.house.gov/files/documents/ISRPerformanceAudit%20Final.pdf\">influential\u003c/a> and well-funded Defense Department entity, the Intelligence, Surveillance, and Reconnaissance Task Force, began preparing a classified brief on challenges faced by special operations forces conducting counterterrorism operations in East Africa and the Arabian Peninsula, such as those operating under TF 48-4. The ISR Task Force fell under the control of Michael Vickers, a powerful veteran of CIA paramilitary operations. Obama had promoted Vickers in 2010 to undersecretary of defense for intelligence, and as the Pentagon’s top intelligence official he exerted great influence over matters of covert operations.\u003c/p>\n\u003cp>The task force had been \u003ca href=\"http://webcache.googleusercontent.com/search?q=cache:VwchwHgm-VgJ:archive.defense.gov/news/newsarticle.aspx%3Fid%3D49639+&amp;cd=3&amp;hl=en&amp;ct=clnk&amp;gl=us\" target=\"_blank\">established\u003c/a> in 2008 to study the intelligence and surveillance needs of war fighters in Afghanistan and Iraq. By 2012, it had evolved into a multibillion-dollar advocacy wing pushing for the purchase of new surveillance technologies to support the military’s black ops forces in waging unconventional wars.\u003c/p>\n\u003cp>The purpose of the ISR study, in outlining the challenges faced by special operations units tasked with disrupting and destroying terrorist networks, was to press for more tools and to collect data that would guide future operations.\u003c/p>\n\u003cp>\u003cem>The Intercept\u003c/em> obtained two versions of the study, both titled “ISR Support to Small Footprint CT Operations — Somalia/Yemen.” \u003ca href=\"/document/2015/10/14/small-footprint-operations-2-13/#page-1\">One slide deck\u003c/a>, a detailed report, was distributed in February 2013, and another, an \u003ca href=\"/document/2015/10/14/small-footprint-operations-5-13/#page-1\">executive summary\u003c/a>, was circulated in May 2013, the month President Obama gave the first major address of his presidency on drones and targeted killings. The timing of the reports is interesting, because it was during this period that the Obama administration began to publicly advance the idea of handing control of the drone program to the military.\u003c/p>\n\n\u003c!-- iframe plugin v.2.9 wordpress.org/plugins/iframe/ --\>\n\u003ciframe src=\"/jw?videoKey=Thacm3vV\" height=\"397\" width=\"100%\" scrolling=\"no\" class=\"iframe-class\" frameborder=\"0\">\u003c/iframe>\n\n\u003cp class=\"caption\">On May 23, 2013, President Obama gave his first formal address on drone strikes at the National Defense University in Washington, D.C.\u003c/p>\n\u003cp>&nbsp;\u003c/p>\n\u003cp>“The United States has taken lethal, targeted action against al Qaeda and its associated forces, including with remotely piloted aircraft commonly referred to as drones,” Obama \u003ca href=\"https://www.whitehouse.gov/the-press-office/2013/05/23/remarks-president-national-defense-university\">said\u003c/a> in front of a military audience. “As was true in previous armed conflicts, this new technology raises profound questions — about who is targeted, and why; about civilian casualties, and the risk of creating new enemies; about the legality of such strikes under U.S. and international law; about accountability and morality.” Drone strikes, he asserted, are “effective” and legal.\u003c/p>\n\u003cp>Obama did not mention TF 48-4 in his speech, but it was the actions of the special operations task force — and those of the CIA’s parallel program — that he was discussing.\u003c/p>\n\u003cp>During the period covered in the ISR study — January 2011 through June 2012 — three U.S. citizens were killed in drone strikes in Yemen. Only one, the radical preacher Anwar al Awlaki, was labeled the intended target of the strike. The U.S. claimed it did not intend to kill Samir Khan, who was traveling with Awlaki when a Hellfire hit their vehicle. The third — and most controversial — killing of a U.S. citizen was that of Awlaki’s son, 16-year-old Abdulrahman Awlaki. He was killed two weeks after his father, while having dinner with his cousin and some friends. Immediately after the strike, anonymous U.S. officials asserted that the younger Awlaki was connected to al Qaeda and was 21 years old. After the family produced his birth certificate, the U.S. changed its position, with an anonymous official calling the killing of the teenager an “\u003ca href=\"https://www.washingtonpost.com/world/national-security/cia-veteran-john-brennan-has-transformed-us-counterterrorism-policy/2012/10/24/318b8eec-1c7c-11e2-ad90-ba5920e56eb3_story.html\">outrageous mistake\u003c/a>.”\u003c/p>\n\u003cp>A former senior official in the Obama administration, who worked on the high-value targeting program and asked not to be identified because he was discussing classified material, \u003ca href=\"http://www.thenation.com/article/inside-americas-dirty-wars/\">told me\u003c/a> in 2013 that after the Abdulrahman strike, the president was “surprised and upset and wanted an explanation.” “We had no idea the kid was there,” the official said. The White House did not officially acknowledge the strikes until nearly two years later. “We killed three U.S. citizens in a very short period,” he told me. “Two of them weren’t even targets: Samir Khan and Abdulrahman Awlaki. That doesn’t look good. It’s embarrassing.”\u003c/p>\n\u003cp>The former senior official said that John Brennan, President Obama’s top counterterrorism adviser, “suspected that the kid had been killed intentionally and ordered a review. I don’t know what happened with the review.” When asked about the review, a spokesperson for the National Security Council told me, “We cannot discuss the sensitive details of specific operations.”\u003c/p>\n\n\u003c!-- iframe plugin v.2.9 wordpress.org/plugins/iframe/ --\>\n\u003ciframe src=\"/jw?videoKey=uNq3AGgc\" height=\"405\" width=\"100%\" scrolling=\"no\" class=\"iframe-class\" frameborder=\"0\">\u003c/iframe>\n\n\u003cp class=\"caption\">Home video of Abdulrahman Awlaki playing with his younger siblings in the family’s courtyard in 2009. The 16-year-old U.S. citizen was killed in a drone strike on October 14, 2011, in Yemen.\u003c/p>\n\u003cp>&nbsp;\u003c/p>\n\u003cp>Lt. Gen. Flynn, who since leaving the DIA has become an outspoken critic of the Obama administration, charges that the White House relies heavily on drone strikes for reasons of expediency, rather than effectiveness. “We’ve tended to say, drop another bomb via a drone and put out a headline that ‘we killed Abu Bag of Doughnuts’ and it makes us all feel good for 24 hours,” Flynn said. “And you know what? It doesn’t matter. It just made them a martyr, it just created a new reason to fight us even harder.”\u003c/p>\n\u003cdiv class='img-wrap align-right width-fixed' style='width:682px'>\u003cimg class=\"alignright size-large wp-image-6601\" src=\"/wp-uploads/sites/1/2015/10/61564801_H26994163-682x1024.jpg\" alt=\"\" />\u003c/p>\n\u003cp class=\"caption\">Lt. Gen. Michael Flynn, former head of the Defense Intelligence Agency, was an architect of JSOC&#8217;s find, fix, finish doctrine.\u003c/p>\n\u003cp>\u003cp class='caption source pullright' style=''>Photo: Michael Reynolds/EPA/Landov\u003c/p>\u003c/div>\n\u003cp>Glenn Carle, a former senior CIA officer, disputes Flynn’s characterization of the Obama administration’s motive in its widespread use of drones. “I would be skeptical the government would ever make that formal decision to act that way,” Carle, who spent more than two decades in the CIA’s clandestine services, told \u003cem>The Intercept\u003c/em>. “Obama is always attacked by the right as being soft on defense and not able to make the tough decisions. That’s all garbage. The Obama administration has been quite ruthless in its pursuit of terrorists. If there are people who we, in our best efforts, assess to be trying to kill us, we can make their life as short as possible. And we do it.”\u003c/p>\n\u003cp>TF 48-4, according to the documents, did in fact have an impressive cache of firepower in Djibouti to kill or capture people approved for the kill list by the president. According to \u003ca href=\"/document/2015/10/14/small-footprint-operations-5-13/#page-3\">one slide\u003c/a>, as of 2012 the base at Camp Lemonnier housed more than a dozen armed drones and additional surveillance aircraft. Its arsenal also included eight manned F-15E warplanes, which can carry so-called bunker busters — 5,000-pound laser-guided bombs.\u003c/p>\n\u003cp>The ISR Task Force recommended providing special operations forces with more and better drones and an enhanced mandate to capture and interrogate suspects “via host-nation partners.”\u003c/p>\n\u003cp>Outsourcing U.S. kill/capture operations to local forces, which occurred frequently throughout the Bush administration’s time in office, regularly led to human rights abuses, torture, and extrajudicial killings. “I’m very hesitant on backing foreign militaries or paramilitary forces or militias,” said Clinton Watts, a former FBI special agent who worked on counterterrorism and later served as an executive officer of the Combating Terrorism Center at West Point. “I’ve seen that up close before and you’re backing rape and pillage campaigns through the countryside, usually. You can’t control them and you don’t have transparency over what they do and it blows up in your face the same way that a bad drone strike does.”\u003c/p>\n\u003cp>The ISR Task Force asserted that an increase in the number of capture operations \u003ca href=\"/document/2015/10/14/small-footprint-operations-2-13/#page-12\">could be achieved\u003c/a> by using U.S. “advisors” to build partnerships with local forces and by conducting “advance force operations.” AFOs are used by the U.S. military to discreetly plant tracking devices, conduct surveillance, and physically access places inhabited by potential targets, often in “denied areas” where the U.S. is not yet at war. Forces deployed in AFOs \u003ca href=\"http://fas.org/man/eprint/respass.pdf\">may also conduct\u003c/a> clandestine “direct actions,” including kill/capture operations.\u003c/p>\n\u003cp>During the Bush administration, AFOs served as a primary vehicle for justifying the \u003ca href=\"http://www.nytimes.com/2005/01/24/politics/pentagon-sends-its-spies-to-join-fight-on-terror.html\">clandestine deployment\u003c/a> of U.S. special operators \u003ca href=\"http://www.nytimes.com/2015/06/07/world/asia/the-secret-history-of-seal-team-6.html?_r=0\">across the world\u003c/a> to engage in “\u003ca href=\"http://fas.org/man/eprint/respass.pdf\">operational preparation\u003c/a>” of a future battlespace. Those activities expanded as the Bush administration adopted the \u003ca href=\"http://library.rumsfeld.com/doclib/sp/1314/To%20Gen.%20Dick%20Myers%20et%20al.%20re%20'Preparation%20of%20the%20Battlespace'%2009-02-2004.pdf\">view\u003c/a> that, post 9/11, “the entire world is the ‘battlespace.’”\u003c/p>\n\u003cp>A July 2015 U.S. government \u003ca href=\"https://theintercept.com/document/2015/10/15/advance-force-operations-contract/\">contract solicitation\u003c/a> for training Pacific Command personnel who conduct AFOs envisioned a course that would focus on tactics “that directly or indirectly support technical surveillance operations in non-permissive environments.” Among them: breaking and bypassing a slew of locks, both physical and digital; cloning hotel room key cards; picking advanced car lock systems; and learning “physical restraint escape techniques.” The solicitation stated that operatives need such courses to “remain proficient in this highly refined skill set.”\u003c/p>\n\u003cp>\u003c!-- SquirrelTypewriter --\>\u003c/p>\n\u003cp class=\"caption\">U.S. military descriptions of the &#8220;skill set&#8221; required for advance force operations.\u003c/p>\n\u003cp>&nbsp;\u003c/p>\n\u003cp>\u003cu>\u003cspan class=\"dropcap\">T\u003c/span>HE TONE OF THE ISR STUDY\u003c/u> at times gives the impression that special operations forces were effectively prisoners of resource shortages and a legal bureaucracy that interfered with the military’s ability to kill or capture terrorists with the frequency, efficiency, and urgency demanded by policymakers.\u003c/p>\n\u003cp>Those sentiments were echoed by Lt. Gen. Flynn, who served for years as the chief intelligence officer for JSOC. “You cannot conduct counterinsurgency, counterterrorism, or counter-guerrilla operations without having effective interrogation operations,” Flynn said in an interview. “If the president says, &#8216;Defeat this enemy,&#8217; but you say you need resources that you never get, you just can’t defeat the enemy. Without the ability to capture or interrogate, your effectiveness when conducting counterterrorism operations can be cut in half, if not even lower than that, and that’s the challenge that we face.”\u003c/p>\n\u003cp>Carle, the former senior CIA officer, said the ISR study is part of the “classic” turf war. “If you get the budget,” he said, “then you control the decisions and everybody thinks that whatever toys they control are the toys that need to be used and therefore you need more of them.” The Pentagon wants “to expand their influence,&#8221; he added, &#8220;because then you don’t have obstreperous and disheveled civilian CIA guys who clink glasses in salons telling you how to do things. They don’t want that. That’s a classic turf institutional tension.”\u003c/p>\n\u003cp>The study, which utilizes corporate language to describe lethal operations as though they were a product in need of refining and upgrading, includes analyses from IBM, which \u003ca href=\"https://www.documentcloud.org/documents/2483499-edge-methods-ibm-bao-intell-v4.html\">has boasted\u003c/a> that its work for the Pentagon “integrates commercial consulting methods with tacit knowledge of the mission, delivering work products and advice that improve operations and creates [sic] new capabilities.”\u003c/p>\n\u003cp>The study \u003ca href=\"/document/2015/10/14/small-footprint-operations-2-13/#page-27\">compared\u003c/a> the tempo and methods of conventional operations in which U.S. personnel were on the ground in large numbers — as in Iraq and Afghanistan — to the shadow wars in Yemen and Somalia, where there was a scant and sporadic U.S. military presence. Unlike in Iraq and Afghanistan, where special operations units were given carte blanche to engage in a systematic kill/capture program, in Somalia and Yemen they were required to operate under more stringent rules and guidelines. “When compared to previous operations,” the study \u003ca href=\"/document/2015/10/14/small-footprint-operations-2-13/#page-26\">asserted\u003c/a>, “the amount of time required to action objectives is literally orders of magnitude higher.”\u003c/p>\n\u003cp>The CIA has operated in Pakistan with \u003ca href=\"http://www.wsj.com/articles/obama-kept-looser-rules-for-drones-in-pakistan-1430092626\">looser requirements\u003c/a> for obtaining the president’s direct approval before launching strikes; the president also waived the requirement that a CIA target present an “imminent” threat.\u003c/p>\n\u003cdiv class='img-wrap align-none width-auto' style='width:auto'>\u003ca href=\"/wp-uploads/sites/1/2015/10/chain-of-command.jpg\">\u003cimg class=\"alignnone size-large wp-image-6359\" src=\"/wp-uploads/sites/1/2015/10/chain-of-command-1024x792.jpg\" alt=\"chain-of-command\" />\u003c/a>\u003c/p>\n\u003cp class=\"caption\">A slide from a May 2013 Pentagon presentation shows the chain of command for ordering drone strikes and other operations carried out by JSOC in Yemen and Somalia.\u003c/p>\n\u003cp>\u003cp class='caption source pullright' style=''>GCC = Geographic Combatant Command; SECDEF = Secretary of Defense; PDC/PC = Principals’ Deputies Committee/Principals Committee; CoM = Chief of Mission; CoS = Chief of Station\u003c/p>\u003c/div>\n\u003cp>One slide \u003ca href=\"/document/2015/10/14/small-footprint-operations-5-13/#page-6\">outlined the bureaucracy\u003c/a> involved in authorizing the military to conduct high-value strikes, a process that in some cases took years. “Relatively few high-level terrorists meet criteria for targeting under the provisions,” the \u003ca href=\"/document/2015/10/14/small-footprint-operations-5-13/#page-7\">study\u003c/a> said, and the “near certainty” standard for positively identifying a target and requirements of “low” collateral damage “reduces targeting opportunities.” The study lamented the technical difficulties in achieving \u003ca href=\"/document/2015/10/14/small-footprint-operations-5-13/#page-11\">positive identification\u003c/a> of a targeted person and guaranteeing minimal collateral damage, particularly when \u003ca href=\"/document/2015/10/14/small-footprint-operations-2-13/#page-16\">insufficient\u003c/a> numbers of drones and full motion video platforms caused “blinking” in the surveillance apparatus.\u003c/p>\n\u003cp>One former senior special operations officer, who asked not to be identified because he was discussing classified materials, told \u003cem>The Intercept\u003c/em> that the ISR study was best understood as a “bitch brief.” The message, he said, was, “We can’t do what you’re asking us to do because you are not giving us the resources to get it done.”\u003c/p>\n\u003cp>As the Obama era draws to a close, the internal debate over control of the drone program continues, with some \u003ca href=\"http://www.huffingtonpost.com/2015/06/24/obama-cia-drones_n_7649702.html\">reports\u003c/a> suggesting the establishment of a “dual command” structure for the CIA and the military. For now, it seems that the military is getting much of what it agitated for in the ISR study. In August, the \u003cem>Wall Street Journal\u003c/em> \u003ca href=\"http://www.wsj.com/articles/pentagon-to-add-drone-flights-1439768451\">reported\u003c/a> that the military plans to “sharply expand the number of U.S. drone flights over the next four years, giving military commanders access to more intelligence and greater firepower to keep up with a sprouting number of global hot spots.” The paper reported that drone flights would increase by 50 percent by 2019, adding: “While expanding surveillance, the Pentagon plan also grows the capacity for lethal airstrikes.”\u003c/p>\n\u003cp class=\"caption\">\u003cem>Top photo: Veronique de Viguerie/Getty Images\u003c/em>\u003c/p>\n","link":"https://theintercept.com/drone-papers/find-fix-finish/","thumbnail":{"ID":40402,"title":"Predator Drones in Afghanistan","excerpt":"KANDAHAR, AFGHANISTAN - MAY 2, 2006: The US military in Kandahar, southern Afghanistan, a Taliban stronghold, are using high-tech Predator drones against their enemy. They have approximately 8 there. The Predator has no pilot, and is controlled for his highly secret mission from Las Vegas. The team in Kandahar is in charge of their take off and landings. The drones have a highly powerful camera with infrared, as well as a still camera and two missiles. (Photo by Veronique de Viguerie/Getty Images)","content":"","credit":"Getty Images","sizes":{"feature_hero":{"path":"wp-content/uploads/sites/1/2015/10/SQ03_FindFixFinish-Getty159308578-1.jpg","width":594,"height":365},"promo":{"path":"wp-uploads/sites/1/2015/10/SQ03_FindFixFinish-Getty159308578-1-promo.jpg","width":440,"height":220},"promo_large":{"path":"wp-content/uploads/sites/1/2015/10/SQ03_FindFixFinish-Getty159308578-1.jpg","width":594,"height":365},"top_large":{"path":"wp-uploads/sites/1/2015/10/SQ03_FindFixFinish-Getty159308578-1-top-large.jpg","width":440,"height":440},"top_small":{"path":"wp-uploads/sites/1/2015/10/SQ03_FindFixFinish-Getty159308578-1-top-small.jpg","width":200,"height":200},"square":{"path":"wp-uploads/sites/1/2015/10/SQ03_FindFixFinish-Getty159308578-1-440x365.jpg","width":440,"height":365},"article_header":{"path":"wp-content/uploads/sites/1/2015/10/SQ03_FindFixFinish-Getty159308578-1.jpg","width":594,"height":365},"original":{"path":"wp-uploads/sites/1/2015/10/SQ03_FindFixFinish-Getty159308578-1.jpg","width":"594","height":"365"}}},"date":"2015-10-15T12:00:04+00:00","authors":[{"ID":9,"display_name":"Jeremy Scahill","url":"https://theintercept.com/staff/jeremy-scahill/","brief_bio":"Jeremy Scahill is an investigative reporter and war correspondent.","full_bio":"\u003cp>Jeremy Scahill is one of the three founding editors of \u003cem>The Intercept\u003c/em>. He is an investigative reporter, war correspondent, and author of the international bestselling books \u003cem>Dirty Wars: The World Is a Battlefield \u003c/em>and \u003cem>Blackwater: The Rise of the World’s Most Powerful Mercenary Army\u003c/em>. \u003c!-- Read More --\>He has reported from Afghanistan, Iraq, Somalia, Yemen, Nigeria, the former Yugoslavia, and elsewhere across the globe. Scahill has served as the national security correspondent for \u003cem>The Nation \u003c/em>and \u003cem>Democracy Now!\u003c/em>.\u003c/p>\n\u003cp>Scahill&#8217;s work has sparked several congressional investigations and won some of journalism’s highest honors. He was twice awarded the prestigious George Polk Award, in 1998 for foreign reporting and in 2008 for \u003cem>Blackwater.\u003c/em> Scahill is a producer and writer of the award-winning film \u003cem>Dirty Wars\u003c/em>, which premiered at the 2013 Sundance Film Festival and was nominated for an Academy Award.\u003c/p>\n","email":"jeremy.scahill@theintercept.com","image_350":"https://theintercept.com/wp-uploads/sites/1/2014/02/Jeremy-Scahill-Original_350_2.jpg","twitter":"@jeremyscahill","facebook":"","pgp_key":"Jeremy Scahill Public Key","pgp_file":"https://firstlook.org/wp-uploads/sites/1/2014/05/JeremyScahillPGP.asc","pgp_fingerprint":"9FD2 A4D1 CEBF 2C31 EE1F B308 9F90 4CC8 45AA B390","user_title":"Co-founding Editor","user_group":"founding-editor","nicename":"jeremy-scahill"}],"excerpt_type":"","is_feature":"","feature_title":"","is_blog":false,"blog_title":"","comments_number":"21","bitly_url":"http://interc.pt/1NekNrr","comments_open":true,"is_banner_hidden":false,"featured_video_url":"","meta":{"links":[]},"layout":"default","banner_videokey":"","post_type":"squirrel","share_twitter_text":"Inside the CIA and Pentagon turf war over drone supremacy","yoast_wpseo_canonical":"https://theintercept.com/drone-papers/find-fix-finish/","yoast_wpseo_general_title":"Inside the CIA and Pentagon turf war over drone supremacy","yoast_wpseo_general_description":"","yoast_wpseo_facebook_title":"Inside the CIA and Pentagon turf war over drone supremacy","yoast_wpseo_facebook_description":"","yoast_wpseo_facebook_thumbnail":"","yoast_wpseo_twitter_title":"Inside the CIA and Pentagon turf war over drone supremacy","yoast_wpseo_twitter_description":"","yoast_wpseo_twitter_thumbnail":"","squirrel_subhead":"For the Pentagon, creating an architecture of assassination meant navigating a turf war with the CIA","squirrel_intro":"Soon after he was elected president, Barack Obama was strongly urged by Michael Hayden, the outgoing CIA director, and his new top counterterrorism adviser, John Brennan, to adopt the way of the scalpel — small footprint counterterrorism operations and drone strikes. In one briefing, Hayden bluntly told Obama that covert action was the only way to confront al Qaeda and other terrorist groups plotting attacks against the U.S. ","squirrel_num":"4","squirrel_top_text_color":"white","squirrel_top_meta_color":"black","squirrel_intro_bg_color":"white","squirrel_intro_text_color":"black","squirrel_subhead_offset":"0","squirrel_homepage_hero_location":3,"squirrel_videokey":""},"40292":{"ID":40292,"title":"A Visual Glossary","slug":"a-visual-glossary","excerpt":"Decoding the language of covert warfare.","content":"\u003cp>\u003cimg class=\"aligncenter size-article-medium wp-image-6198\" src=\"/wp-uploads/sites/1/2015/10/birds-anim-720.gif\" alt=\"\" />\u003ca id=\"birds\">\u003c/a>\u003c/p>\n\u003chr />\n\u003cp class=\"caption\">\u003cem>Click any arrow to enter a rabbit hole. Each serves as a back door into one of our stories.\u003c/em>\u003c/p>\n\u003ch2>Birds \u003ca class=\"sq-arrow\" href=\"https://theintercept.com/drone-papers/the-assassination-complex/\"> \u003c/a>\u003c/h2>\n\u003cp>\u003cem>The first bomb dropped from an airplane exploded in an oasis outside Tripoli on November 1, 1911.\u003c/em>\u003ca href=\"#credit\">¹\u003c/a>\u003c/p>\n\u003cp>While flying over Ain Zara, Libya, Lieutenant Giulio Gavotti leaned out of his airplane, which looked like a dragonfly, and dropped a Haasen hand grenade. It landed &#8220;in the camp of the enemy, with good results.&#8221;\u003c/p>\n\u003cdiv class='img-wrap align-bleed width-auto' style='width:auto'> \u003cimg class=\"aligncenter size-article-large wp-image-6201\" src=\"/wp-uploads/sites/1/2015/10/1911.jpg\" alt=\"\" /> \u003c/div>\n\u003cp>One hundred years later, the bombing is done by pilotless planes. They are controlled remotely, often half a world away. We have come to call them &#8220;drones.&#8221;\u003c/p>\n\u003cp>On the inside, people call them &#8220;birds.&#8221;\u003c/p>\n\u003cdiv class='img-wrap align-center width-fixed' style='width:720px'> \u003cimg class=\"aligncenter size-large wp-image-6204\" src=\"/wp-uploads/sites/1/2015/10/drone-mq1.jpg\" alt=\"\" /> \u003cp class='caption source pullright' style=''>Photo: U.S. Air Force\u003c/p>\u003c/div>\n\u003cp>Operators can watch their targets for hours, often from air-conditioned rooms, until they receive the order to fire. When the time is right, a room full of people watch as the shot is taken.\u003c/p>\n\u003cp>This is where they sit.\u003c/p>\n\u003cdiv class='img-wrap align-center width-fixed' style='width:720px'> \u003cimg class=\"aligncenter size-large wp-image-6238\" src=\"/wp-uploads/sites/1/2015/10/seating_chart.png\" alt=\"\" /> \u003ca id=\"objectives\">\u003c/a>\u003c/div>\n\u003ch2>Objectives \u003ca class=\"sq-arrow\" href=\"https://theintercept.com/drone-papers/the-life-and-death-of-objective-peckham/\"> \u003c/a>\u003c/h2>\n\u003cp>Most of the time, drone operators are trying to kill someone specific. They call these people—the people being hunted—“objectives.”\u003c/p>\n\u003cp>What does an objective look like? Here&#8217;s an example.\u003c/p>\n\u003cdiv class='img-wrap align-center width-fixed' style='width:720px'> \u003cimg class=\"aligncenter size-large wp-image-6240\" src=\"/wp-uploads/sites/1/2015/10/peckham1.png\" alt=\"\" />\u003cimg class=\"aligncenter size-large wp-image-6242\" src=\"/wp-uploads/sites/1/2015/10/peckham2.png\" alt=\"\" /> \u003c/div>\n\u003cp>This timeline was for a man named Bilal el-Berjawi. Intelligence agencies watched him for years, then the British government stripped him of his citizenship.\u003c/p>\n\u003cp>After calling his wife, who had just given birth in a London hospital, Berjawi was killed by an American drone strike. Some people thought the call might have given away his location, but the drones already knew where he was.\u003c/p>\n\u003cp>This was his car.\u003c/p>\n\u003cdiv class='img-wrap align-center width-fixed' style='width:720px'> \u003cimg class=\"aligncenter size-article-medium wp-image-6247\" src=\"/wp-uploads/sites/1/2015/10/peckham-car.png\" alt=\"\" /> \u003ca id=\"jackpot\">\u003c/a>\u003c/div>\n\u003ch2>Jackpot \u003ca class=\"sq-arrow\" href=\"https://theintercept.com/drone-papers/manhunting-in-the-hindu-kush/\"> \u003c/a>\u003c/h2>\n\u003cp>When drone operators hit their target, killing the person they intend to kill, that person is called a “jackpot.”\u003c/p>\n\u003cp>When they miss their target and end up killing someone else, they label that person EKIA, or “enemy killed in action.”\u003c/p>\n\u003cdiv class='img-wrap align-center width-fixed' style='width:720px'> \u003cimg class=\"aligncenter size-article-medium wp-image-6248\" src=\"/wp-uploads/sites/1/2015/10/skyraider.jpg\" alt=\"\" /> \u003ca id=\"EKIA\">\u003c/a>\u003c/div>\n\u003ch2>EKIA \u003ca class=\"sq-arrow\" href=\"https://theintercept.com/document/2015/10/15/operation-haymaker/\"> \u003c/a>\u003c/h2>\n\u003cp>Over a five-month period, U.S. forces used drones and other aircraft to kill 155 people in northeastern Afghanistan. They achieved 19 jackpots. Along the way, they killed at least 136 other people, all of whom were classified as EKIA, or enemies killed in action.\u003c/p>\n\u003cdiv class='img-wrap align-bleed width-auto' style='width:auto'> \u003cimg class=\"aligncenter size-article-large wp-image-6249\" src=\"/wp-uploads/sites/1/2015/10/hay.png\" alt=\"\" /> \u003c/div>\n\u003cp>Note the &#8220;%&#8221; column. It is the number of jackpots (JPs) divided by the number of operations. A 70 percent success rate. But it ignores well over a hundred other people killed along the way.\u003c/p>\n\u003cp>This means that almost 9 out of 10 people killed in these strikes were not the intended targets.\u003c/p>\n\u003cdiv class='img-wrap align-center width-fixed' style='width:720px'> \u003cimg class=\"aligncenter size-article-medium wp-image-6250\" src=\"/wp-uploads/sites/1/2015/10/ekia-grid.png\" alt=\"\" /> \u003ca id=\"touchdown\">\u003c/a>\u003c/div>\n\u003ch2>Touchdown \u003ca class=\"sq-arrow\" href=\"#watchlist\"> \u003c/a>\u003c/h2>\n\u003cp>Hellfire missiles—the explosives fired from drones—are not always fired at people. In fact, most drone strikes are aimed at phones. The SIM card provides a person&#8217;s location—when turned on, a phone can become a deadly proxy for the individual being hunted.\u003c/p>\n\u003cp>When a night raid or drone strike successfully neutralizes a target&#8217;s phone, operators call that a &#8220;touchdown.&#8221;\u003c/p>\n\u003cdiv class='img-wrap align-center width-fixed' style='width:720px'> \u003cimg class=\"aligncenter size-article-medium wp-image-6251\" src=\"/wp-uploads/sites/1/2015/10/obj_houston_dots.png\" alt=\"\" /> \u003c/div>\n\u003ch2>Baseball card \u003ca class=\"sq-arrow\" href=\"https://theintercept.com/drone-papers-alphabet-of-assassination\"> \u003c/a>\u003c/h2>\n\u003cp>“Baseball cards” (BBCs) are the military&#8217;s method for visualizing information—they are used to display data, map relationships between people, and identify an individual&#8217;s so-called pattern of life.\u003c/p>\n\u003cp>This isn&#8217;t quite what a baseball card looks like, but they are said to include much of the following information.\u003c/p>\n\u003cdiv class='img-wrap align-center width-fixed' style='width:720px'> \u003cimg class=\"aligncenter size-article-medium wp-image-6252\" src=\"/wp-uploads/sites/1/2015/10/bbc-burwyn.png\" alt=\"\" />\u003cimg class=\"aligncenter size-article-large wp-image-6253\" src=\"/wp-uploads/sites/1/2015/10/words.gif\" alt=\"\" /> \u003ca id=\"blink\">\u003c/a>\u003c/div>\n\u003ch2>Blink \u003ca class=\"sq-arrow\" href=\"https://theintercept.com/document/2015/10/15/small-footprint-operations-2-13/\"> \u003c/a>\u003c/h2>\n\u003cp>A &#8220;blink&#8221; happens when a drone has to move and there isn’t another aircraft to continue watching a target. According to classified documents, this is a major challenge facing the military, which always wants to have a &#8220;persistent stare.&#8221;\u003c/p>\n\u003cdiv class='img-wrap align-center width-fixed' style='width:720px'> \u003cimg class=\"aligncenter size-article-medium wp-image-6255\" src=\"/wp-uploads/sites/1/2015/10/persistent-stare.png\" alt=\"\" /> \u003c/div>\n\u003cp>The conceptual metaphor of surveillance is seeing. Perfect surveillance would be like having a lidless eye. Much of what is seen by a drone&#8217;s camera, however, appears without context on the ground. Some drone operators describe watching targets as &#8220;looking through a soda straw.&#8221;\u003c/p>\n\u003cdiv class='img-wrap align-center width-fixed' style='width:720px'>\u003cimg class=\"aligncenter size-article-medium wp-image-6254\" src=\"/wp-uploads/sites/1/2015/10/blinks.gif\" alt=\"\" /> \u003ca id=\"footprint\">\u003c/a>\u003c/div>\n\u003ch2>Footprint \u003ca class=\"sq-arrow\" href=\"https://theintercept.com/drone-papers/target-africa/\"> \u003c/a>\u003c/h2>\n\u003cp>Drones are not magic. They have to take off from somewhere. Increasingly that somewhere is on the continent of Africa.\u003c/p>\n\u003cp>But where exactly?\u003c/p>\n\u003cp>As of 2012, the Joint Special Operations Command (JSOC) had bases in Djibouti, Kenya, and Ethiopia. They operated 11 Predators and five Reaper drones over the Horn of Africa and Yemen.\u003c/p>\n\u003cdiv class='img-wrap align-center width-fixed' style='width:720px'> \u003cimg class=\"aligncenter size-article-medium wp-image-6256\" src=\"/wp-uploads/sites/1/2015/10/footprint.png\" alt=\"\" /> \u003c/div>\n\u003cp>After crashing multiple Predator drones near Camp Lemonnier, the U.S. military moved operations to a more remote airstrip in Chabelley, Djibouti.\u003c/p>\n\u003cdiv class='img-wrap align-center width-fixed' style='width:720px'> \u003cimg class=\"aligncenter size-article-medium wp-image-6257\" src=\"/wp-uploads/sites/1/2015/10/chabelley.2014.Nov_.jpg\" alt=\"\" />\u003c/p>\n\u003cp class=\"caption\">Chabelley, Djibouti. November 2014.\u003c/p>\n\u003cp>\u003cp class='caption source pullright' style=''>Photo: Google Earth\u003c/p>\u003c/div>\n\u003cp>Here&#8217;s a snapshot of how the U.S. views its surveillance capabilities on the continent of Africa more broadly.\u003c/p>\n\u003cdiv class='img-wrap align-center width-fixed' style='width:720px'> \u003cimg class=\"aligncenter size-article-medium wp-image-6258\" src=\"/wp-uploads/sites/1/2015/10/continent.png\" alt=\"\" /> \u003ca id=\"orbits\">\u003c/a>\u003c/div>\n\u003ch2>Orbits \u003ca class=\"sq-arrow\" href=\"https://theintercept.com/drone-papers/firing-blind/\"> \u003c/a>\u003c/h2>\n\u003cp>The military worries about what it calls the &#8220;tyranny of distance.&#8221; Compared to the traditional battlefields of Iraq and Afghanistan, U.S. drones have to travel farther to reach their “named areas of interest,” or NAIs, in Yemen and Somalia.\u003c/p>\n\u003cdiv class='img-wrap align-center width-fixed' style='width:720px'> \u003cimg class=\"aligncenter size-article-medium wp-image-6259\" src=\"/wp-uploads/sites/1/2015/10/orbits.png\" alt=\"\" /> \u003c/div>\n\u003cp>Here&#8217;s where the U.S. appears to have &#8220;finished&#8221; people in Yemen.\u003c/p>\n\u003cdiv class='img-wrap align-center width-fixed' style='width:720px'> \u003cimg class=\"aligncenter size-article-medium wp-image-6260\" src=\"/wp-uploads/sites/1/2015/10/yemen-finish.png\" alt=\"\" /> \u003c/div>\n\u003ch2>Kill Chain \u003ca class=\"sq-arrow\" href=\"https://theintercept.com/drone-papers/the-kill-chain/\"> \u003c/a>\u003c/h2>\n\u003cp>For many years, lawyers and human rights advocates have wondered about the chain of command. How are non-battlefield assassinations authorized? Does it fall within the Authorization for Use of Military Force (AUMF), or through some other authority?\u003c/p>\n\u003cp>The documents we have are not comprehensive, but they suggest a linear chain—all the way up to the president of the United States (POTUS).\u003c/p>\n\u003cdiv class='img-wrap align-bleed width-auto' style='width:auto'> \u003cimg class=\"aligncenter size-article-large wp-image-6261\" src=\"/wp-uploads/sites/1/2015/10/arrows-bleed.png\" alt=\"\" /> \u003c/div>\n\u003cdiv class='img-wrap align-center width-fixed' style='width:720px'> \u003cimg class=\"aligncenter size-article-medium wp-image-6264\" src=\"/wp-uploads/sites/1/2015/10/potus-arrows.png\" alt=\"\" /> \u003ca id=\"watchlist\">\u003c/a>\u003c/div>\n\u003ch2>Watchlist \u003ca class=\"sq-arrow\" href=\"https://theintercept.com/drone-papers/find-fix-finish/\"> \u003c/a>\u003c/h2>\n\u003cp>As we reported last year, U.S. intelligence agencies hunt people primarily on the basis of their cellphones. Equipped with a simulated cell tower called GILGAMESH, a drone can force a target&#8217;s phone to lock onto it, and subsequently use the phone&#8217;s signals to triangulate that person&#8217;s location.\u003c/p>\n\u003cp>Here is what a watchlist looks like.\u003c/p>\n\u003cdiv class='img-wrap align-center width-fixed' style='width:1000px'> \u003cimg class=\"aligncenter size-article-large wp-image-6265\" src=\"/wp-uploads/sites/1/2015/10/watchlist.jpg\" alt=\"\" /> \u003ca id=\"f3ea\">\u003c/a>\u003c/div>\n\u003ch2>Find, Fix, Finish \u003ca class=\"sq-arrow\" href=\"#birds\"> \u003c/a>\u003c/h2>\n\u003cp>In the end, Intelligence, Surveillance, and Reconnaissance (ISR) is about continuing a cycle: Find a person, Fix a person, Finish them. But there are two other steps in the process: Exploit and Analyze.\u003c/p>\n\u003cp>Colloquially referred to as “F3EA,” the cycle feeds back into itself. The whole process amounts to human hunting. As soon as a target is finished, the hunt for a new target begins.\u003c/p>\n\u003cdiv class='img-wrap align-center width-fixed' style='width:720px'> \u003cimg class=\"aligncenter size-article-medium wp-image-6266\" src=\"/wp-uploads/sites/1/2015/10/f3.gif\" alt=\"\" /> \u003ca id=\"credit\">\u003c/a>\u003c/div>\n\u003chr />\n\u003cp class=\"caption\">\u003ca href=\"#birds\">1.\u003c/a> \u003cem>With thanks to Sven Lindqvist&#8217;s \u003cem>A History of Bombing\u003c/em>, which served as a template for this narrative. Additional design and illustration by Evan Bissell.\u003c/em>\u003c/p>\n\u003cp class=\"caption\">Additional reporting: \u003ca href=\"/staff/jeremy-scahill/\">\u003cimg class=\"sq-author\" src=\"https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2014/02/Jeremy-Scahill-Original_350_2.jpg\" alt=\"\" width=\"40\" /> Jeremy Scahill\u003c/a>\u003c/p>\n","link":"https://theintercept.com/drone-papers/a-visual-glossary/","thumbnail":{"ID":40395,"title":"","excerpt":"","content":"","credit":"","sizes":{"feature_hero":{"path":"wp-uploads/sites/1/2015/10/SQ02_AVisualGlossary01-feature-hero.jpg","width":1200,"height":800},"promo":{"path":"wp-uploads/sites/1/2015/10/SQ02_AVisualGlossary01-promo.jpg","width":440,"height":220},"promo_large":{"path":"wp-uploads/sites/1/2015/10/SQ02_AVisualGlossary01-promo-large.jpg","width":900,"height":450},"top_large":{"path":"wp-uploads/sites/1/2015/10/SQ02_AVisualGlossary01-top-large.jpg","width":440,"height":440},"top_small":{"path":"wp-uploads/sites/1/2015/10/SQ02_AVisualGlossary01-top-small.jpg","width":200,"height":200},"square":{"path":"wp-uploads/sites/1/2015/10/SQ02_AVisualGlossary01-440x440.jpg","width":440,"height":440},"article_header":{"path":"wp-content/uploads/sites/1/2015/10/SQ02_AVisualGlossary01.jpg","width":1230,"height":615},"original":{"path":"wp-uploads/sites/1/2015/10/SQ02_AVisualGlossary01.jpg","width":"1230","height":"615"}}},"date":"2015-10-15T11:58:42+00:00","authors":[{"ID":39,"display_name":"Josh Begley","url":"https://theintercept.com/staff/josh/","brief_bio":"Josh Begley is a data artist and web developer based in Brooklyn.","full_bio":"\u003cp>Josh Begley is a data artist and web developer based in Brooklyn. He is the creator of \u003ca href=\"https://twitter.com/dronestream\">Metadata+\u003c/a>, an iPhone app that tracks U.S. drone strikes. His work has appeared in \u003cem>Wired\u003c/em>, \u003cem>The New York Times\u003c/em>, \u003cem>NPR\u003c/em>, \u003cem>The Atlantic\u003c/em>, \u003cem>The Guardian\u003c/em>, \u003cem>New York Magazine\u003c/em>, and at the New Museum of Contemporary Art.\u003c/p>\n","email":"josh.begley@theintercept.com","image_350":"https://firstlook.org/wp-uploads/sites/1/2015/07/josh.begley.2015.bw_-350x350.jpg","twitter":"@joshbegley","facebook":"","pgp_key":"Josh Begley Public Key","pgp_file":"https://firstlook.org/wp-uploads/sites/1/2015/07/JoshBegleyPGP.asc","pgp_fingerprint":"F23B 9817 ECFF AF18 4107 2905 CB37 7EB6 A498 FCD3","user_title":"Research Editor","user_group":"","nicename":"josh"}],"excerpt_type":"","is_feature":"","feature_title":"","is_blog":false,"blog_title":"","comments_number":"95","bitly_url":"http://interc.pt/1QwG3cO","comments_open":true,"is_banner_hidden":false,"featured_video_url":"","meta":{"links":[]},"layout":"default","banner_videokey":"","post_type":"squirrel","share_twitter_text":"The Drone Papers: A Visual Glossary","yoast_wpseo_canonical":"https://theintercept.com/drone-papers/a-visual-glossary/","yoast_wpseo_general_title":"The Drone Papers: A Visual Glossary","yoast_wpseo_general_description":"Decoding the language of covert warfare.","yoast_wpseo_facebook_title":"The Drone Papers: A Visual Glossary","yoast_wpseo_facebook_description":"Decoding the language of covert warfare.","yoast_wpseo_facebook_thumbnail":"https://firstlook.org/wp-uploads/sites/1/2015/10/docs-1200.jpg","yoast_wpseo_twitter_title":"The Drone Papers: A Visual Glossary","yoast_wpseo_twitter_description":"Decoding the language of covert warfare.","yoast_wpseo_twitter_thumbnail":"https://firstlook.org/wp-uploads/sites/1/2015/10/docs-1200.jpg","squirrel_subhead":"Decoding the language of covert warfare","squirrel_intro":"This is a labyrinth with 12 entrances and no exit. It&nbsp;is&nbsp;built on a cache of documents provided to \u003cem>The&nbsp;Intercept\u003c/em> by a source within the intelligence community.","squirrel_num":"2","squirrel_top_text_color":"red","squirrel_top_meta_color":"black","squirrel_intro_bg_color":"white","squirrel_intro_text_color":"black","squirrel_subhead_offset":"2","squirrel_homepage_hero_location":1,"squirrel_videokey":""},"40294":{"ID":40294,"title":"The Assassination Complex","slug":"the-assassination-complex","excerpt":"The whistleblower who leaked the drone papers believes the public is entitled to know how people are placed on kill lists and assassinated on orders from the president.","content":"\u003cp>\u003cu>\u003cspan class=\"dropcap\">D\u003c/span>RONES ARE A TOOL,\u003c/u> not a policy. The policy is assassination. While every president since Gerald Ford has upheld an executive order banning assassinations by U.S. personnel, Congress has avoided legislating the issue or even \u003ca href=\"http://fas.org/irp/crs/RS21037.pdf\">defining\u003c/a> the word “assassination.” This has allowed proponents of the drone wars to rebrand assassinations with more palatable characterizations, such as the term du jour, “targeted killings.”\u003c/p>\n\u003cp>When the Obama administration has discussed drone strikes publicly, it has offered assurances that such operations are a more precise alternative to boots on the ground and are authorized only when an “imminent” threat is present and there is “near certainty” that the intended target will be eliminated. Those terms, however, appear to have been bluntly \u003ca href=\"http://www.slate.com/articles/news_and_politics/frame_game/2013/02/drones_law_and_imminent_attacks_how_the_u_s_redefines_legal_terms_to_justify.html\">redefined\u003c/a> to bear almost no resemblance to their commonly understood meanings.\u003c/p>\n\u003cp>The first drone strike outside of a declared war zone was conducted more than \u003ca href=\"http://news.bbc.co.uk/2/hi/2402479.stm\">12 years ago\u003c/a>, yet it was not until May 2013 that the White House released a \u003ca href=\"https://www.whitehouse.gov/sites/default/files/uploads/2013.05.23_fact_sheet_on_ppg.pdf\">set of standards and procedures\u003c/a> for conducting such strikes. Those guidelines offered little specificity, asserting that the U.S. would only conduct a lethal strike outside of an “area of active hostilities” if a target represents a “continuing, imminent threat to U.S. persons,” without providing any sense of the \u003ca href=\"https://www.aclu.org/news/aclu-comment-presidents-national-security-speech\">internal process\u003c/a> used to determine whether a suspect should be killed without being indicted or tried. The implicit message on drone strikes from the Obama administration has been one of \u003cem>trust, but don’t verify\u003c/em>.\u003c/p>\n\u003cdiv class='img-wrap align-center width-fixed' style='width:1024px'>\u003cimg class=\"aligncenter size-large wp-image-6586\" src=\"/wp-uploads/sites/1/2015/10/P1150806_bw-1024x684.jpg\" alt=\"\" />\u003cp class='caption source pullright' style=''>Photo: The Intercept\u003c/p>\u003c/div>\n\u003cp>\u003ca class=\"sq-article-link\" href=\"/document/2015/10/14/small-footprint-operations-2-13\">\u003cimg src=\"/wp-uploads/sites/1/2015/10/ISR-Feb13-thumb.jpg\" alt=\"\" />\u003cspan class=\"\">Document\u003c/span>\u003cbr />\nSmall Footprint Operations 2/13\u003c/a> \u003ca class=\"sq-article-link\" href=\"/document/2015/10/14/small-footprint-operations-5-13\">\u003cimg src=\"/wp-uploads/sites/1/2015/10/ISR-May13-thumb.jpg\" alt=\"\" />\u003cspan class=\"\">Document\u003c/span>\u003cbr />\nSmall Footprint Operations 5/13\u003c/a> \u003ca class=\"sq-article-link\" href=\"/document/2015/10/14/operation-haymaker\">\u003cimg src=\"/wp-uploads/sites/1/2015/10/13-redacted-thumb.jpg\" alt=\"\" />\u003cspan class=\"\">Document\u003c/span>\u003cbr />\nOperation Haymaker\u003c/a> \u003ca class=\"sq-article-link\" href=\"/document/2015/10/14/geolocation-watchlist\">\u003cimg src=\"/wp-uploads/sites/1/2015/10/watchlist-thumb.png\" alt=\"\" />\u003cspan class=\"\">Document\u003c/span>\u003cbr />\nGeolocation-Watchlist\u003c/a> \u003cem>The Intercept\u003c/em> has obtained a cache of secret slides that provides a window into the inner workings of the U.S. military’s kill/capture operations at a key time in the evolution of the drone wars — between 2011 and 2013. The documents, which also outline the internal views of special operations forces on the shortcomings and flaws of the drone program, were provided by a source within the intelligence community who worked on the types of operations and programs described in the slides. \u003cem>The Intercept\u003c/em> granted the source’s request for anonymity because the materials are classified and because the U.S. government has engaged in aggressive prosecution of whistleblowers. The stories in this series will refer to the source as “the source.”\u003c/p>\n\u003cp>The source said he decided to provide these documents to \u003cem>The Intercept\u003c/em> because he believes the public has a right to understand the process by which people are placed on kill lists and ultimately assassinated on orders from the highest echelons of the U.S. government. “This outrageous explosion of watchlisting — of monitoring people and racking and stacking them on lists, assigning them numbers, assigning them ‘baseball cards,’ assigning them death sentences without notice, on a worldwide battlefield — it was, from the very first instance, wrong,” the source said.\u003c/p>\n\u003cblockquote class='stylized pull-none'>“We’re allowing this to happen. And by ‘we,’ I mean every American citizen who has access to this information now, but continues to do nothing about it.”\u003c/blockquote>\n\u003cp>The Pentagon, White House, and Special Operations Command all declined to comment. A Defense Department spokesperson said, “We don’t comment on the details of classified reports.”\u003c/p>\n\u003cp>The CIA and the U.S. military’s Joint Special Operations Command (JSOC) operate parallel drone-based assassination programs, and the secret documents should be viewed in the context of an intense \u003ca href=\"/drone-papers/find-fix-finish/\">internal turf war\u003c/a> over which entity should have supremacy in those operations. Two sets of slides focus on the military’s high-value targeting campaign in Somalia and Yemen as it existed between 2011 and 2013, specifically the operations of a secretive unit, Task Force 48-4.\u003c/p>\n\u003cp>\u003ca href=\"/document/2015/10/15/operation-haymaker/#page-1\">Additional documents\u003c/a> on high-value kill/capture operations in Afghanistan buttress \u003ca href=\"http://www.nytimes.com/2012/05/29/world/obamas-leadership-in-war-on-al-qaeda.html?_r=0\">previous accounts\u003c/a> of how the Obama administration masks the true number of civilians killed in drone strikes by categorizing unidentified people killed in a strike as enemies, even if they were not the intended targets. The slides also \u003ca href=\"/drone-papers/manhunting-in-the-hindu-kush\">paint a picture\u003c/a> of a campaign in Afghanistan aimed not only at eliminating al Qaeda and Taliban operatives, but also at taking out members of other local armed groups.\u003c/p>\n\u003cp>One top-secret document shows how the terror &#8220;watchlist&#8221; appears in the terminals of personnel conducting drone operations, linking unique codes associated with cellphone SIM cards and handsets to specific individuals in order to geolocate them.\u003c/p>\n\u003cdiv class='img-wrap align-bleed width-auto' style='width:auto'>\u003cimg class=\"alignright size-article-medium wp-image-6703\" src=\"/wp-uploads/sites/1/2015/10/GeolocationWatchlist_Crop01.jpg\" alt=\"\" />\u003c/p>\n\u003cp class=\"caption overlayed\">A top-secret document shows how the watchlist looks on internal systems used by drone operators.\u003c/p>\n\u003cp>\u003c/div>\n\u003cp>The \u003ca href=\"/drone-papers/firing-blind/\">costs to intelligence\u003c/a> gathering when suspected terrorists are killed rather than captured are outlined in the slides pertaining to Yemen and Somalia, which are part of a 2013 study conducted by a Pentagon entity, the Intelligence, Surveillance, and Reconnaissance Task Force. The ISR study lamented the limitations of the drone program, arguing for more advanced drones and other surveillance aircraft and the expanded use of naval vessels to extend the reach of surveillance operations necessary for targeted strikes. It also contemplated the establishment of new “politically challenging” airfields and recommended capturing and interrogating more suspected terrorists rather than killing them in drone strikes.\u003c/p>\n\u003cp>The ISR Task Force at the time was under the control of Michael Vickers, the undersecretary of defense for intelligence. Vickers, a fierce proponent of drone strikes and a legendary paramilitary figure, had long pushed for a significant increase in the military’s use of special operations forces. The ISR Task Force is \u003ca href=\"http://intelligence.house.gov/sites/intelligence.house.gov/files/documents/ISRPerformanceAudit%20Final.pdf\">viewed by key lawmakers\u003c/a> as an advocate for more surveillance platforms like drones.\u003c/p>\n\u003cp>The ISR study also reveals \u003ca href=\"/drone-papers/the-life-and-death-of-objective-peckham/\">new details\u003c/a> about the case of a British citizen, Bilal el-Berjawi, who was stripped of his citizenship before being killed in a U.S. drone strike in 2012. British and American intelligence had Berjawi under surveillance for several years as he traveled back and forth between the U.K. and East Africa, yet did not capture him. Instead, the U.S. hunted him down and \u003ca href=\"/document/2015/10/14/small-footprint-operations-2-13/#page-22\">killed him in Somalia\u003c/a>.\u003c/p>\n\u003cp>Taken together, the secret documents lead to the conclusion that Washington’s 14-year high-value targeting campaign suffers from an overreliance on signals intelligence, an apparently incalculable civilian toll, and — due to a preference for assassination rather than capture — an inability to extract potentially valuable intelligence from terror suspects. They also highlight the futility of the war in Afghanistan by showing how the U.S. has poured vast resources into killing local insurgents, in the process exacerbating the very threat the U.S. is seeking to confront.\u003c/p>\n\u003cp>\u003ca class=\"sq-article-link\" href=\"/drone-papers/find-fix-finish\">\u003cimg src=\"/wp-uploads/sites/1/2015/10/SQ03_FindFixFinish-Getty159308578-1-promo.jpg\" alt=\"\" />\u003cspan class=\"\">Read more\u003c/span>\u003cbr />\nFind, Fix, Finish\u003c/a> These secret slides help provide historical context to Washington’s ongoing wars, and are especially relevant today as the U.S. military \u003ca href=\"https://www.washingtonpost.com/world/national-security/us-launches-secret-drone-campaign-to-hunt-islamic-state-leaders-in-syria/2015/09/01/723b3e04-5033-11e5-933e-7d06c647a395_story.html\">intensifies\u003c/a> its drone strikes and covert actions against ISIS in Syria and Iraq. Those campaigns, like the ones detailed in these documents, are unconventional wars that employ special operations forces at the tip of the spear.\u003c/p>\n\u003cp>The &#8220;find, fix, finish&#8221; doctrine that has fueled America’s post-9/11 borderless war is being refined and institutionalized. Whether through the use of drones, night raids, or new platforms yet to be unleashed, these documents lay bare the normalization of assassination as a central component of U.S. counterterrorism policy.\u003c/p>\n\u003cblockquote class='stylized pull-none'>“The military is easily capable of adapting to change, but they don’t like to stop anything they feel is making their lives easier, or is to their benefit. And this certainly is, in their eyes, a very quick, clean way of doing things. It’s a very slick, efficient way to conduct the war, without having to have the massive ground invasion mistakes of Iraq and Afghanistan,” \u003cstrong>the source said.\u003c/strong> “But at this point, they have become so addicted to this machine, to this way of doing business, that it seems like it’s going to become harder and harder to pull them away from it the longer they’re allowed to continue operating in this way.”\u003c/blockquote>\n\u003cdiv class=\"sq-bleed sq-bleed--black\">\n\u003cdiv class='img-wrap align-bleed width-auto' style='width:auto'>\u003cimg class=\"alignright size-large wp-image-6755\" src=\"/wp-uploads/sites/1/2015/10/GettyImages-486218728_Crop01-1024x419.jpg\" alt=\"\" />\u003c/div>\n\u003cp>The articles in \u003cem>The Drone Papers\u003c/em> were produced by a team of reporters and researchers from \u003cem>The Intercept\u003c/em> that has spent months analyzing the documents. The series is intended to serve as a long-overdue public examination of the methods and outcomes of America’s assassination program. This campaign, carried out by two presidents through four presidential terms, has been shrouded in excessive secrecy. The public has a right to see these documents not only to engage in an informed debate about the future of U.S. wars, both overt and covert, but also to understand the circumstances under which the U.S. government arrogates to itself the right to sentence individuals to death without the established checks and balances of arrest, trial, and appeal.\u003c/p>\n\u003chr />\n\u003cp>\u003cem>Among the key revelations in this series:\u003c/em>\u003c/p>\n\u003ch2 class=\"sq-head-alt\">How the president authorizes targets for assassination\u003c/h2>\n\u003cp>\u003ca class=\"sq-article-link\" href=\"/drone-papers/the-kill-chain\">\u003cimg src=\"/wp-uploads/sites/1/2015/10/KC_HeadsRedacted01-promo.jpg\" alt=\"\" />\u003cspan class=\"\">Read more\u003c/span>\u003cbr />\nKill Chain\u003c/a>It has been widely reported that President Obama directly approves high-value targets for inclusion on the kill list, but the secret ISR study provides new insight into the kill chain, including a detailed chart stretching from electronic and human intelligence gathering all the way to the president’s desk. The same month the ISR study was circulated — May 2013 — Obama signed the policy guidance on the use of force in counterterrorism operations overseas. A senior administration official, who declined to comment on the classified documents, told \u003cem>The Intercept\u003c/em> that &#8220;those guidelines remain in effect today.”\u003c/p>\n\u003cp>U.S. intelligence personnel collect information on potential targets, as \u003cem>The Intercept\u003c/em> has \u003ca href=\"https://firstlook.org/theintercept/2014/08/05/watch-commander/\">previously reported\u003c/a>, drawn from \u003ca href=\"https://firstlook.org/theintercept/2014/07/23/blacklisted/\">government watchlists\u003c/a> and the work of intelligence, military, and law enforcement agencies. At the time of the study, when someone was destined for the kill list, intelligence analysts created a portrait of a suspect and the threat that person posed, pulling it together “in a condensed format known as a ‘baseball card.’” That information was then bundled with operational information and packaged in a “target information folder” to be “staffed up to higher echelons” for action. On average, it took 58 days for the president to sign off on a target, \u003ca href=\"/document/2015/10/15/small-footprint-operations-2-13/#page-41\">one slide\u003c/a> indicates. At that point, U.S. forces had 60 days to carry out the strike. The documents include two case studies that are partially based on information detailed on baseball cards.\u003c/p>\n\u003cp>The system for \u003ca href=\"/document/2015/10/14/small-footprint-operations-2-13/#page-23\">creating baseball cards\u003c/a> and targeting packages, according to the source, depends largely on intelligence intercepts and a multi-layered system of fallible, human interpretation. “It isn’t a surefire method,” he said. “You’re relying on the fact that you do have all these very powerful machines, capable of collecting extraordinary amounts of data and information,” which can lead personnel involved in targeted killings to believe they have “godlike powers.”\u003c/p>\n\u003ch2 class=\"sq-head-alt\">Assassinations depend on unreliable intelligence and hurt intelligence gathering\u003c/h2>\n\u003cp>\u003ca class=\"sq-article-link\" href=\"/drone-papers/firing-blind\">\u003cimg src=\"/wp-uploads/sites/1/2015/10/firing-blind-drone-promo.jpg\" alt=\"\" />\u003cspan class=\"\">Read more\u003c/span>\u003cbr />\nFiring Blind\u003c/a>In undeclared war zones, the U.S. military has become overly reliant on signals intelligence, or SIGINT, to identify and ultimately hunt down and kill people. The documents acknowledge that using metadata from phones and computers, as well as communications intercepts, is an inferior method of finding and finishing targeted people. They described SIGINT capabilities in these unconventional battlefields as “poor” and “limited.” Yet such collection, much of it provided by foreign partners, accounted for more than half the intelligence used to track potential kills in Yemen and Somalia. The ISR study characterized these failings as a technical hindrance to efficient operations, omitting the fact that \u003ca href=\"http://www.nytimes.com/2015/04/24/world/asia/drone-strikes-reveal-uncomfortable-truth-us-is-often-unsure-about-who-will-die.html\">faulty intelligence\u003c/a> has led to the killing of innocent people, \u003ca href=\"http://www.wsj.com/articles/american-italian-hostages-killed-in-cia-drone-strike-in-january-1429795801\">including\u003c/a> U.S. citizens, in drone strikes.\u003c/p>\n\u003cp>The source underscored the unreliability of metadata, most often from phone and computer communications intercepts. These sources of information, identified by so-called selectors such as a phone number or email address, are the primary tools used by the military to find, fix, and finish its targets. “It requires an enormous amount of faith in the technology that you’re using,” the source said. “There’s countless instances where I’ve come across intelligence that was faulty.” This, he said, is a primary factor in the killing of civilians. “It’s stunning the number of instances when selectors are misattributed to certain people. And it isn’t until several months or years later that you all of a sudden realize that the entire time you thought you were going after this really hot target, you wind up realizing it was his mother’s phone the whole time.”\u003c/p>\n\u003cp>Within the special operations community, the source said, the internal view of the people being hunted by the U.S. for possible death by drone strike is: “They have no rights. They have no dignity. They have no humanity to themselves. They’re just a ‘selector’ to an analyst. You eventually get to a point in the target’s life cycle that you are following them, you don’t even refer to them by their actual name.” This practice, he said, contributes to “dehumanizing the people before you’ve even encountered the moral question of ‘is this a legitimate kill or not?’”\u003c/p>\n\u003cp>By the ISR study’s own admission, killing suspected terrorists, even if they are “legitimate” targets, further hampers intelligence gathering. The secret study states bluntly: “Kill operations significantly reduce the intelligence available.” A chart shows that special operations actions in the Horn of Africa resulted in captures just 25 percent of the time, indicating a heavy tilt toward lethal strikes.\u003c/p>\n\u003ch2 class=\"sq-head-alt\">Strikes often kill many more than the intended target\u003c/h2>\n\u003cp>\u003ca class=\"sq-article-link\" href=\"/drone-papers/manhunting-in-the-hindu-kush\">\u003cimg src=\"/wp-uploads/sites/1/2015/10/GettyImages-107990394-promo.jpg\" alt=\"\" />\u003cspan class=\"\">Read more\u003c/span>\u003cbr />\nManhunting in the Hindu Kush\u003c/a> The White House and Pentagon boast that the targeted killing program is precise and that civilian deaths are minimal. However, documents detailing a special operations campaign in northeastern Afghanistan, Operation Haymaker, show that between January 2012 and February 2013, U.S. special operations airstrikes killed more than 200 people. Of those, only 35 were the intended targets. During one five-month period of the operation, according to the documents, nearly 90 percent of the people killed in airstrikes were not the intended targets. In Yemen and Somalia, where the U.S. has far more limited intelligence capabilities to confirm the people killed are the intended targets, the equivalent ratios may well be much worse.\u003c/p>\n\u003cp>“Anyone caught in the vicinity is guilty by association,” the source said. When “a drone strike kills more than one person, there is no guarantee that those persons deserved their fate. &#8230; So it’s a phenomenal gamble.”\u003c/p>\n\u003ch2 class=\"sq-head-alt\">The military labels \u003cem>unknown\u003c/em> people it kills as “enemies killed in action”\u003c/h2>\n\u003cp>\u003ca class=\"sq-article-link\" href=\"/drone-papers/manhunting-in-the-hindu-kush\">\u003cimg src=\"/wp-uploads/sites/1/2015/10/GettyImages-107990394-promo.jpg\" alt=\"\" />\u003cspan class=\"\">Read more\u003c/span>\u003cbr />\nManhunting in the Hindu Kush\u003c/a> The documents show that the military designated people it killed in targeted strikes as EKIA — &#8220;enemy killed in action&#8221; — even if they were not the intended targets of the strike. Unless evidence posthumously emerged to prove the males killed were not terrorists or “unlawful enemy combatants,” EKIA remained their designation, according to the source. That process, he said, “is insane. But we’ve made ourselves comfortable with that. The intelligence community, JSOC, the CIA, and everybody that helps support and prop up these programs, they’re comfortable with that idea.”\u003c/p>\n\u003cp>The source described official U.S. government statements minimizing the number of civilian casualties inflicted by drone strikes as “exaggerating at best, if not outright lies.”\u003c/p>\n\u003ch2 class=\"sq-head-alt\">The number of people targeted for drone strikes and other finishing operations\u003c/h2>\n\u003cp>\u003ca class=\"sq-article-link\" href=\"/drone-papers/the-kill-chain\">\u003cimg src=\"/wp-uploads/sites/1/2015/10/KC_HeadsRedacted01-promo.jpg\" alt=\"\" />\u003cspan class=\"\">Read more\u003c/span>\u003cbr />\nKill Chain\u003c/a>According to \u003ca href=\"/document/2015/10/15/small-footprint-operations-5-13/#page-6\">one secret slide\u003c/a>, as of June 2012, there were 16 people in Yemen whom President Obama had authorized U.S. special operations forces to assassinate. In Somalia, there were four. The statistics contained in the documents appear to refer only to targets approved under the 2001 Authorization for Use of Military Force, not CIA operations. In 2012 alone, according to data compiled by the Bureau of Investigative Journalism, there were more than 200 people killed in operations in Yemen and between four and eight in Somalia.\u003c/p>\n\u003ch2 class=\"sq-head-alt\">How geography shapes the assassination campaign\u003c/h2>\n\u003cp>\u003ca class=\"sq-article-link\" href=\"/drone-papers/firing-blind\">\u003cimg src=\"/wp-uploads/sites/1/2015/10/firing-blind-drone-promo.jpg\" alt=\"\" />\u003cspan class=\"\">Read more\u003c/span>\u003cbr />\nFiring Blind\u003c/a>In Afghanistan and Iraq, the pace of U.S. strikes was much quicker than in Yemen and Somalia. This appears due, in large part, to the fact that Afghanistan and Iraq were declared war zones, and in Iraq the U.S. was able to launch attacks from bases closer to the targeted people. By contrast, in Somalia and Yemen, undeclared war zones where strikes were justified under tighter restrictions, U.S. attack planners described a serpentine bureaucracy for obtaining approval for assassination. The secret study states that the number of high-value targeting operations in these countries was “significantly lower than previously seen in Iraq and Afghanistan” because of these “constraining factors.”\u003c/p>\n\u003cp>Even after the president approved a target in Yemen or Somalia, the great distance between drone bases and targets created significant challenges for U.S. forces — a problem referred to in the documents as the “tyranny of distance.” In Iraq, more than 80 percent of “finishing operations” were conducted within 150 kilometers of an air base. In Yemen, the average distance was about 450 kilometers and in Somalia it was more than 1,000 kilometers. On average, one document states, it took the U.S. six years to develop a target in Somalia, but just 8.3 months to kill the target once the president had approved his addition to the kill list.\u003c/p>\n\u003ch2 class=\"sq-head-alt\">Inconsistencies with White House statements about targeted killing\u003c/h2>\n\u003cp>\u003ca class=\"sq-article-link\" href=\"/drone-papers/the-kill-chain\">\u003cimg src=\"/wp-uploads/sites/1/2015/10/KC_HeadsRedacted01-promo.jpg\" alt=\"\" />\u003cspan class=\"\">Read more\u003c/span>\u003cbr />\nKill Chain\u003c/a>The White House’s publicly available policy standards state that lethal force will be launched only against targets who pose a “continuing, imminent threat to U.S. persons.” In the documents, however, there is only one \u003ca href=\"/document/2015/10/15/small-footprint-operations-5-13/#page-6\">explicit mention\u003c/a> of a specific criterion: that a person “presents a threat to U.S. interest or personnel.” While such a rationale may make sense in the context of a declared war in which U.S. personnel are on the ground in large numbers, such as in Afghanistan, that standard is so vague as to be virtually meaningless in countries like Yemen and Somalia, where very few U.S. personnel operate.\u003c/p>\n\u003c/div>\n\u003cp>While many of the documents provided to \u003cem>The Intercept\u003c/em> contain explicit internal recommendations for improving unconventional U.S. warfare, the source said that what’s implicit is even more significant. The mentality reflected in the documents on the assassination programs is: “This process can work. We can work out the kinks. We can excuse the mistakes. And eventually we will get it down to the point where we don’t have to continuously come back &#8230; and explain why a bunch of innocent people got killed.”\u003c/p>\n\u003cp>The architects of what amounts to a global assassination campaign do not appear concerned with either its enduring impact or its moral implications. “All you have to do is take a look at the world and what it’s become, and the ineptitude of our Congress, the power grab of the executive branch over the past decade,” the source said. “It’s never considered: Is what we’re doing going to ensure the safety of our moral integrity? Of not just our moral integrity, but the lives and humanity of the people that are going to have to live with this the most?”\u003c/p>\n\u003cp class=\"caption\">\u003cem>Photo: Mohammed Hamoud/Anadolu Agency/Getty Images\u003c/em>\u003c/p>\n","link":"https://theintercept.com/drone-papers/the-assassination-complex/","thumbnail":{"ID":40338,"title":"","excerpt":"","content":"","credit":"","sizes":{"feature_hero":{"path":"wp-uploads/sites/1/2015/10/SQ01_TheAssassinationComplex01-feature-hero.jpg","width":1200,"height":800},"promo":{"path":"wp-uploads/sites/1/2015/10/SQ01_TheAssassinationComplex01-promo.jpg","width":440,"height":220},"promo_large":{"path":"wp-uploads/sites/1/2015/10/SQ01_TheAssassinationComplex01-promo-large.jpg","width":900,"height":450},"top_large":{"path":"wp-uploads/sites/1/2015/10/SQ01_TheAssassinationComplex01-top-large.jpg","width":440,"height":440},"top_small":{"path":"wp-uploads/sites/1/2015/10/SQ01_TheAssassinationComplex01-top-small.jpg","width":200,"height":200},"square":{"path":"wp-uploads/sites/1/2015/10/SQ01_TheAssassinationComplex01-440x440.jpg","width":440,"height":440},"article_header":{"path":"wp-uploads/sites/1/2015/10/SQ01_TheAssassinationComplex01-article-header.jpg","width":1440,"height":720},"original":{"path":"wp-uploads/sites/1/2015/10/SQ01_TheAssassinationComplex01.jpg","width":"1920","height":"1080"}}},"date":"2015-10-15T11:57:44+00:00","authors":[{"ID":9,"display_name":"Jeremy Scahill","url":"https://theintercept.com/staff/jeremy-scahill/","brief_bio":"Jeremy Scahill is an investigative reporter and war correspondent.","full_bio":"\u003cp>Jeremy Scahill is one of the three founding editors of \u003cem>The Intercept\u003c/em>. He is an investigative reporter, war correspondent, and author of the international bestselling books \u003cem>Dirty Wars: The World Is a Battlefield \u003c/em>and \u003cem>Blackwater: The Rise of the World’s Most Powerful Mercenary Army\u003c/em>. \u003c!-- Read More --\>He has reported from Afghanistan, Iraq, Somalia, Yemen, Nigeria, the former Yugoslavia, and elsewhere across the globe. Scahill has served as the national security correspondent for \u003cem>The Nation \u003c/em>and \u003cem>Democracy Now!\u003c/em>.\u003c/p>\n\u003cp>Scahill&#8217;s work has sparked several congressional investigations and won some of journalism’s highest honors. He was twice awarded the prestigious George Polk Award, in 1998 for foreign reporting and in 2008 for \u003cem>Blackwater.\u003c/em> Scahill is a producer and writer of the award-winning film \u003cem>Dirty Wars\u003c/em>, which premiered at the 2013 Sundance Film Festival and was nominated for an Academy Award.\u003c/p>\n","email":"jeremy.scahill@theintercept.com","image_350":"https://theintercept.com/wp-uploads/sites/1/2014/02/Jeremy-Scahill-Original_350_2.jpg","twitter":"@jeremyscahill","facebook":"","pgp_key":"Jeremy Scahill Public Key","pgp_file":"https://firstlook.org/wp-uploads/sites/1/2014/05/JeremyScahillPGP.asc","pgp_fingerprint":"9FD2 A4D1 CEBF 2C31 EE1F B308 9F90 4CC8 45AA B390","user_title":"Co-founding Editor","user_group":"founding-editor","nicename":"jeremy-scahill"}],"excerpt_type":"","is_feature":"","feature_title":"","is_blog":false,"blog_title":"","comments_number":"528","bitly_url":"http://interc.pt/1Lvu1R3","comments_open":true,"is_banner_hidden":false,"featured_video_url":"","meta":{"links":[]},"layout":"default","banner_videokey":"","post_type":"squirrel","share_twitter_text":"Leaked military documents expose the inner workings of Obama’s drone wars","yoast_wpseo_canonical":"https://theintercept.com/drone-papers/the-assassination-complex/","yoast_wpseo_general_title":"Leaked military documents expose the inner workings of Obama’s drone wars","yoast_wpseo_general_description":"","yoast_wpseo_facebook_title":"Leaked military documents expose the inner workings of Obama’s drone wars","yoast_wpseo_facebook_description":"","yoast_wpseo_facebook_thumbnail":"","yoast_wpseo_twitter_title":"Leaked military documents expose the inner workings of Obama’s drone wars","yoast_wpseo_twitter_description":"","yoast_wpseo_twitter_thumbnail":"","squirrel_subhead":"Secret military documents expose the inner workings of Obama’s drone wars","squirrel_intro":"From his first days as commander in chief, the drone has been President Barack Obama’s weapon of choice, used by the military and the CIA to hunt down and kill the people his administration has deemed — through secretive processes, without indictment or trial — worthy of execution. There has been intense focus on the technology of remote killing, but that often serves as a surrogate for what should be a broader examination of the state’s power over life and death.","squirrel_num":"1","squirrel_top_text_color":"white","squirrel_top_meta_color":"red","squirrel_intro_bg_color":"white","squirrel_intro_text_color":"black","squirrel_subhead_offset":"2","squirrel_homepage_hero_location":0,"squirrel_videokey":"4B8F9Vyr"},"40296":{"ID":40296,"title":"The Kill Chain","slug":"the-kill-chain","excerpt":"New details about the secret criteria for drone strikes and how the White House approves targets.","content":"\u003cp>\u003cu>\u003cspan class=\"dropcap\">T\u003c/span>HE DOCUMENTS COME FROM\u003c/u> \u003ca href=\"https://theintercept.com/document/2015/10/14/small-footprint-operations-5-13/#page-6\">a Pentagon study\u003c/a>, circulated in early 2013, evaluating the intelligence and surveillance technology behind the military’s Joint Special Operations Command (JSOC) killing campaign in Yemen and Somalia in 2011 and 2012.\u003c/p>\n\u003cp>The study, carried out by the Pentagon’s Intelligence, Surveillance, and Reconnaissance Task Force, illuminates and in some cases contradicts the administration’s public description of a campaign directed at high-level terrorists who pose an imminent threat to the United States. It admits frankly that capturing terrorists is a rare occurrence and hints at the use of so-called signature strikes against unknown individuals exhibiting suspicious behavior.\u003c/p>\n\u003cp>\u003cem>The Intercept\u003c/em> obtained two versions of the study, a \u003ca href=\"https://theintercept.com/document/2015/10/14/small-footprint-operations-2-13/\">longer presentation\u003c/a> dated February 2013, and an \u003ca href=\"https://theintercept.com/document/2015/10/14/small-footprint-operations-5-13\">executive summary\u003c/a> from May 2013, which includes a slide showing the chain of command leading to the approval of a lethal strike.\u003c/p>\n\u003cdiv class='img-wrap align-center width-auto' style='width:auto'>\u003cimg class=\"alignnone size-large wp-image-6359\" src=\"/wp-uploads/sites/1/2015/10/chain-of-command-1024x792.jpg\" alt=\"\" />\u003c/p>\n\u003cp class=\"caption\">A slide from a May 2013 Pentagon presentation shows the chain of command for ordering drone strikes and other operations carried out by JSOC in Yemen and Somalia.\u003c/p>\n\u003cp>\u003cp class='caption source pullright' style=''>GCC = Geographic Combatant Command; SECDEF = Secretary of Defense; PDC/PC = Principals’ Deputies Committee/Principals Committee; CoM = Chief of Mission; CoS = Chief of Station\u003c/p>\u003c/div>\n\u003cp>The Obama administration has been loath to declassify even the legal rationale for drone strikes — let alone detail the bureaucratic structure revealed in these documents. Both the CIA and JSOC conduct drone strikes in Yemen, and very little has been officially disclosed about either the military’s or the spy agency’s operations.\u003c/p>\n\u003cp>“The public has a right to know who’s making these decisions, who decides who is a legitimate target, and on what basis that decision is made,” said Jameel Jaffer, deputy legal director of the American Civil Liberties Union.\u003c/p>\n\u003cp>Both the Pentagon and the National Security Council declined to respond to detailed questions about the study and about the drone program more generally. The NSC would not say if the process for approving targets or strikes had changed since the study was produced.\u003c/p>\n\u003ch2>Two Steps to a Kill\u003c/h2>\n\u003cp>The May 2013 \u003ca href=\"https://theintercept.com/document/2015/10/14/small-footprint-operations-5-13/#page-6\">slide\u003c/a> describes a two-part process of approval for an attack: step one, “‘Developing a target’ to ‘Authorization of a target,’” and step two, “‘Authorizing’ to ‘Actioning.’” According to the slide, intelligence personnel from JSOC’s Task Force 48-4, working alongside other intelligence agencies, would build the case for action against an individual, eventually generating a “baseball card” on the target, which was “staffed up to higher echelons — ultimately to the president.”\u003c/p>\n\u003cp>The intelligence package on the person being targeted passed from the JSOC task force tracking him to the command in charge of the region — Centcom for Yemen, and Africom for Somalia — and then to the Joint Chiefs of Staff, followed by the secretary of defense. It was then examined by a circle of top advisers known as the Principals Committee of the National Security Council, and their seconds in command, known collectively as the Deputies Committee.\u003c/p>\n\u003cp>The slide detailing the kill chain indicates that while Obama approved each target, he did not approve each individual strike, although news accounts have previously reported that the president \u003ca href=\"http://www.nytimes.com/2012/05/29/world/obamas-leadership-in-war-on-al-qaeda.html?_r=0\">personally\u003c/a> “signs off” on strikes outside of Afghanistan or Pakistan. However, the slide does appear to be consistent with Obama’s \u003ca href=\"https://www.thebureauinvestigates.com/2012/09/06/obamas-five-rules-for-covert-drone-strikes/\">comment\u003c/a> in 2012 that “ultimately I’m responsible for the process.”\u003c/p>\n\u003cdiv class='img-wrap align-bleed width-auto' style='width:auto'>\u003cimg class=\"max-width\" src=\"/wp-uploads/sites/1/2015/10/KC_Heads01.png\" alt=\"\" width=\"1405\" height=\"1326\" />\u003cp class='caption source' style=''>Illustrations: The Intercept\u003cbr />\nPhoto: Feierstein: Landov; all other photos: Getty Images\u003c/p>\u003c/div>\n\u003cp>There have been various accounts of this drone bureaucracy, and almost all stress the role of Obama’s influential counterterrorism adviser John Brennan (who became director of the CIA in 2013) and of top administration lawyers in deciding who could be killed. Under Brennan, the nominations process was reportedly concentrated in the White House, \u003ca href=\"http://bigstory.ap.org/content/who-will-drones-target-who-us-will-decide\">replacing\u003c/a> video conferences once run by the Joint Chiefs of Staff and \u003ca href=\"https://www.washingtonpost.com/world/national-security/plan-for-hunting-terrorists-signals-us-intends-to-keep-adding-names-to-kill-lists/2012/10/23/4789b2ae-18b3-11e2-a55c-39408fbe6a4b_story.html\">elevating\u003c/a> the role of the National Counterterrorism Center in organizing intelligence. Later in 2013, the White House \u003ca href=\"http://www.nbcnews.com/news/other/why-white-house-blessed-recent-yemen-drone-strikes-f6C10936036\">reportedly\u003c/a> tightened control over individual strikes in Yemen.\u003c/p>\n\u003cp>At the time of the study, with the president’s approval, JSOC had a 60-day window to hit a target. For the actual strike, the task force needed approval from the Geographic Combatant Command as well as the ambassador and CIA station chief in the country where the target was located. For a very important target, such as al Qaeda-linked preacher Anwar al Awlaki, who was a U.S. citizen, “it would take a high-level official to approve the strike,” said Lt. Col. Mark McCurley, a former drone pilot who worked on operations in Yemen and recently published a \u003ca href=\"http://www.penguin.com/book/hunter-killer-by-t-mark-mccurley-kevin-maurer/9780525954439\">book about his experiences\u003c/a>. “And that includes a lot of lawyers and a lot of review at different levels to reach that decision. We have an extensive chain of command, humans along the whole link that monitor the entire process from start to finish on an airstrike.” The country’s government was also supposed to sign off. “One Disagrees = STOP,” the slide notes, with a tiny red stop sign.\u003c/p>\n\u003cp>In practice, the degree of cooperation with the host nation has varied. Somalia’s minister of national security, Abdirizak Omar Mohamed, told \u003cem>The Intercept\u003c/em> that the United States alerted Somalia’s president and foreign minister of strikes “sometimes ahead of time, sometimes during the operation &#8230; normally we get advance notice.” He said he was unaware of an instance where Somali officials had objected to a strike, but added that if they did, he assumed the U.S. would respect Somalia’s sovereignty.\u003c/p>\n\u003cp>By 2011, when the study’s time frame began, Yemen’s president Ali Abdullah Saleh was in crisis. Facing domestic protests during the Arab Spring, he left the country in June 2011 after being injured in a bombing. Both the CIA and JSOC stepped up their drone campaigns, which enjoyed \u003ca href=\"http://www.nytimes.com/2012/09/29/world/middleeast/yemens-leader-president-hadi-praises-us-drone-strikes.html\">vocal support\u003c/a> from Saleh’s eventual successor, Abdu Rabbu Mansour Hadi.\u003c/p>\n\u003cp>“It was almost never coordinated with Saleh. Once Hadi became president, March 2012, there was a big chance we’d be in the loop” before drone strikes were conducted, said a former senior Yemeni official who worked for both the Saleh and Hadi governments.\u003c/p>\n\u003cp>Today, with Yemen’s capital under the control of the Houthi rebel group and undergoing bombardment by Saudi Arabia, administration lawyers \u003ca href=\"http://www.latimes.com/world/middleeast/la-fg-yemen-houthis-20150206-story.html\">do not seem worried\u003c/a> about asking permission to carry out drone strikes amid the fray.\u003c/p>\n\u003cp>“Now, I think they don’t even bother telling anyone. There is really no one in charge to tell,” said the former Yemeni official, who requested anonymity citing current unrest and the fact that he no longer works for the government.\u003c/p>\n\u003ch2>Who Can Be Targeted\u003c/h2>\n\u003cp>Both the Bush and Obama administrations have maintained that the 2001 Authorization for Use of Military Force, or AUMF, permits the pursuit of members of al Qaeda and its affiliates wherever they may be located.\u003c/p>\n\u003cp>The Pentagon study refers throughout to operations that fall under AUMF. But it also underlines how the targeted killing campaigns differ from traditional battlefields, \u003ca href=\"https://theintercept.com/document/2015/10/14/small-footprint-operations-2-13/#page-6\">noting\u003c/a> that the region is located “Outside a Defined Theater of Active Armed Conflict,” which limits “allowable U.S. activities.”\u003c/p>\n\u003cp>Obama administration officials \u003ca href=\"https://www.propublica.org/documents/item/425630-crs-targeted-killing#document/p12/a71709\">have said\u003c/a> that in addition to being a member of al Qaeda or an associated force, targets must also pose a significant threat to the United States. In May 2013, facing increasing pressure to fully admit the existence of the drone war and especially to address allegations of civilian harm, the White House \u003ca href=\"https://www.whitehouse.gov/the-press-office/2013/05/23/fact-sheet-us-policy-standards-and-procedures-use-force-counterterrorism\">released\u003c/a> policy guidelines for lethal counterterrorism operations that seemed to further restrict them. In a \u003ca href=\"https://www.whitehouse.gov/the-press-office/2013/05/23/remarks-president-national-defense-university\">speech\u003c/a>, Obama announced that action would be taken only against people who posed a “continuing, imminent threat to the American people,” and who could not be captured. A strike would only occur with “near certainty” that no civilians would be killed or injured.\u003c/p>\n\u003cp>Even with the new guidelines, \u003ca href=\"http://opiniojuris.org/2011/05/21/no-the-un-has-not-affirmed-that-the-us-is-engaged-in-an-armed-conflict-with-al-qaeda/\">legal observers\u003c/a>, particularly \u003ca href=\"https://www.hrw.org/news/2013/07/31/us-reassess-war-model-against-al-qaeda\">human rights lawyers\u003c/a>, have disputed the Obama administration’s position that the U.S., in strict legal terms, is in an armed conflict with al Qaeda in Yemen or Somalia — and therefore dispute what standards should apply to strikes. Others question the extent to which the hundreds of people killed in drone strikes in those countries meet the supposedly strict criteria.\u003c/p>\n\u003cp>“I think there can be questions raised about how stringently some of the requirements are being applied,” said Jennifer Daskal, an assistant professor of law at American University who worked for the Department of Justice from 2009 to 2011. “Near certainty of no civilian deaths, is that really imposed? What does it mean for capture not to be feasible? How hard do you have to try?”\u003c/p>\n\u003cp>It is not clear whether the study reflects the May policy guidance, since it does not give an extensive description of the criteria for approving a target, noting only that the target must be “a threat to U.S. interest or personnel.”\u003c/p>\n\u003cp>A spokesperson for the National Security Council would not explain why the standards in the study differed from the guidelines laid out in May 2013, but emphasized that “those guidelines remain in effect today.&#8221;\u003c/p>\n\u003cp>The two-month window for striking, says Hina Shamsi, director of the ACLU’s National Security Project, shows the administration’s broad interpretation of “a continuing, imminent threat.”\u003c/p>\n\u003cp>“If you have approval over a monthslong period, that sends the signal of a presumption that someone is always targetable, regardless of whether they are actually participating in hostilities,” said Shamsi.\u003c/p>\n\u003cp>The slide illustrating the chain of approval makes no mention of evaluating options for capture. It may be implied that those discussions are part of the target development process, but the omission reflects the brute facts beneath the Obama administration’s stated preference for capture: Detention of marked targets is incredibly rare.\u003c/p>\n\u003cp>A \u003ca href=\"https://theintercept.com/document/2015/10/14/small-footprint-operations-5-13/#page-9\">chart\u003c/a> in the study shows that in 2011 and 2012, captures accounted for only 25 percent of operations carried out in the Horn of Africa — and all were apparently by foreign forces. In one of the few publicized captures of the Obama presidency, al Shabaab commander Ahmed Abdulkadir Warsame was \u003ca href=\"https://www.washingtonpost.com/national/national-security/us-indicts-somali-on-terrorism-charges/2011/07/05/gHQA8bbfzH_story.html\">picked up in April 2011\u003c/a> by U.S. forces in the Gulf of Aden and brought to Manhattan for trial, though he may not be reflected in the study’s figures because he was apprehended at sea.\u003c/p>\n\u003cdiv class='img-wrap align-right width-auto' style='width:auto'>\u003ca href=\"/wp-uploads/sites/1/2015/10/pie-chart.jpg\" target=\"_blank\">\u003cimg class=\"alignnone size-article-medium wp-image-6365\" src=\"/wp-uploads/sites/1/2015/10/pie-chart.jpg\" alt=\"\" />\u003c/a>\u003c/p>\n\u003cp class=\"caption\">The Pentagon study recommended more captures, rather than killings, because of the intelligence that could be gleaned from interrogations and collected materials.\u003c/p>\n\u003cp>\u003cp class='caption source pullright' style=''>EKIA = Enemy Killed in Action; HOA = Horn of Africa\u003c/p>\u003c/div>\n\u003cp>The study does not contain an overall count of strikes or deaths, but it does note that “relatively few high-level terrorists meet criteria for targeting” and states that at the end of June 2012, there were 16 authorized targets in Yemen and only four in Somalia.\u003c/p>\n\u003cp>Despite the small number of people on the kill list, in 2011 and 2012 there were at least 54 U.S. drone strikes and other attacks reported in Yemen, killing a minimum of 293 people, including 55 civilians, according to \u003ca href=\"https://docs.google.com/spreadsheets/d/1lb1hEYJ_omI8lSe33izwS2a2lbiygs0hTp2Al_Kz5KQ/edit?pli=1#gid=977256262\">figures compiled\u003c/a> by the Bureau of Investigative Journalism. In Somalia, there were at least three attacks, \u003ca href=\"/drone-papers/the-life-and-death-of-objective-peckham/\">resulting in the deaths of at minimum six people\u003c/a>.\u003c/p>\n\u003cp>Some of those Yemen strikes were likely carried out by the CIA, which since mid-2011 has flown drones to Yemen from a \u003ca href=\"https://www.washingtonpost.com/world/national-security/brennan-nomination-opens-obama-to-criticism-on-secret-targeted-killings/2013/02/05/8f3c94f0-6fb0-11e2-8b8d-e0b59a1b8e2a_story_1.html\">base in Saudi Arabia\u003c/a> and reportedly has \u003ca href=\"http://www.nytimes.com/2013/02/06/world/middleeast/with-brennan-pick-a-light-on-drone-strikes-hazards.html?hp&amp;pagewanted=all&amp;_r=1\">its own kill list and rules\u003c/a> for strikes. Yet it is also clear that the military sometimes harmed multiple other people in trying to kill one of those high-level targets. The study includes a \u003ca href=\"https://theintercept.com/document/2015/10/14/small-footprint-operations-2-13/#page-23\">description\u003c/a> of the hunt for an alleged al Qaeda member referred to as “Objective Rhodes” or “Anjaf,” who is likely Fahd Saleh al-Anjaf al-Harithi, who was reported killed in July 2012, on the same day as Objective Rhodes. A failed strike on Harithi that April killed two “enemies.” News accounts at the time \u003ca href=\"http://uk.reuters.com/article/2012/04/23/uk-saudi-yemen-kidnappers-idUKBRE83M15O20120423\">reported\u003c/a> three “militants” had died.\u003c/p>\n\u003cdiv class='img-wrap align-center width-auto' style='width:auto'>\u003cimg class=\"aligncenter size-thumbnail wp-image-6379\" src=\"/wp-uploads/sites/1/2015/10/38.jpg\" alt=\"\" />\u003c/p>\n\u003cp class=\"caption\">A slide from February 2013 recounts the hunt for an alleged al Qaeda member (likely Fahd Saleh al-Anjaf al-Harithi) showing that two others died in a botched attempt to kill him.\u003c/p>\n\u003cp>\u003c/div>\n\u003cp>The large number of reported strikes may also be a reflection of signature strikes in Yemen, where people can be targeted based on patterns of suspect behavior. In 2012, administration officials \u003ca href=\"https://www.washingtonpost.com/world/national-security/white-house-approves-broader-yemen-drone-campaign/2012/04/25/gIQA82U6hT_story.html\">said\u003c/a> that President Obama had approved strikes in Yemen on unknown people, \u003ca href=\"http://www.newsweek.com/drones-silent-killers-64909\">calling them TADS,\u003c/a> or “terror attack disruption strikes,” and claiming that they were more constrained than the CIA’s signature strikes in Pakistan.\u003c/p>\n\u003cp>The study \u003ca href=\"https://theintercept.com/document/2015/10/14/small-footprint-operations-2-13/#page-30\">refers\u003c/a> to using drones and spy planes to “conduct TADS related network development,” presumably a reference to surveilling behavior patterns and relationships in order to carry out signature strikes. It is unclear what authorities govern such strikes, which undermine the administration’s insistence that the U.S. kills mainly “high-value” targets.\u003c/p>\n\u003ch2>Near Certainty\u003c/h2>\n\u003cp>According to the White House guidelines released in May 2013, the decision to take a strike should be based on thorough surveillance and only occur in the absence of civilians. A strike requires “near certainty that the terrorist target is present” and “near certainty that non-combatants will not be injured or killed.”\u003c/p>\n\u003cp>The study describes the rules for a strike slightly differently, stating that there must be a “low CDE [collateral damage environment]” — meaning a low estimate of how many innocent people might be harmed. It also states there must be “near certainty” that the target is present, “based on two forms of intelligence,” with “no contradictory intelligence.” In contrast to the White House statement, the “near certainty” standard is not applied to civilians.\u003c/p>\n\u003cp>The study \u003ca href=\"https://theintercept.com/document/2015/10/14/small-footprint-operations-2-13/#page-13\">cites\u003c/a> the “need to avoiding [sic] collateral damage areas” as a reason for “unsuccessful” missions, but it does not give numbers of civilian casualties or examples of bad intelligence leading to a mistaken kill.\u003c/p>\n\u003cdiv class='img-wrap align-center width-auto' style='width:auto'>\u003cimg class=\"alignnone size-article-medium wp-image-6371\" src=\"/wp-uploads/sites/1/2015/10/TollOfUSattacksInYemenAndSomalia01.png\" alt=\"\" />\u003c/p>\n\u003cp class=\"caption\">Since the first drone strike in Yemen in 2002, hundreds of people have been killed in U.S. operations in Yemen and Somalia, many of them innocent civilians. The tallies shown here were compiled by the \u003ca href=\"https://www.thebureauinvestigates.com/2011/08/10/pakistan-drone-strikes-the-methodology2/#sources\">Bureau of Investigative Journalism\u003c/a> from reports of both CIA and JSOC drone strikes and other operations. The large range in the estimates is due to the inherent difficulties of collecting data on airstrikes in war zones. The identities of the &#8220;people killed&#8221; were often unknown and may include civilians as well as suspected terrorists or militants. The U.S. almost never publicly acknowledges individual operations.\u003c/p>\n\u003cp>\u003cp class='caption source pullright' style=''>Graphic: The Intercept\u003c/p>\u003c/div>\n\u003cp>Yet the overall conclusion is that getting accurate positive identification is a \u003ca href=\"/drone-papers/firing-blind/\">“critical” issue for the drone program\u003c/a> in the region, due to limitations in technology and the number of spy aircraft available. The military relies heavily on signals intelligence — drawn from electronic communications — and much of it comes from foreign governments, who may have their own agendas.\u003c/p>\n\u003cp>Identifying the correct target relates directly to the issue of civilian casualties: If you don’t have certainty about your target, it follows that you may well be killing innocent people. In Iraq and Afghanistan, “when collateral damage did occur, 70 percent of the time it was attributable to failed — that is, mistaken — identification,” according to a \u003ca href=\"http://georgetownlawjournal.org/files/2014/03/McNeal-TargetedKilling.pdf\">paper\u003c/a> by Gregory McNeal, an expert on drones and security at Pepperdine School of Law.\u003c/p>\n\u003cp>Another factor is timing: If the 60-day authorization expired, analysts would have to start all over in building the intelligence case against the target, said a former senior special operations officer, who asked not to be identified because he was discussing classified materials\u003cem>. \u003c/em>That could lead to pressure to take a shot while the window was open.\u003c/p>\n\u003cp>During the time of the study, there were multiple well-reported, high-profile incidents in which reported JSOC strikes killed the wrong people. Perhaps most famously, in October 2011, a 16-year-old U.S. citizen named Abdulrahman Awlaki, the son of Anwar al Awlaki, died in a JSOC strike while eating dinner with his cousins, two weeks after his father was killed by a CIA drone. In press accounts, one anonymous official \u003ca href=\"https://www.washingtonpost.com/world/national-security/cia-veteran-john-brennan-has-transformed-us-counterterrorism-policy/2012/10/24/318b8eec-1c7c-11e2-ad90-ba5920e56eb3_story_4.html\">called\u003c/a> Abdulrahman’s death “an outrageous mistake,” while others said he was with people believed to be members of al Qaeda in the Arabian Peninsula. Publicly, the government has \u003ca href=\"http://www.nytimes.com/interactive/2013/05/23/us/politics/23holder-drone-lettter.html\">said\u003c/a> only that he “was not specifically targeted.”\u003c/p>\n\u003cp>A September 2012 strike in Yemen, extensively investigated by \u003ca href=\"https://www.hrw.org/report/2013/10/22/between-drone-and-al-qaeda/civilian-cost-us-targeted-killings-yemen\">Human Rights Watch\u003c/a> and the \u003ca href=\"https://www.opensocietyfoundations.org/sites/default/files/death-drones-report-eng-20150413.pdf\">Open Society Foundations\u003c/a>, killed 12 civilians, including three children and a pregnant woman. No alleged militants died in the strike, and the Yemeni government paid restitution for it, but the United States never offered an explanation.\u003c/p>\n\u003cp>“The mothers and fathers and brothers and sisters of the people who were killed in these drones strikes want to know why,” said Amrit Singh, senior legal officer at the Open Society Justice Initiative. “We’re left with no explanation as to why they were targeted and in most cases no compensation, and the families are aware of no investigation.”\u003c/p>\n\u003cp>This spring, in a rare admission of a mistake in targeting, the White House \u003ca href=\"http://www.cnn.com/2015/04/23/politics/white-house-hostages-killed/\">announced\u003c/a> that two hostages held by al Qaeda — an American and an Italian — had been killed in a CIA drone strike in Pakistan in January. In attempting to explain the tragedy, the White House spokesperson used the language of the standards that had failed to prevent it: The hostages had died despite “near certainty,” after “near continuous surveillance,” that they were not present.\u003c/p>\n\u003cp>&nbsp;\u003c/p>\n\u003cp class=\"caption\">Additional reporting: \u003ca href=\"/staff/jeremy-scahill/\">\u003cimg class=\"sq-author\" src=\"https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2014/02/Jeremy-Scahill-Original_350_2.jpg\" alt=\"\" width=\"40\" /> Jeremy Scahill\u003c/a>\u003c/p>\n","link":"https://theintercept.com/drone-papers/the-kill-chain/","thumbnail":{"ID":40327,"title":"","excerpt":"","content":"","credit":"","sizes":{"feature_hero":{"path":"wp-uploads/sites/1/2015/10/KC_HeadsRedacted01-feature-hero.jpg","width":1200,"height":800},"promo":{"path":"wp-uploads/sites/1/2015/10/KC_HeadsRedacted01-promo.jpg","width":440,"height":220},"promo_large":{"path":"wp-uploads/sites/1/2015/10/KC_HeadsRedacted01-promo-large.jpg","width":900,"height":450},"top_large":{"path":"wp-uploads/sites/1/2015/10/KC_HeadsRedacted01-top-large.jpg","width":440,"height":440},"top_small":{"path":"wp-uploads/sites/1/2015/10/KC_HeadsRedacted01-top-small.jpg","width":200,"height":200},"square":{"path":"wp-uploads/sites/1/2015/10/KC_HeadsRedacted01-440x440.png","width":440,"height":440},"article_header":{"path":"wp-uploads/sites/1/2015/10/KC_HeadsRedacted01-article-header.jpg","width":1440,"height":720},"original":{"path":"wp-uploads/sites/1/2015/10/KC_HeadsRedacted01.png","width":"1485","height":"1384"}}},"date":"2015-10-15T11:57:57+00:00","authors":[{"ID":41,"display_name":"Cora Currier","url":"https://theintercept.com/staff/cora/","brief_bio":"Cora Currier is a journalist with a focus on national security, foreign affairs, and human rights.","full_bio":"\u003cp>Cora Currier is a journalist with a focus on national security, foreign affairs, and human rights. As a reporting fellow at ProPublica, she covered national security and finance. Her work has been published in \u003cem>Stars and Stripes\u003c/em>, \u003cem>The Nation\u003c/em>, \u003cem>Columbia Journalism Review\u003c/em>, Al Jazeera America, and many other outlets. Before joining ProPublica, she was on the editorial staff of \u003cem>The New Yorker\u003c/em> and a lead researcher on several books of history and politics. She lives in New York.\u003c/p>\n","email":"cora.currier@theintercept.com","image_350":"https://firstlook.org/wp-uploads/sites/1/2014/08/cora_avatar_1409289060-350x350.jpg","twitter":"@coracurrier","facebook":"","pgp_key":"Cora Currier Public Key","pgp_file":"https://firstlook.org/wp-uploads/sites/1/2014/09/CoraCurrierPGP.asc","pgp_fingerprint":"73FF EEE8 D773 173A 7BD0 CEB2 969F 24F4 C809 2B47","user_title":"Reporter","user_group":"","nicename":"cora"}],"excerpt_type":"","is_feature":"","feature_title":"","is_blog":false,"blog_title":"","comments_number":"95","bitly_url":"http://interc.pt/1LmgszP","comments_open":true,"is_banner_hidden":false,"featured_video_url":"","meta":{"links":[]},"layout":"default","banner_videokey":"","post_type":"squirrel","share_twitter_text":"The Kill Chain: The lethal bureaucracy behind Obama’s drone war","yoast_wpseo_canonical":"https://theintercept.com/drone-papers/the-kill-chain/","yoast_wpseo_general_title":"The Kill Chain: The lethal bureaucracy behind Obama’s drone war","yoast_wpseo_general_description":"","yoast_wpseo_facebook_title":"The Kill Chain: The lethal bureaucracy behind Obama’s drone war","yoast_wpseo_facebook_description":"","yoast_wpseo_facebook_thumbnail":"","yoast_wpseo_twitter_title":"The Kill Chain: The lethal bureaucracy behind Obama’s drone war","yoast_wpseo_twitter_description":"","yoast_wpseo_twitter_thumbnail":"","squirrel_subhead":"The lethal bureaucracy behind Obama’s drone war","squirrel_intro":"Secret military documents obtained by \u003cem>The Intercept\u003c/em> offer rare documentary evidence of the process by which the Obama administration creates and acts on its kill list of terror suspects in Yemen and Somalia. The documents offer an unusual glimpse into the decision-making process behind the drone strikes and other operations of the largely covert war, outlining the selection and vetting of targets through the ranks of the military and the White House, culminating in the president’s approval of a 60-day window for lethal action.","squirrel_num":"3","squirrel_top_text_color":"red","squirrel_top_meta_color":"red","squirrel_intro_bg_color":"white","squirrel_intro_text_color":"black","squirrel_subhead_offset":"0","squirrel_homepage_hero_location":2,"squirrel_videokey":""},"40298":{"ID":40298,"title":"Manhunting in the Hindu Kush","slug":"manhunting-in-the-hindu-kush","excerpt":"Leaked documents detailing a multi-year U.S. military campaign in Afghanistan reveal the strategic limits and startling human costs of drone warfare.","content":"\u003cp>\u003cu>\u003cspan class=\"dropcap\">I\u003c/span>NTELLIGENCE COMMUNITY DOCUMENTS\u003c/u> obtained by \u003cem>The Intercept\u003c/em>, detailing the purpose and achievements of the Haymaker campaign, indicate that the American forces involved in the operations had, at least on paper, all of the components they needed to succeed. After more than a decade of war in Afghanistan, a robust network of intelligence sources — including informants on the ground — had been established in parts of the historically rebellious, geographically imposing provinces of Kunar and Nuristan. The operators leading the campaign included some of the most highly trained military units at the Obama administration’s disposal, and they were supported by the world’s most powerful electronic surveillance agencies, equipped with technology that allowed for unmatched tracking of wanted individuals.\u003c/p>\n\u003cp>Despite all these advantages, the military’s own analysis demonstrates that the Haymaker campaign was in many respects a failure. The vast majority of those killed in airstrikes were not the direct targets. Nor did the campaign succeed in significantly degrading al Qaeda’s operations in the region. When contacted by \u003cem>The Intercept\u003c/em> with a series of questions regarding the Haymaker missions, the United States Special Operations Command in Afghanistan declined to comment on the grounds that the campaign — though now finished — remains classified.\u003c/p>\n\u003cp>The secret documents obtained by \u003cem>The Intercept\u003c/em> include detailed slides pertaining to Haymaker and other operations in the restive border regions of Afghanistan, including images, names, and affiliations of alleged militants killed or captured as a result of the missions; examples of the intelligence submitted to trigger lethal operations; and a “story board” of a completed drone strike. The targets identified in the slides as killed or detained represent a range of militant groups, including alleged members of the Taliban and al Qaeda — but also local forces with no international terrorism ambitions, groups that took up arms against the U.S after American airstrikes brought the war to their doorsteps.\u003c/p>\n\u003cp>An additional slide included in the materials charts mission statistics from September 2011 to September 2012 for Task Force 3-10, which was responsible for special operations across Afghanistan, breaking down in rare detail the more than 2,000 missions conducted by elite U.S. forces in the country over the course of a year.\u003c/p>\n\u003cp>Together, the materials offer an unprecedented glimpse into the kind of killing that has come to define the war on terror, underscoring the inherent limitations, and human cost, of those operations. With the Obama administration publicly committed to continuing campaigns like Haymaker — special operations missions focused on hunting down specific individuals, not only in Afghanistan but in nations around the world — the documents raise profound questions over the legacy of the longest foreign war in American history and its influence on conflicts to come.\u003c/p>\n\u003cdiv class='img-wrap align-bleed width-auto' style='width:auto'>\u003cimg class=\"alignnone size-large wp-image-6446\" src=\"/wp-uploads/sites/1/2015/10/6999128422_87e9f0da48_b-1024x683.jpg\" alt=\"\" />\u003c/p>\n\u003cp class=\"caption\">A village security force commander and coalition special operations forces identify insurgent fighting positions during a daylong firefight in Nuristan province, Afghanistan, April 12, 2012.\u003c/p>\n\u003cp>\u003cp class='caption source' style=''>Photo: U.S. Department of Defense\u003c/p>\u003c/div>\n\u003cp>\u003cu>\u003cspan class=\"dropcap\">T\u003c/span>HE FREQUENCY WITH\u003c/u> which “targeted killing” operations hit unnamed bystanders is among the more striking takeaways from the Haymaker slides. The documents show that during a five-month stretch of the campaign, nearly nine out of 10 people who died in airstrikes were not the Americans’ direct targets. By February 2013, Haymaker airstrikes had resulted in no more than 35 “jackpots,” a term used to signal the neutralization of a specific targeted individual, while more than 200 people were declared EKIA — “enemy killed in action.”\u003c/p>\n\u003cdiv class='img-wrap align-center width-fixed' style='width:150px'>\u003cimg class=\"alignright size-thumbnail wp-image-6603\" src=\"/wp-uploads/sites/1/2015/10/OPN_haymakerEffects01.jpg\" alt=\"\" />\u003c/p>\n\u003cp class=\"caption\">A summary of operations conducted from January 2012 through February 2013 as part of Operation Haymaker, a U.S. military campaign in northeastern Afghanistan aimed at rooting out elements of al Qaeda and the Taliban.\u003c/p>\n\u003cp>\u003c/div>\n\u003cp>In the complex world of remote killing in remote locations, labeling the dead as “enemies” until proven otherwise is commonplace, said an intelligence community source with experience working on high-value targeting missions in Afghanistan, who provided the documents on the Haymaker campaign. The process often depends on assumptions or best guesses in provinces like Kunar or Nuristan, the source said, particularly if the dead include “military-age males,” or MAMs, in military parlance. “If there is no evidence that proves a person killed in a strike was either not a MAM, or was a MAM but not an unlawful enemy combatant, then there is no question,” he said. “They label them EKIA.” In the case of airstrikes in a campaign like Haymaker, the source added, missiles could be fired from a variety of aircraft. “But nine times out of 10 it’s a drone strike.”\u003c/p>\n\u003cp>The source is deeply suspicious of those airstrikes — the ones ostensibly based on hard evidence and intended to kill specific individuals — which end up taking numerous lives. Certainty about the death of a direct target often requires more than simply waiting for the smoke to clear. Confirming a chosen target was indeed killed can include days of monitoring signals intelligence and communication with sources on the ground, none of which is perfect 100 percent of the time. Firing a missile at a target in a group of people, the source said, requires “an even greater leap of faith” — a leap that he believes often treats physical proximity as evidence.\u003c/p>\n\u003cp>The documents include slides focused specifically on Haymaker operations from January 2012 to February 2013, distinguishing between raids, described as “enabled” and “combined” operations, and airstrikes, which are described as “kinetic strikes.” In both cases, raids and airstrikes, the source said the target was always an individual person. “Every mission that’s triggered begins as an objective to find one person for whatever reason,” the source said, adding, “Every jackpot is one person off the list.”\u003c/p>\n\u003cp>According to the documents, raids performed on the ground during Haymaker were far less lethal than airstrikes and led to the capture of scores of individuals. Research by Larry Lewis, formerly a principal research scientist at the Center for Naval Analyses, supports that conclusion. Lewis spent years studying U.S. operations in Afghanistan, including raids, airstrikes, and jackpots, all with an eye to understanding why civilian casualties happen and how to better prevent them. His contract work for the U.S. military, much of it classified, included a focus on civilian casualties and informed tactical directives issued by the top generals guiding the war. During his years of research, what Lewis uncovered in his examination of U.S. airstrikes, particularly those delivered by machines thought to be the most precise in the Pentagon’s arsenal, was dramatic. He \u003ca href=\"http://www.theguardian.com/world/2013/jul/02/us-drone-strikes-afghan-civilians\">found \u003c/a>that drone strikes in Afghanistan were 10 times more likely to kill civilians than conventional aircraft.\u003c/p>\n\u003cp>“We assume that they’re surgical but they’re not,” Lewis said in an interview. “Certainly in Afghanistan, in the time frame I looked at, the rate of civilian casualties was significantly higher for unmanned vehicles than it was for manned aircraft airstrikes. And that was a lot higher than raids.”\u003c/p>\n\u003cp>The limited point of view of the drone’s camera, what Lewis describes as the “soda straw effect,” together with the globally dispersed operational network that supports drone strikes, can lead to mistakes, he argues, including the loss of innocent lives. The materials obtained by \u003cem>The Intercept \u003c/em>make just one explicit mention of civilian casualties, in the Task Force 3-10 mission statistics from September 2011 through September 2012. The \u003ca href=\"https://theintercept.com/document/2015/10/14/operation-haymaker/#page-16\">document\u003c/a> reveals the U.S. conducted more than 1,800 “night ops” at a time when President Hamid Karzai was calling for an end to American involvement in controversial night raids. Of those operations — which resulted in 1,239 targets captured or killed and 709 “associates” of targets captured or killed — the military reported “shots fired” in less than 9 percent of its missions, with a total of 14 civilian casualty “events” for the year.\u003c/p>\n\u003cdiv class='img-wrap align-center width-auto' style='width:auto'>\u003cimg class=\"alignnone size-large wp-image-6449\" src=\"/wp-uploads/sites/1/2015/10/15-1024x793.jpg\" alt=\"\" />\u003c/p>\n\u003cp class=\"caption\">A breakdown of 2011 to 2012 mission statistics for Task Force 3-10, a U.S. special operations task force responsible for missions in Afghanistan at the time.\u003c/p>\n\u003cp>\u003c/div>\n\u003cp>“The 14 civilian casualties is highly suspect,” said the source, who reviewed after-action reports on raids and other operations in Afghanistan. “I know the actual number is much higher,” he added. “But they make the numbers themselves so they can get away with writing off most of the kills as legitimate.”\u003c/p>\n\u003cp>The Haymaker documents reveal little about whether the deaths reflected in the materials were “legitimate” or not. They do, however, offer an illustrative window into how the killing has been done in the past — and how it may be done in the future.\u003c/p>\n\u003cdiv class='img-wrap align-bleed width-auto' style='width:auto'>\u003cimg class=\"alignnone size-large wp-image-6451\" src=\"/wp-uploads/sites/1/2015/10/6941459585_28513f5474_o_SE-1024x576.jpg\" alt=\"U.S. Special Operations personnel take cover to avoid flying debris as they prepare to board a UH-60 Black Hawk helicopter during a mission in Kunar province, Afghanistan, Feb. 25, 2012. The Soldiers were conducting reconnaissance for a future village stability platform, a site Afghan forces and coalition Special Operations Forces will use to live and work with villagers. (DoD photo by Mass Communication Specialist 2nd Class Clayton Weiss, U.S. Navy/Released)\" />\u003c/p>\n\u003cp class=\"caption overlayed\">U.S. special operations personnel prepare to board a UH-60 Black Hawk helicopter during a mission in Kunar province, Afghanistan, Feb. 25, 2012.\u003c/p>\n\u003cp>\u003cp class='caption source' style=''>Photo: U.S. Department of Defense\u003c/p>\u003c/div>\n\u003cp>\u003cu>\u003cspan class=\"dropcap\">T\u003c/span>HE REQUEST WAS UNAMBIGUOUS.\u003c/u> Dated October 30, 2012, and stamped with the seal of the United States Central Command, the title read, “Request for Kinetic Strike Approval.” The “desired results” listed at the top of the \u003ca href=\"https://theintercept.com/document/2015/10/14/operation-haymaker/#page-10\">document\u003c/a> included just three words: “Kill Qari Munib.”\u003c/p>\n\u003cp>Munib, whose objective name was “Lethal Burwyn,” was described as a Taliban subcommander operating in the Pech district of Kunar province. He allegedly exercised command and control over a specific portion of the organization, was responsible for numerous attacks on both coalition and Afghan security forces, and communicated with Taliban officials in Pakistan. Specifically, the request reported, Munib had been implicated in recent plots to carry out improvised explosives attacks.\u003c/p>\n\u003cdiv class='img-wrap align-center width-auto' style='width:auto'>\u003cimg class=\"alignnone size-large wp-image-6452\" src=\"/wp-uploads/sites/1/2015/10/67-1024x794.jpg\" alt=\"\" />\u003c/p>\n\u003cp class=\"caption\">A 2012 U.S. military request for an airstrike targeting Qari Munib, an alleged Taliban subcommander operating in northeastern Afghanistan.\u003c/p>\n\u003cp>\u003c/div>\n\u003cp>The Americans considered the consequences of taking Munib’s life, including media coverage, possible political fallout, and potential “population blowback.” In all three categories, it was determined that negative repercussions were “unlikely,” and that Munib’s death would “decrease attacks on” coalition and Afghan forces. Going through with the operation, the request asserted, would require a signals intelligence “correlation,” followed by a full motion video lock, visual identification within 24 hours of the strike, and a “low” probability of collateral damage. Two maps were featured in the document intended to seal Munib’s fate, one of which included coordinates of his last known location. In the bottom right hand corner of the document was a bar, numbered one to 10, and fading in color from red to green. It was titled “Confidence Level.” A red triangle sat between the numbers nine and 10.\u003c/p>\n\u003cp>Less than a week after the briefing was completed, the kill mission was underway. Signals intelligence had been picked up from a compound where Munib was known to sleep, according to a storyboard detailing the operation. Images relayed from the scene revealed the presence of five military-age males in the area. Floating above the site, an MQ-9 Reaper drone, known as “Skyraider,” captured the image of a man dressed in a drab, flowing robe, with a white cap on his head, casting a long shadow in the dirt. According to the storyboard, the image was “correlated” to signals intelligence linked to Munib.\u003c/p>\n\u003cp>Skyraider loitered above as the man, joined by two others, walked up a ridgeline before heading back into the compound. The figure again emerged from the building. The drone’s camera registered a positive identification. Skyraider “engaged.” A screen grab from the scene shows a cloud of smoke where the individual had been. Task force personnel watched as a group of people collected the target’s remains.\u003c/p>\n\u003cp>“RESULTS: JP — Pending EKIA, 1 x TOTAL EKIA,” the storyboard reported. An enemy had been killed in action. Confirmation that he was indeed Munib, the jackpot, or JP, was still pending.\u003c/p>\n\u003cdiv class='img-wrap align-center width-auto' style='width:auto'>\u003cimg class=\"alignnone size-large wp-image-6453\" src=\"/wp-uploads/sites/1/2015/10/68-1024x792.jpg\" alt=\"\" />\u003c/p>\n\u003cp class=\"caption\">A storyboard detailing a 2012 U.S. drone strike targeting Qari Munib, an alleged Taliban subcommander.\u003c/p>\n\u003cp>\u003c/div>\n\u003cp>On Friday, November 9, 2012, NATO issued one of its standard updates on missions around the country, including two short lines about an operation carried out the day before in eastern Afghanistan. “An Afghan and coalition security force killed Taliban leader Qari Munib during a security operation in Kunar province Thursday,” the \u003ca href=\"http://www.rs.nato.int/article/isaf-releases/isaf-joint-command-morning-operational-update-nov-9.html\">statement read\u003c/a>. “Qari Munib was responsible for directing attacks against Afghan and coalition forces and coordinating the movement of weapons and ammunition for the attacks.”\u003c/p>\n\u003cp>The announcement appeared five days after the drone strike described in the intelligence community storyboard, which made no mention of Afghan forces involved in the operation. Was Munib killed in a unilateral U.S. drone strike, later obfuscated by NATO? Or did the drone strike fail to jackpot, resulting in a subsequent joint operation that succeeded in eliminating him? If so, who was it that Skyraider engaged that day? Whose body parts did the American analysts watch the first responders collect?\u003c/p>\n\u003cp>Those questions remain unanswered. A more fundamental question suggests itself, however. How did the most powerful military in history come to devote its elite forces and advanced technology to the hunt for a man like Qari Munib — a mid-level Taliban figure in a remote corner of the planet, half a world away from the White House and ground zero in Manhattan, more than 11 years after the September 11 attacks?\u003c/p>\n\u003cp>&nbsp;\u003c/p>\n\u003cp>\u003cu>\u003cspan class=\"dropcap\">W\u003c/span>HEN THE AMERICANS\u003c/u> set out to kill Qari Munib with a drone in 2012, an \u003ca href=\"https://theintercept.com/document/2015/10/14/operation-haymaker/#page-9\">intelligence document\u003c/a> purporting to lay out his bona fides as a target listed local insurgency figures alongside regional actors. In a graphic titled “Link Analysis,” Munib’s name appears under a generic cartoon of an Afghan male, surrounded by six other headshots. Half of them are described as “Salafists,” a conservative faction that has existed in Kunar for decades and, for a period, resisted Taliban presence in the province.\u003c/p>\n\u003cp>One of the Salafists pictured was Haji Matin, a timber trader from the Korengal Valley. In the early years of the war, one of Matin’s business rivals wrongly fingered him as a militant to the Americans. U.S. forces responded by bombing Matin’s home. While Matin survived, several members of his family \u003ca href=\"http://www.nytimes.com/2008/02/24/magazine/24afghanistan-t.html?pagewanted=all&amp;_r=0\">were killed\u003c/a>. The Americans then appropriated one of his lumberyards as an outpost, thus turning one of the most powerful men in the area into a formidable insurgent leader. The transformation of men like Matin and the Salafists, once locally minded powerbrokers, into anti-U.S. fighters, was hardly unique.\u003c/p>\n\u003cdiv class='img-wrap align-right width-auto' style='width:auto'>\u003cimg class=\"alignright size-article-medium wp-image-6478\" src=\"/wp-uploads/sites/1/2015/10/66crop01-540x451.jpg\" alt=\"\" />\u003c/p>\n\u003cp class=\"caption\">A “Link Analysis” purporting to detail alleged Taliban subcommander Qari Munib’s ties to other militant figures.\u003c/p>\n\u003cp>\u003c/div>\n\u003cp>“When viewed from absolutely the wrong metric, the Americans were very successful at hunting people,” said Matt Trevithick, a researcher who in 2014 made more than a dozen \u003ca href=\"http://www.thedailybeast.com/articles/2014/11/15/heart-of-darkness-into-afghanistan-s-korengal.html\">unembedded trips\u003c/a> to some of Kunar’s most remote areas in an effort to understand the province, and American actions there, through the eyes of its residents. The problem, he said, is that savvy, opportunistic strongmen maneuvered to draw U.S. forces into local conflicts, a dynamic that played out again and again throughout the war. “We knew nothing about who we were shooting at — specifically in Kunar,” Trevithick said. He understands the frustration of conventional U.S. forces who were dropped in places like Kunar. “I don’t blame them,” he said. “They’re put in an impossible situation themselves. But what happens is everyone starts looking like the enemy. And that means you start shooting. And that means people actually do become the enemy.”\u003c/p>\n\u003cp>In September 2010, nine years after the terrorist attacks in New York City, the U.S. military and coalition forces were working their way through a list of 744 people slated for death or capture in Afghanistan. According to the so-called Joint Prioritized Effects List (JPEL), provided by NSA whistleblower Edward Snowden, Kunar, with 44 targets, had the third-highest total in the country. Few of the Kunar targets represented core al Qaeda-linked figures, and many were associated with local groups like the Salafists, whose listed offenses typically included attacks on Western and Afghan government forces in the province. The targets on the 2010 list were prioritized with rankings of one to four, in terms their significance, with one being the most significant. In Kunar, a single target rose to the level of priority one, while more than 80 percent were designated priority three. Seven of the JPEL targets appear in the Haymaker slides, though just three had been linked to al Qaeda. Regardless of their associations, the U.S. ultimately devoted the same resources to picking off locally affiliated militants as it did to the campaign against the group responsible for 9/11.\u003c/p>\n\u003cp>After nearly a decade of war, thousands of operations, and thousands of deaths, some within the special operations community began to question the quality of the United States’ targets in Afghanistan. “By 2010, guys were going after street thugs,” a former SEAL Team 6 officer \u003ca href=\"http://www.nytimes.com/2015/06/07/world/asia/the-secret-history-of-seal-team-6.html\">told\u003c/a> the \u003cem>New York Times\u003c/em> recently. “The most highly trained force in the world, chasing after street thugs.” Concerns that the U.S. was devoting tremendous resources to kill off a never-ending stream of nobodies did little to halt the momentum.\u003c/p>\n\u003cdiv class='img-wrap align-bleed width-auto' style='width:auto'>\u003cimg class=\"aligncenter size-large wp-image-6477\" src=\"/wp-uploads/sites/1/2015/10/17871494565_f44640bc74_o-1024x576.jpg\" alt=\"Uniformed and civilian cyber and military intelligence specialists monitor Army networks in the Cyber Mission Unit’s Cyber Operations Center at Fort Gordon, Ga. (Photo by Michael L. Lewis)\" />\u003c/p>\n\u003cp class=\"caption overlayed\">Cyber and military intelligence specialists monitor Army networks in the Cyber Mission Unit&#8217;s Cyber Operations Center at Fort Gordon, Georgia.\u003c/p>\n\u003cp>\u003cp class='caption source' style=''>Photo: U.S. Army Cyber Command\u003c/p>\u003c/div>\n\u003cp>\u003cu>\u003cspan class=\"dropcap\">T\u003c/span>HE SECRET DOCUMENTS\u003c/u> obtained by \u003cem>The Intercept\u003c/em>, which include a \u003ca href=\"https://theintercept.com/document/2015/10/14/operation-haymaker/#page-4\">slide\u003c/a> on “Manhunting Basics,” reflect the combination of U.S. military personnel and spies who have hunted targets along Afghanistan’s border with Pakistan for years. According to \u003ca href=\"https://theintercept.com/document/2015/10/14/operation-haymaker/#page-7\">one of the slides\u003c/a>, the Haymaker “functional teams” included the CIA, the Defense Intelligence Agency, the NSA, and the National Geospatial-Intelligence Agency. The Air Force’s uniquely designed 11th Intelligence Squadron also played a role. The Florida-based squadron was \u003ca href=\"http://www.afsoc.af.mil/News/ArticleDisplay/tabid/136/Article/163478/new-hurlburt-intel-squadron-turns-aerial-eye-on-terrorists.aspx\">reactivated\u003c/a> in August 2006 for the express purpose of supporting “find, fix, finish” operations to capture or kill targets through analysis of aerial intelligence.\u003c/p>\n\u003cdiv class='img-wrap align-center width-auto' style='width:auto'>\u003ca href=\"/wp-uploads/sites/1/2015/10/64.jpg\">\u003cimg class=\"alignnone size-large wp-image-6467\" src=\"/wp-uploads/sites/1/2015/10/64-1024x793.jpg\" alt=\"\" />\u003c/a>\u003c/p>\n\u003cp class=\"caption\">A slide detailing Operation Haymaker’s “functional teams,” which included personnel from a range of U.S. military units and intelligence agencies.\u003c/p>\n\u003cp>\u003c/div>\n\u003cp>The drone operations that supported campaigns like Haymaker also included personnel stationed at Camp Alpha, a secure facility at Bagram populated by teams from the military’s Joint Special Operations Command (JSOC), as well as contractors manning stations at U.S. bases like Fort Gordon, a lesser-known though crucial node in the war on terror that supports tactical NSA operations abroad from Augusta, Georgia. The hunting and killing operations relied on advanced technology to zero in on targets, including the cellphone geolocation system known as GILGAMESH. As \u003cem>The Intercept\u003c/em> \u003ca href=\"https://theintercept.com/2014/02/10/the-nsas-secret-role/\">reported\u003c/a> in 2014, the GILGAMESH system employs a simulated cellphone tower to identify and locate targeted SIM cards.\u003c/p>\n\u003cdiv class='img-wrap align-center width-auto' style='width:auto'>\u003ca href=\"/wp-uploads/sites/1/2015/10/59.jpg\">\u003cimg class=\"alignnone size-large wp-image-6468\" src=\"/wp-uploads/sites/1/2015/10/59-1024x792.jpg\" alt=\"\" />\u003c/a>\u003c/p>\n\u003cp class=\"caption\">A slide on “Manhunting Basics” takes a lighthearted approach to the core mission of the Haymaker campaign: finding and killing specific individuals.\u003c/p>\n\u003cp>\u003cp class='caption source pullright' style=''>ABI = Activity Based Intelligence; F3EA = Find, Fix, Finish, Exploit, Analyze; HUMINT = Human Intelligence; IMINT = Imagery Intelligence; IPB = Intelligence Preparation of the Battlespace; SIGINT = Signals Intelligence; SNA= Social Network Analysis\u003c/p>\u003c/div>\n\u003cp>While signals intelligence and electronic surveillance clearly contributed to Haymaker’s kinetic operations — like the drone strike that targeted Qari Munib — there was evidently more to the missions than advanced technology. Unlike some other arenas in which the war on terror has touched down — Yemen or Somalia, for example — the documents point to the robust presence of U.S. intelligence agencies and human sources on the ground in northeastern Afghanistan. In Nuristan’s Waygal district, the Defense Intelligence Agency and the CIA had “myriad complementary sources,” a \u003ca href=\"https://theintercept.com/document/2015/10/14/operation-haymaker/#page-15\">slide\u003c/a> laying out &#8220;targeting criteria&#8221; in the district noted, “some of whom may be able to trigger our operations.” A third of the “active targets” in Waygal had “good selectors” — phones the Americans could target in the run-up to a raid or airstrike — and the NSA had “taken on [signals intelligence] development in Waygal, greatly enhancing our understanding of the [signals intelligence] environment.”\u003c/p>\n\u003cdiv class='img-wrap align-center width-auto' style='width:auto'>\u003ca href=\"/wp-uploads/sites/1/2015/10/72.jpg\">\u003cimg class=\"alignnone size-large wp-image-6469\" src=\"/wp-uploads/sites/1/2015/10/72-1024x792.jpg\" alt=\"\" />\u003c/a>\u003c/p>\n\u003cp class=\"caption\">A slide reporting a robust presence of human intelligence sources (HUMINT or HI) in the district of Waygal, a “historic” al Qaeda sanctuary in northeastern Afghanistan.\u003c/p>\n\u003cp>\u003c/div>\n\u003cp>According to the slide, Waygal, described as a “historic” al Qaeda sanctuary, included more than a half-dozen NAIs, “named areas of interest,” the identification of which was attributed to similarly “historic” levels of human and signals intelligence cultivation, as well as surveillance provided by drones scanning the district. There were “over a dozen active targets” in three villages, the slide said, adding that most of the targets were already on a targeting list, or “easily could be.” “The targets there are not only senior-level Taliban facilitators and hosts, but Arabs themselves,” the slide noted, underscoring the presence of suspected foreign fighters in the district. “Elimination of these targets,” it continued, “will provide demonstrable measures of success.”\u003c/p>\n\u003cp>The documents indicate that U.S. forces launched just one airstrike as part of the Haymaker campaign in the early months of 2012, killing two people. In May 2012, however, the tempo of operations picked up dramatically, an increase that coincided with a strategic shift in Afghanistan emanating from the White House. As the military’s focus shifted to hunting down specific targets from 2011 to 2012, drone strikes in Afghanistan \u003ca href=\"http://unama.unmissions.org/LinkClick.aspx?fileticket=K0B5RL2XYcU%3D\">increased\u003c/a> by 72 percent.\u003c/p>\n\u003cp>Over the course of five months, stretching through the summer of 2012, Haymaker operations included 27 raids and 27 airstrikes. The raids resulted in the capture of 61 people, 13 of them jackpots, the actual targets of the missions. A total of two people were reportedly killed in these ground operations. In the airstrikes, meanwhile, a total of 155 people were killed and labeled as enemies killed in action, according to \u003ca href=\"https://theintercept.com/document/2015/10/14/operation-haymaker/#page-2\">a table\u003c/a> presented in the documents. Just 19 were jackpots. The table does not say whether the jackpots are reflected in the EKIA total. It does, however, appear to present a success rate: the number of jackpots divided by the number of missions. In the case of raids, a figure of 48 percent is presented; for airstrikes it’s 70 percent.\u003c/p>\n\u003cdiv class='img-wrap align-center width-auto' style='width:auto'>\u003ca href=\"/wp-uploads/sites/1/2015/10/14crop01.jpg\">\u003cimg class=\"alignnone size-article-medium wp-image-6470\" src=\"/wp-uploads/sites/1/2015/10/14crop01.jpg\" alt=\"\" />\u003c/a>\u003c/p>\n\u003cp class=\"caption\">A comparison of raids (described as “enabled ops”) and airstrikes (described as “kinetic strikes”) reveals significant differences in the total number of prisoners taken versus individuals killed during an intensified period of Haymaker operations.\u003c/p>\n\u003cp>\u003cp class='caption source pullright' style=''>EKIA = Enemy Killed in Action; JP = Jackpot.\u003c/p>\u003c/div>\n\u003cp>The scores of unnamed people killed in the hunt for jackpots, and the intelligence opportunities lost by failing to capture targets alive, do not appear to factor into the calculation. The apparent success rate, in other words, depends solely on killing jackpots, and ignores the strategic — and human — consequences of killing large numbers of bystanders.\u003c/p>\n\u003cp>While the source conceded there could be scenarios in which women and children killed in an airstrike are labeled as EKIA, in the case of the Haymaker strikes he believed it was “more likely” that the dead included “groups of men or teenaged boys” killed because “the intel says the guy JSOC is going after may be in that group of men.” In the event that a target is identified in such a group, he said, “They’ll go through with the strike.”\u003c/p>\n\u003cp>The materials also include a chart revealing that airstrikes killed 219 people over a 14-month period in 2012 and 2013, resulting in at least 35 jackpots. The \u003ca href=\"https://theintercept.com/document/2015/10/14/operation-haymaker/#page-1\">document\u003c/a> includes thumbnail images of individuals, representing a range of groups, who were captured or killed during Haymaker — in total 30 men, 24 of them stamped EKIA, five detained, and one wounded in action. The deaths of just over half the individuals were noted in NATO’s press releases or media reports.\u003c/p>\n\u003cp>&nbsp;\u003c/p>\n\u003cp>\u003cu>\u003cspan class=\"dropcap\">T\u003c/span>HE HAYMAKER FILES\u003c/u> also point to the psychological impact of living under the constant threat of death from above — an effect human rights workers have \u003ca href=\"http://chrgj.org/wp-content/uploads/2012/10/Living-Under-Drones.pdf\">documented\u003c/a> among civilians living in areas populated by militants. A quote attributed to a Taliban detainee identified as “Ahmad,” aka “Objective Brandywine,” features prominently on three of the \u003ca href=\"https://theintercept.com/document/2015/10/14/operation-haymaker/\">documents\u003c/a>. “Hands down, the scariest/most intimidating message for the Taliban, at any level, from fighter to Taliban senior leadership, is anything to do with drones or aerial bombings,” Ahmad purportedly said. “The Taliban has no way to defend against them and they are certain to end in absolute destruction of whatever their target is.”\u003c/p>\n\u003cdiv class='img-wrap align-left width-fixed' style='width:192px'>\u003ca href=\"/wp-uploads/sites/1/2015/10/13crop01.jpg\">\u003cimg class=\"alignleft size-medium wp-image-6471\" src=\"/wp-uploads/sites/1/2015/10/13crop01-192x300.jpg\" alt=\"\" />\u003c/a>\u003c/p>\n\u003cp class=\"caption\">A quote attributed to an alleged Taliban detainee describes the psychological impact of living under the threat of U.S. airstrikes.\u003c/p>\n\u003cp>\u003c/div>\n\u003cp>Still, the documents’ assessment of Haymaker’s effectiveness was frank. A slide detailing the campaign’s “effects” from January 2012 through February 2013 included an assessment of “Objectives &amp; Measures of Effectiveness.” The results were not good. Disruptions in al Qaeda’s view of northeastern Afghanistan as a safe haven and the loss of “key” al Qaeda members and enablers in the region were deemed “marginal.” Meanwhile, \u003ca href=\"https://theintercept.com/document/2015/10/14/operation-haymaker/#page-6\">a comparison\u003c/a> of Haymaker 1.0 (August 2011) with Haymaker 2.0 (February 2013) noted that al Qaeda faced “little to no local opposition” and enjoyed “relatively free movement” to and from Pakistan. Kinetic strikes, the slide reported, “successfully killed one [al Qaeda] target per year,” allowing the organization to “easily” reconstitute.\u003c/p>\n\u003cdiv class='img-wrap align-left width-fixed' style='width:1024px'>\u003ca href=\"/wp-uploads/sites/1/2015/10/63.jpg\">\u003cimg class=\"alignleft size-large wp-image-6473\" src=\"/wp-uploads/sites/1/2015/10/63-1024x793.jpg\" alt=\"\" />\u003c/a>\u003c/p>\n\u003cp class=\"caption\">A slide reveals the Haymaker campaign’s limited strategic achievements.\u003c/p>\n\u003cp>\u003c/div>\n\u003cp>By 2013, Haymaker was amassing a significant body count but making little headway against al Qaeda forces in the region. According to the “Success Criteria” slide, “sporadic reporting of concern over [the] viability” of northeastern Afghanistan as a safe haven had been “overshadowed” by the group’s senior leadership discussing the establishment of a “post-2014 sanctuary.” Individuals continued to return to Pakistan to support operations in and outside of Afghanistan, the slide asserted. While “nascent developments in some valleys” indicated that locals were “tiring” of al Qaeda’s efforts to “root out spies as a perceived method to stopping strikes,” the strikes and raids themselves had “succeeded in killing/capturing few [al Qaeda] targets.” As slides detailing its effectiveness noted, Haymaker’s impact on al Qaeda and Taliban enablers in Kunar and Nuristan was “considered temporary without a long-term, persistent campaign.”\u003c/p>\n\u003cdiv class='img-wrap align-center width-auto' style='width:auto'>\u003cimg class=\"alignnone size-large wp-image-6791\" src=\"/wp-uploads/sites/1/2015/10/GettyImages-161611768-1024x740.jpg\" alt=\"\" />\u003c/p>\n\u003cp class=\"caption\">A wounded Afghan boy receives treatment at a hospital in Kunar province on Feb. 13, 2013, after a NATO airstrike killed 10 civilians.\u003c/p>\n\u003cp>\u003cp class='caption source pullright' style=''>Photo: Namatullah Karyab/AFP/Getty Images\u003c/p>\u003c/div>\n\u003cp>&nbsp;\u003c/p>\n\u003cp>\u003cu>\u003cspan class=\"dropcap\">O\u003c/span>N FEBRUARY 18, 2013,\u003c/u> while Haymaker was still underway, Afghan President Hamid Karzai issued a \u003ca href=\"http://www.nytimes.com/2013/02/17/world/asia/karzai-to-forbid-his-forces-from-requesting-foreign-airstrikes.html\">decree\u003c/a>: Afghan military forces were barred from calling in U.S. airstrikes for support on missions. The order followed an operation in Kunar in which NATO and Afghan forces were blamed for the deaths of 10 civilians — including one man, four women, and five children. In 2012, the U.N. mission in Afghanistan had documented a number of other incidents involving civilian deaths resulting from U.S. operations, including a raid that left seven civilians dead, an “aerial attack” that killed seven children and one adult, and a drone strike targeting “two insurgents” that killed a teenage girl.\u003c/p>\n\u003cp>The most recent date included in the Haymaker materials is February 28, 2013. Whether the date marked the end of the campaign is unclear. What does seem clear, however, is that Haymaker coincided with an increase in drone strikes and civilian casualties across Afghanistan. By the end of 2013, the U.N. reported the number of civilian casualties from drone strikes in Afghanistan had tripled from 2012, with “almost one-third of the civilian deaths from aerial operations” reported in Kunar, the heart of the Haymaker campaign. Records of condolence payments disbursed by the U.S. military, \u003ca href=\"https://theintercept.com/2015/02/27/payments-civilians-afghanistan/\">obtained\u003c/a> by \u003cem>The Intercept, \u003c/em>show more than $118,000 distributed in 45 disbursements to Kunar in fiscal years 2011 through 2013. In addition to numerous injuries, the payments also cover the deaths of 27 people, including at least four children. The records do not indicate whether the incidents were linked to the Haymaker campaign or whether they were the result of mistaken ground raids or airstrikes.\u003c/p>\n\u003cdiv class='img-wrap align-center width-auto' style='width:auto'>\u003cimg class=\"aligncenter size-large wp-image-6476\" src=\"/wp-uploads/sites/1/2015/10/MargotTable.png\" alt=\"\" />\u003c/div>\n\u003cp>Until recently, the ongoing conflict in Afghanistan had largely receded from public conversations in the U.S. This month, an American airstrike on a hospital run by the international organization Médecins Sans Frontières, offered a forceful reminder that the war, despite the Obama administration’s declaration in 2014, is far from over. Unleashed in the early morning hours of October 3, in the province of Kunduz, the U.S. attack killed at least a dozen members of the humanitarian group’s medical staff and 10 patients, including three children. A nurse on the scene recalled seeing six victims in the intensive care unit ablaze in their beds. “There are no words for how terrible it was,” the nurse \u003ca href=\"http://www.doctorswithoutborders.org/article/unspeakable-msf-nurse-recounts-attack-msfs-kunduz-hospital\">said\u003c/a>. MSF denounced the strike as a war crime and demanded an independent investigation.\u003c/p>\n\u003cp>The Kunduz attack \u003ca href=\"http://blogs.cfr.org/zenko/2015/10/03/kunduz-airstrike-and-civilian-deaths-in-afghanistan/\">underscored\u003c/a> an ugly reality: After nearly a decade and a half of war, more than 2,300 American \u003ca href=\"https://www.dmdc.osd.mil/dcas/pages/report_oef_type.xhtml\">lives lost\u003c/a>, and an estimated 26,000 Afghan \u003ca href=\"http://watson.brown.edu/costsofwar/costs/human/civilians/afghan\">civilians killed\u003c/a>, the nature of combat in Afghanistan is entering a new, potentially bloodier, phase. In August, the United Nations \u003ca href=\"http://www.un.org/apps/news/story.asp?NewsID=51563#.VedLLlzeyfR\">reported\u003c/a> that civilian casualties in Afghanistan “are projected to equal or exceed the record high numbers documented last year.” While most civilian casualties in the first half of 2015 were attributed to “anti-government” forces, 27 deaths and 22 injuries were attributed to airstrikes “by international military forces,” a 23 percent increase over last year, most of them, unlike the air raid in Kunduz, carried out by drones.\u003c/p>\n\u003cp>Despite the rise in civilian casualties and the well-documented failure of drone strikes to achieve the military’s broader objectives, there is every indication that unmanned airstrikes will play an increasing role in U.S. military engagement in Afghanistan, as they have in war zones across the world. Less than two weeks after the U.N. issued its report, \u003cem>Foreign Policy\u003c/em> \u003ca href=\"http://foreignpolicy.com/2015/08/14/easing-off-the-taliban/\">revealed\u003c/a> that JSOC has drastically reduced the number of night raids it conducts in Afghanistan, while dramatically increasing its reliance on airstrikes, and is currently “on pace to double the rate at which it kills ‘high-value individuals’ using kinetic strikes, compared to how many it was killing that way five years ago.”\u003c/p>\n\u003cp>Afghanistan’s northeastern border with Pakistan remains an active area of focus for the remaining U.S. special operations forces in the country. The Pech Valley, once a hotspot during the Haymaker campaign, continues to host a constellation of armed groups. Al Qaeda, the organization used to justify both the invasion of Afghanistan and the Haymaker campaign, reportedly enjoys a more pronounced presence in the valley than ever. “The al Qaeda presence there now,” according to a \u003ca href=\"http://www.usip.org/sites/default/files/SR382-Ten-Years-in-Afghanistans-Pech-Valley.pdf\">report \u003c/a>by the United States Institute for Peace, “is larger than when U.S. counterterrorism forces arrived in 2002.”\u003c/p>\n\u003cp>With JSOC and the CIA running a \u003ca href=\"https://www.washingtonpost.com/world/national-security/us-launches-secret-drone-campaign-to-hunt-islamic-state-leaders-in-syria/2015/09/01/723b3e04-5033-11e5-933e-7d06c647a395_story.html\">new drone war\u003c/a> in Iraq and Syria, much of Haymaker’s strategic legacy lives on. Such campaigns, with their tenuous strategic impacts and significant death tolls, should serve as a reminder of the dangers fallible lethal systems pose, the intelligence community source said. “This isn’t to say that the drone program is a complete wash and it’s never once succeeded in carrying out its stated purpose,” he pointed out. “It certainly has.” But even the operations military commanders would point to as successes, he argued, can have unseen impacts, particularly in the remote communities where U.S. missiles so often rain down. “I would like to think that what we were doing was in some way trying to help Afghans,” the source explained, but the notion “that what we were part of was actually defending the homeland or in any way to the benefit of the American public” evaporated long ago. “There’s no illusion of that that exists in Afghanistan,” he said. “It hasn’t existed for many years.”\u003c/p>\n\u003cp class=\"caption\">\u003cem>Top Photo: Ed Darack/Getty Images\u003c/em>\u003c/p>\n\u003cp class=\"caption\">Additional reporting: \u003ca href=\"/staff/jeremy-scahill/\">\u003cimg class=\"sq-author\" src=\"https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2014/02/Jeremy-Scahill-Original_350_2.jpg\" alt=\"\" width=\"40\" /> Jeremy Scahill\u003c/a> Research: \u003ca href=\"/staff/margotwilliams/\">\u003cimg class=\"sq-author\" src=\"https://prod01-cdn06.cdn.firstlook.org/wp-uploads/sites/1/2015/02/margot-350x350.jpg\" alt=\"\" width=\"40\" /> Margot Williams\u003c/a>\u003c/p>\n","link":"https://theintercept.com/drone-papers/manhunting-in-the-hindu-kush/","thumbnail":{"ID":40324,"title":"107990394","excerpt":"U.S. Army UH-60 Blackhawk Helicopter Over Hindu Kush","content":"","credit":"Getty Images/Science Faction","sizes":{"feature_hero":{"path":"wp-uploads/sites/1/2015/10/GettyImages-107990394-feature-hero.jpg","width":1200,"height":800},"promo":{"path":"wp-uploads/sites/1/2015/10/GettyImages-107990394-promo.jpg","width":440,"height":220},"promo_large":{"path":"wp-uploads/sites/1/2015/10/GettyImages-107990394-promo-large.jpg","width":900,"height":450},"top_large":{"path":"wp-uploads/sites/1/2015/10/GettyImages-107990394-top-large.jpg","width":440,"height":440},"top_small":{"path":"wp-uploads/sites/1/2015/10/GettyImages-107990394-top-small.jpg","width":200,"height":200},"square":{"path":"wp-uploads/sites/1/2015/10/GettyImages-107990394-440x440.jpg","width":440,"height":440},"article_header":{"path":"wp-uploads/sites/1/2015/10/GettyImages-107990394-article-header.jpg","width":1440,"height":720},"original":{"path":"wp-uploads/sites/1/2015/10/GettyImages-107990394.jpg","width":"1440","height":"1034"}}},"date":"2015-10-15T11:57:29+00:00","authors":[{"ID":14,"display_name":"Ryan Devereaux","url":"https://theintercept.com/staff/ryan-devereaux/","brief_bio":"Ryan Devereaux is a Brooklyn-based journalist.","full_bio":"\u003cp>Ryan Devereaux is a Brooklyn-based journalist.\u003c/p>\n","email":"ryan.devereaux@theintercept.com","image_350":"https://theintercept.com/wp-uploads/sites/1/2014/05/Ryan-Devereaux_700.jpg","twitter":"@rdevro","facebook":"","pgp_key":"Ryan Devereaux Public Key","pgp_file":"https://firstlook.org/wp-uploads/sites/1/2014/05/RyanDevereauxPGP.asc","pgp_fingerprint":"3728 F848 0034 DE9A 9B93 EF19 9821 E4B0 0BF1 57E3","user_title":"Reporter","user_group":"","nicename":"ryan-devereaux"}],"excerpt_type":"","is_feature":"","feature_title":"","is_blog":false,"blog_title":"","comments_number":"53","bitly_url":"http://interc.pt/1GeJR1P","comments_open":true,"is_banner_hidden":false,"featured_video_url":"","meta":{"links":[]},"layout":"default","banner_videokey":"","post_type":"squirrel","share_twitter_text":"Manhunting in the Hindu Kush","yoast_wpseo_canonical":"https://theintercept.com/drone-papers/manhunting-in-the-hindu-kush/","yoast_wpseo_general_title":"Manhunting in the Hindu Kush","yoast_wpseo_general_description":"","yoast_wpseo_facebook_title":"","yoast_wpseo_facebook_description":"","yoast_wpseo_facebook_thumbnail":"","yoast_wpseo_twitter_title":"","yoast_wpseo_twitter_description":"","yoast_wpseo_twitter_thumbnail":"","squirrel_subhead":"Civilian casualties and strategic failures in America’s longest war ","squirrel_intro":"From 2011 to 2013, the most elite forces in the U.S. military, supported by the CIA and other elements of the intelligence community, set out to destroy the Taliban and al Qaeda forces that remained hidden among the soaring peaks and plunging valleys of the Hindu Kush, along Afghanistan’s northeastern border with Pakistan. Dubbed Operation Haymaker, the campaign has been described as a potential model for the future of American warfare: special operations units, partnered with embedded intelligence elements running a network of informants, pinpointing members of violent organizations, then drawing up plans to eliminate those targets from the battlefield, either by capturing or killing them.","squirrel_num":"5","squirrel_top_text_color":"white","squirrel_top_meta_color":"white","squirrel_intro_bg_color":"black","squirrel_intro_text_color":"red","squirrel_subhead_offset":"0","squirrel_homepage_hero_location":3,"squirrel_videokey":""},"40300":{"ID":40300,"title":"Firing Blind","slug":"firing-blind","excerpt":"A secret Pentagon study highlights the chronic flaws in intelligence used for drone strikes in Yemen and Somalia.","content":"\u003cp>\u003cu>\u003cspan class=\"dropcap\">T\u003c/span>HOSE SHORTFALLS STEM\u003c/u> from the remote geography of Yemen and Somalia and the limited American presence there. As a result, the U.S. military has been overly reliant on signals intelligence from computers and cellphones, and the quality of those intercepts has been limited by constraints on surveillance flights in the region.\u003c/p>\n\u003cp>The documents are part of a \u003ca href=\"https://theintercept.com/document/2015/10/14/small-footprint-operations-2-13/\">study\u003c/a> by a Pentagon Task Force on Intelligence, Surveillance, and Reconnaissance. They provide details about how targets were tracked for lethal missions carried out by the Joint Special Operations Command, or JSOC, in Yemen and Somalia between January 2011 and summer 2012. When the study was circulated in 2013, the Obama administration was publicly \u003ca href=\"https://www.washingtonpost.com/world/national-security/obamas-new-drone-policy-has-cause-for-concern/2013/05/25/0daad8be-c480-11e2-914f-a7aba60512a7_story.html\">floating\u003c/a> the idea of moving the bulk of its drone program to the Pentagon from the CIA, and the military was eager to make the case for more bases, more drones, higher video quality, and better eavesdropping equipment.\u003c/p>\n\u003cdiv class=\"video-bleed\">\n\u003cdiv class=\"video-bleed-aspect\" style=\"padding-top: 46.8%\">\n\u003c!-- iframe plugin v.2.9 wordpress.org/plugins/iframe/ --\>\n\u003ciframe src=\"/jw?videoKey=gDXSpZYm&amp;autostart=true&amp;controls=false&amp;repeat=true\" height=\"100%\" width=\"100%\" scrolling=\"no\" class=\"iframe-class\" frameborder=\"0\">\u003c/iframe>\n\u003c/div>\n\u003c/div>\n\u003cp class=\"caption\">\u003cem>3D effects: Cerulean CGI, Photo: Brian Ritchie\u003c/em>\u003c/p>\n\u003cp>&nbsp;\u003c/p>\n\u003cp>Yet by identifying the challenges and limitations facing the military’s “find, fix, finish” operations in Somalia and Yemen — the cycle of gathering intelligence, locating, and attacking a target — the conclusions of the ISR study would seem to undermine the Obama administration’s claims of a precise and effective campaign, and lend support to critics who have questioned the quality of intelligence used in drone strikes.\u003c/p>\n\u003cp>The study made specific recommendations for improving operations in the Horn of Africa, but a Pentagon spokesperson, Cmdr. Linda Rojas, declined to explain what, if any, measures had been taken in response to the study’s findings, saying only that “as a matter of policy we don’t comment on the details of classified reports.”\u003c/p>\n\u003ch2>The Tyranny of Distance\u003c/h2>\n\u003cblockquote class='stylized pull-none'>One of the most glaring problems identified in the ISR study was the U.S. military’s inability to carry out full-time surveillance of its targets in the Horn of Africa and Yemen. Behind this problem lies the “\u003ca href=\"https://theintercept.com/document/2015/10/14/small-footprint-operations-2-13/#page-6\">tyranny of distance\u003c/a>” — a reference to the great lengths that aircraft must fly to their targets from the main U.S. air base in Djibouti, the small East African nation that borders Somalia and sits just across the Gulf of Aden from Yemen.\u003c/blockquote>\n\u003cp>Surveillance flights are limited by fuel — and, in the case of manned aircraft, the endurance of pilots. In contrast with Iraq, where more than 80 percent of “finishing operations” were conducted within 150 kilometers of an air base, the study notes that “most objectives in Yemen are ~ 500 km away” from Djibouti and “Somalia can be over 1,000 km.” The result is that drones and planes can spend half their air time in transit, and not enough time conducting actual surveillance.\u003c/p>\n\u003cdiv class='img-wrap align-right width-fixed' style='width:300px'>\u003ca href=\"/wp-uploads/sites/1/2015/10/44crop01.jpg\">\u003cimg class=\"alignright size-medium wp-image-6499\" src=\"/wp-uploads/sites/1/2015/10/44crop01.jpg\" alt=\"\" />\u003c/a>\u003c/p>\n\u003cp class=\"caption\">A Pentagon chart showing that as of June 2012 manned spy planes accounted for the majority of flights over Yemen, even though drones were more efficient, since they could spend more time over a target. Over Somalia, the military used a mix of manned and unmanned aircraft.\u003c/p>\n\u003cp>\u003cp class='caption source pullright' style=''>AP = Arabian Peninsula; EA = East Africa.\u003c/p>\u003c/div>\n\u003cp>Compounding the tyranny of distance, the ISR \u003ca href=\"https://theintercept.com/document/2015/10/14/small-footprint-operations-2-13/#page-16\">study complained\u003c/a>, was the fact that JSOC had too few drones in the region to meet the requirements mandated for carrying out a finishing operation. The military measures surveillance flights in orbits — meaning continuous, unbroken coverage of a target — and JSOC chronically failed to meet “minimum requirements” for orbits over Yemen, and in the case of Somalia had never met the minimum standards. On average, 15 flights a day, by multiple aircraft relieving or complementing one another, were needed to complete three orbits over Yemen.\u003c/p>\n\u003cp>The “sparse” available resources meant that aircraft had to “cover more potential leads — stretching coverage and leading to [surveillance] ‘blinks.’” Because multiple aircraft needed to be “\u003ca href=\"https://theintercept.com/document/2015/10/14/small-footprint-operations-2-13/#page-32\">massed\u003c/a>” over one target before a strike, surveillance of other targets temporarily ceased, thus breaking the military’s ideal of a “persistent stare” or the “\u003ca href=\"http://www.dtic.mil/doctrine/docnet/courses/intelligence/intel/jfq_50_art-2.pdf\">unblinking eye\u003c/a>” of around-the-clock tracking.\u003c/p>\n\u003cdiv class='img-wrap align-left width-fixed' style='width:196px'>\u003ca href=\"/wp-uploads/sites/1/2015/10/47crop01.jpg\">\u003cimg class=\"alignleft size-medium wp-image-6500\" src=\"/wp-uploads/sites/1/2015/10/47crop01.jpg\" alt=\"\" />\u003c/a>\u003c/p>\n\u003cp class=\"caption\">When the military was focused on a “finish” — meaning kill — operation, drones were taken off the surveillance of other targets.\u003c/p>\n\u003cp>\u003c/div>\n\u003cp>JSOC \u003ca href=\"https://theintercept.com/document/2015/10/14/small-footprint-operations-2-13/#page-29\">relied on manned spy planes\u003c/a> to fill the orbit gap over Yemen. In June 2012 there were six U-28 spy planes in operation in East Africa and the Arabian Peninsula, as well as several other types of manned aircraft. The U-28s in Djibouti were “referred to as the ‘Chiclet line,’” according to the ISR study, and “compounded Djiboutian air control issues” because of their frequent flights.\u003c/p>\n\u003cp>Only in the summer of 2012, with the addition of contractor-operated drones based in Ethiopia and Fire Scout unmanned helicopters, did Somalia have the minimum number of drones commanders wanted. The number of Predator drones stationed in Djibouti doubled over the course of the study, and in 2013, the fleet \u003ca href=\"https://www.washingtonpost.com/world/national-security/drone-safety-concerns-force-us-to-move-large-fleet-from-camp-lemonnier-in-djibouti/2013/09/24/955518c4-213c-11e3-a03d-abbedc3a047c_story.html\">was moved\u003c/a> from the main U.S. air base, Camp Lemonnier, to another Djibouti airstrip because of overcrowding and a string of crashes.\u003c/p>\n\u003cp>“Blinking” remained a concern, however, and the study recommended adding even more aircraft to the area of operations. Noting that political and developmental issues hampered the military’s ability to build new bases, it suggested expanding the use of aircraft launched from ships. JSOC \u003ca href=\"https://theintercept.com/document/2015/10/14/small-footprint-operations-2-13/#page-4\">already made use\u003c/a> of Fire Scout helicopter drones and small Scan Eagle drones off the coast of Somalia, as well as “Armada Sweep,” which a 2011 document from the National Security Agency, provided by former contractor Edward Snowden, describes as a “ship-based collection system” for electronic communications data. (The NSA declined to comment on Armada Sweep.)\u003c/p>\n\u003cp>Lt. Gen. Michael Flynn, who was head of the Defense Intelligence Agency from July 2012 to August 2014, told \u003cem>The Intercept\u003c/em> that the surveillance requirements he outlined for tracking al Qaeda while in office had never been met. “We end up spending money on other stupid things instead of actually the capabilities that we need,” he said. “This is not just about buying more drones, it’s a whole system that’s required.”\u003c/p>\n\u003cp>According to Micah Zenko, a senior fellow at the Council on Foreign Relations who has closely studied the drone war, resource constraints in Africa “mean less time for the persistent stare that counterterrorism analysts and commanders want, and got used to in the Afghanistan-Pakistan theater.”\u003c/p>\n\u003ch2>Find, Fix, Finish\u003c/h2>\n\u003cblockquote class='stylized pull-none'>The find, fix, finish cycle is known in the military as FFF, or F3. But just as critical are two other letters: E and A, for “exploit and analyze,” referring to the use of materials collected on the ground and in detainee interrogations.\u003c/blockquote>\n\u003cp>F3EA became doctrine in counterinsurgency campaigns in Iraq and Afghanistan in the mid-2000s. Gen. Stanley McChrystal wrote in his memoir that the simplicity of those “five words in a line &#8230; belied how profoundly it would drive our mission.” In 2008, Flynn, who worked closely with McChrystal before becoming head of the Defense Intelligence Agency, \u003ca href=\"http://www.dtic.mil/doctrine/docnet/courses/intelligence/intel/jfq_50_art-2.pdf\">wrote\u003c/a> that “\u003cem>Exploit-Analyze\u003c/em> starts the cycle over again by providing leads, or start points, into the network that could be observed and tracked using airborne ISR.”\u003c/p>\n\u003cp>Deadly strikes thus truncate the find, fix, finish cycle without exploitation and analysis — precisely the components that were lacking in the drone campaign waged in East Africa and Yemen. That shortfall points to one of the contradictions at the heart of the drone program in general: Assassinations are intelligence dead ends.\u003c/p>\n\u003cp>The ISR study shows that after a “kill operation” there is typically nobody on the ground to collect written material or laptops in the target’s house, or the phone on his body, or capture suspects and ask questions. Yet collection of on-the-ground intelligence of that sort — referred to as DOMEX, for “document and media exploitation,” and TIR, for “tactical interrogation report” — is invaluable for identifying future targets.\u003c/p>\n\u003cdiv class='img-wrap align-center width-fixed' style='width:1024px'>\u003ca href=\"/wp-uploads/sites/1/2015/10/23.jpg\">\u003cimg class=\"aligncenter size-large wp-image-6502\" src=\"/wp-uploads/sites/1/2015/10/23-1024x792.jpg\" alt=\"\" />\u003c/a>\u003c/p>\n\u003cp class=\"caption\">A slide from a Pentagon study notes that deadly strikes in Yemen and Somalia reduce the amount of intelligence for future operations.\u003c/p>\n\u003cp>\u003cp class='caption source pullright' style=''>AUMF = 2001 Authorization for Use of Military Force; FMV = Full Motion Video; F3EA = Find, Fix, Finish, Exploit, Analyze; HOA = Horn of Africa\u003c/p>\u003c/div>\n\u003cp>Stating that 75 percent of operations in the region were strikes, and noting that “kill operations significantly reduce the intelligence available from detainees and captured material,” the study recommended an expansion of “capture finishes via host-nation partners for more ‘finish-derived’ intelligence.” One of the problems with that scenario, however, is that security forces in host nations like Yemen and Somalia are profoundly unreliable and have been linked to a wide variety of abuses, including the torture of prisoners.\u003c/p>\n\u003cp>A \u003ca href=\"http://www.stimson.org/images/uploads/task_force_report_final_web_062414.pdf\">report\u003c/a> last year by retired Gen. John Abizaid and former Defense Department official Rosa Brooks noted that the “enormous uncertainties” of drone warfare are “multiplied further when the United States relies on intelligence and other targeting information provided by a host nation government: How can we be sure we are not being drawn into a civil war or being used to target the domestic political enemies of the host state leadership?”\u003c/p>\n\u003cp>In 2011, for example, U.S. officials \u003ca href=\"http://www.wsj.com/articles/SB10001424052970203899504577126883574284126\">told\u003c/a> the \u003cem>Wall Street Journal\u003c/em> that they had killed a local governor because Yemeni officials didn’t tell them he was present at a gathering of al Qaeda figures. “We think we got played,” one official said. (The Yemeni government disputed the report.)\u003c/p>\n\u003cp>Despite such warnings, the drone program has relied heavily on intelligence from other countries. One \u003ca href=\"https://theintercept.com/document/2015/10/14/small-footprint-operations-2-13/#page-9\">slide\u003c/a> describes signals intelligence, or SIGINT, as coming “often from foreign partners,” and another, titled “\u003ca href=\"https://theintercept.com/document/2015/10/14/small-footprint-operations-2-13/#page-14\">Alternatives to Exploit/Analyze\u003c/a>,” states that “in the reduced access environment, national intelligence partners often have the best information and access.”\u003c/p>\n\u003cdiv class='img-wrap align-right width-fixed' style='width:300px'>\u003ca href=\"/wp-uploads/sites/1/2015/10/24crop01.jpg\">\u003cimg class=\"alignright size-medium wp-image-6503\" src=\"/wp-uploads/sites/1/2015/10/24crop01.jpg\" alt=\"\" />\u003c/a>\u003c/p>\n\u003cp class=\"caption\">The military relies heavily on intelligence from electronic communications, much of it provided by foreign governments, but acknowledges that the information is “neither as timely nor as focused as tactical intelligence.”\u003c/p>\n\u003cp>\u003c/div>\n\u003cp>One way to increase the reliability of host-nation intelligence is to be directly involved in its collection — but this can be risky for soldiers on the ground. The study called for “advance force operations,” including “small teams of special force advisors,” to work with foreign forces to capture combatants, interrogate them, and seize any written material or electronic devices they possess. According to public Special Operations \u003ca href=\"http://www.dtic.mil/doctrine/new_pubs/jp3_05.pdf\">guidelines\u003c/a>, advance force operations “prepare for near-term” actions by planting tracking devices, conducting reconnaissance missions, and staging for attacks. The documents obtained by \u003cem>The Intercept\u003c/em> did not specify an optimum number of advisors or where they should be based or how exactly they should be involved in capture or interrogation operations.\u003c/p>\n\u003cp>Although the study dates from 2013, current Special Operations Commander Joseph Votel \u003ca href=\"http://aspensecurityforum.org/wp-content/uploads/2015/07/A-Look-into-SOCOM.pdf\">echoed \u003c/a>its findings in July 2015. Votel noted that his troops were working closely with African Union forces and the Somali government to battle al Shabaab. He added, “We get a lot more &#8230; when we actually capture somebody or we capture material than we do when we kill someone.”\u003c/p>\n\u003cdiv class='img-wrap align-bleed width-auto' style='width:auto'>\u003cimg class=\"alignnone size-large wp-image-6793\" src=\"/wp-uploads/sites/1/2015/10/GettyImages-158498631.jpg\" alt=\"\" />\u003c/p>\n\u003cp class=\"caption overlayed\">A man walks past destroyed buildings in Zinjibar, capital of Abyan province in southern Yemen on Dec. 5, 2012.\u003c/p>\n\u003cp>\u003cp class='caption source' style=''>Photo: Sami-al-Ansi/AFP/Getty Images\u003c/p>\u003c/div>\n\u003ch2>The Poverty of Signals Intelligence\u003c/h2>\n\u003cblockquote class='stylized pull-none'>With limited ability to conduct raids or seize materials from targeted individuals in Yemen and Somalia, JSOC relied overwhelmingly on monitoring electronic communications to discover and ultimately locate targets.\u003c/blockquote>\n\u003cp>The documents state bluntly that SIGINT is an inferior form of intelligence. Yet signals accounted for more than half the intelligence collected on targets, with much of it coming from foreign partners. The rest originated with human intelligence, primarily obtained by the CIA. “These sources,” the study \u003ca href=\"https://theintercept.com/document/2015/10/14/small-footprint-operations-2-13/#page-9\">notes\u003c/a>, “are neither as timely nor as focused as tactical intelligence” from interrogations or seized materials.\u003c/p>\n\u003cp>Making matters worse, the documents \u003ca href=\"https://theintercept.com/document/2015/10/14/small-footprint-operations-2-13/#page-9\">refer to “poor” and “limited”\u003c/a> capabilities for collecting SIGINT, implying a double bind in which kill operations were reliant on sparse amounts of inferior intelligence.\u003c/p>\n\u003cp>The disparity with other areas of operation was stark, as a chart contrasting cell data makes clear: In Afghanistan there were 8,900 cell data reports each month, versus 50 for Yemen and 160 for Somalia. Despite that, another chart shows SIGINT comprised more than half the data sources that went into developing targets in Somalia and Yemen in 2012.\u003c/p>\n\u003cdiv class='img-wrap align-right width-fixed' style='width:300px'>\u003ca href=\"/wp-uploads/sites/1/2015/10/09crop01.jpg\">\u003cimg class=\"alignright size-medium wp-image-6504\" src=\"/wp-uploads/sites/1/2015/10/09crop01.jpg\" alt=\"\" />\u003c/a>\u003c/p>\n\u003cp class=\"caption\">Cellphone data was critical for finding and identifying targets, yet a chart from a Pentagon study shows that the military had far less information in Yemen and Somalia than it was accustomed to having in Afghanistan.\u003c/p>\n\u003cp>\u003cp class='caption source pullright' style=''>DOMEX = Document and Media Exploitation; GSM = Global System for Mobile communication; HOA = Horn of Africa; IIRs = Intelligence Information Reports; SIGINT = Signals Intelligence; TIRs = Tactical Interrogation Reports.\u003c/p>\u003c/div>\n\u003cp>Flynn told \u003cem>The Intercept\u003c/em> there was “way too much reliance on technical aspects [of intelligence], like signals intelligence, or even just looking at somebody with unmanned aerial vehicles.”\u003c/p>\n\u003cp>“I could get on the telephone from somewhere in Somalia, and I know I’m a high-value target, and say in some coded language, ‘The wedding is about to occur in the next 24 hours,’” Flynn said. “That could put all of Europe and the United States on a high-level alert, and it may be just total bullshit. SIGINT is an easy system to fool and that’s why it has to be validated by other INTs — like HUMINT. You have to ensure that the person is actually there at that location because what you really intercepted was the phone.”\u003c/p>\n\u003cp>In addition to using SIGINT to identify and find new targets, the documents \u003ca href=\"https://theintercept.com/document/2015/10/14/small-footprint-operations-2-13/#page-10\">detail\u003c/a> how military analysts also relied on such intelligence to make sure that they had the correct person in their sights and to estimate the harm to civilians before a strike. After locating a target, usually by his cellphone or other electronics, analysts would study video feeds from surveillance aircraft “to build near-certainty via identification of distinguishing physical characteristics.”\u003c/p>\n\u003cp>A British intelligence document on targeted killing in Afghanistan, which was among the Snowden files, describes a similar process of “monitoring a fixed location, and tracking any persons moving away from that location, and identifying if a similar pattern is experienced through SIGINT collect.” The document explains that “other visual indicators may be used to aid the establishment of [positive identification]” including “description of clothing” or “gait.” After a shot, according to the British document and case studies in the Pentagon’s ISR report, drones would hover to determine if their target had been hit, collecting video and evidence of whether the cellphone had been eliminated. (The British intelligence agency, GCHQ, declined to comment on the document.)\u003c/p>\n\u003cdiv class='img-wrap align-center width-fixed' style='width:1024px'>\u003ca href=\"/wp-uploads/sites/1/2015/10/54.jpg\">\u003cimg class=\"aligncenter size-large wp-image-6505\" src=\"/wp-uploads/sites/1/2015/10/54-1024x794.jpg\" alt=\"\" />\u003c/a>\u003c/p>\n\u003cp class=\"caption\">A chart comparing the surveillance capabilities of the various drones and aircraft flying over Yemen and Somalia in 2012.\u003c/p>\n\u003cp>\u003cp class='caption source pullright' style=''>APG = Aerial Precision Geolocation; DNR COMINT = Dial Network Recognition Communications Intelligence; ISR = Intelligence, Surveillance, and Reconnaissance; FMV = Full Motion Video; PTT COMINT = Push-to-Talk Communications Intelligence.\u003c/p>\u003c/div>\n\u003cp>Yet according to the ISR study, the military faced “critical shortfalls of capabilities” in the technologies enabling that kind of precise surveillance and post-strike assessment. At the time of the study, only some of the Reaper drones had high-definition video, and most of the aircraft over the region lacked the ability to collect “dial number recognition” data.\u003c/p>\n\u003cp>The study cites these shortcomings as an explanation for the low rate of successful strikes against the targets on the military’s kill list in Yemen and Somalia, especially in comparison with Iraq and Afghanistan. It presents the failings primarily as an issue of efficiency, with little mention of the possible consequence of bad intelligence leading to killing the wrong people.\u003c/p>\n\u003cp class=\"caption\">Additional reporting: \u003ca href=\"/staff/jeremy-scahill/\">\u003cimg class=\"sq-author\" src=\"https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2014/02/Jeremy-Scahill-Original_350_2.jpg\" alt=\"\" width=\"40\" /> Jeremy Scahill\u003c/a>\u003c/p>\n","link":"https://theintercept.com/drone-papers/firing-blind/","thumbnail":{"ID":40318,"title":"","excerpt":"","content":"","credit":"","sizes":{"feature_hero":{"path":"wp-uploads/sites/1/2015/10/firing-blind-feature-hero.jpg","width":1200,"height":800},"promo":{"path":"wp-uploads/sites/1/2015/10/firing-blind-promo.jpg","width":440,"height":220},"promo_large":{"path":"wp-uploads/sites/1/2015/10/firing-blind-promo-large.jpg","width":900,"height":450},"top_large":{"path":"wp-uploads/sites/1/2015/10/firing-blind-top-large.jpg","width":440,"height":440},"top_small":{"path":"wp-uploads/sites/1/2015/10/firing-blind-top-small.jpg","width":200,"height":200},"square":{"path":"wp-uploads/sites/1/2015/10/firing-blind-440x440.png","width":440,"height":440},"article_header":{"path":"wp-uploads/sites/1/2015/10/firing-blind-article-header.jpg","width":1440,"height":720},"original":{"path":"wp-uploads/sites/1/2015/10/firing-blind.png","width":"1440","height":"880"}}},"date":"2015-10-15T11:58:22+00:00","authors":[{"ID":41,"display_name":"Cora Currier","url":"https://theintercept.com/staff/cora/","brief_bio":"Cora Currier is a journalist with a focus on national security, foreign affairs, and human rights.","full_bio":"\u003cp>Cora Currier is a journalist with a focus on national security, foreign affairs, and human rights. As a reporting fellow at ProPublica, she covered national security and finance. Her work has been published in \u003cem>Stars and Stripes\u003c/em>, \u003cem>The Nation\u003c/em>, \u003cem>Columbia Journalism Review\u003c/em>, Al Jazeera America, and many other outlets. Before joining ProPublica, she was on the editorial staff of \u003cem>The New Yorker\u003c/em> and a lead researcher on several books of history and politics. She lives in New York.\u003c/p>\n","email":"cora.currier@theintercept.com","image_350":"https://firstlook.org/wp-uploads/sites/1/2014/08/cora_avatar_1409289060-350x350.jpg","twitter":"@coracurrier","facebook":"","pgp_key":"Cora Currier Public Key","pgp_file":"https://firstlook.org/wp-uploads/sites/1/2014/09/CoraCurrierPGP.asc","pgp_fingerprint":"73FF EEE8 D773 173A 7BD0 CEB2 969F 24F4 C809 2B47","user_title":"Reporter","user_group":"","nicename":"cora"},{"ID":11,"display_name":"Peter Maass","url":"https://theintercept.com/staff/peter-maass/","brief_bio":"Peter Maass has written about war, media, and national security for a variety of outlets.","full_bio":"\u003cp>Peter Maass has written about war, media, and national security for\u003cem> The New York Times Magazine\u003c/em>, \u003cem>The New Yorker, \u003c/em>and \u003cem>The Washington Post\u003c/em>. \u003c!-- Read More --\>He reported on both civilians and combatants during the conflicts in Iraq and Afghanistan. He is the author of \u003cem>Love Thy Neighbor: A Story of War\u003c/em>, an award-winning memoir about the conflict in Bosnia, and he wrote \u003cem>Crude World: The Violent Twilight of Oil\u003c/em>. Peter, awarded a Guggenheim Fellowship in 2012, has focused most recently on government and corporate surveillance, and is working on a book about surveillance for Alfred A. Knopf. He has taught writing at Princeton and Columbia universities, and he has been awarded fellowships at the Shorenstein Center at Harvard and the American Academy in Berlin. He is on the advisory boards of the Solutions Journalism Network, and the Program for Narrative and Documentary Practice at Tufts University. A graduate of the University of California at Berkeley, he lives in New York City.\u003c/p>\n","email":"peter.maass@theintercept.com","image_350":"https://theintercept.com/wp-uploads/sites/1/2014/02/Peter-Mass-Hi-Res-Original-2_350.jpg","twitter":"@maassp","facebook":"","pgp_key":"Peter Maass Public Key","pgp_file":"https://firstlook.org/wp-uploads/sites/1/2014/05/PeterMassPGP.asc","pgp_fingerprint":"0C49 0F9D 179E 263F 9FFE 5080 2198 F5B7 D4E5 391A","user_title":"Senior Editor","user_group":"","nicename":"peter-maass"}],"excerpt_type":"","is_feature":"","feature_title":"","is_blog":false,"blog_title":"","comments_number":"12","bitly_url":"http://interc.pt/1LmgDv3","comments_open":true,"is_banner_hidden":false,"featured_video_url":"","meta":{"links":[]},"layout":"default","banner_videokey":"","post_type":"squirrel","share_twitter_text":"Firing Blind: Critical intelligence failures and the limits of drone technology","yoast_wpseo_canonical":"https://theintercept.com/drone-papers/firing-blind/","yoast_wpseo_general_title":"Firing Blind: Critical intelligence failures and the limits of drone technology","yoast_wpseo_general_description":"","yoast_wpseo_facebook_title":"Firing Blind: Critical intelligence failures and the limits of drone technology","yoast_wpseo_facebook_description":"","yoast_wpseo_facebook_thumbnail":"","yoast_wpseo_twitter_title":"Firing Blind: Critical intelligence failures and the limits of drone technology","yoast_wpseo_twitter_description":"","yoast_wpseo_twitter_thumbnail":"","squirrel_subhead":"Flawed Intelligence and the Limits of Drone Technology","squirrel_intro":"The Obama administration has portrayed drones as an effective and efficient weapon in the ongoing war with al Qaeda and other radical groups. Yet classified Pentagon documents obtained by \u003cem>The Intercept\u003c/em> reveal that the U.S. military has faced “critical shortfalls” in the technology and intelligence it uses to find and kill suspected terrorists in Yemen and Somalia.","squirrel_num":"6","squirrel_top_text_color":"black","squirrel_top_meta_color":"black","squirrel_intro_bg_color":"red","squirrel_intro_text_color":"black","squirrel_subhead_offset":"0","squirrel_homepage_hero_location":3,"squirrel_videokey":""},"40302":{"ID":40302,"title":"The Life and Death of Objective Peckham","slug":"the-life-and-death-of-objective-peckham","excerpt":"For years Bilal el-Berjawi traveled freely from the U.K. to Somalia under the watchful eyes of intelligence services. Then the U.S. killed him with a drone strike.","content":"\u003cp>\u003cu>\u003cspan class=\"dropcap\">A\u003c/span> SMALL AND STOCKY\u003c/u> British-Lebanese citizen with a head of thick dark hair, Berjawi had grown up much like any other young boy in the United Kingdom’s capital city, attending school during the day and playing soccer with friends in his free time. But by his early 20s he was leading no ordinary life. He was suspected of having cultivated ties with senior al Qaeda militants in East Africa, his British citizenship was abruptly revoked, and he was placed on a U.S. kill list.\u003c/p>\n\u003cp>In January 2012, Berjawi met his sudden end, about 10 miles northwest of Mogadishu, when a missile crashed into his white car and blasted it beyond recognition.\u003c/p>\n\u003cp>At the time of Berjawi’s death, the Associated Press \u003ca href=\"http://www.sandiegouniontribune.com/news/2012/jan/21/officials-us-drone-strike-killed-somali-insurgent/\">reported\u003c/a> that the missile strike targeting him had been carried out by a drone, citing an anonymous U.S. official. \u003cem>The Economist\u003c/em> \u003ca href=\"http://www.economist.com/blogs/baobab/2012/01/shabab-somalia\">criticized\u003c/a> the secrecy surrounding the attack and questioned whether it had amounted to a “very British execution.”\u003c/p>\n\u003cp>Now, a classified U.S. document obtained by \u003cem>The Intercept\u003c/em> shines new light on the circumstances surrounding Berjawi’s death. It reveals that the U.S. government was monitoring him for at least five years as he traveled between London and Somalia; that he was targeted by a covert special operations unit running a fleet of more than two dozen drones, fighter jets, and other aircraft out of East Africa; and that cellphone surveillance facilitated the strike that killed him.\u003c/p>\n\u003cdiv class='img-wrap align-right width-fixed' style='width:1024px'>\u003ca href=\"/wp-uploads/sites/1/2015/10/1.jpg\">\u003cimg class=\"alignright size-large wp-image-6515\" src=\"/wp-uploads/sites/1/2015/10/1-1024x575.jpg\" alt=\"\" />\u003c/a>\u003c/p>\n\u003cp class=\"caption\">A video produced by al Shabaab purports to show Berjawi&#8217;s mangled vehicle in the aftermath of the drone strike that killed him on Jan. 21, 2012.\u003c/p>\n\u003cp>\u003c/div>\n\u003cp>The document, a \u003ca href=\"https://theintercept.com/document/2015/10/14/small-footprint-operations-2-13/#page-22\">case study\u003c/a> included in a secret 2013 report by the Pentagon’s Intelligence, Surveillance, and Reconnaissance Task Force, does not mention Berjawi by name, instead referring to a target code-named “Objective Peckham.” But it contains enough specific details about the target’s movements and the time and place of the attack that killed him to confirm his identity beyond doubt.\u003c/p>\n\u003cp>\u003cem>The Intercept\u003c/em> has pieced together the final years of Berjawi’s life based on the Pentagon case study, public records, interviews with individuals who knew him, and a \u003ca href=\"https://www.documentcloud.org/documents/2455966-bilal-el-berjawi-abu-omar-cage-interview-april.html\">transcript\u003c/a> of a long conversation Berjawi had in April 2009 with members of \u003ca href=\"http://www.cageuk.org/\">Cage\u003c/a>, a London-based rights group, in which he discussed his encounters with security agencies in the U.K. and Kenya.\u003c/p>\n\u003cp>The story of Berjawi’s life and death raises new questions about the British government’s role in the targeted assassination of its own citizens — also providing unique insight into covert U.S. military actions in the Horn of Africa and their impact on al Qaeda and its affiliate in the region, al Shabaab.\u003c/p>\n\u003cdiv class='img-wrap align-none width-auto' style='width:auto'>\u003ca href=\"/wp-uploads/sites/1/2015/10/Testa.London.004.jpg\">\u003cimg class=\"aligncenter size-large wp-image-6516\" src=\"/wp-uploads/sites/1/2015/10/Testa.London.004-1024x682.jpg\" alt=\"UK. London. 29th September 2015. Church St Market on the Edgware Road. Andrew Testa for the Intercept\" />\u003c/a>\u003c/p>\n\u003cp class=\"caption overlayed\">Church Street Market near Edgware Road, northwest London. Sept. 29, 2015.\u003c/p>\n\u003cp>\u003cp class='caption source pullright' style=''>Photo: Andrew Testa for The Intercept\u003c/p>\u003c/div>\n\u003cp>&nbsp;\u003c/p>\n\u003cp>\u003cu>\u003cspan class=\"dropcap\">B\u003c/span>ERJAWI — WHO WAS KNOWN\u003c/u> by a variety of other names, including Bilal Abul-Jariya, Abu Omar, and Abu Hafsa — spent his youth in the St. John&#8217;s Wood district of northwest London, living in an apartment a short walk from Abbey Road Studios. He was a baby when his mother moved him, along with his sister and brother, to the United Kingdom.\u003c/p>\n\u003cp>According to Berjawi’s own account of his upbringing, provided to Cage and reviewed by \u003cem>The Intercept\u003c/em>, he was born in Lebanon in 1990 and came to London the same year. But passport records uncovered by Ugandan media indicate that he may in fact have been born in September 1984, which would make him 27 at the time of his death.\u003c/p>\n\u003cp>As a teenager, Berjawi hung around with his friends on London’s busy Edgware Road and frequented some of the shisha bars and Lebanese food stores scattered across the area.\u003c/p>\n\u003cp>Tam Hussein, a former youth worker for a community organization in north London, met Berjawi for the first time around 2003. Berjawi was 16 or 17 at the time, according to Hussein. “He was a good kid back then,” Hussein told me. “But he was a roughneck, he was a fighter. That’s what he was known for.”\u003c/p>\n\u003cp>Hussein recalled that Berjawi was associated with a Muslim gang in north London that was embroiled in fights with rival Irish youths. But he saw no sign that Berjawi was involved in anything other than unruly teenage behavior.\u003c/p>\n\u003cp>On one occasion, Berjawi and a group of his friends were given the opportunity to go on a vacation overseas, funded by the community organization Hussein worked for. Hussein recalls that the group chose a holiday resort in Benidorm, on the east coast of Spain, where they were thrown out of a hotel for being too raucous.\u003c/p>\n\u003cp>“They got up to such craziness, smashed up a hotel room,” Hussein said. “I never saw him [Berjawi] drinking, but obviously he got up to — he liked all the stuff that young guys like, partying and stuff like that.”\u003c/p>\n\u003cp>The period between 2003 and 2006 appears to have been a crucial and formative time in Berjawi’s life, when he transitioned from partying in Spain and playing soccer in London parks to joining up with al Qaeda-affiliated militants in Somalia.\u003c/p>\n\u003cp>According to the \u003ca href=\"https://theintercept.com/document/2015/10/14/small-footprint-operations-2-13/#page-22\">Pentagon case study\u003c/a>, in 2006 Berjawi left London for a short period and attended a training camp called “Bayt al-Jinn,” where he received explosives training. He then “returned to the U.K. and provided financial support to AQ allied elements in East Africa.”\u003c/p>\n\u003cp>The case study does not specify the location of the Bayt al-Jinn camp. However, a previously secret detainee report on a Kenyan terror suspect held at Guantánamo, \u003ca href=\"https://wikileaks.org/gitmo/prisoner/10025.html\">published by WikiLeaks\u003c/a> in 2011, mentions a “Bayt Jinn House” in Mogadishu that was allegedly frequented by international al Qaeda operatives in the region. The Guantánamo report also states that a group known as the “London boys” — of which Berjawi was a member — attended a training camp in Mogadishu in the fall of 2006.\u003c/p>\n\u003cp>The U.S. government accounts are corroborated by a \u003ca href=\"http://jihadology.net/2013/04/15/new-release-biography-of-the-martyred-figures-in-east-africa-5-bilal-al-birjawi-al-lubnani-abu-%E1%B8%A5af%E1%B9%A3/\">martyrdom biography\u003c/a> of Berjawi published on jihadi Internet forums after his death, which states that he “joined with the Mujahideen in Somalia during the time of the Islamic Courts Union,” referring to a coalition of Sharia courts that gained control of large parts of Somalia in 2006. There he attended his “first training,” according to the biography, then returned to the U.K., where he took responsibility for “the collection of funds and its delivery.”\u003c/p>\n\u003cdiv class='img-wrap align-bleed width-auto' style='width:auto'>\u003ca href=\"/wp-uploads/sites/1/2015/10/Testa.London.015.jpg\">\u003cimg class=\"aligncenter size-large wp-image-6517\" src=\"/wp-uploads/sites/1/2015/10/Testa.London.015-1024x682.jpg\" alt=\"UK. London. 29th. September 2015. Abbey Road\" />\u003c/a>\u003c/p>\n\u003cp class=\"caption overlayed\">Abbey Road in St. John&#8217;s Wood, London. Sept. 29, 2015.\u003c/p>\n\u003cp>\u003cp class='caption source' style=''>Photo: Andrew Testa for The Intercept\u003c/p>\u003c/div>\n\u003cp>&nbsp;\u003c/p>\n\u003cp>\u003cu>\u003cspan class=\"dropcap\">A\u003c/span>FTER RETURNING FROM\u003c/u> Somalia in 2006, Berjawi does not appear to have had any direct contact with British police or security agencies. Despite his apparent instruction at an al Qaeda-affiliated camp, he was not arrested on his way back to England, suggesting that intelligence collected by the U.S. about his whereabouts might not have been immediately shared with British agencies. Lynne Arnold, a spokesperson for London&#8217;s Metropolitan Police, declined to answer questions for this story, saying she was &#8220;not able to discuss&#8221; why Berjawi was not arrested or whether U.S. authorities had shared any information about him.\u003c/p>\n\u003cp>According to the interview conducted by Cage, which campaigns on behalf of terrorism suspects who are denied legal rights, Berjawi did not begin to notice that British authorities were interested in him until about 2007.\u003c/p>\n\u003cp>That year, counterterrorism forces in Nairobi detained two of Berjawi’s friends from London, who had fled Somalia after war broke out with Ethiopia. The pair were later released without charge. Upon their return to London, the men told Berjawi that during their detention in Kenya, British agents had questioned them and shown them his photograph.\u003c/p>\n\u003cp>“That’s when I realized myself I was starting to be followed,” Berjawi said. “I would see someone — the same person — following me, wherever I was. The same car — I actually even memorized the number plate.”\u003c/p>\n\u003cp>Berjawi’s suspicions appear to have been further confirmed between 2007 and 2008. During a trip to Lebanon, he was stopped at a Lebanese airport and questioned about why he had traveled to the country. He told the authorities he was visiting family, gave them a phone number for his uncle, and eventually they let him through. Berjawi was interrogated again on his way out of Lebanon, but arrived back in London without any problems. A few days after his return, however, Berjawi called his uncle and learned that he had been approached by Lebanese counterterrorism agents, who had been asking questions about him.\u003c/p>\n\u003cp>&nbsp;\u003c/p>\n\u003cp>\u003cu>\u003cspan class=\"dropcap\">B\u003c/span>Y EARLY 2009, BERJAWI\u003c/u> was working in London with his stepfather as a plumber and air-conditioning engineer. He had gotten married, had a baby girl, and his wife was pregnant with another child, this time a boy. But Berjawi was still on the radar of security agencies, and he was about to experience his first serious interrogation.\u003c/p>\n\u003cp>With a childhood friend named Mohamed Sakr, Berjawi arranged a trip to Kenya. According to his account, he wanted to go on a wildlife safari, but counterterrorism officials in Kenya suspected otherwise. When he arrived in the Mombasa airport, Berjawi was stopped and questioned. He was permitted into the country, but noticed a man of Somali origin following him everywhere, whom he suspected was some sort of spy.\u003c/p>\n\u003cblockquote class='stylized pull-none'>“Wherever I go to eat, whatever safari park we go to, he’s always there on his phone,” Berjawi told Cage. “When I stop, he stops; when I walk, he walks.”\u003c/blockquote>\n\u003cp>After a few days in Mombasa, Berjawi and Sakr traveled to Nairobi, perhaps in an effort to avoid the man they believed was tailing them. When they arrived, the pair stayed at the family home of Naji Mansour, an American citizen living in Nyari, an affluent Nairobi neighborhood located near the United Nations Africa headquarters.\u003c/p>\n\u003cp>Mansour, who was 32 at the time, lived with his wife and two children in a large house in a compound with its own gym, games room, and garden. The main part of the house had four bedrooms, but there were two additional bedrooms in a separate wing that the family kept for guests.\u003c/p>\n\u003cp>Recalling how he first came into contact with Berjawi and Sakr, Mansour told me that he put them up as a favor to a friend named Mohamed, whom he had met in Dubai while working briefly for a tech company there that provided information security services.\u003c/p>\n\u003cp>According to Mansour, Berjawi and Sakr claimed they had traveled to Kenya to research a substance known as “miraa” — or khat — an amphetamine-like stimulant grown and consumed in the Horn of Africa and the Arabian Peninsula. Mansour’s first impression of the pair was that they were “regular Joes.” They lounged around the house, watched movies, played games with his children, and occasionally prayed. “But they didn’t seem like hardcore, staunch Muslims,” Mansour said.\u003c/p>\n\u003cp>At first, Berjawi and Sakr said they would only need a place to stay for a few days. But a few days soon turned into a week. When Mansour asked about their plans, he was told they were waiting for some money to be sent to them before they moved on.\u003c/p>\n\u003cp>“I didn’t feel like they were a threat in any way, even when they overstayed,” said Mansour. “The only strange thing that I noticed from them the whole time is that it seemed like they weren’t trying to go out; they weren’t trying to leave the house.”\u003c/p>\n\u003cdiv class='img-wrap align-bleed width-auto' style='width:auto'>\u003cimg class=\"alignright size-thumbnail wp-image-6609\" src=\"/wp-uploads/sites/1/2015/10/PeckhamJourney01.png\" alt=\"\" />\u003cp class='caption source' style=''>Illustration: The Intercept\u003c/p>\u003c/div>\n\u003cp>&nbsp;\u003c/p>\n\u003cp>Suddenly, about two weeks into their stay, in February 2009, Kenyan anti-terror police surrounded Mansour’s Nairobi house. Berjawi was playing pool in the games room when he heard a loud series of knocks at the door. He peered through a curtain and saw heavily armed Kenyan officers, a helicopter flying above, and lots of cars. The police then stormed the property, told Berjawi to get on the floor, and pointed a gun at his head while he was searched.\u003c/p>\n\u003cp>Berjawi told Cage that he and Sakr were handcuffed, taken to the anti-terror police headquarters, and placed in separate cells. Berjawi described his cell as a “black hole” with “no pillows, no light, nothing,” and said that when he asked for food a guard told him that he had to drink his own urine.\u003c/p>\n\u003cp>Later that day, Berjawi said he was taken from his cell through a long dark corridor to a private room. He was dazzled by the bright lights when the door opened, but when his eyes regained focus he could see about five men, dressed smartly in suits.\u003c/p>\n\u003cp>“They looked like professional people, y’know, they didn’t look like they belonged there,” Berjawi later recalled. “You could tell the difference between them and the guards that were working there. With the guards you can smell the sweat on them, and some of them were even drunk.”\u003c/p>\n\u003cp>Berjawi said the men accused him of being an al Qaeda suicide bomber who had come to Kenya as part of a plot to attack the Israeli Embassy and an Israeli-owned supermarket. He denied the allegations and requested a lawyer. “My friend, this is Africa,” he recalled being told. “In Africa, the only thing we can give you is black magic.”\u003c/p>\n\u003cp>For four days, Berjawi and Sakr were held in custody and repeatedly interrogated. According to Berjawi, when he was eventually given some food, a porridge-like dish called “ugali,” the guards had sprinkled it with cigarette ash. He claimed they also asked him if he was gay and insinuated that they were going to send in a man who would rape him. Toward the end of the ordeal, Berjawi said that both he and Sakr endured several mock executions. “They just threw us out the car in the forest, and we heard ‘tchck-tchk’— you know, the noise was there, and then I’d feel a gun to the back of my head, like that, but &#8230; nothing. Then they’d just all laugh, pick us back up, throw us back into the car, then they’d drive again. They did this twice or three times.”\u003c/p>\n\u003cp>(Kenya’s National Police Service, the authority responsible for law enforcement in the country, did not respond to requests for comment on this story.)\u003c/p>\n\u003cp>&nbsp;\u003c/p>\n\u003cp>\u003cu>\u003cspan class=\"dropcap\">A\u003c/span>CCORDING TO BERJAWI,\u003c/u> there were no British agents present during his interrogations in Kenya. He did believe, however, that British government operatives were feeding questions to the Kenyans, who seemed to know many highly specific details about his life in London, such as his daughter’s name, where he played soccer, the names of his friends, and which mosque he attended.\u003c/p>\n\u003cp>On the final day of his detention, a woman Berjawi said was from the British Embassy visited him, asked how he was doing, and handed him some forms to fill out. Shortly afterward, he was released. Together with Sakr, Berjawi was flown back to London accompanied by four Kenyan agents.\u003c/p>\n\u003cp>When the plane touched down, an announcement came over the speakers instructing all passengers to remain in their seats. A large group of “big white built men came on the plane with suits,&#8221; Berjawi later recounted. &#8220;One of them directly looked at me and smiled, and he called me, ‘Bilal, would you like to stand up?’”\u003c/p>\n\u003cp>The men ushered Berjawi and Sakr off the plane, at which point the friends were separated. The men told Berjawi they were from the British domestic security agency, MI5.\u003c/p>\n\u003cp>Over a period of about 10 hours, the agents interrogated him about his visit to Kenya and warned him he was not allowed to decline to answer their questions, suggesting he was detained under a British law, the \u003ca href=\"http://www.legislation.gov.uk/ukpga/2000/11/schedule/7\">Terrorism Act\u003c/a>, which makes it a criminal offense to respond with “no comment.”\u003c/p>\n\u003cp>The British agents snapped photographs of Berjawi and took his fingerprints. He recalled that they were apologetic, telling him, “We have to do this.” But he was left feeling aggrieved; after interrogating him, the agents took his money and shoes, handed him his clothes in a garbage bag, and left him alone in the airport, barefoot, without any means to return to his home in northwest London.\u003c/p>\n\u003cblockquote class='stylized pull-none'>A few weeks later, Berjawi called his uncle in Lebanon, who described receiving another visit from counterterrorism agents. This time, the agents informed him that Berjawi was “involved in al Qaeda,” based on “information from Britain.” They emphasized that his nephew shouldn’t return to Lebanon or there would be problems.\u003c/blockquote>\n\u003cp>Meanwhile, Berjawi began to suspect that he was being followed each time he set foot outside his London home. On one occasion, shortly after he returned from Kenya, he went out to the supermarket and noticed two men who he believed were tailing him. On the street, he bumped into an old friend and stopped for a quick conversation. Berjawi said that the two men subsequently approached his friend, who was taken away in a car to a nearby police station and interrogated.\u003c/p>\n\u003cp>The increased scrutiny appears to have agitated and unsettled Berjawi, though he still had not been arrested in the U.K. or charged with any crimes.\u003c/p>\n\u003cp>In April 2009, he approached Cage to complain that he was being “harassed” by security services, according to the transcript of the meeting \u003ca href=\"https://www.documentcloud.org/documents/2455966-bilal-el-berjawi-abu-omar-cage-interview-april.html\">shared with\u003c/a> \u003cem>The Intercept.\u003c/em>\u003c/p>\n\u003cp>“I don’t want to be harassed, followed — I feel intimidated, I’ve got a lot of side effects, you know,” Berjawi told the advocacy group. “My friends have been scared away from me because they’ve been approached. I feel isolated. &#8230; It’s becoming a bit too much.”\u003c/p>\n\u003cdiv class='img-wrap align-bleed width-auto' style='width:auto'>\u003cimg class=\"aligncenter size-large wp-image-6525\" src=\"/wp-uploads/sites/1/2015/10/Testa.London.011-1024x682.jpg\" alt=\"\" />\u003c/p>\n\u003cp class=\"caption overlayed\">Church Street Market near Edgware Road, northwest London. Sept. 29, 2015.\u003c/p>\n\u003cp>\u003cp class='caption source' style=''>Photo: Andrew Testa for The Intercept\u003c/p>\u003c/div>\n\u003cp>&nbsp;\u003c/p>\n\u003cp>\u003cu>\u003cspan class=\"dropcap\">W\u003c/span>ITHIN SIX MONTHS,\u003c/u> in October 2009, both Berjawi and his friend Sakr were back in Somalia. A year later, in September 2010, the British government revoked the passports of both men under the British Nationality Act, severing its legal obligations to uphold their rights as citizens, a move that may have paved the way for their assassination.\u003c/p>\n\u003cp>Berjawi wanted to appeal the decision to revoke his passport, and in October 2010 sent an email to a contact at Cage asking the organization to instruct his lawyer, Saghir Hussain, to represent him in the case. Hussain told me that there were difficulties filing the appeal, primarily because of security concerns about talking over the phone to Berjawi in Somalia.\u003c/p>\n\u003cblockquote class='stylized pull-none'>“I said to his family, ‘Look, I can’t guarantee that while he’s communicating with us he won’t be droned and killed,’” Hussain recalled. “That’s why it was decided that it was too risky for us to carry on.”\u003c/blockquote>\n\u003cp>As it turned out, Hussain’s concerns were well-founded.\u003c/p>\n\u003cp>Since 2006, according to the secret Pentagon study, a covert Joint Special Operations Command unit known as TF 48-4 had been keeping close tabs on Berjawi’s movements. He had been featured on a so-called baseball card, used by the U.S. government to encapsulate information about candidates for assassination, and had thus entered a process for kill or capture known as “find, fix, finish,” or FFF.\u003c/p>\n\u003cdiv class='img-wrap align-right width-fixed' style='width:756px'>\u003cimg class=\"alignright size-large wp-image-6528\" src=\"/wp-uploads/sites/1/2015/10/note-2-756x1024.jpg\" alt=\"\" />\u003c/p>\n\u003cp class=\"caption\">A note written by Berjawi in October 2010, after his U.K. citizenship was revoked. No appeal was filed, and he was killed by a U.S. drone strike on Jan. 21, 2012.\u003c/p>\n\u003cp>\u003c/div>\n\u003cp>By December 2009, the document alleges, Berjawi was helping to “facilitate money, equipment, and fighters” through the U.K. to Somalia. Throughout 2010, the U.S. government collected intelligence on him through intercepted communications, and before long operators pinpointed his location.\u003c/p>\n\u003cp>On June 23, 2011, Berjawi was tracked to an area near Kismayo, a port city some 250 miles from Mogadishu. The special operations unit launched a missile strike, according to the document, but it was unsuccessful due to a malfunction and other problems related to “approval authorities.”\u003c/p>\n\u003cp>Although Berjawi was not killed, he may have been wounded in the attack or in another carried out around the same time. On June 24, the Associated Press \u003ca href=\"http://www.huffingtonpost.com/huff-wires/20110624/af-somalia/\">reported\u003c/a> a missile strike late the previous day on a convoy of al Qaeda-linked militants near Kismayo, which injured two or three of the fighters.\u003c/p>\n\u003cp>Two weeks later, Somali media \u003ca href=\"https://web.archive.org/web/20110713055710/http://www.raxanreeb.com/?p=102606\">reported\u003c/a> that Berjawi, a “senior officer” with al Qaeda, was believed to have been injured in an attack and had traveled to Kenya for medical treatment.\u003c/p>\n\u003cp>It was not until the following year that U.S. forces again identified Berjawi’s location.\u003c/p>\n\u003cdiv class='img-wrap align-center width-auto' style='width:auto'>\u003cimg class=\"alignnone size-thumbnail wp-image-6658\" src=\"/wp-uploads/sites/1/2015/10/37.jpg\" alt=\"\" />\u003c/p>\n\u003cp class=\"caption\">A secret case study details the surveillance and assassination of “Objective Peckham,” Bilal el- Berjawi, in January 2012.\u003c/p>\n\u003cp>\u003cp class='caption source pullright' style=''>APG = Aerial Precision Geolocation; FFF = Find, Fix, Finish; FMV = Full Motion Video; HUMINT = Human Intelligence; SIGINT = Signals Intelligence\u003c/p>\u003c/div>\n\u003cp>&nbsp;\u003c/p>\n\u003cp>\u003cu>\u003cspan class=\"dropcap\">A\u003c/span>CCORDING TO THE SECRET\u003c/u> Pentagon document, titled “FFF Timeline: Objective Peckham Case Study,” on January 21, 2012, Berjawi’s white SUV was observed at 3:59 a.m., presumably by drone, and his movements were tracked over several hours in an area a few miles northwest of Mogadishu, between the towns of Afgooye and Ceelasha.\u003c/p>\n\u003cp>The case study timeline describes an “adult with heavy strides and slight limp (OBJ PECKHAM)” at 5:02 a.m. Three hours later, at 8:11 a.m., a “vehicle follow begins.” At 10:39 a.m. the timeline shows that surveillance equipment logged a “Full Register/Match” of a cellphone in the target area, meaning the unique identifying codes of a SIM card and handset associated with Berjawi had been confirmed by the special operations unit.\u003c/p>\n\u003cp>Twenty-four minutes later, at 11:03 a.m., Bilal el-Berjawi, otherwise known as Objective Peckham, “was eliminated via kinetic strike,” the entire front half of his vehicle mangled by the explosion.\u003c/p>\n\u003cp>The timeline of the strike, oddly, shows another match with the cellphone at 11:31 a.m. The drone continued “to monitor the scene.”\u003c/p>\n\u003cp>The following day a spokesperson for al Shabaab calling himself Sheikh Ali Mohamud Rage \u003ca href=\"http://panafricannews.blogspot.fr/2012/01/british-citizen-killed-by-us-military.html\">confirmed\u003c/a> the death of Berjawi, whom he described as a senior al Qaeda commander in Somalia. Rage said that Berjawi had been killed by a U.S. drone, and vowed revenge for the killing. He added: “We take his death as congratulation, thanks to Allah. &#8230; His martyrdom dream has just become true.”\u003c/p>\n\u003cp>As news of Berjawi’s demise spread, it fueled paranoia within elements of al Qaeda in Somalia. Seven months prior to his death, al Qaeda’s chief in East Africa, Fazul Abdullah Mohammed, had also \u003ca href=\"http://www.theguardian.com/world/2011/jun/11/al-qaida-bomber-fazul-abdullah-mohammed-killed\">been killed\u003c/a>. Berjawi was said to have been close to Mohammed, and perhaps was his successor, so when he too died in a sudden attack there were suspicions that al Shabaab was carrying out some kind of clandestine coup.\u003c/p>\n\u003cp>Some news reports out of Kenya initially suggested the attack on Berjawi was an “\u003ca href=\"https://web.archive.org/web/20121020083857/http://allafrica.com/stories/201201250052.html\">inside job\u003c/a>,” and that he had been assassinated due to a power struggle. \u003ca href=\"http://www.somaliareport.com/index.php/post/2749/Al_Qaeda_Al-Shaabab_Pledge_AllegianceAgain\">Subsequently\u003c/a>, one Somali outlet reported that at least 100 foreign al Qaeda fighters in Somalia had fled the country, partly due to leadership squabbles.\u003c/p>\n\u003cp>“It is true that those brothers left us and went to Yemen due to some minor internal misunderstandings amongst ourselves,” an al Shabaab spokesperson was quoted as saying at the time. “This started when we lost our brother, Bilal el-Berjawi, on January 21.”\u003c/p>\n\u003cp>Once it became apparent that Berjawi had in fact been killed in a U.S. drone strike, the groups appear to have settled their differences and strengthened their alliance. Three weeks after Berjawi’s death, the leaders of both al Qaeda and al Shabaab appeared in a video together. Al Shabaab \u003ca href=\"http://edition.cnn.com/2012/02/09/world/africa/somalia-shabaab-qaeda/\">pledged\u003c/a> its allegiance to al Qaeda and vowed that it would “march with you as loyal soldiers.”\u003c/p>\n\u003cdiv class='img-wrap align-none width-auto' style='width:auto'>\u003cimg class=\"alignnone size-large wp-image-6529\" src=\"/wp-uploads/sites/1/2015/10/Testa.London.002-1024x682.jpg\" alt=\"UK. London. 29th September 2015 Lisson Grove Andrew Testa for the Intercept\" />\u003c/p>\n\u003cp class=\"caption\">Lisson Grove in northwest London. Sept. 29, 2015.\u003c/p>\n\u003cp>\u003cp class='caption source pullright' style=''>Photo: Andrew Testa for The Intercept\u003c/p>\u003c/div>\n\u003cp>&nbsp;\u003c/p>\n\u003cp>\u003cu>\u003cspan class=\"dropcap\">S\u003c/span>HORTLY BEFORE BERJAWI\u003c/u> was killed, his wife back in London had given birth to a new baby boy. She is believed to have spent time with Berjawi in Somalia but had returned to London in 2011.\u003c/p>\n\u003cp>Upon hearing about the birth of his third child, Berjawi reportedly phoned his wife while she was in the hospital, hours before he was killed. Relatives speculated that it was this phone call that had exposed him as a target for the drone strike. That seems unlikely, however. According to the timeline obtained by \u003cem>The Intercept, \u003c/em>Berjawi’s location had already been established by the covert special operations unit nine days prior to the lethal attack. Cellphone surveillance helped pinpoint him on the day he died, but it is unclear whether the phone in question belonged to Berjawi, or whether it had been covertly placed in his vehicle by someone else to aid the strike.\u003c/p>\n\u003cp>Six months after Berjawi’s death, in July 2012, al Shabaab \u003ca href=\"http://www.washingtontimes.com/news/2012/jul/22/al-shabab-executes-3-members/\">publicly executed\u003c/a> three men accused of helping British and American spy agencies kill Berjawi. In a propaganda video, the alleged informants confessed to having hidden a cellphone in Berjawi’s vehicle so that he could be tracked and bombed. One of the accused informants, Isaac Omar Hassan, said a man working with the CIA in Mogadishu handed him a Nokia X2 cellphone and an envelope containing $4,000 cash. He was asked to place the phone in Berjawi’s vehicle and make sure it was turned on when requested, which he said he did on the day Berjawi was targeted.\u003c/p>\n\u003cp>&nbsp;\u003c/p>\n\u003cp>\u003cu>\u003cspan class=\"dropcap\">B\u003c/span>ERJAWI&#8217;S CHILDHOOD FRIEND\u003c/u> Mohamed Sakr, whom he had traveled with on his trips to Kenya and Somalia, met a similar fate.\u003c/p>\n\u003cp>In February 2012, about a month after Berjawi’s demise, Sakr was also killed in a reported U.S. drone strike in Somalia.\u003c/p>\n\u003cp>The revocation of Berjawi’s and Sakr’s British passports prior to their deaths by U.S. drone strike has \u003ca href=\"https://www.thebureauinvestigates.com/2013/02/27/former-british-citizens-killed-by-drone-strikes-after-passports-revoked/\">raised questions\u003c/a> about whether the British government was secretly complicit in their assassination.\u003c/p>\n\u003cp>Ben Stack, a spokesperson for the U.K. \u003ca href=\"https://www.gov.uk/government/organisations/home-office\">Home Office\u003c/a>, declined to comment for this story when asked whether the passports were revoked as part of a coordinated sequence of events that culminated in deadly attacks by U.S. special operations forces. “We don’t routinely comment on security matters,” he said.\u003c/p>\n\u003cdiv class='img-wrap align-right width-fixed' style='width:300px'>\u003cimg class=\"alignright size-medium wp-image-6530\" src=\"/wp-uploads/sites/1/2015/10/6-300x153.jpg\" alt=\"\" />\u003c/p>\n\u003cp class=\"caption\">Bilal el-Berjawi holding an AK-47 rifle in a martyrdom video produced after his death by al Shabaab&#8217;s media wing.\u003c/p>\n\u003cp>\u003c/div>\n\u003cp>Kat Craig, a lawyer with the London-based human rights group \u003ca href=\"http://www.reprieve.org.uk/\">Reprieve\u003c/a>, told me that she believed there was “mounting evidence” that the British government has used “citizenship-stripping” as a tactic to remove legal obstacles to killing people suspected of becoming affiliated with terrorist groups.\u003c/p>\n\u003cp>“If the U.K. government had any role in these men’s deaths — including revocation of their citizenship to facilitate extra-judicial killings — then the public has a right to know,” Craig said. “Our government cannot be involved in secret executions. If people are accused of wrongdoing they should be brought before a court and tried. That is what it means to live in a democracy that adheres to the rule of law.”\u003c/p>\n\u003cp>Since 2006, the British government has reportedly \u003ca href=\"https://www.thebureauinvestigates.com/2014/12/10/what-do-we-know-about-citizenship-stripping/\">deprived\u003c/a> at least 27 people of their U.K. citizenship on national security grounds, deeming their presence “not conducive to the public good.” The power to revoke a person’s citizenship rests solely with a government minister, though the decision can be challenged through a controversial immigration court. When cases are brought on national security grounds, they are routinely based on secret evidence, meaning the accusations against individuals are withheld from them and their lawyers.\u003c/p>\n\u003cp>“The net effect of the practice,” according to Craig, is “not only to remove judicial oversight from a possible life and death decision, but also to close the doors of the court on anyone who seeks to expose some of the gravest abuses being committed by Western governments.”\u003c/p>\n\u003cp>There have \u003ca href=\"https://www.thebureauinvestigates.com/2015/09/07/raf-drone-strike-syria-deaths-means-at-least-10-britons-now-killed-by-drones-in-wests-war-on-terror/\">reportedly\u003c/a> been at least 10 British citizens killed in drone attacks as part of a covert campaign that, between 2008 and 2015, has gradually expanded from Pakistan to Somalia and now to Syria. Most recently, in late August, Islamic State computer hacker Junaid Hussain, a former resident of Birmingham, England, was \u003ca href=\"http://www.nytimes.com/2015/08/28/world/middleeast/junaid-hussain-islamic-state-recruiter-killed.html?_r=0\">assassinated\u003c/a> on the outskirts of Raqqa, Syria, by a U.S. strike. Several days earlier, in another attack near Raqqa, the U.K. government \u003ca href=\"http://www.theguardian.com/world/2015/sep/07/british-isis-militants-killed-raf-drone-strike-syria-reyaad-khan-ruhul-amin\">deployed\u003c/a> its own drones for the first time to target British citizens, killing Islamic State recruits Ruhul Amin and Reyaad Khan while they were traveling together in a car.\u003c/p>\n\u003cp>It remains unclear whether, like Berjawi and Sakr, these targets had their British passports revoked before they were killed. Stack, the Home Office spokesperson, would not discuss the citizenship status of Hussain, Amin, Khan, or other Brits killed by drones. “We don’t talk about individual cases and also we don’t comment on matters of national security,” he told me.\u003c/p>\n\u003cdiv class='img-wrap align-bleed width-auto' style='width:auto'>\u003cimg class=\"alignright size-large wp-image-6531\" src=\"/wp-uploads/sites/1/2015/10/Testa.London.016-1024x682.jpg\" alt=\"\" />\u003c/p>\n\u003cp class=\"caption overlayed\">Regent&#8217;s Park Mosque, northwest London. Sept. 29, 2015.\u003c/p>\n\u003cp>\u003cp class='caption source' style=''>Photo: Andrew Testa for The Intercept\u003c/p>\u003c/div>\n\u003cp>&nbsp;\u003c/p>\n\u003cp>\u003cu>\u003cspan class=\"dropcap\">A\u003c/span>ROUND THE COMMUNITY\u003c/u> in which Berjawi grew up, the reverberations of his life and death continue to be felt. Most recently, \u003ca href=\"http://www.bbc.com/news/uk-31641569\">news reports\u003c/a> have featured his name as a one-time associate of Mohammed Emwazi, better known as the masked Islamic State executioner nicknamed “Jihadi John.” Emwazi lived near Berjawi in northwest London, and a source familiar with his circle of friends told me that the pair had attended the same school. Emwazi was a few years younger than Berjawi and “looked up” to him, according to the source, who asked not to be named.\u003c/p>\n\u003cp>Several of Berjawi’s former friends still live and work in London but have distanced themselves from the controversy surrounding him. One of Berjawi’s closest former friends now works as a bus driver; another of his peers has since become an imam. Many, including Berjawi’s family members and neighbors, are reluctant to talk about him publicly.\u003c/p>\n\u003cp>On the quiet tree-lined street in London where Berjawi spent his youth, cars come and go and a new generation of children laugh and play games out on the sidewalk. At Berjawi’s old apartment, where some members of his family still live, there is a creased Arabic poster pinned to the door with a message for visitors. “Whoever believes in God and the Judgment Day,” it reads, “let him speak up, or remain silent.”\u003c/p>\n\u003cp>&nbsp;\u003c/p>\n\u003cp class=\"caption\">\u003cem>Top photo: Church Street Market near Edgware Road, London. Sept. 29, 2015. Andrew Testa for The Intercept\u003c/em>\u003c/p>\n\u003cp class=\"caption\">Additional reporting: \u003ca href=\"/staff/jeremy-scahill/\">\u003cimg class=\"sq-author\" src=\"https://prod01-cdn07.cdn.firstlook.org/wp-uploads/sites/1/2014/02/Jeremy-Scahill-Original_350_2.jpg\" alt=\"\" width=\"40\" /> Jeremy Scahill\u003c/a>\u003c/p>\n","link":"https://theintercept.com/drone-papers/the-life-and-death-of-objective-peckham/","thumbnail":{"ID":40309,"title":"","excerpt":"UK. London. 29th September 2015\nChurch St Market on the Edgware Road.\nAndrew Testa for the Intercept","content":"","credit":"Andrew Testa","sizes":{"feature_hero":{"path":"wp-uploads/sites/1/2015/10/Testa.London.006-feature-hero.jpg","width":1200,"height":800},"promo":{"path":"wp-uploads/sites/1/2015/10/Testa.London.006-promo.jpg","width":440,"height":220},"promo_large":{"path":"wp-uploads/sites/1/2015/10/Testa.London.006-promo-large.jpg","width":900,"height":450},"top_large":{"path":"wp-uploads/sites/1/2015/10/Testa.London.006-top-large.jpg","width":440,"height":440},"top_small":{"path":"wp-uploads/sites/1/2015/10/Testa.London.006-top-small.jpg","width":200,"height":200},"square":{"path":"wp-uploads/sites/1/2015/10/Testa.London.006-440x440.jpg","width":440,"height":440},"article_header":{"path":"wp-content/uploads/sites/1/2015/10/Testa.London.006.jpg","width":1400,"height":933},"original":{"path":"wp-uploads/sites/1/2015/10/Testa.London.006.jpg","width":"1400","height":"933"}}},"date":"2015-10-15T11:59:17+00:00","authors":[{"ID":13,"display_name":"Ryan Gallagher","url":"https://theintercept.com/staff/ryan-gallagher/","brief_bio":"Ryan Gallagher is a UK-based investigative journalist whose work is focused on government surveillance, technology, and civil liberties.","full_bio":"\u003cp>Ryan Gallagher is an award-winning Scottish journalist whose work at \u003cem>The Intercept\u003c/em> is focused on government surveillance, technology, and civil liberties. His reporting has appeared in publications including \u003cem>Slate\u003c/em>, \u003cem>The Guardian\u003c/em>, \u003cem>Ars Technica\u003c/em>, \u003cem>Huffington Post\u003c/em>, \u003cem>The Sydney Morning Herald\u003c/em>, \u003cem>The Financial Times\u003c/em>, \u003cem>The Independent\u003c/em>, and \u003cem>The New Statesman\u003c/em>. Since 2011, Ryan has broken a series of national and international stories about controversial surveillance technologies, shining a light on spy agencies and uncovering links between western technology firms and governments in repressive countries. He is a Future Tense Fellow at the New America Foundation and he graduated with a master’s degree from the University of Edinburgh in 2010.\u003c/p>\n","email":"ryan.gallagher@theintercept.com","image_350":"https://firstlook.org/wp-uploads/sites/1/2014/03/Ryan-Gallagher_avatar_1394910672-350x350.jpg","twitter":"@rj_gallagher","facebook":"","pgp_key":"Ryan Gallagher Public Key","pgp_file":"https://theintercept.com/wp-uploads/sites/1/2015/11/RyanGallagherPGP.asc","pgp_fingerprint":"1818 A67A CE48 F9A6 769B 2FA9 8E9D DDC9 16C0 4FB2","user_title":"Reporter","user_group":"","nicename":"ryan-gallagher"}],"excerpt_type":"","is_feature":"","feature_title":"","is_blog":false,"blog_title":"","comments_number":"101","bitly_url":"http://interc.pt/1Lc2WRk","comments_open":true,"is_banner_hidden":false,"featured_video_url":"","meta":{"links":[]},"layout":"default","banner_videokey":"","post_type":"squirrel","share_twitter_text":"Stripped of British citizenship and killed by an American drone","yoast_wpseo_canonical":"https://theintercept.com/drone-papers/the-life-and-death-of-objective-peckham/","yoast_wpseo_general_title":"Stripped of British citizenship and killed by an American drone","yoast_wpseo_general_description":"","yoast_wpseo_facebook_title":"Stripped of British citizenship and killed by an American drone","yoast_wpseo_facebook_description":"","yoast_wpseo_facebook_thumbnail":"","yoast_wpseo_twitter_title":"Stripped of British citizenship and killed by an American drone","yoast_wpseo_twitter_description":"","yoast_wpseo_twitter_thumbnail":"","squirrel_subhead":"Stripped of British citizenship and killed by an American drone","squirrel_intro":"As he walked through the busy streets of London, Bilal el-Berjawi was glancing over his shoulder. Everywhere he went, he suspected he was being followed. Within a few years — 4,000 miles away in remote Somalia — he would be dead, killed by a secret U.S. drone strike.","squirrel_num":"7","squirrel_top_text_color":"red","squirrel_top_meta_color":"black","squirrel_intro_bg_color":"white","squirrel_intro_text_color":"red","squirrel_subhead_offset":"3","squirrel_homepage_hero_location":3,"squirrel_videokey":""},"40407":{"ID":40407,"title":"The Drone Papers","slug":"drone-papers","excerpt":"The Intercept has obtained a cache of secret documents detailing the inner workings of the U.S. military’s assassination program in Afghanistan, Yemen, and Somalia. The documents, provided by a whistleblower, offer an unprecedented glimpse into Obama’s drone wars.","content":"","link":"https://theintercept.com/drone-papers/","thumbnail":{"ID":40439,"title":"","excerpt":"","content":"","credit":"","sizes":{"feature_hero":{"path":"wp-content/uploads/sites/1/2015/10/sq_share.jpg","width":1199,"height":627},"promo":{"path":"wp-uploads/sites/1/2015/10/sq_share-promo.jpg","width":440,"height":220},"promo_large":{"path":"wp-uploads/sites/1/2015/10/sq_share-promo-large.jpg","width":900,"height":450},"top_large":{"path":"wp-uploads/sites/1/2015/10/sq_share-top-large.jpg","width":440,"height":440},"top_small":{"path":"wp-uploads/sites/1/2015/10/sq_share-top-small.jpg","width":200,"height":200},"square":{"path":"wp-uploads/sites/1/2015/10/sq_share-440x440.jpg","width":440,"height":440},"article_header":{"path":"wp-content/uploads/sites/1/2015/10/sq_share.jpg","width":1199,"height":627},"original":{"path":"wp-uploads/sites/1/2015/10/sq_share.jpg","width":"1199","height":"627"}}},"date":"2015-10-15T11:56:48+00:00","authors":[{"ID":9,"display_name":"Jeremy Scahill","url":"https://theintercept.com/staff/jeremy-scahill/","brief_bio":"Jeremy Scahill is an investigative reporter and war correspondent.","full_bio":"\u003cp>Jeremy Scahill is one of the three founding editors of \u003cem>The Intercept\u003c/em>. He is an investigative reporter, war correspondent, and author of the international bestselling books \u003cem>Dirty Wars: The World Is a Battlefield \u003c/em>and \u003cem>Blackwater: The Rise of the World’s Most Powerful Mercenary Army\u003c/em>. \u003c!-- Read More --\>He has reported from Afghanistan, Iraq, Somalia, Yemen, Nigeria, the former Yugoslavia, and elsewhere across the globe. Scahill has served as the national security correspondent for \u003cem>The Nation \u003c/em>and \u003cem>Democracy Now!\u003c/em>.\u003c/p>\n\u003cp>Scahill&#8217;s work has sparked several congressional investigations and won some of journalism’s highest honors. He was twice awarded the prestigious George Polk Award, in 1998 for foreign reporting and in 2008 for \u003cem>Blackwater.\u003c/em> Scahill is a producer and writer of the award-winning film \u003cem>Dirty Wars\u003c/em>, which premiered at the 2013 Sundance Film Festival and was nominated for an Academy Award.\u003c/p>\n","email":"jeremy.scahill@theintercept.com","image_350":"https://theintercept.com/wp-uploads/sites/1/2014/02/Jeremy-Scahill-Original_350_2.jpg","twitter":"@jeremyscahill","facebook":"","pgp_key":"Jeremy Scahill Public Key","pgp_file":"https://firstlook.org/wp-uploads/sites/1/2014/05/JeremyScahillPGP.asc","pgp_fingerprint":"9FD2 A4D1 CEBF 2C31 EE1F B308 9F90 4CC8 45AA B390","user_title":"Co-founding Editor","user_group":"founding-editor","nicename":"jeremy-scahill"}],"excerpt_type":"","is_feature":"","feature_title":"","is_blog":false,"blog_title":"","comments_number":"0","bitly_url":"","comments_open":true,"is_banner_hidden":false,"featured_video_url":"","meta":{"links":[]},"layout":"","banner_videokey":"","post_type":"page","share_twitter_text":"","yoast_wpseo_canonical":"https://theintercept.com/drone-papers/","yoast_wpseo_general_title":"The Drone Papers: Secret documents detail the U.S. assassination program.","yoast_wpseo_general_description":"","yoast_wpseo_facebook_title":"","yoast_wpseo_facebook_description":"","yoast_wpseo_facebook_thumbnail":"","yoast_wpseo_twitter_title":"","yoast_wpseo_twitter_description":"","yoast_wpseo_twitter_thumbnail":""},"41072":{"ID":41072,"title":"U.S. Military Used Christian NGO as Front for North Korea Espionage","slug":"pentagon-missionary-spies-christian-ngo-front-for-north-korea-espionage","excerpt":"Leaving his own employees in the dark, the leader of an award-winning Christian NGO helped the Pentagon conduct espionage in North Korea while hiding the source of the organization's funding, according to sources interviewed for this special investigation.","content":"\u003cp>\u003cspan class=\"dropcap\">O\u003c/span>\u003cu>N MAY 10, 2007,\u003c/u> in the East Room of the White House, President George W. Bush presided over a ceremony honoring the nation’s most accomplished community service leaders. Among those collecting a President’s Volunteer Service Award that afternoon was Kay Hiramine, the Colorado-based founder of a multimillion-dollar humanitarian organization.\u003c/p>\n\u003cp>Hiramine’s NGO, Humanitarian International Services Group, or HISG, won special praise from the president for having demonstrated how a private charity could step in quickly in response to a crisis. “In the aftermath of Hurricane Katrina,” read Hiramine’s citation, “HISG’s team launched a private sector operation center in Houston that mobilized over 1,500 volunteers into the disaster zone within one month after the hurricane.”\u003c/p>\n\u003cp>But as the evangelical Christian Hiramine crossed the stage to shake hands with President Bush and receive his award, he was hiding a key fact from those in attendance: He was a Pentagon spy whose NGO was funded through a highly classified Defense Department program.\u003c/p>\n\u003cp>\u003cdiv class='img-wrap align-right width-fixed' style='width:300px'> \u003cimg class=\"alignright size-medium wp-image-41104\" src=\"https://theintercept.com/wp-uploads/sites/1/2015/10/boykin.jpg\" alt=\"Gen. William Boykin addresses the crowd during a speech at Colorado Christian University on Monday, May 2, 2011. AAron Ontiveroz, The Denver Post\" />\u003c/p>\n\u003cp class=\"caption\">Lt. Gen. William &#8220;Jerry&#8221; Boykin giving a speech at Colorado Christian University on Monday, May 2, 2011.\u003c/p>\n\u003cp>\u003cp class='caption source pullright' style=''>Photo: Aaron Ontieroz/Denver Post/Getty Images\u003c/p>\u003c/div>The secret Pentagon program, which dates back to December 2004, continued well into the Obama presidency. It was the brainchild of a senior Defense Department intelligence official of the Bush administration, Lt. Gen. William “Jerry” Boykin. Boykin, an evangelical Christian who ran into criticism \u003ca href=\"http://www.nytimes.com/2003/10/17/world/rumsfeld-praises-army-general-who-ridicules-islam-as-satan.html\">in 2003\u003c/a> for his statements about Islam, settled on the ruse of the NGO as he was seeking new and unorthodox ways to penetrate North Korea.\u003c/p>\n\u003cp>Long a source of great concern to the U.S. and Western Europe because of its nuclear program, North Korea was the most difficult intelligence target for the U.S. “We had nothing inside North Korea,” one former military official familiar with U.S. efforts in the country told me. “Zero.” But Hiramine’s NGO, by offering humanitarian aid to the country’s desperate population, was able to go where others could not.\u003c/p>\n\u003cp>It is unclear how many HISG executives beyond Hiramine knew about the operation; Hiramine did not respond to repeated requests for comment and neither did any of his senior colleagues. Few, if any, of the rest of the organization’s staff and volunteers had any knowledge about its role as a Pentagon front, according to former HISG employees and former military officials.\u003c/p>\n\u003cp>The revelation that the Pentagon used an NGO and unwitting humanitarian volunteers for intelligence gathering is the result of a monthslong investigation by \u003cem>The\u003c/em> \u003cem>Intercept\u003c/em>. In the course of the investigation, more than a dozen current and former military and intelligence officials, humanitarian aid workers, missionaries, U.S. officials, and former HISG staffers were interviewed. The U.S. government officials who were familiar with the Pentagon operation and HISG’s role asked for anonymity because discussing classified military and intelligence matters would put them at risk of prosecution. The Pentagon had no comment on HISG or the espionage operations in North Korea.\u003c/p>\n\u003cp>Before it was finally dismantled in 2013, Hiramine’s organization received millions in funding from the Pentagon through a complex web of organizations designed to mask the origin of the cash, according to one of the former military officials familiar with the program, as well as documentation reviewed for this article.\u003c/p>\n\u003cp>The use of HISG for espionage was “beyond the pale” of what the U.S. government should be allowed to do, said Sam Worthington, president of InterAction, an association of nearly 200 American NGOs. The practice of using humanitarian workers as spies “violates international principles” and puts legitimate aid and development workers at risk, he argued.\u003c/p>\n\u003cp>“It is unacceptable that the Pentagon or any other U.S. agency use nonprofits for intelligence gathering,” Worthington said. “It is a violation of the basic trust between the U.S. government and its civic sector.”\u003c/p>\n\u003ciframe width='100%' height='400px' src='//www.youtube.com/embed/_oLJtffyMSo?start=218&amp;end=275' frameborder='0' allowfullscreen>\u003c/iframe>\n\u003cp class=\"caption\">Kay Hiramine discussing his faith with Dave Yarnes and Gene Strite.\u003c/p>\n\u003cp>&nbsp;\u003c/p>\n\u003cp>\u003cspan class=\"dropcap\">H\u003c/span>\u003cu>ISG WAS ESTABLISHED\u003c/u> shortly after 9/11, when Hiramine led a group of three friends in creating a humanitarian organization that they hoped could provide disaster relief and sustainable development in poor and war-torn countries around the world, according to the organization’s incorporation documents.\u003c/p>\n\u003cp>In its first two years, HISG was little more than a fledgling faith-based charity. Just after the U.S. invaded Afghanistan, Hiramine and his friends shipped medical supplies to a hospital there. By 2003, HISG had collaborated with a small Pentagon group called the Afghanistan Reachback Office, which was set up to coordinate reconstruction activities.\u003c/p>\n\u003cp>That same year, Boykin was named deputy in the newly created office of the undersecretary of defense for intelligence. Boykin had a special operations career that spanned many of the U.S. military’s most high-risk missions prior to 9/11. He served as commander of the Army’s most elite unit, commonly known as Delta Force, and oversaw the Black Hawk Down mission in Somalia in 1993 and the hunt for Pablo Escobar in Colombia.\u003c/p>\n\u003cp>\u003cdiv class='img-wrap align-right width-fixed' style='width:219px'> \u003ca href=\"https://theintercept.com/wp-uploads/sites/1/2015/10/cambone.jpg\">\u003cimg class=\"alignright size-medium wp-image-41106\" src=\"https://theintercept.com/wp-uploads/sites/1/2015/10/cambone.jpg\" alt=\"WASHINGTON - AUGUST 11: Stephen A. Cambone, Under Secretary of Defense for Intelligence, testifies before the House Armed Services Committee on Capitol Hill August 11, 2004 in Washington, DC. The committee is hearing testimony on the commissions final report and recommondations that was released last month. (Photo by Mark Wilson/Getty Images)\" />\u003c/a>\u003c/p>\n\u003cp class=\"caption\">Stephen Cambone, undersecretary of defense for intelligence, on August 11, 2004, in Washington, D.C.\u003c/p>\n\u003cp>\u003cp class='caption source pullright' style=''>Photo: Mark Wilson/Getty Images\u003c/p>\u003c/div>With the war on terror intensifying, Defense Secretary Donald Rumsfeld charged Boykin and his superior, Stephen Cambone, with the task of increasing the department’s ability to conduct intelligence operations independent from the CIA. Cambone and Boykin concluded that the Pentagon had ceded too much of its intelligence-gathering role in the preceding decades to the CIA, and it was time to recalibrate the balance. The CIA was kept in the loop. Within a year of his arrival to his new position at the Pentagon, Boykin dispatched a Pentagon staffer to the CIA to help coordinate the new and increased human intelligence operations abroad.\u003c/p>\n\u003cp>According to former military officials, Boykin took a page from the CIA’s playbook and looked for ways to provide cover for Pentagon espionage operations. Hiramine’s group was one of several NGOs used by the Pentagon in this way. Some, like HISG, already existed as fledgling organizations, while others were created from scratch by the Pentagon.\u003c/p>\n\u003cp>The espionage effort was one of the most secretive programs at the Pentagon, called an unacknowledged and waived &#8220;special access program,&#8221; or SAP. The designation meant that Defense Secretary Rumsfeld was required only to brief the chair and ranking members of both appropriations and armed services committees, who were not allowed to take notes or bring in staffers.\u003c/p>\n\u003cp>The Defense Department intelligence operations primarily focused on counterterrorism, but the efforts also extended to Iran and North Korea, where the military sought elusive intelligence on those countries’ nuclear programs.\u003c/p>\n\u003cp>That’s where HISG came in.\u003c/p>\n\u003cp>At the time the Pentagon program launched, the NGO had been responsible for many shipments of medical equipment, clothing, and disaster relief supplies around the world.\u003c/p>\n\u003cp>On at least one occasion in the period between 2004 and 2006, Hiramine, through HISG, helped coordinate a humanitarian shipment to North Korea.\u003c/p>\n\u003cp>The charity’s offer of donated clothing was the kind of faith-based donation the North Korean government would occasionally accept to help its population endure the country’s harsh winters. Unbeknownst to the North Korean government, however, underneath the clothing was a hidden compartment containing scores of bibles.\u003c/p>\n\u003cp>Shipping bibles into North Korea was risky — North Korea severely restricts any religious activities that deviate from communist ideology. But that was the point — if Hiramine’s bibles could make it, the Pentagon would know that it could use the same smuggling method to get military sensors and equipment into the country.\u003c/p>\n\u003cp>“We sent the bibles in as a test run,” a former senior Pentagon official told me. “They got through without the North Koreans discovering them.”\u003c/p>\n\u003cp>The Pentagon tasked Hiramine with gathering the intelligence it needed inside North Korea, and Hiramine would in turn utilize HISG’s access to the country to complete the assignments, according to two former military officials with knowledge of the effort. Hiramine, in his role as CEO of HISG, tapped Christian missionaries, aid workers, and Chinese smugglers to move equipment into and around North Korea — none of whom had any idea that they were part of a secret Pentagon operation.\u003c/p>\n\u003cp>On at least two different occasions, in 2007 and again in 2010, Hiramine entered North Korea under humanitarian cover, according to a former HISG employee familiar with his travel. HISG documents show that the organization boasted of having shipped winter clothing, including &#8220;ski jackets,&#8221; into North Korea during the NGO&#8217;s first 10 years of operation.\u003c/p>\n\u003cp>\u003cdiv class='img-wrap align-right width-fixed' style='width:300px'> \u003ca href=\"https://theintercept.com/wp-uploads/sites/1/2015/10/hiramine-nkorea.jpg\">\u003cimg class=\"alignright size-medium wp-image-41199\" src=\"https://theintercept.com/wp-uploads/sites/1/2015/10/hiramine-nkorea.jpg\" alt=\"hiramine-nkorea\" />\u003c/a>\u003c/p>\n\u003cp class=\"caption\">Kay Hiramine in North Korea, September 24, 2007.\u003c/p>\n\u003cp>\u003cp class='caption source pullright' style=''>Photo:Kay Hiramine/Twitpic\u003c/p>\u003c/div>Because American intelligence has so few assets inside North Korea, much of Hiramine’s task was to find transportation routes to move military equipment — and potentially clandestine operatives — in and around the country. The Pentagon would eventually move sensors and small radio beacons through Hiramine’s transportation network, according to another former military official. Much of what Hiramine was doing was what the military refers to as “operational preparation of the environment,” or OPE, a category that encompasses clandestine intelligence gathering and prepositioning equipment inside a country for future conflicts.\u003c/p>\n\u003cp>“We needed collection devices, spoofers” — used to disrupt North Korean military devices or radio signals — “and [equipment] to measure nuclear anomalies,” the same former military official told me. The military hardware also included shortwave radios that could be used to help a downed pilot to escape in the event of a future conflict with North Korea.\u003c/p>\n\u003cp>None of the former officials with knowledge of the program whom I spoke with would say where exactly the equipment was positioned or describe the intelligence that Hiramine was able to gather, citing the sensitivity of the matter. But two former officials said the intelligence and the network used to gain access inside the country were formally distributed to the CIA in what the U.S. intelligence community calls IIRs, or &#8220;intelligence information reports,&#8221; indicating the CIA was aware the Pentagon was using an NGO to conduct the operations. The CIA referred all questions about Hiramine’s intelligence reports to the Pentagon.\u003c/p>\n\u003cp>“If true, to use unwitting aid workers on behalf of an intelligence operation, people who genuinely do humanitarian work, to turn their efforts into intel collection is unacceptable,” said Rep. Jan Schakowsky, who served on the House Intelligence Committee from 2007 until this year. Schakowsky said she was unaware of the program, and unaware of any briefings given to the committee chair and ranking members.\u003c/p>\n\u003cp>“Now we have people who have been hired to do some good work and become unwitting accomplices to an intelligence mission? They can face all kinds of retaliation. It is completely unacceptable,” Schakowsky said.\u003cdiv class='img-wrap align-bleed width-auto' style='width:auto'> \u003ca href=\"https://theintercept.com/wp-uploads/sites/1/2015/10/hawkins-hiramines.jpg\">\u003cimg class=\"alignnone size-large wp-image-41107\" src=\"https://theintercept.com/wp-uploads/sites/1/2015/10/hawkins-hiramines.jpg\" alt=\"Jack Hawkins, Director of Volunteers for Prosperity (USAID) at the White House celebration of Asian Pacific Heritage Month.Kay Hiramine of Colorado Springs, Colo., recipient of the President's Volunteer Service award and Volunteers for Prosperity participant.\" />\u003c/a>\u003c/p>\n\u003cp class=\"caption overlayed\">Jack Hawkins of USAID with Julie Hiramine and Kay Hiramine of Colorado Springs, Colo., receiving the President&#8217;s Volunteer Service Award at the White House, May 10, 2007.\u003c/p>\n\u003cp>\u003cp class='caption source' style=''>Photo: M. T. Harmon/Nation Service\u003c/p>\u003c/div>\u003c/p>\n\u003cp>\u003cspan class=\"dropcap\">I\u003c/span>\u003cu>T IS UNCLEAR\u003c/u> how exactly Hiramine became involved in the Pentagon espionage effort, but his nonprofit presented a convenient vehicle for the Pentagon to hide intelligence-gathering missions and shipments of clandestine military equipment into denied areas.\u003c/p>\n\u003cp>Using an approach pioneered by the CIA, the Pentagon obscured the origin of the funding for the organization. “If you expose the money, you expose the network,” said a former military official who is critical of the program&#8217;s lack of oversight.\u003c/p>\n\u003cp>The organization received one stream of funding via a for-profit company called Private Sector Consulting, which was run by Hiramine, his partner Michael McCausland, and other HISG executives, and shared addresses and phone numbers with HISG in Colorado, according to public records. HISG reported in 2009 that it had no paid employees; its 30 staffers were designated “volunteers.” According to three people who worked for HISG, however, the salaries and benefits of the NGO’s employees were paid by the consulting firm. In 2009, for example, tax records show that Hiramine drew no salary as the head of Humanitarian International Services Group, yet earned $281,351 from Private Sector Consulting.\u003c/p>\n\u003cp>“It was our pure funding that made” HISG, one of the former military officials told me, explaining how the Pentagon provided the money for salaries to Private Sector Consulting.\u003c/p>\n\u003cp>A second revenue stream arrived at HISG via a private trust and another nonprofit, Working Partners Foundation, which was incorporated in late 2004, around the same time that Private Sector Consulting was launched and the Pentagon program was rolled out.\u003c/p>\n\u003cp>Here’s how it worked.\u003c/p>\n\u003cp>The Pentagon funneled money to the private fund, which was run out of a law office in Minnetonka, Minnesota, according to a former military official familiar with the arrangement. The fund, called New Millennium Trust, was run by retired Army Col. Thomas Lujan.\u003c/p>\n\u003cp>Lujan also had a historical distinction, according to an online \u003ca href=\"http://www.reformbh.com/new-page-4/\">bio\u003c/a>: He was the first military lawyer assigned to Delta Force — and would have known Boykin most of his professional career. According to a \u003ca href=\"http://www.reformbh.com/new-page-4/,\">public website\u003c/a>, Lujan, who retired in 1998, still maintains top-secret government clearance. Lujan declined to comment.\u003c/p>\n\u003cp>\u003cdiv class='img-wrap align-right width-fixed' style='width:300px'> \u003ca href=\"https://theintercept.com/wp-uploads/sites/1/2015/10/king-boykin.jpg\">\u003cimg class=\"alignright size-medium wp-image-41109\" src=\"https://theintercept.com/wp-uploads/sites/1/2015/10/king-boykin.jpg\" alt=\"king-boykin\" />\u003c/a>\u003c/p>\n\u003cp class=\"caption\">Screen grab of Yale King (center) and Boykin (right) on the Oak Initiative discussing King&#8217;s auto dealership.\u003c/p>\n\u003cp>\u003cp class='caption source pullright' style=''>Photo: The Oak Initiative\u003c/p>\u003c/div>Next, according to tax filings, New Millennium Trust would donate money to Working Partners Foundation, which was run by a prominent Colorado car dealer named Yale King starting in October 2004. King was also a “dear friend” of Boykin. In his autobiography, \u003cem>Never Surrender\u003c/em>, Boykin recalled receiving a fax from King while recuperating from an injury sustained during an attack on the U.S. base at Mogadishu’s airport. The fax consisted of a single Biblical verse. “I can’t explain why Yale sent that fax halfway around the world when he did,” Boykin wrote, “but I felt it was exactly the message God wanted me to hear.”\u003c/p>\n\u003cp>By 2006, responsibility for the program shifted away from Boykin. He retired in the summer of 2007. But the former military official critical of the effort called the HISG operation a “jobs program” for Boykin’s friends and former military colleagues. Boykin did not respond to requests for comment.\u003c/p>\n\u003cp>King earned $252,000 as the director of Working Partners Foundation in 2006. According to tax records, New Millennium Trust was the sole funder of Working Partners Foundation. The Pentagon money passed through King’s foundation, which made donations to Hiramine and HISG. In total, New Millennium Trust gave Working Partners Foundation $11.9 million between 2005 and 2014. Working Partners Foundation, in turn, passed $6.5 million to HISG between 2005 and 2012, according to tax filings.\u003c/p>\n\u003cp>To help Working Partners maintain the appearance of a legitimate charity, each year the foundation donated smaller amounts of cash to bona fide NGOs, such as Catholic Relief Services, which says it had no knowledge of any Pentagon link to the money. In at least one case, according to tax filings, Working Partners gave roughly $200,000 to a U.S.-based ministry that &#8220;deliver[s] Bibles &#8230; to the persecuted church in the Gospel restricted nation of North Korea.&#8221; Working Partners also funneled almost $500,000 to a medical charity run by Yale King&#8217;s wife in the first five years after Working Partners was established, according to tax records.\u003c/p>\n\u003cp>(King eventually moved Working Partners to Palm Beach, Florida, where it was transferred to a tax and estate lawyer named Robert Simses. Simses declined to comment, and King did not respond to multiple requests.)\u003c/p>\n\u003cp>One of the former military officials estimated that the Pentagon provided at least $15 million to HISG over the course of the program through these revenue streams.\u003c/p>\n\u003cp>“Kay never talked about where we got our funding from,” said Tom Jennings, who worked as HISG’s Asia program director for six years. “And I never felt that I was supposed to ask about it.” Jennings said he didn’t know that Hiramine had worked for the Pentagon on a secret espionage program, and now fears the revelations that HISG was funded by the Pentagon could taint the legitimate disaster relief and development programs he helped lead.\u003c/p>\n\u003cp>According to Hiramine’s LinkedIn profile, Private Sector Consulting “provided support services,” such as disaster response, to government agencies including the Department of Homeland Security, Department of Defense, and FEMA.\u003c/p>\n\u003cp>“I warned them they had to keep Private Sector Consulting separate,” said a former HISG employee, who was familiar with some of the contracts with the U.S. government. (This individual still works in humanitarian aid and did not want to be publicly associated with a Pentagon espionage program so was granted anonymity.) The former employee “didn’t have a clue” the nonprofit group was fronting for the Pentagon.\u003cdiv class='img-wrap align-bleed width-auto' style='width:auto'> \u003ca href=\"https://theintercept.com/wp-uploads/sites/1/2015/10/HISG_NGO-graphic.jpg\">\u003cimg class=\"alignnone size-large wp-image-41116\" src=\"https://theintercept.com/wp-uploads/sites/1/2015/10/HISG_NGO-graphic.jpg\" alt=\"HISG_NGO-graphic\" />\u003c/a> \u003cp class='caption source' style=''>Photo: Hiramine, Boykin: Getty Images (2); King: AP\u003c/p>\u003c/div>\u003c/p>\n\u003cp>&nbsp;\u003c/p>\n\u003cp>\u003cspan class=\"dropcap\">A\u003c/span>\u003cu>SIDE FROM HIRAMINE\u003c/u> and possibly other top executives, those who worked for HISG were never aware they were involved in a Pentagon intelligence program, or that Hiramine was working for the U.S. government, according to two former military officials.\u003c/p>\n\u003cp>“They were never witting,” said the former senior Pentagon official. “That was the point.”\u003c/p>\n\u003cp>In all, HISG operated in more than 30 countries, significantly funded by the Pentagon.\u003c/p>\n\u003cp>According to former employees, public records, and HISG’s former website, the nonprofit conducted disaster relief; provided food, medical supplies, and clothing; and helped start small businesses in countries including Niger, Mali, Ethiopia, Kenya, Iran, Lebanon, Yemen, and China.\u003c/p>\n\u003cp>“They gave us a tremendous latitude to do tremendous amounts of good,” Jennings said. “We were able to go to the poor in villages, train them how to start businesses and create jobs, so that they could begin to lift themselves out of poverty and regain their self-dignity. Looking back, that was one of the most fulfilling times in my life.”\u003c/p>\n\u003cp>\u003cdiv class='img-wrap align-left width-fixed' style='width:300px'> \u003ca href=\"https://theintercept.com/wp-uploads/sites/1/2015/10/hiramine-mcclausland.jpg\">\u003cimg class=\"alignleft size-medium wp-image-41108\" src=\"https://theintercept.com/wp-uploads/sites/1/2015/10/hiramine-mcclausland.jpg\" alt=\"\" />\u003c/a>\u003c/p>\n\u003cp class=\"caption\">Kay Hiramine and Michael McCausland\u003c/p>\n\u003cp>\u003cp class='caption source pullright' style=''>Photo: HISG\u003c/p>\u003c/div>But behind all the global charity work was an ulterior motive for military officials: The longer HISG operated and became more legitimate, the more opportunities would be available to U.S. military and intelligence officials to run operations in other countries as they had in North Korea. In other words, Hiramine’s ability to use HISG to form partnerships and working relationships with other unsuspecting aid workers and missionaries would give the Pentagon more places to spy, according to one of the former military officials. That official would not say whether Hiramine was tasked with operating in countries besides North Korea.\u003c/p>\n\u003cp>Hiramine and HISG were successful enough in their humanitarian efforts to garner that 2007 honor, the President’s Volunteer Service Award. It is not known if the White House was aware that HISG was part of a Pentagon program.\u003c/p>\n\u003cp>“If these people had been caught and tried and executed in downtown Pyongyang you’d really understand the risk,” said Robert Baer, a retired CIA officer who spent more than 20 years conducting espionage operations.\u003c/p>\n\u003cp>Using humanitarian and aid workers for gathering intelligence has always been risky. U.S. intelligence policy prohibits using American clergy, journalists, or Peace Corps volunteers as a cover to conduct espionage. Using NGOs is not strictly prohibited, but though it is not unprecedented, it is dangerous.\u003c/p>\n\u003cp>In recent years, the risk of using legitimate aid workers as cover for spying has had deadly repercussions.\u003c/p>\n\u003cp>In 2011, the CIA directed a Pakistani doctor to collect DNA samples of the suspected family members of Osama bin Laden under the guise of a hepatitis vaccination program in Abbottabad, Pakistan. After the raid, the Pakistani doctor was arrested and imprisoned by Pakistani authorities, and the Taliban later killed several medical professionals who were trying to conduct polio eradication campaigns, along with their guards.\u003c/p>\n\u003cp>The Taliban claimed the vaccination program was part of a Western intelligence plot. Cases of polio, which has been eradicated in almost every country in the world, have spiked in Pakistan in recent years. In 2014, a White House adviser informed U.S. public health school deans that the CIA is no longer allowed to use vaccination programs as an intelligence cover.\u003c/p>\n\u003cp>“The reward is almost zero given the risk because using NGOs — especially unwitting [ones] — produces very weak intelligence,” said Robert Baer, the retired CIA officer. “This is pure Graham Greene, \u003cem>Our Man in Havana\u003c/em> stuff,” he continued, referring to the farcical tale of a vacuum cleaner salesman who was recruited to spy on Cuba’s missile program.\u003c/p>\n\u003cp>\u003cspan class=\"dropcap\">D\u003c/span>\u003cu>ESPITE STARTING DURING\u003c/u> the Bush presidency, the North Korea espionage program continued through Obama’s first term. It’s unclear if the president was briefed. The White House declined to comment.\u003c/p>\n\u003cp>In 2012, now-retired Adm. William McRaven, the commander of the Special Operations Command in Tampa, Florida, who oversaw the Osama bin Laden raid, shut down the North Korea spying program.\u003c/p>\n\u003cdiv class='img-wrap align-right width-fixed' style='width:300px'>\n\u003cp>\u003ca href=\"https://theintercept.com/wp-uploads/sites/1/2015/10/mcraven.jpg\">\u003cimg class=\"alignright size-medium wp-image-41110\" src=\"https://theintercept.com/wp-uploads/sites/1/2015/10/mcraven.jpg\" alt=\"Image #: 21476399 U.S. Navy Admiral William McRaven testifies before the Senate Armed Services Committee in Washington March 5, 2013, with regard to the Defense Authorization Request for fiscal year 2014. REUTERS/Gary Cameron (UNITED STATES - Tags: MILITARY POLITICS PROFILE HEADSHOT) REUTERS /GARY CAMERON /LANDOV\" />\u003c/a>\u003c/p>\n\u003cp class=\"caption\">U.S. Navy Adm. William McRaven testifies before the Senate Armed Services Committee in Washington, March 5, 2013.\u003c/p>\n\u003cp>\u003cp class='caption source pullright' style=''>Photo: Gary Cameron/Reuters /Landov\u003c/p>\u003c/div>“McRaven told us he shut it down because he was nervous about the flap if it ever got out that the Pentagon had used a bunch of evangelicals and missionaries as spies,” said one former military officer, adding that if the program had produced better intelligence McRaven would have considered keeping it up and running. McRaven did not respond to a request for comment.\u003c/p>\n\u003cp>In January 2013, Hiramine and his fellow HISG executives announced to their employees that they were shuttering the organization. “We got no warning,” said Jennings, the former HISG program director. “We had no jobs, no severance, and no explanation. All they said was ‘we lost our funding.’”\u003c/p>\n\u003cp>According to Working Partners Foundation tax returns, 2013 was the first year since it began operating in 2005 that no funds were given to HISG. Instead, the nonprofit gave roughly $700,000 &#8212; funds that were likely allocated before McRaven ordered the program ended &#8212; to a range of relief and nonprofit groups, including a Washington-based defense think tank.\u003c/p>\n\u003cp>Some of HISG’s infrastructure remained, but Hiramine left and his main partner, Michael McCausland, transformed what was left of HISG into a new organization called Sustainable Communities Worldwide.\u003c/p>\n\u003cp>With HISG gone, the Pentagon began to dismantle the funding mechanisms that propped up the organization.\u003c/p>\n\u003cp>Private Sector Consulting was dissolved in December 2013, and this year, for the first time since it was created, Working Partners Foundation did not receive any money from New Millennium Trust.\u003c/p>\n\u003cp>According to tax filings, Working Partners wrote one final check for $475,500 to the Bureau of the Fiscal Service, a division of the Treasury Department, earlier this year. &#8220;The board of directors elected to terminate the foundation and pay all funds remaining to the United States treasury to be used to reduce the public debt,” according to public tax records. Working Partners was dissolved in January.\u003c/p>\n\u003cp>In other words, Working Partners gave its remaining funds as a gift to the federal government, a strange move for a private foundation — though not, perhaps, for one serving as cover for a now-terminated Pentagon program.\u003c/p>\n\u003cp>\u003cstrong>Update: October 28, 2015\u003c/strong>\u003c/p>\n\u003cp>This report makes reference to a donation from Working Partners Foundation to Catholic Relief Services, based on Working Partners Foundation’s tax filings. Catholic Relief Services, which conducted a review after publication, said its own records contained no indication it received money from Working Partners Foundation or HISG.\u003c/p>\n\u003cp>\u003cem>\u003ca href=\"https://theintercept.com/staff/margotwilliams/\">Margot Williams\u003c/a> and \u003ca href=\"https://theintercept.com/staff/leefang/\">Lee Fang\u003c/a> contributed to this report. \u003c/em>\u003c/p>\n\u003cp>\u003cem>Top photo: U.S. President George W. Bush with Kay Hiramine prior to presenting him with a President&#8217;s Volunteer Service Award on May 10, 2007, in the East Room of the White House (photo flipped). \u003c/em>\u003c/p>\n","link":"https://theintercept.com/2015/10/26/pentagon-missionary-spies-christian-ngo-front-for-north-korea-espionage/","thumbnail":{"ID":41105,"title":"CAPTION CORRECTION - NAMEUS President","excerpt":"Washington, UNITED STATES: CAPTION CORRECTION - NAME\nUS President George W. Bush smiles alongside Kay Hiramine, CEO of Private Sector Consulting in Colorado Springs, Colorado, prior to presenting him with a President's Volunteer Service Award during an event also celebrating Asian Pacific American Heritage month, 10 May 2007 in the East Room of the White House in Washington DC. AFP PHOTO/SAUL LOEB (Photo credit should read SAUL LOEB/AFP/Getty Images)","content":"","credit":"Photo: Saul Loeb/AFP/Getty Images","sizes":{"feature_hero":{"path":"wp-uploads/sites/1/2015/10/bush-hiramine-feature-hero.jpg","width":1200,"height":800},"promo":{"path":"wp-uploads/sites/1/2015/10/bush-hiramine-promo.jpg","width":440,"height":220},"promo_large":{"path":"wp-uploads/sites/1/2015/10/bush-hiramine-promo-large.jpg","width":900,"height":450},"top_large":{"path":"wp-uploads/sites/1/2015/10/bush-hiramine-top-large.jpg","width":440,"height":440},"top_small":{"path":"wp-uploads/sites/1/2015/10/bush-hiramine-top-small.jpg","width":200,"height":200},"square":{"path":"wp-uploads/sites/1/2015/10/bush-hiramine-e1445815598620-440x440.jpg","width":440,"height":440},"article_header":{"path":"wp-uploads/sites/1/2015/10/bush-hiramine-article-header.jpg","width":1440,"height":720},"original":{"path":"wp-uploads/sites/1/2015/10/bush-hiramine.jpg","width":"1600","height":"834"}}},"date":"2015-10-26T15:05:22+00:00","authors":[{"ID":81,"display_name":"Matthew Cole","url":"https://theintercept.com/staff/matthewcole/","brief_bio":"\u003cspan class=\"s1\">Matthew Cole is an investigative journalist covering national security and U.S. involvement in foreign conflicts.\u003c/span>","full_bio":"\u003cp class=\"p1\">\u003cspan class=\"s1\">Matthew Cole has covered national security since 2005 for U.S. television networks and print outlets. He has reported extensively on the CIA’s post-9/11 transformation, including identifying and locating a \u003ca href=\"http://abcnews.go.com/Blotter/cia-secret-prison-found/story?id=9115978\">\u003cspan class=\"s2\">secret CIA prison in Lithuania\u003c/span>\u003c/a> used to interrogate al Qaeda detainees. Since 2005, Cole has traveled extensively in Afghanistan and Pakistan to cover conflict and investigate U.S. intelligence operations.\u003c/span>\u003c/p>\n\u003cp class=\"p1\">\u003cspan class=\"s1\">For the past six years, Cole has worked as an investigative producer for ABC and NBC News. At each network, Cole broke several stories of global significance. Among the subjects he has reported on are Blackwater’s covert work with the CIA and JSOC;  the Raymond Davis affair in Pakistan; the death of Osama bin Laden; missing Libyan surface-to-air missiles after the fall of Qadaffi; classified CIA documents related to its drone program; and a SEAL Team 6 raid in Somalia. \u003c/span>\u003c/p>\n\u003cp class=\"p1\">\u003cspan class=\"s1\">For NBC News, Cole worked closely with Glenn Greenwald to report \u003ca href=\"http://www.nbcnews.com/news/investigations/war-anonymous-british-spies-attacked-hackers-snowden-docs-show-n21361\">\u003cspan class=\"s2\">stories based on documents leaked by Edward Snowden\u003c/span>\u003c/a>, and secured the first and only American television interview of Snowden.\u003c/span>\u003c/p>\n","email":"matthew.cole@theintercept.com","image_350":"https://firstlook.org/wp-uploads/sites/1/2015/06/250d845-350x350.jpg","twitter":"@matthewacole","facebook":"https://www.facebook.com/matthew.cole.3538","pgp_key":"Matthew Cole Public Key","pgp_file":"https://firstlook.org/wp-uploads/sites/1/2015/06/FB5AF0A9.asc","pgp_fingerprint":"F1D3 A76E 5BBE 77F2 8430 EF8B 950A 7D6C FB5A F0A9","user_title":"National Security Reporter","user_group":"","nicename":"matthewcole"}],"excerpt_type":"image-featured","is_feature":"1","feature_title":"The Pentagon’s Missionary Spies","is_blog":false,"blog_title":"","comments_number":"93","bitly_url":"http://interc.pt/1LwXM2B","comments_open":false,"is_banner_hidden":false,"featured_video_url":"","meta":{"links":[]},"layout":"default","banner_videokey":"","post_type":"post","share_twitter_text":"","yoast_wpseo_canonical":"https://theintercept.com/2015/10/26/pentagon-missionary-spies-christian-ngo-front-for-north-korea-espionage/","yoast_wpseo_general_title":"Pentagon Used Christian NGO as North Korea Espionage Front","yoast_wpseo_general_description":"","yoast_wpseo_facebook_title":"","yoast_wpseo_facebook_description":"","yoast_wpseo_facebook_thumbnail":"","yoast_wpseo_twitter_title":"","yoast_wpseo_twitter_description":"","yoast_wpseo_twitter_thumbnail":""}},"staff":{},"comments":{},"documents":{}},"staffIDs":[],"greenwaldIDs":[],"carouselIDs":[],"homepageGreenwaldIDs":[],"USIDs":[],"homepageReverseChronIDs":[],"homepageSidemenuStuck":false,"homepageActiveSidemenuLink":null,"featureIDs":[],"documentIDs":[],"staffDetailIDs":{},"searchResultIDs":[],"bodyClasses":[],"fovIDs":[],"squirrelIDs":[40290,40288,40302,40292,40300,40296,40294,40298],"squirrelDocumentIDs":[],"hamburgerColor":null,"commentsOpen":{},"postsExpanded":{}}
195
+ window.config = {"wp_origin":"https://firstlook.org","wp_host":"theintercept.com","wp_base_path":"","request_timeout":5000,"cdn_hosts":["prod01-cdn07.cdn.firstlook.org","prod01-cdn06.cdn.firstlook.org","prod01-cdn05.cdn.firstlook.org","prod01-cdn04.cdn.firstlook.org"],"piwik":{"site_id":1,"url":"https://prod01-piwik.firstlook.org/","ignore_paths":["/theintercept/securedrop"]},"site_prefix":"","parsely":{"site_id":"theintercept.com","endpoint":"https://theintercept.com/a"},"host":"theintercept.com"}
196
+ </script>
197
+
198
+
199
+
200
+ <script type="application/ld+json">
201
+ {"url":"https://theintercept.com/2015/10/26/pentagon-missionary-spies-christian-ngo-front-for-north-korea-espionage/","@context":"http://schema.org","@type":"NewsArticle","headline":"U.S. Military Used Christian NGO as Front for North Korea Espionage","dateCreated":"2015-10-26T15:05:22+00:00","authors":["Matthew Cole"],"thumbnailUrl":"https://prod01-cdn05.cdn.firstlook.org/wp-uploads/sites/1/2015/10/bush-hiramine-feature-hero.jpg"}
202
+ </script>
203
+
204
+ <div id="parsely-root" style="display: none">
205
+ <div id="parsely-cfg" data-parsely-site="theintercept.com"></div>
206
+ </div>
207
+
208
+
209
+ <script src="https://prod01-cdn05.cdn.firstlook.org/assets/app766ba4ad9a54803a9adc.js"></script>
210
+ </body>
211
+ </html>
@@ -0,0 +1,747 @@
1
+ <!DOCTYPE html> <html itemscope itemtype="http://schema.org/NewsArticle" lang="en" class=" article "> <head> <meta name="eomportal-uuid" content="652d639c-a99b-11e5-b596-113f59ee069a"/> <meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1"> <meta charset="utf-8"/> <meta id="viewport" name="viewport" content="width=device-width, initial-scale=1.0, user-scalable=yes, minimum-scale=0.5, maximum-scale=2.0"/> <meta name="referrer" content="unsafe-url"/> <meta name="keywords" content="ML-Israel-Ambassador's-Gift, Israel, Middle East, General news, International relations, Boycotts, Government and politics, Political and civil unrest"/> <meta itemprop="description" name="description" content="Israel&rsquo;s ambassador to the United States has dispatched a politically charged holiday gift."/> <meta name="news_keywords" content="ML-Israel-Ambassador's-Gift, Israel, Middle East, General news, International relations, Boycotts, Government and politics, Political and civil unrest"/> <meta name="twitter:site" value="@WashingtonPost"/> <meta name="twitter:card" content="summary_large_image"> <meta property="og:description" content="Israel&rsquo;s ambassador to the United States has dispatched a politically charged holiday gift."/> <meta property="og:type" content="article"/> <meta property="og:site_name" content="Washington Post"/> <meta itemprop="mainEntityOfPage" content="True"/> <meta itemprop="image" property="og:image" content="https://www.washingtonpost.com/pb/resources/img/twp-3000x1568.jpg"/> <meta property="og:title" content="Israel ambassador to US sends anti-boycott message with gift"/> <meta property="article:publisher" content="https://www.facebook.com/washingtonpost"> <meta property="fb:admins" content="1513210492"/> <meta property="fb:app_id" content="41245586762"/> <meta property="fb:admins" content="1244584375"/> <meta property="fb:admins" content="4403963"/> <meta property="fb:admins" content="2724956"/> <meta property="fb:admins" content="500835072"/> <meta property="og:url" content="https://www.washingtonpost.com/world/middle_east/israel-ambassador-to-us-sends-anti-boycott-message-with-gift/2015/12/23/652d639c-a99b-11e5-b596-113f59ee069a_story.html"/> <meta name="apple-itunes-app" content="app-id=938922398, app-argument=https://www.washingtonpost.com/world/middle_east/israel-ambassador-to-us-sends-anti-boycott-message-with-gift/2015/12/23/652d639c-a99b-11e5-b596-113f59ee069a_story.html"/> <link rel="manifest" href="https://www.washingtonpost.com/pb/resources/json/manifest.json"/> <link itemprop="url" rel="canonical" href="https://www.washingtonpost.com/world/middle_east/israel-ambassador-to-us-sends-anti-boycott-message-with-gift/2015/12/23/652d639c-a99b-11e5-b596-113f59ee069a_story.html"/> <link rel="alternate" href="android-app://com.washingtonpost.android/wp-android/www.washingtonpost.com/world/middle_east/israel-ambassador-to-us-sends-anti-boycott-message-with-gift/2015/12/23/652d639c-a99b-11e5-b596-113f59ee069a_story.html"/> <title> Israel ambassador to US sends anti-boycott message with gift - The Washington Post</title> <!--[if (gt IE 8) | (IEMobile)]><!--> <link rel="stylesheet" href="/pb/resources/css/headerfonts.css?_=201512031740"/> <!--<![endif]--> <!--[if (lt IE 9) & (!IEMobile)]><link rel="stylesheet" href="/pb/resources/css/headerfonts_ie.css?_=201512031740"/><![endif]--> <link rel="stylesheet" href="/pb/resources/assets/fonts/fontawesome/latest/css/font-awesome.css"/> <link href="/pb/gr/c/default/r5c0xp103PgCxp/css/9b874c98cf.css?_=f9f2f" rel="stylesheet"/> <link href="/pb/gr/p/default/r5c0xp103PgCxp/style.css?_=bd289" rel="stylesheet"/> <script>window.head_conf={head:"TWPHead"};</script> <script src="/pb/resources/js/head.min.js"></script> <script>window.wp_pb=window.wp_pb||{pageName:"article-world",pageId:"r5c0xp103PgCxp",contextPath:"/pb",isAdmin:!1,layoutEngineName:"off",environment:"production",resourceToken:"201512031740"};var commercialNode="/world/middle_east";</script> <script src="/pb/gr/c/default/r5c0xp103PgCxp/headjs/f3abdd3338.js?_=5b02f"></script> <script src="/pb/gr/p/default/r5c0xp103PgCxp/head.js?_=bd289"></script> <script>!function(a,f){window.TWP=window.TWP||{};window.TWP.AdsTest=window.TWP.AdsTest||{};var g={},e={},c={};try{a.each(f,function(b,d){d&&(c[d]=a.Deferred(),e[d]=c[d].promise())}),a(window.document).on("abtest-ready",function(b,d){a.each(f,function(b,a){c[a]&&c[a].resolve(d.get(a))})}),g.get=function(b){c[b]=c[b]||a.Deferred();e[b]=e[b]||c[b].promise();return a.when(e[b])}}catch(h){}window.TWP.AdsTest=g}(jQuery,["ads-teads"]);</script> <script>wp_pb=window.wp_pb||{};
2
+ var isMobile={Android:function(){return navigator.userAgent.match(/Android/i)?!0:!1},AndroidOld:function(){return navigator.userAgent.match(/Android 2.3.3/i)?!0:!1},AndroidTablet:function(){return navigator.userAgent.match(/Android/i)&&!navigator.userAgent.match(/Mobile/i)?!0:!1},Kindle:function(){return navigator.userAgent.match(/Kindle/i)?!0:!1},KindleFire:function(){return navigator.userAgent.match(/KFOT/i)?!0:!1},Silk:function(){return navigator.userAgent.match(/Silk/i)?!0:!1},BlackBerry:function(){return navigator.userAgent.match(/BlackBerry/i)?
3
+ !0:!1},iOS:function(){return navigator.userAgent.match(/iPhone|iPad|iPod/i)?!0:!1},iPhone:function(){return navigator.userAgent.match(/iPhone|iPod/i)?!0:!1},iPad:function(){return navigator.userAgent.match(/iPad/i)?!0:!1},Windows:function(){return navigator.userAgent.match(/IEMobile/i)?!0:!1},FirefoxOS:function(){return navigator.userAgent.match(/Mozilla/i)&&navigator.userAgent.match(/Mobile/i)?!0:!1},Retina:function(){return window.retina||1<window.devicePixelRatio?!0:!1},any:function(){return isMobile.Android()||
4
+ isMobile.Kindle()||isMobile.KindleFire()||isMobile.Silk()||isMobile.BlackBerry()||isMobile.iOS()||isMobile.Windows()||isMobile.FirefoxOS()},all:function(){return navigator.userAgent},tablet:function(){return isMobile.AndroidTablet()||isMobile.iPad()||isMobile.Kindle()||isMobile.KindleFire()||isMobile.Silk()}},mobile_browser=isMobile.any()?1:0,iphone_browser=isMobile.iPhone()?1:0,ipad_browser=isMobile.iPad()?1:0,android_browser=isMobile.Android()?1:0,android233_browser=isMobile.AndroidOld()?1:0,kindle_browser=
5
+ isMobile.Kindle()?1:0,retina_browser=isMobile.Retina()?1:0,mobile_tablet=isMobile.tablet()?1:0,windows_browser=isMobile.Windows()?1:0;TWP=window.TWP||{};TWP.PostTV=TWP.PostTV||{};
6
+ TWP.PostTV.BrowserInfo=TWP.PostTV.BrowserInfo||{init:function(){this.browser=this.searchString(this.dataBrowser)||"An unknown browser";this.version=this.searchVersion(navigator.userAgent)||this.searchVersion(navigator.appVersion)||"an unknown version";this.OS=this.searchString(this.dataOS)||"an unknown OS"},searchString:function(a){for(var b=0;b<a.length;b++){var d=a[b].string,c=a[b].prop;this.versionSearchString=a[b].versionSearch||a[b].identity;if(d){if(-1!=d.indexOf(a[b].subString))return a[b].identity}else if(c)return a[b].identity}},
7
+ searchVersion:function(a){var b=a.indexOf(this.versionSearchString);if(-1!=b)return parseFloat(a.substring(b+this.versionSearchString.length+1))},dataBrowser:[{string:navigator.userAgent,subString:"Chrome",identity:"Chrome"},{string:navigator.userAgent,subString:"OmniWeb",versionSearch:"OmniWeb/",identity:"OmniWeb"},{string:navigator.vendor,subString:"Apple",identity:"Safari",versionSearch:"Version"},{prop:window.opera,identity:"Opera",versionSearch:"Version"},{string:navigator.vendor,subString:"iCab",
8
+ identity:"iCab"},{string:navigator.vendor,subString:"KDE",identity:"Konqueror"},{string:navigator.userAgent,subString:"Firefox",identity:"Firefox"},{string:navigator.vendor,subString:"Camino",identity:"Camino"},{string:navigator.userAgent,subString:"Netscape",identity:"Netscape"},{string:navigator.userAgent,subString:"MSIE",identity:"Explorer",versionSearch:"MSIE"},{string:navigator.userAgent,subString:"Gecko",identity:"Mozilla",versionSearch:"rv"},{string:navigator.userAgent,subString:"Mozilla",
9
+ identity:"Netscape",versionSearch:"Mozilla"}],dataOS:[{string:navigator.platform,subString:"Win",identity:"Windows"},{string:navigator.platform,subString:"Mac",identity:"Mac"},{string:navigator.userAgent,subString:"iPhone",identity:"iPhone"},{string:navigator.userAgent,subString:"iPad",identity:"iPad"},{string:navigator.userAgent,subString:"Android",identity:"Android"},{string:navigator.platform,subString:"Linux",identity:"Linux"}]};TWP.PostTV.BrowserInfo.init();
10
+ TWP.PostTV.getCookie=function(a){a+="\x3d";for(var b=document.cookie.split(";"),d=0;d<b.length;d++){for(var c=b[d];" "==c.charAt(0);)c=c.substring(1,c.length);if(0==c.indexOf(a))return c.substring(a.length,c.length)}return null};wp_pb.BrowserInfo=wp_pb.BrowserInfo||{};wp_pb.BrowserInfo.mobile_browser=mobile_browser;wp_pb.BrowserInfo.tablet=mobile_tablet;wp_pb.BrowserInfo.OS=TWP.PostTV.BrowserInfo.OS;wp_pb.BrowserInfo.browser=TWP.PostTV.BrowserInfo.browser;wp_pb.BrowserInfo.version=TWP.PostTV.BrowserInfo.version;
11
+ wp_pb.BrowserInfo.OS=TWP.PostTV.BrowserInfo.OS;</script> <script>if("undefined"==typeof wp_meta_data)try{wp_meta_data={platform:"pagebuilder",showAds:!0,showPreRollAds:!1,isHomepage:!1,isErrorPage:!1,isMultimedia:!1,wt:"article_story",page_id:["652d639c-a99b-11e5-b596-113f59ee069a"],author:["Associated Press"],keywords:"ML-Israel-Ambassador's-Gift;Israel;Middle East;General news;International relations;Boycotts;Government and politics;Political and civil unrest".split(";"),clavis:{keywords:"Israel;holiday gift;United States;BDS movement;Ambassador Ron Dermer;settlement;JERUSALEM;ambassador;state;boycott;effort;holiday basket;enemy;recipient;goods;wine;Divestment;message;oil;Sanctions movement;war;land;European Union;product;move".split(";"),
12
+ topics:["National Security","Race and Ethnicity","Travel","Religion and Belief","Wars, Conflicts and Terrorism"],ct:["sz","rm","ej","rj","qa"]},breaking_news:[!1],contentType:["article"]}}catch(e){};</script> <script>(function(){TWP="undefined"==typeof TWP?{}:TWP;TWP.Data="undefined"==typeof TWP.Data?{}:TWP.Data;TWP.Data.Tracking={init:function(){this.props={};this.props.platform="pagebuilder";this.props.site="www.washingtonpost.com";this.props.page_type="";this.props.page_name="world:article - 113f59ee069a - 20151223 - israel-ambassador-to-us-sends-anti-boycott-message-with-gift";this.props.section="world";this.props.channel="wp - world";this.props.subsection="world - middle_east";this.props.hierarchy="world|article";
13
+ this.props.content_type="article";this.props.story_type="News";this.props.headline="Israel ambassador to US sends anti-boycott message with gift";this.props.author="Associated Press";this.props.source="AP";this.props.content_id="652d639c-a99b-11e5-b596-113f59ee069a";this.props.page_num="";this.props.op_ranking="no sentiment - no ideology";this.props.columnname="";this.props.blogname="";this.props.published="";this.props.news_or_commercial="News";this.props.commercial_node="/world/middle_east";this.props.content_category=
14
+ "Foreign";this.props.sectionfront="";this.props.track_scrolling=!0}};TWP.Data.Tracking.init()})();</script> <script id="twp-identity" src="/pb/1h/twp-global.js?outputType=javascript&token=201512031740"></script> </head> <body class="pb-theme-normal pb-full-fluid"> <div style="width: 1px !important; height: 1px !important; position: absolute !important; left: -10000px !important; top: -1000px !important;" class="pub_300x250 pub_300x250m pub_728x90 text-ad textAd text_ad text_ads text-ads text-ad-links" id="wp-adb-c"></div> <div id="pb-root" class=""> <div class="pb-container"> <div class="moat-trackable pb-f-theme-normal pb-3 pb-feature pb-layout-item pb-f-page-header-v2" moat-id="page/header-v2|world" data-chain-name="no-name" data-feature-name="no-name" data-feature-id="page/header-v2" id="feEHvL103PgCxp"> <!--[if IE 9]><style>#main-sections-nav.subNavigation{width:475px !important}#main-sections-nav{left:-250px !important;width:315px !important}#main-sections-nav-inner{position:absolute !important}#main-sections-nav.subNavigation #main-sections-nav-inner{width:550px !important;overflow-x:hidden !important}#main-sections-nav.subNavigation{width:470px !important}</style><![endif]--> <!--[if IE 9]><div id="page" class="ie ie9 "><![endif]--> <!--[if IE 8]><div id="page" class="ie ie8 "><![endif]--> <!--[if !IE]><!--> <div id="page" class="nie"> <!--<![endif]--> <header id="wp-header" class="site-header fixed "> <nav id="nav-bar" class="top-nav" role="navigation"> <div id="logo-in-nav" class=" nav-display-show "> <a href="https://www.washingtonpost.com" class="wp-logo-link"> <img width="200" src="https://img.washingtonpost.com/pb/resources/img/thewashingtonpost-white-2x.png" alt="The Washington Post"/> </a> </div> <div class="main-navigation row"> <div class="col-xs-9 col-md-8 col-lg-9"> <ul class="buttons-inline"> <li class="search-form-item hidden-xs"> <form id="search-form" method="get" class="search" action="//www.washingtonpost.com/newssearch/"> <input id="search-field" autocomplete="off" name="query" type="text" class="form-control closed" placeholder="Search"/> <i id="search-btn" class="fa fa-search closed"></i> </form> </li> <li class="hidden-xs"> <a href="#" id="section-menu-btn" class="button section-menu-btn sections"> Sections <i class="fa fa-bars"></i> </a> </li> <li class="mobile-nav-button visible-xs"> <a href="#" class="section-menu-btn"><i class="fa fa-bars mobile-hamburger-ic"></i></a> </li> </ul> </div> <div class="col-xs-3 col-md-4 col-lg-3"> <div class="mobile-settings-button visible-xs"> <a href="#" id="settings-nav-btn"><i class="fa fa-cog"></i></a> </div> <div class="sign-up-buttons"> <div class="mobile-arrow not-logged-in visible-xs"></div> <div class="clear visible-xs"></div> <ul class="button-group" id="logged-in-status"> <li class="nav-sign-in hidden"> <a id="sign-in-link" href="https://subscribe.washingtonpost.com/loginregistration/index.html" class="button"> <span class="username">Sign In</span> </a> </li> <li id="nav-user" class="hidden hidden-xs" data-show-identity="true" data-menu="user-menu"> <a class="button"> <span class="username">Username</span> <i class="fa fa-caret-down"></i> </a> </li> <li id="nav-subscribe" class="hidden"> <a href="https://subscribe.washingtonpost.com/acquisition/?nid=top_pb_subscribe&promo=digital02_default&oscode=RPWH&wpsrc=CM0000445&destination=http://www.washingtonpost.com/pb/world/middle_east/israel-ambassador-to-us-sends-anti-boycott-message-with-gift/2015/12/23/652d639c-a99b-11e5-b596-113f59ee069a_story.html" class="button"> <span>Subscribe</span> </a> </li> <li id="nav-reading-list" class="hidden"> <a href="https://www.washingtonpost.com/pb/readinglist/"> Reading List </a> </li> </ul> </div> <div id="slug_88x31" data-ad-type="88x31" style="display:none;"></div> </div> </div> </nav> <div id="user-menu" class="nav-menu hidden"> <div class="mobile-arrow logged-in"></div> <div class="clear"></div> <ul></ul> </div> </header> </div> <!--[if IE 8]><div id="main-sections-nav" class="sections-nav ie8"><![endif]--> <!--[if IE 9]><div id="main-sections-nav" class="sections-nav ie9"><![endif]--> <!--[if !IE]><!--> <div id="main-sections-nav" class="sections-nav "> <!--<![endif]--> <div id="main-sections-nav-inner" class="sections-nav"> <div class="visible-xs"> <form id="nav-search-mobile" method="get" action="//www.washingtonpost.com/newssearch/"> <input type="text" placeholder="Search" name="query" autocomplete="off"> <button type="submit" class="fa fa-search"></button> </form> </div> <div id="sections-menu-off-canvas"> <ul class="side-nav"> <li id="nav-screenreader-link" class="main-nav nav-screenreader-link"> <a class='main-nav-item' class="screenreader-link" href="http://www.washingtonpost.com/pb/world/middle_east/israel-ambassador-to-us-sends-anti-boycott-message-with-gift/2015/12/23/652d639c-a99b-11e5-b596-113f59ee069a_story.html?resType=accessibility&nid=menu_nav_accessibilityforscreenreader">Accessibility for screenreader</a> </li> <li class='main-nav '> <a class='main-nav-item' href="https://www.washingtonpost.com/">Home Page</a> </li> <li class='main-nav has-sub '> <a class='main-nav-item' href="http://www.washingtonpost.com/politics/">Politics</a> <i class="fa fa-angle-right main-nav-angle"></i> <div class="subnav-arrow"></div> <ul class="sub-nav"> <li class="sub-nav-item"> <a href="https://www.washingtonpost.com/news/powerpost/">PowerPost</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/blogs/the-fix/">The Fix</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/politics/federal-government/">The Fed Page</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/politics/white-house/">White House</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/politics/courts-law/">Courts and Law</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/politics/polling/">Polling</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/blogs/monkey-cage/">Monkey Cage</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/blogs/fact-checker/">Fact Checker</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/blogs/federal-eye/">Federal Eye</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/blogs/post-politics/">Post Politics Blog</a> </li> </ul> </li> <li class='main-nav has-sub '> <a class='main-nav-item' href="https://www.washingtonpost.com/opinions/">Opinions</a> <i class="fa fa-angle-right main-nav-angle"></i> <div class="subnav-arrow"></div> <ul class="sub-nav"> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/opinions/the-posts-view/">The Post's View</a> </li> <li class="sub-nav-item"> <a href="https://www.washingtonpost.com/people/tom-toles">Toles Cartoons</a> </li> <li class="sub-nav-item"> <a href="https://www.washingtonpost.com/people/ann-telnaes">Telnaes Animations</a> </li> <li class="sub-nav-item"> <a href="https://www.washingtonpost.com/opinions/local-opinions/">Local Opinions</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/opinions/letters-to-the-editor/">Letters to the Editor</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/news/act-four/">Act Four</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/blogs/all-opinions-are-local/">All Opinions Are Local</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/news/book-party/">Book Party</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/blogs/compost/">Compost</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/blogs/erik-wemple/">Erik Wemple</a> </li> <li class="sub-nav-item"> <a href="https://www.washingtonpost.com/opinions/five-myths/">Five Myths</a> </li> <li class="sub-nav-item"> <a href="https://www.washingtonpost.com/news/in-theory/">In Theory</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/blogs/plum-line/">The Plum Line</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/posteverything/">PostEverything</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/blogs/post-partisan/">PostPartisan</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/news/rampage/">Rampage</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/blogs/right-turn/">Right Turn</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/news/the-watch/">The Watch</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/news/volokh-conspiracy/">Volokh Conspiracy</a> </li> </ul> </li> <li class='main-nav has-sub '> <a class='main-nav-item' href="http://www.washingtonpost.com/sports/">Sports</a> <i class="fa fa-angle-right main-nav-angle"></i> <div class="subnav-arrow"></div> <ul class="sub-nav"> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/sports/redskins/">Redskins</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/sports/nfl/">NFL</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/sports/mlb/">MLB</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/sports/nba/">NBA</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/sports/nhl/">NHL</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/allmetsports/">AllMetSports</a> </li> <li class="sub-nav-item"> <a href="https://www.washingtonpost.com/sports/soccer/">Soccer</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/sports/boxing-mma/">Boxing/MMA</a> </li> <li class="sub-nav-item subSub-nav-item College Sports"> <a href="http://www.washingtonpost.com/sports/colleges/football/">College Football</a> </li> <li class="sub-nav-item subSub-nav-item College Sports"> <a href="http://www.washingtonpost.com/sports/colleges/basketball/">College Basketball</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/blogs/dc-sports-bog/">D.C. Sports Bog</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/blogs/early-lead/">Early Lead</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/news/fancy-stats/">Fancy Stats</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/sports/golf/">Golf</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/sports/tennis/">Tennis</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/sports/fantasy-sports/">Fantasy Sports</a> </li> </ul> </li> <li class='main-nav has-sub '> <a class='main-nav-item' href="http://www.washingtonpost.com/local/">Local</a> <i class="fa fa-angle-right main-nav-angle"></i> <div class="subnav-arrow"></div> <ul class="sub-nav"> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/local/dc/">D.C.</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/local/maryland/">Maryland</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/local/virginia/">Virginia</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/local/public-safety/">Public Safety</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/local/education/">Education</a> </li> <li class="sub-nav-item"> <a href="https://www.washingtonpost.com/local/obituaries/">Obituaries</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/local/traffic-commuting/">Transportation</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/local/weather/">Weather</a> </li> </ul> </li> <li class='main-nav has-sub '> <a class='main-nav-item' href="http://www.washingtonpost.com/national/">National</a> <i class="fa fa-angle-right main-nav-angle"></i> <div class="subnav-arrow"></div> <ul class="sub-nav"> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/news/acts-of-faith/">Acts of Faith</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/national/health-science/">Health and Science</a> </li> <li class="sub-nav-item"> <a href="https://www.washingtonpost.com/world/national-security/">National Security</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/sf/investigative/collection/investigations/">Investigations</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/news/morning-mix/">Morning Mix</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/news/post-nation/">Post Nation</a> </li> <li class="sub-nav-item"> <a href="https://www.washingtonpost.com/national/obituaries/">Obituaries</a> </li> </ul> </li> <li class='main-nav has-sub '> <a class='main-nav-item' href="http://www.washingtonpost.com/world/">World</a> <i class="fa fa-angle-right main-nav-angle"></i> <div class="subnav-arrow"></div> <ul class="sub-nav"> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/world/africa/">Africa</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/world/americas/">The Americas</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/world/asia-pacific/">Asia and Pacific</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/world/europe/">Europe</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/world/middle-east/">Middle East</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/world/national-security/">National Security</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/blogs/worldviews/">WorldViews</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/news/checkpoint/">Checkpoint</a> </li> </ul> </li> <li class='main-nav has-sub '> <a class='main-nav-item' href="http://www.washingtonpost.com/business/">Business</a> <i class="fa fa-angle-right main-nav-angle"></i> <div class="subnav-arrow"></div> <ul class="sub-nav"> <li class="sub-nav-item"> <a href="https://www.washingtonpost.com/news/wonk/">Wonkblog</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/business/on-leadership/">On Leadership</a> </li> <li class="sub-nav-item"> <a href="https://www.washingtonpost.com/business/get-there/">Personal Finance</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/news/digger/">Digger</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/news/energy-environment/">Energy and Environment</a> </li> <li class="sub-nav-item"> <a href="http://washpost.bloomberg.com/market-news/">Markets</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/business/on-small-business/">On Small Business</a> </li> <li class="sub-nav-item"> <a href="http://washpost.bloomberg.com/worldbusiness/">World Business</a> </li> <li class="sub-nav-item"> <a href="http://knowmore.washingtonpost.com/">Know More</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/business/capital-business/">Capital Business</a> </li> </ul> </li> <li class='main-nav has-sub '> <a class='main-nav-item' href="http://www.washingtonpost.com/business/technology/">Tech</a> <i class="fa fa-angle-right main-nav-angle"></i> <div class="subnav-arrow"></div> <ul class="sub-nav"> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/news/innovations/">Innovations</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/business/on-it/">On I.T.</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/blogs/the-switch/">The Switch</a> </li> </ul> </li> <li class='main-nav has-sub '> <a class='main-nav-item' href="http://www.washingtonpost.com/lifestyle/">Lifestyle</a> <i class="fa fa-angle-right main-nav-angle"></i> <div class="subnav-arrow"></div> <ul class="sub-nav"> <li class="sub-nav-item subSub-nav-item Style Blog"> <a href="https://www.washingtonpost.com/news/arts-and-entertainment/">Arts and Entertainment</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/lifestyle/advice/">Advice</a> </li> <li class="sub-nav-item"> <a href="https://www.washingtonpost.com/pb/people/carolyn-hax/">Carolyn Hax</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/food/">Food</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/lifestyle/travel/">Travel</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/lifestyle/wellness/">Wellness</a> </li> <li class="sub-nav-item"> <a href="https://www.washingtonpost.com/lifestyle/magazine/">Magazine</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/lifestyle/home-garden/">Home and Garden</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/news/inspired-life/">Inspired Life</a> </li> <li class="sub-nav-item"> <a href="https://www.washingtonpost.com/lifestyle/fashion/">Fashion</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/lifestyle/kidspost/">KidsPost</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/lifestyle/on-parenting/">On Parenting</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/blogs/reliable-source/">Reliable Source</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/news/the-intersect/">The Intersect</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/news/soloish/">Solo-ish</a> </li> </ul> </li> <li class='main-nav has-sub '> <a class='main-nav-item' href="http://www.washingtonpost.com/entertainment/">Entertainment</a> <i class="fa fa-angle-right main-nav-angle"></i> <div class="subnav-arrow"></div> <ul class="sub-nav"> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/entertainment/comics/">Comics</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/goingoutguide/">Going Out Guide</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/entertainment/horoscopes/">Horoscopes</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/goingoutguide/movies">Movies</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/goingoutguide/museums/">Museums</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/goingoutguide/music">Music</a> </li> <li class="sub-nav-item"> <a href="http://games.washingtonpost.com/">Puzzles and Games</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/entertainment/theater-dance">Theater and Dance</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/entertainment/tv/">TV</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/news/comic-riffs/">Comic Riffs</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/entertainment/books/">Books</a> </li> </ul> </li> <li class='main-nav has-sub '> <a class='main-nav-item' href="http://www.washingtonpost.com/posttv/">Video</a> <i class="fa fa-angle-right main-nav-angle"></i> <div class="subnav-arrow"></div> <ul class="sub-nav"> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/posttv/c/live">Live</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/posttv/c/video/topic/topnews">Top News</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/posttv/c/video/topic/popularvideo">Popular Video</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/posttv/c/video/topic/politics">Politics</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/posttv/c/video/topic/opinions">Opinions</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/posttv/c/video/topic/sports">Sports</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/posttv/c/video/topic/national">National</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/posttv/c/video/topic/world">World</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/posttv/c/video/topic/business">Business</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/posttv/c/video/topic/tech">Technology</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/posttv/c/video/topic/style">Style</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/posttv/c/video/topic/entertainment">Entertainment</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/posttv/c/video/topic/local">Local</a> </li> </ul> </li> <li class='main-nav has-sub '> <a class='main-nav-item' href="https://www.washingtonpost.com/photography/">Photography</a> <i class="fa fa-angle-right main-nav-angle"></i> <div class="subnav-arrow"></div> <ul class="sub-nav"> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/news/in-sight/">In Sight</a> </li> </ul> </li> <li class='main-nav has-sub '> <a class='main-nav-item' href="http://www.washingtonpost.com/pb/blogs/post-live/">Washington Post Live</a> <i class="fa fa-angle-right main-nav-angle"></i> <div class="subnav-arrow"></div> <ul class="sub-nav"> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/pb/news/america-answers/">America Answers</a> </li> </ul> </li> <li class='main-nav '> <a class='main-nav-item' href="http://live.washingtonpost.com/">Live Chats</a> </li> <li class='main-nav has-sub '> <a class='main-nav-item' href="http://www.washingtonpost.com/realestate/">Real Estate</a> <i class="fa fa-angle-right main-nav-angle"></i> <div class="subnav-arrow"></div> <ul class="sub-nav"> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/rentals/">Rentals</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/blogs/where-we-live/">Where We Live</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/homesales/index.html">Recently Sold Homes</a> </li> </ul> </li> <li class='main-nav '> <a class='main-nav-item' href="http://www.washingtonpost.com/cars/">Cars</a> </li> <li class='main-nav '> <a class='main-nav-item' href="https://jobs.washingtonpost.com/">Jobs</a> </li> <li class='main-nav '> <a class='main-nav-item' href="http://www.washingtonpost.com/sf/brand-connect/">WP BrandConnect</a> </li> <li class='main-nav '> <a class='main-nav-item' href="http://www.washingtonpost.com/classifieds/">Classifieds</a> </li> <li class='main-nav has-sub '> <a class='main-nav-item' href="https://www.washingtonpost.com">Partners</a> <i class="fa fa-angle-right main-nav-angle"></i> <div class="subnav-arrow"></div> <ul class="sub-nav"> <li class="sub-nav-item"> <a href="http://www.washingtonpost.com/express/">Express</a> </li> <li class="sub-nav-item"> <a href="http://www.washingtonpostwine.com/">WP Wine Club</a> </li> <li class="sub-nav-item"> <a href="http://www.eltiempolatino.com/">El Tiempo Latino</a> </li> <li class="sub-nav-item"> <a href="http://www.parade.com/">Parade</a> </li> <li class="sub-nav-item"> <a href="http://fashionwashington.com/">Fashion Washington</a> </li> </ul> </li> </ul> </div> <ul id="site-attribution-off-canvas-menu" class="side-nav site-attribution"> <li> <a href="https://www.washingtonpost.com">washingtonpost.com</a> </li> <li> <a href="https://www.washingtonpost.com">1996-2015 The Washington Post</a> </li> <li> <a href="https://www.washingtonpost.com/terms-of-service/2011/11/18/gIQAldiYiN_story.html">Terms of Service</a> </li> <li> <a href="https://www.washingtonpost.com/privacy-policy/2011/11/18/gIQASIiaiN_story.html">Privacy Policy</a> </li> <li> <a href="http://www.washingtonpost.com/news/ask-the-post/discussion-and-submission-guidelines/">Submissions and Discussion Policy</a> </li> <li> <a href="https://www.washingtonpost.com/rss-terms-of-service/2012/01/16/gIQAadFYAQ_story.html">RSS Terms of Service</a> </li> <li> <a href="https://www.washingtonpost.com/how-can-i-opt-out-of-online-advertising-cookies/2011/11/18/gIQABECbiN_story.html">Ad Choices</a> </li> </ul> <div class="bottom-wrapper"></div> </div> </div> <div id="wp-logo-for-print"> <img src="https://img.washingtonpost.com/pb/resources/img/washingtonpost_black_32.png" alt="The Washington Post"/> </div> </div> </div> <div class="moat-trackable pb-f-theme-normal full pb-feature pb-layout-item pb-f-sharebars-top-share-bar" moat-id="sharebars/top-share-bar|world" data-chain-name="no-name" data-feature-name="no-name" data-feature-id="sharebars/top-share-bar" id="fKFpRg103PgCxp"> <style>.hideText{position:absolute;left:-10000px}</style> <div id="top-sharebar_515" class="top-sharebar-wrapper sticky-top-sharebar color-top unprocessed" data-postshare='facebook,twitter,google-plus,email,linkedin,tumblr,whatsapp,sms'> <div class="social-tools-wrapper"> <span class="social-tools-primary hide-multiple-rows"> <div class="social-tools"> <a onclick="var shareWindow=window.open('https://www.facebook.com/sharer/sharer.php?u=http%3A%2F%2Fwapo.st%2F1PlarJi%3Ftid=ss_fb','share_facebook','width=658,height=354,scrollbars=no'); try{wp_pb.StaticMethods.staticPostShare.callPostShare('facebook', this.postShareObject, 'https://www.facebook.com/sharer/sharer.php?u=', 'https://www.washingtonpost.com/world/middle_east/israel-ambassador-to-us-sends-anti-boycott-message-with-gift/2015/12/23/652d639c-a99b-11e5-b596-113f59ee069a_story.html', '', 'width=658,height=354,scrollbars=no', shareWindow, 'ss_fb');}catch(err){if(false){console.log(err);}} return false;" tabindex=_tbidx_> <div class="facebook tool first desktop mobile"><span class="hideText">Share on Facebook</span><span class="fa fa-facebook-square"></span></div> </a><a onclick="var shareWindow=window.open('https://twitter.com/share?url=http%3A%2F%2Fwapo.st%2F1PlarJi%3Ftid=ss_tw&text=Israel%20ambassador%20to%20US%20sends%20anti-boycott%20message%20with%20gift','share_twitter','width=550, height=350, scrollbars=no'); try{wp_pb.StaticMethods.staticPostShare.callPostShare('twitter', this.postShareObject, 'https://twitter.com/share?url=', 'https://www.washingtonpost.com/world/middle_east/israel-ambassador-to-us-sends-anti-boycott-message-with-gift/2015/12/23/652d639c-a99b-11e5-b596-113f59ee069a_story.html', '&text=Israel%20ambassador%20to%20US%20sends%20anti-boycott%20message%20with%20gift', 'width=550, height=350, scrollbars=no', shareWindow, 'ss_tw');}catch(err){if(false){console.log(err);}} return false;" tabindex=_tbidx_> <div class="twitter tool desktop mobile"><span class="hideText">Share on Twitter</span><span class="fa fa-twitter"></span></div> </a><a onclick="var shareWindow=window.open('https://plus.google.com/share?url=http%3A%2F%2Fwapo.st%2F1PlarJi%3Ftid=ss_gp','share_google-plus','width=832,height=472,scrollbars=no'); try{wp_pb.StaticMethods.staticPostShare.callPostShare('google-plus', this.postShareObject, 'https://plus.google.com/share?url=', 'https://www.washingtonpost.com/world/middle_east/israel-ambassador-to-us-sends-anti-boycott-message-with-gift/2015/12/23/652d639c-a99b-11e5-b596-113f59ee069a_story.html', '', 'width=832,height=472,scrollbars=no', shareWindow, 'ss_gp');}catch(err){if(false){console.log(err);}} return false;" tabindex=_tbidx_> <div class="google-plus tool desktop"><span class="hideText">Share on Google Plus</span><span class="fa fa-google-plus"></span></div> </a><a onclick="try{wp_pb.StaticMethods.staticPostShare.callPostShare('email', this.postShareObject, 'mailto:?subject=Israel%20ambassador%20to%20US%20sends%20anti-boycott%20message%20with%20gift from The Washington Post&body=', 'https://www.washingtonpost.com/world/middle_east/israel-ambassador-to-us-sends-anti-boycott-message-with-gift/2015/12/23/652d639c-a99b-11e5-b596-113f59ee069a_story.html', '', null, null, 'ss_mail');}catch(err){if(false){console.log(err);} window.location.href = 'mailto:?subject=Israel%20ambassador%20to%20US%20sends%20anti-boycott%20message%20with%20gift from The Washington Post&body=http%3A%2F%2Fwapo.st%2F1PlarJi%3Ftid=ss_mail'; }return false;" tabindex=_tbidx_> <div class="email tool desktop mobile"><span class="hideText">Share via Email</span><span class="fa fa-envelope"></span></div> </a><a onclick="return false;"> <div class="more tool desktop"><span class="hideText" tabindex=_tbidx_>More Options</span><span class="fa fa-plus"> </span></div> </a><a class="sms-share-device unprocessed" onclick="try{wp_pb.StaticMethods.staticPostShare.callPostShare('sms', this.postShareObject, 'sms://&body=Israel%20ambassador%20to%20US%20sends%20anti-boycott%20message%20with%20gift - ', 'https://www.washingtonpost.com/world/middle_east/israel-ambassador-to-us-sends-anti-boycott-message-with-gift/2015/12/23/652d639c-a99b-11e5-b596-113f59ee069a_story.html', '', null, null, 'ss_sms');}catch(err){if(false){console.log(err);} window.location.href = 'sms://&body=Israel%20ambassador%20to%20US%20sends%20anti-boycott%20message%20with%20gift - http%3A%2F%2Fwapo.st%2F1PlarJi%3Ftid=ss_sms'; }return false;" tabindex=_tbidx_> <div class="sms tool mobile"><span class="hideText">Share on SMS</span><span class="fa fa-commenting"></span></div> </a><a onclick="try{wp_pb.StaticMethods.staticPostShare.callPostShare('whatsapp', this.postShareObject, 'whatsapp://send?text=Israel%20ambassador%20to%20US%20sends%20anti-boycott%20message%20with%20gift - ', 'https://www.washingtonpost.com/world/middle_east/israel-ambassador-to-us-sends-anti-boycott-message-with-gift/2015/12/23/652d639c-a99b-11e5-b596-113f59ee069a_story.html', '', null, null, 'ss_wa');}catch(err){if(false){console.log(err);} window.location.href = 'whatsapp://send?text=Israel%20ambassador%20to%20US%20sends%20anti-boycott%20message%20with%20gift - http%3A%2F%2Fwapo.st%2F1PlarJi%3Ftid=ss_wa'; }return false;" tabindex=_tbidx_> <div class="whatsapp tool last mobile"><span class="hideText">Share on Whatsapp</span><span class="fa fa-whatsapp"></span></div> </a></div> </span> <span class="social-tools-additional"> <div class="social-tools "> <a onclick="var shareWindow=window.open('https://www.linkedin.com/shareArticle?mini=true&url=http%3A%2F%2Fwapo.st%2F1PlarJi%3Ftid=ss_in&title=Israel+ambassador+to+US+sends+anti-boycott+message+with+gift','share_linkedin','width=830,height=460,scrollbars=no'); try{wp_pb.StaticMethods.staticPostShare.callPostShare('linkedin', this.postShareObject, 'https://www.linkedin.com/shareArticle?mini=true&url=', 'https://www.washingtonpost.com/world/middle_east/israel-ambassador-to-us-sends-anti-boycott-message-with-gift/2015/12/23/652d639c-a99b-11e5-b596-113f59ee069a_story.html', '&title=Israel+ambassador+to+US+sends+anti-boycott+message+with+gift', 'width=830,height=460,scrollbars=no', shareWindow, 'ss_in');}catch(err){if(false){console.log(err);}} return false;" tabindex=_tbidx_> <div class="linkedin tool first desktop"><span class="hideText">Share on LinkedIn</span><span class="fa fa-linkedin"></span></div> </a><a onclick="window.open('//pinterest.com/pin/create/button/?url=https%3A%2F%2Fwww.washingtonpost.com%2Fworld%2Fmiddle_east%2Fisrael-ambassador-to-us-sends-anti-boycott-message-with-gift%2F2015%2F12%2F23%2F652d639c-a99b-11e5-b596-113f59ee069a_story.html%3Ftid=ss_pin&media=&description=Israel+ambassador+to+US+sends+anti-boycott+message+with+gift','share_pinterest','width=550,height=450,scrollbars=no');" tabindex=_tbidx_> <div class="pinterest tool desktop"><span class="hideText">Share on Pinterest</span><span class="fa fa-pinterest"></span></div> </a><a onclick="var shareWindow=window.open('https://www.tumblr.com/share/link?url=http%3A%2F%2Fwapo.st%2F1PlarJi%3Ftid=ss_tu&name=Israel+ambassador+to+US+sends+anti-boycott+message+with+gift&description=','share_tumblr','width=550,height=450,scrollbars=no'); try{wp_pb.StaticMethods.staticPostShare.callPostShare('tumblr', this.postShareObject, 'https://www.tumblr.com/share/link?url=', 'https://www.washingtonpost.com/world/middle_east/israel-ambassador-to-us-sends-anti-boycott-message-with-gift/2015/12/23/652d639c-a99b-11e5-b596-113f59ee069a_story.html', '&name=Israel+ambassador+to+US+sends+anti-boycott+message+with+gift&description=', 'width=550,height=450,scrollbars=no', shareWindow, 'ss_tu');}catch(err){if(false){console.log(err);}} return false;" tabindex=_tbidx_> <div class="tumblr tool last desktop"><span class="hideText">Share on Tumblr</span><span class="fa fa-tumblr"></span></div> </a></div> </span> <span class="social-tools-readlater"> <div class="social-tools "> <a tabindex=_tbidx_> <div class="tool read-later-bookmark desktop mobile" data-canonical-url="https://www.washingtonpost.com/world/middle_east/israel-ambassador-to-us-sends-anti-boycott-message-with-gift/2015/12/23/652d639c-a99b-11e5-b596-113f59ee069a_story.html"> <span class="hideText">Book mark article</span> <span class="fa fa-bookmark-o"></span> </div> </a> <a tabindex=_tbidx_> <div class="tool read-later-list desktop mobile"> <span class="hideText">Read later list</span> <span class="fa fa-list-ul"></span> </div> </a> </div> </span> </div> <div class="social-notification-bar"> <div class="notification-message"> <span class="fa fa-check"></span> <span class="social-text social-text-desk"> Saved to Reading List</span> <span class="social-text social-text-mobile"> Saved</span> </div> <div class="read-later-ads" id="read_later_notification_desktop" data-ad-type="read_later_notification_desktop" style="display:none;"></div> </div> <div class="sign-in-dialog"> <div class="col-sm-6 dialog-message-container"> <div class="read-later-dialog-message"> <div class="read-later-dialog-headline">Too busy to read this now?</div> <p>Sign in or create an account so we can save this story to your Reading List. You'll be able to access the story from your Reading List on any computer, tablet or smartphone.</p> </div> <div id="read_later_popup_ad_container" data-ad-id="slug_read_later_popup_desktop" data-ad-type="read_later_popup_desktop" style="display:none;"></div> </div> <div class="col-sm-6 login-btn-container"> <p class="top-header-message">Sign in to your account to save this article.</p> <div class="dialog-btn-container"> <a class="dialog-btn login-btn" href="">Sign in</a> </div> <div class="dialog-btn-container"> <a class="dialog-btn create-account-btn" href="">Create account</a> </div> </div> </div> </div> <div class="clear"></div> <div class="shareBar-follow-modal" style="display: none;"> <div class="follow-modal-title not-signed-In before"> <div> <b class="follow-category category-title"></b> <i class="fa fa-times follow-modal-close"></i> </div> <p class="category-desc"> The inside track on Washington politics. </p> </div> <div class="follow-modal-body"> <div class="not-signed-In before"> Be the first to know about new <span class="category-title"> </span> stories from PowerPost. Sign up to follow, and we’ll e-mail you free updates as they’re published. </div> <div class="signed-In"> <i class="fa fa-check"></i> You’ll receive free e-mail news updates each time a new story is published. </div> <div class="not-signed-In after"> <i class="fa fa-check"></i> You’re all set! </div> </div> <div class="follow-modal-buttons"> <div class="not-signed-In before"> <div> <input type="email" class="follow-modal-input" id="follow-modal-input"placeholder="Enter email address"/> <a class="follow-modal-confirm sign-up">Sign up </a> </div> <p class="invalid-email">*Invalid email address</p> </div> <div class="not-signed-In after"> <a class="follow-modal-confirm got-it">Got it</a> </div> <div class="signed-In"> <a class="follow-modal-confirm got-it">Got it</a> </div> </div> <div class="arrow-down"></div> </div> </div> <div class="moat-trackable pb-f-theme-normal full pb-feature pb-layout-item pb-f-ad-leaderboard" moat-id="ad/leaderboard|world" data-chain-name="no-name" data-feature-name="no-name" data-feature-id="ad/leaderboard" id="fNq0KF103PgCxp"> <div class="leaderboard ad-hideable"> <div id="slug_leaderboard" data-ad-type="leaderboard" class="pb-ad-container" style="display:none;"> </div> </div> <div class="mobile-fixed ad-hideable"> <div id="slug_t" data-ad-type="t" class="pb-ad-container-mobile" style="display:none;"> </div> </div> <script>(function(){TWP=window.TWP||{};TWP.Features=TWP.Features||{};TWP.Features.Ad=TWP.Features.Ad||{};TWP.Features.Ad.Leaderboard={};TWP.Features.Ad.Leaderboard.viewability=!1;TWP.Features.Ad.Leaderboard.sticky=!0;TWP.Features.Ad.Leaderboard.belowSharebar=!1})();</script> </div> <div class="pb-container"> <div class="moat-trackable pb-f-theme-normal pb-3 pb-feature pb-layout-item pb-f-article-article-topper" moat-id="article/article-topper|world" data-chain-name="no-name" data-feature-name="no-name" data-feature-id="article/article-topper" id="fgjolt103PgCxp"> <div id="article-topper" class="article-topper"> <div class="headline-kicker"><a href='/world/middle-east'>Middle East</a></div> <h1 data-pb-field="customFields.web_headline" itemprop="headline">Israel ambassador to US sends anti-boycott message with gift</h1> <div id="essentials-topperx" style="display: none;"></div> <div class="clear"></div> </div> <div class="subTitle-follow-modal"> <div class="follow-modal-title not-signed-In before"> <div> <b class="follow-category category-title"></b> <i class="fa fa-times follow-modal-close"></i> </div> <p class="category-desc"> The inside track on Washington politics. </p> </div> <div class="follow-modal-body"> <div class="not-signed-In before"> Be the first to know about new <span class="category-title"> </span> stories from PowerPost. Sign up to follow, and we’ll e-mail you free updates as they’re published. </div> <div class="signed-In"> <i class="fa fa-check"></i> You’ll receive free e-mail news updates each time a new story is published. </div> <div class="not-signed-In after"> <i class="fa fa-check"></i> You’re all set! </div> </div> <div class="follow-modal-buttons"> <div class="not-signed-In before"> <div> <input type="email" class="follow-modal-input" id="follow-modal-input"placeholder="Enter email address"/> <a class="follow-modal-confirm sign-up">Sign up </a> </div> <p class="invalid-email">*Invalid email address</p> </div> <div class="not-signed-In after"> <a class="follow-modal-confirm got-it">Got it</a> </div> <div class="signed-In"> <a class="follow-modal-confirm got-it">Got it</a> </div> </div> <div class="arrow-down"></div> </div> </div> <div class="moat-trackable pb-f-theme-normal pb-3 pb-feature pb-layout-item pb-f-sharebars-utilities-tool-bar" moat-id="sharebars/utilities-tool-bar|world" data-chain-name="no-name" data-feature-name="no-name" data-feature-id="sharebars/utilities-tool-bar" id="fpYQV0103PgCxp"> <style>.hideText{position:absolute;left:-10000px}</style> <div id="utilities-tool_4269" class="utilities-bar-wrapper "> <div class=" utility-tools-wrapper"> <div class="utility-tools-primary margin-top"> <div class="utility-tools"> <div class="textresizer tool first mobile"><span class="hideText" tabindex=_tbidx_>Resize Text</span><span class="fa fa-font"></span></div><a onclick="window.print();" tabindex=_tbidx_> <div class="print tool mobile"><span class="hideText">Print Article</span><span class="fa fa-print"></span></div> </a><a href="#" onclick="wp_pb.report('comments', 'showComments',{elm:$(this),guid:'https://www.washingtonpost.com/world/middle_east/israel-ambassador-to-us-sends-anti-boycott-message-with-gift/2015/12/23/652d639c-a99b-11e5-b596-113f59ee069a_story.html'}); return false;" tabindex=_tbidx_> <div class="comments tool last mobile"><span class="hideText">Comments</span><span class="fa fa-comments"></span> <span id="echo_container" class="echo_container comment-vars echo-counter text" guid="https://www.washingtonpost.com/world/middle_east/israel-ambassador-to-us-sends-anti-boycott-message-with-gift/2015/12/23/652d639c-a99b-11e5-b596-113f59ee069a_story.html">0</span></div> </a></div> </div> </div> <div id="slug_tiffany_tile" data-ad-type="tiffany_tile" class="right" style="display:none;padding-left:20px !important;height:auto;max-height:60px;overflow:hidden;"> <div id="wpni_adi_tiffany_tile" class="ads slug tiffany_tile header"></div> </div> </div> <div class="clear"></div> </div> <div class=" main-content pb-layout-item pb-chain pb-c-default-chain pb-2" id="c0NSVbJ03PgCxp"> <div class="moat-trackable pb-f-theme-normal pb-2 pb-feature pb-layout-item pb-f-article-article-body" moat-id="article/article-body|world" data-chain-name="no-name" data-feature-name="no-name" data-feature-id="article/article-body" id="f7jL31203PgCxp"> <div id="article-body" class="article-body"> <div class="pb-sig-line hasnt-headshot has-0-headshots hasnt-bio is-not-column"> <span class="pb-byline" itemprop="author" itemscope itemtype="http://schema.org/Person">By <span itemprop="name">Associated Press</span></span> <span class="pb-timestamp" itemprop="datePublished" content="2015-12-23T12:34-500">December 23 at 12:34 PM</span> </div> <article itemprop="articleBody"> <p>JERUSALEM — Israel’s ambassador to the United States has dispatched a politically charged holiday gift.</p> <p>Ambassador Ron Dermer says that by sending American recipients a holiday basket that includes wine, olive oil and other goods produced in Israeli settlements, he is also delivering a message against those seeking to boycott the Jewish state.</p> <p>Dermer said Wednesday the gift is meant to “combat the latest effort by Israel’s enemies to destroy the one and only Jewish state.”</p> <p>Israel has been jarred by efforts of the Boycott, Divestment and Sanctions movement, or BDS, which Israel considers to be anti-Semitic. It has also been outraged by last month’s move by the European Union to label products made in Israeli settlements on lands it captured in the 1967 Mideast war.</p> <p>The U.S. opposes the BDS movement.</p><div></div><div></div> <p>Copyright 2015 The Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.</p> </article> <div class="clear"></div> <div class="post-body-sig-line"><div class="post-body-bio"></div><div class="clear"></div></div> </div> </div> <div class="moat-trackable pb-f-theme-normal pb-1 pb-feature pb-layout-item pb-f-page-newsletter-inStream" moat-id="page/newsletter-inStream|world" data-chain-name="no-name" data-feature-name="no-name" data-feature-id="page/newsletter-inStream" id="f053Qm403PgCxp"> <div id="signup-box-instream" class=" bottomArticle" data-force="false"> <div class="hidden-data"> <p id="section-instream">world</p> <p id="subsection-instream">middle_east</p> <p id="blogname-instream"></p> </div> <div> <p class="headline" id="headline-instream"><i class="fa fa-check checked-icon"></i></p> <p class="title" id="tagline-instream"></p> <p class="title" id="confirmation-instream"> <span>Success!</span> Check your inbox for details. <span class="might-like"> You might also like:</span> </p> <div id="subscribe-form-inStream"> <input type="text" name="email" id="email-inStream" class="newsLetter-field" placeholder="E-mail address"/> <input type="submit" value="Add" class="newsLetter-btn subscribe-btn-inStream"/> </div> <input type="submit" value="Sign me up" class="newsLetter-field newsletter-btn-signed-up subscribe-newsLetter" id="loggedInBtn"/> <p class="error-msg-inStream">Please enter a valid email address</p> </div> <div class="suggestions-inStream" id="suggestions-inStream"> <div class="suggestion-list-inStream"> <div class="suggestion recommended"> <input type="checkbox" checked class="checkbox" name="" value="" data-pos="1"/> <p class="suggestion-title"></p> </div> <div class="suggestion recommended"> <input type="checkbox" checked class="checkbox" name="" value="" data-pos="2"/> <p class="suggestion-title"></p> </div> <div class="suggestion recommended"> <input type="checkbox" checked class="checkbox" name="" value="" data-pos="3"/> <p class="suggestion-title"></p> </div> </div> <div class="suggestion-buttons-inStream"> <button class="newsLetter-btn suggestion-btn" id="subscribe-bundle-inStream">Sign Up</button> <button class="newsLetter-btn suggestion-btn" id="cancel-bundle-inStream">No Thanks</button> </div> </div> <p class="title" id="all-newsletters-inStream"> <a href="https://subscribe.washingtonpost.com/newsletters">See all newsletters</a> </p> <div class="clear"></div> </div> </div> <div class="moat-trackable pb-f-theme-normal pb-2 pb-feature pb-layout-item pb-f-page-share-bar" moat-id="page/share-bar|world" data-chain-name="no-name" data-feature-name="no-name" data-feature-id="page/share-bar" id="f0LiB9w03PgCxp"> <div class="social-tools-wrapper-bottom " data-postshare='facebook,twitter,google-plus,linkedin,tumblr'> <ul class="social-tools-bottom inline"> <li data-sharetype="facebook" class="left facebook"> <a href="#" onclick="var shareWindow=window.open('https://www.facebook.com/sharer/sharer.php?u=http%3A%2F%2Fwapo.st%2F1PlarJi%3Ftid=ss_fb-bottom','share_facebook','width=658,height=354,scrollbars=no'); try{wp_pb.StaticMethods.staticPostShare.callPostShare('facebook', this.postShareObject, 'https://www.facebook.com/sharer/sharer.php?u=', 'https://www.washingtonpost.com/world/middle_east/israel-ambassador-to-us-sends-anti-boycott-message-with-gift/2015/12/23/652d639c-a99b-11e5-b596-113f59ee069a_story.html', '', 'width=658,height=354,scrollbars=no', shareWindow, 'ss_fb-bottom');}catch(err){if(false){console.log(err);}} return false;" tabindex=_tbidx_> <span class="fa fa-facebook-square">&nbsp;</span><span class="longname">Share on Facebook</span><span class="shortname">Share</span> </a> </li> <li data-sharetype="twitter" class="right twitter"> <a href="#"onclick="var shareWindow=window.open('https://twitter.com/share?url=http%3A%2F%2Fwapo.st%2F1PlarJi%3Ftid=ss_tw-bottom&text=Israel%20ambassador%20to%20US%20sends%20anti-boycott%20message%20with%20gift','share_twitter','width=550, height=350, scrollbars=no'); try{wp_pb.StaticMethods.staticPostShare.callPostShare('twitter', this.postShareObject, 'https://twitter.com/share?url=', 'https://www.washingtonpost.com/world/middle_east/israel-ambassador-to-us-sends-anti-boycott-message-with-gift/2015/12/23/652d639c-a99b-11e5-b596-113f59ee069a_story.html', '&text=Israel%20ambassador%20to%20US%20sends%20anti-boycott%20message%20with%20gift', 'width=550, height=350, scrollbars=no', shareWindow, 'ss_tw-bottom');}catch(err){if(false){console.log(err);}} return false;" tabindex=_tbidx_> <span class="fa fa-twitter">&nbsp;</span> <span class="longname">Share on Twitter</span><span class="shortname">Tweet</span> </a> </li> </ul> <div class="clear"></div> </div> </div> <div class="moat-trackable pb-f-theme-normal pb-2 pb-feature pb-layout-item pb-f-page-comments" moat-id="page/comments|world" data-chain-name="no-name" data-feature-name="no-name" data-feature-id="page/comments" id="f0isLLm03PgCxp"> <div data-allow-comments = "true" class="pb-comment-wrapper "> <div id="comment_summary_pb_comments" class="comment-summary jump "> <div class="comment-summary-count"><span class="fa fa-comments"></span><span id="echo_container" class="echo_container comment-vars echo-counter" guid="https://www.washingtonpost.com/world/middle_east/israel-ambassador-to-us-sends-anti-boycott-message-with-gift/2015/12/23/652d639c-a99b-11e5-b596-113f59ee069a_story.html">0</span></div> <div class="comment-summary-display"><span class="comment-display"> Comments</span></div> </div> </div> <style>.pb-feature.pb-f-page-comments .pb-comment-wrapper{padding-right:0;border-bottom:none}.pb-feature.pb-f-page-comments{border-right:1px solid #d5d5d5;padding-right:50px}</style> </div> <div class="moat-trackable pb-f-theme-normal pb-2 pb-feature pb-layout-item pb-f-page-recommended-strip" moat-id="page/recommended-strip|world" data-chain-name="no-name" data-feature-name="no-name" data-feature-id="page/recommended-strip" id="f0pY4EO03PgCxp"> <script id="postrecommends-article-template" class="template" type="text/template">
15
+
16
+
17
+
18
+
19
+
20
+
21
+
22
+
23
+
24
+
25
+
26
+
27
+
28
+
29
+
30
+
31
+
32
+
33
+
34
+
35
+
36
+
37
+
38
+
39
+
40
+
41
+
42
+
43
+
44
+
45
+
46
+
47
+
48
+
49
+
50
+
51
+
52
+
53
+
54
+
55
+
56
+
57
+ <div class="border-bottom-hairline">
58
+
59
+
60
+
61
+
62
+
63
+ <div class="no-skin flex-item flex-stack text-align-left equalize-height-target" data-pb-content-id="918b10d2d34d2f56dccb82fb624f3379">
64
+
65
+
66
+
67
+
68
+
69
+
70
+
71
+
72
+
73
+
74
+
75
+
76
+
77
+
78
+
79
+
80
+
81
+
82
+
83
+
84
+
85
+
86
+
87
+
88
+
89
+
90
+
91
+
92
+
93
+
94
+
95
+
96
+
97
+
98
+
99
+
100
+
101
+
102
+
103
+
104
+
105
+
106
+
107
+
108
+
109
+ <div class="row">
110
+ <div class="col-xs-4 art-left flex-stack-art">
111
+
112
+
113
+
114
+
115
+
116
+
117
+
118
+
119
+
120
+
121
+
122
+
123
+
124
+
125
+
126
+
127
+
128
+
129
+
130
+
131
+
132
+
133
+
134
+
135
+
136
+
137
+
138
+
139
+
140
+
141
+
142
+
143
+
144
+
145
+
146
+
147
+
148
+
149
+
150
+
151
+
152
+
153
+
154
+
155
+
156
+
157
+
158
+
159
+
160
+
161
+
162
+
163
+
164
+
165
+
166
+
167
+
168
+
169
+
170
+
171
+
172
+
173
+
174
+
175
+
176
+
177
+
178
+
179
+
180
+
181
+
182
+
183
+
184
+
185
+
186
+
187
+
188
+
189
+
190
+
191
+
192
+
193
+
194
+
195
+
196
+
197
+
198
+
199
+
200
+
201
+
202
+
203
+
204
+
205
+
206
+
207
+
208
+
209
+
210
+
211
+
212
+
213
+
214
+
215
+
216
+
217
+
218
+
219
+
220
+
221
+
222
+
223
+
224
+
225
+
226
+
227
+
228
+
229
+
230
+
231
+
232
+
233
+
234
+
235
+
236
+
237
+
238
+
239
+
240
+
241
+
242
+
243
+
244
+
245
+
246
+
247
+
248
+
249
+
250
+
251
+
252
+
253
+
254
+
255
+
256
+
257
+
258
+
259
+
260
+
261
+ <!-- art -->
262
+
263
+ <div class="art art-left art-small art-left text-align-left ">
264
+
265
+
266
+ <div class="photo-wrapper"><a href="https://www.washingtonpost.com/local/nations-t-rex-stands-upright-for-the-first-time-in-65-million-years--and-hes-scary/2015/10/01/9f843fe0-6727-11e5-9223-70cb36460919_story.html"><img
267
+ src="https://img.washingtonpost.com/rf/image_480x320/2010-2019/WashingtonPost/2015/09/30/Others/Images/2015-09-30/T-REX_10181443626351.jpg"
268
+ data-threshold="112" class=" "
269
+ /></a></div>
270
+
271
+
272
+
273
+
274
+
275
+ <div class="clear"></div>
276
+ </div>
277
+ <!-- /art -->
278
+
279
+
280
+
281
+
282
+
283
+ </div><!-- /col art-left -->
284
+ <div class="flex-stack col-xs-8 flex-stack-text">
285
+
286
+
287
+
288
+
289
+
290
+
291
+
292
+
293
+
294
+
295
+
296
+
297
+
298
+
299
+
300
+
301
+
302
+
303
+
304
+
305
+
306
+
307
+
308
+
309
+
310
+
311
+
312
+
313
+
314
+
315
+
316
+
317
+
318
+
319
+
320
+
321
+
322
+
323
+
324
+
325
+
326
+
327
+
328
+
329
+
330
+
331
+
332
+
333
+
334
+
335
+
336
+
337
+
338
+
339
+
340
+
341
+
342
+
343
+
344
+
345
+
346
+
347
+
348
+
349
+
350
+
351
+
352
+
353
+
354
+
355
+
356
+
357
+
358
+
359
+
360
+
361
+
362
+ <div class="headline small highlight-style "><a href="https://www.washingtonpost.com/local/nations-t-rex-stands-upright-for-the-first-time-in-65-million-years--and-hes-scary/2015/10/01/9f843fe0-6727-11e5-9223-70cb36460919_story.html" data-pb-field="web_headline" data-pb-url-field="canonical_url" data-pb-placeholder="Write headline here">‘Nation’s T. rex’ stands upright for the first time in 65 million years — and he’s scary</a></div>
363
+
364
+
365
+
366
+
367
+
368
+
369
+
370
+
371
+
372
+
373
+
374
+
375
+
376
+
377
+
378
+
379
+
380
+
381
+
382
+
383
+ <div class="blurb " data-pb-field="summary" data-pb-placeholder="Write blurb here.">The engineering feat that re-created a ferocious carnivore, now bound for D.C.’s Natural History Museum.</div>
384
+
385
+
386
+
387
+
388
+
389
+
390
+
391
+
392
+
393
+
394
+
395
+
396
+
397
+
398
+
399
+
400
+
401
+
402
+
403
+
404
+
405
+
406
+
407
+
408
+
409
+
410
+
411
+
412
+
413
+
414
+
415
+
416
+
417
+
418
+
419
+
420
+
421
+
422
+
423
+
424
+
425
+
426
+
427
+
428
+
429
+
430
+
431
+
432
+
433
+
434
+
435
+
436
+
437
+
438
+
439
+
440
+
441
+
442
+
443
+
444
+
445
+
446
+
447
+
448
+
449
+
450
+
451
+
452
+
453
+
454
+
455
+
456
+
457
+
458
+
459
+
460
+
461
+
462
+
463
+
464
+
465
+
466
+
467
+
468
+
469
+
470
+
471
+
472
+
473
+
474
+
475
+
476
+
477
+
478
+
479
+
480
+
481
+
482
+
483
+
484
+
485
+
486
+
487
+
488
+
489
+
490
+
491
+
492
+
493
+
494
+
495
+
496
+
497
+
498
+
499
+
500
+
501
+
502
+
503
+
504
+
505
+
506
+
507
+
508
+
509
+
510
+
511
+
512
+
513
+
514
+
515
+
516
+
517
+
518
+
519
+
520
+
521
+
522
+
523
+
524
+
525
+
526
+
527
+
528
+
529
+
530
+
531
+
532
+
533
+
534
+
535
+
536
+
537
+
538
+
539
+
540
+
541
+
542
+
543
+
544
+
545
+
546
+
547
+
548
+
549
+
550
+
551
+
552
+
553
+
554
+
555
+
556
+
557
+
558
+
559
+
560
+
561
+
562
+
563
+
564
+
565
+
566
+
567
+
568
+
569
+
570
+
571
+
572
+
573
+
574
+
575
+
576
+
577
+
578
+
579
+
580
+
581
+
582
+
583
+
584
+
585
+
586
+
587
+
588
+
589
+
590
+
591
+
592
+
593
+
594
+
595
+
596
+
597
+
598
+
599
+
600
+
601
+
602
+
603
+
604
+
605
+
606
+
607
+
608
+
609
+
610
+
611
+
612
+
613
+
614
+
615
+
616
+
617
+
618
+
619
+
620
+
621
+
622
+
623
+
624
+
625
+
626
+
627
+
628
+
629
+
630
+
631
+
632
+
633
+
634
+
635
+
636
+
637
+
638
+
639
+
640
+
641
+
642
+
643
+
644
+
645
+
646
+
647
+
648
+
649
+
650
+
651
+
652
+
653
+
654
+
655
+
656
+
657
+
658
+
659
+
660
+
661
+
662
+
663
+
664
+
665
+
666
+
667
+
668
+
669
+
670
+ </div><!-- /col text -->
671
+ <div class="clear"></div>
672
+ </div><!-- /row -->
673
+
674
+
675
+
676
+
677
+
678
+
679
+ </div>
680
+ </div>
681
+
682
+
683
+
684
+
685
+
686
+
687
+
688
+
689
+
690
+
691
+
692
+
693
+
694
+
695
+
696
+
697
+
698
+ </script> <div id="post-recommends" class="cf-postrecommends-module"> <div id="slug_postrecommends" data-ad-type="postrecommends" style="display:none;"></div> </div> <script>(function(a){TWP=window.TWP||{};TWP.Features=TWP.Features||{};TWP.Features.Page=TWP.Features.Page||{};TWP.Features.Page.PostRecommends={};TWP.Features.Page.PostRecommends.url="https://recommendation-hybrid.wpdigital.net/hybrid/hybrid-filter/hybrid.json?callback\x3d?";TWP.Features.Page.PostRecommends.trackUrl="https://recommendation-hybrid.wpdigital.net/hybrid/hybrid-filter/tracker.json?callback\x3d?";TWP.Features.Page.PostRecommends.profileUrl="https://usersegment.wpdigital.net/usersegments";TWP.Features.Page.PostRecommends.canonicalUrl=
699
+ ""})(jQuery);</script> </div> <div class="moat-trackable pb-f-theme-normal pb-2 pb-feature pb-layout-item pb-f-page-outbrain" moat-id="page/outbrain|world" data-chain-name="no-name" data-feature-name="no-name" data-feature-id="page/outbrain" id="fvWnb9203PgCxp"> <div id="outbrain-container" data-src="https://www.washingtonpost.com/world/middle_east/israel-ambassador-to-us-sends-anti-boycott-message-with-gift/2015/12/23/652d639c-a99b-11e5-b596-113f59ee069a_story.html" data-widget-id="AR_1" data-ob-template="washingtonpost"></div> </div> <div class="moat-trackable pb-f-theme-normal pb-2 pb-feature pb-layout-item pb-f-page-comments" moat-id="page/comments|world" data-chain-name="no-name" data-feature-name="no-name" data-feature-id="page/comments" id="fndqog103PgCxp"> <div data-allow-comments = "true" class="pb-comment-wrapper lockfix "> <div id="comment_summary_pb_comments" class="comment-summary summary-expanded-mobile"> <div class="comment-summary-count"><span class="fa fa-comments"></span><span id="echo_container" class="echo_container comment-vars echo-counter" guid="https://www.washingtonpost.com/world/middle_east/israel-ambassador-to-us-sends-anti-boycott-message-with-gift/2015/12/23/652d639c-a99b-11e5-b596-113f59ee069a_story.html">0</span></div> <div class="comment-summary-display"><span class="comment-display"> Show Comments</span></div> </div> <div id="echo_container_placeholder" class="echo_container_placeholder"> <div id="echo_container_pb_comments" class="echo_container canvas comment-vars comments unprocessed defer deferMobile count submitbox stream " guid="https://www.washingtonpost.com/world/middle_east/israel-ambassador-to-us-sends-anti-boycott-message-with-gift/2015/12/23/652d639c-a99b-11e5-b596-113f59ee069a_story.html" allow_comments="true" allow_photos="false" allow_videos="false" commentpermalinkurlfacet="https://www.washingtonpost.com/world/middle_east/israel-ambassador-to-us-sends-anti-boycott-message-with-gift/2015/12/23/652d639c-a99b-11e5-b596-113f59ee069a_story.html" defaultSort="reverseChronological" defaultTab="all" isallcomments="true" includepause="true" includepermalink="false" includerecommend="true" includereport="true" includereply="true" includeshare="true" includesorts="true" includetabs="" includeverifiedcommenters="true" includevoteofftopic="false" markerDisplay="'post_commenter':'Post Commenter','staff':'Post Writer','top_commenter':'Post Forum','top_local':'Washingtologist','top_sports':'SuperFan','fact_checker':'Fact Checker','post_recommended':'Post Recommended','world_watcher':'World Watcher','cultuer_connoisseur':'Culture Connoisseur','weather_watcher':'Capital Weather Watcher','post_contributor':'Post Contributor'" markersall="" maxItems="5" maxItemsTop="3" moderationrequired="" primaryNode="world" sectionId="middle_east" columnName="" source="washpost.com" streamid="" tabs="{}" usermarkers="" usermarkersall="" webtype="article" data-canvas-id="washpost.com/km4ey0dajm" data-app-instance="6634zxcgfd"> <div class="echo-header-container"> <div id="comment-info-links" class="right"> <span class="discussion-policy"><a href="//www.washingtonpost.com/blogs/ask-the-post/discussion-and-submission-guidelines/" target="_policy">Discussion Policy</a> </span> </div> <div class="comment-count-label"><span class="echo-counter"></span> Comments</div> </div> <div id="echo_stream_container" class="echo-stream-container echo-comment-container echo-canvas canvas canvas-methode-allcomments echo-stream" data-canvas-id="washpost.com/km4ey0dajm" data-app-instance="6634zxcgfd"> </div> </div> <div class="badgetext hide hidden"> <div id="echo-top_sports" class="echo-badge-info"> <div class="marker echo-item-user-top_sports"></div><p class="title">SuperFan Badge</p> <p>SuperFan badge holders consistently post smart, timely comments about Washington area sports and teams.</p> <p class="echo-badge-info-link"><a target="_badgeinfo" href="//www.washingtonpost.com/wp-srv/interactivity/get-a-badge.html">More about badges</a> | <a target="_badgeinfo" href="http://www.washingtonpost.com/wp-srv/interactivity/get-a-badge.html">Request a badge</a></p> </div> <div id="echo-culture_connoisseur" class="echo-badge-info"> <div class="marker echo-item-user-culture_connoisseur"></div><p class="title">Culture Connoisseur Badge</p> <p>Culture Connoisseurs consistently offer thought-provoking, timely comments on the arts, lifestyle and entertainment.</p> <p class="echo-badge-info-link"><a target="_badgeinfo" href="//www.washingtonpost.com/wp-srv/interactivity/get-a-badge.html">More about badges</a> | <a target="_badgeinfo" href="http://www.washingtonpost.com/wp-srv/interactivity/get-a-badge.html">Request a badge</a></p> </div> <div id="echo-fact_checker" class="echo-badge-info"> <div class="marker echo-item-user-fact_checker"></div><p class="title">Fact Checker Badge</p> <p>Fact Checkers contribute questions, information and facts to <a target="_badgeinfo" href="//www.washingtonpost.com/blogs/fact-checker">The Fact Checker</a>.</p> <p class="echo-badge-info-link"><a target="_badgeinfo" href="//www.washingtonpost.com/wp-srv/interactivity/get-a-badge.html">More about badges</a> | <a target="_badgeinfo" href="http://www.washingtonpost.com/wp-srv/interactivity/get-a-badge.html">Request a badge</a></p> </div> <div id="echo-top_local" class="echo-badge-info"> <div class="marker echo-item-user-top_local"></div><p class="title">Washingtologist Badge</p> <p>Washingtologists consistently post thought-provoking, timely comments on events, communities, and trends in the Washington area.</p> <p class="echo-badge-info-link"><a target="_badgeinfo" href="//www.washingtonpost.com/wp-srv/interactivity/get-a-badge.html">More about badges</a> | <a target="_badgeinfo" href="http://www.washingtonpost.com/wp-srv/interactivity/get-a-badge.html">Request a badge</a></p> </div> <div id="echo-staff" class="echo-badge-info"> <div class="marker echo-item-user-staff" style="float:left;"></div><p class="title">Post Writer Badge</p> <p>This commenter is a Washington Post editor, reporter or producer.</p> </div> <div id="echo-top_commenter" class="echo-badge-info"> <div class="marker echo-item-user-top_commenter"></div><p class="title">Post Forum Badge</p> <p>Post Forum members consistently offer thought-provoking, timely comments on politics, national and international affairs.</p> <p class="echo-badge-info-link"><a target="_badgeinfo" href="//www.washingtonpost.com/wp-srv/interactivity/get-a-badge.html">More about badges</a> | <a target="_badgeinfo" href="http://www.washingtonpost.com/wp-srv/interactivity/get-a-badge.html">Request a badge</a></p> </div> <div id="echo-weather_watcher" class="echo-badge-info"> <div class="marker echo-item-user-weather_watcher"></div><p class="title">Weather Watcher Badge</p> <p>Weather Watchers consistently offer thought-provoking, timely comments on climates and forecasts.</p> <p class="echo-badge-info-link"><a target="_badgeinfo" href="//www.washingtonpost.com/wp-srv/interactivity/get-a-badge.html">More about badges</a> | <a target="_badgeinfo" href="http://www.washingtonpost.com/wp-srv/interactivity/get-a-badge.html">Request a badge</a></p> </div> <div id="echo-world_watcher" class="echo-badge-info"> <div class="marker echo-item-user-world_watcher"></div><p class="title">World Watcher Badge</p> <p>World Watchers consistently offer thought-provoking, timely comments on international affairs.</p> <p class="echo-badge-info-link"><a target="_badgeinfo" href="//www.washingtonpost.com/wp-srv/interactivity/get-a-badge.html">More about badges</a> | <a target="_badgeinfo" href="http://www.washingtonpost.com/wp-srv/interactivity/get-a-badge.html">Request a badge</a></p> </div> <div id="echo-post_contributor" class="echo-badge-info"> <div class="marker echo-item-user-post_contributor"></div><p class="title">Post Contributor Badge</p> <p>This commenter is a Washington Post contributor. Post contributors aren’t staff, but may write articles or columns. In some cases, contributors are sources or experts quoted in a story.</p> <p class="echo-badge-info-link"><a target="_badgeinfo" href="//www.washingtonpost.com/wp-srv/interactivity/get-a-badge.html">More about badges</a> | <a target="_badgeinfo" href="http://www.washingtonpost.com/wp-srv/interactivity/get-a-badge.html">Request a badge</a></p> </div> <div id="echo-post_recommended" class="echo-badge-info"> <div class="marker echo-item-marker-post_recommended"></div><p class="title">Post Recommended</p> <p>Washington Post reporters or editors recommend this comment or reader post.</p> </div> <div id="echo-anon-report"> <p>You must be logged in to report a comment.</p> <div class="inline padding-right-9"><a class="echo-sign-in icon right-arrow" href=""><strong>Sign in here</strong></a></div> </div> <div id="echo-anon-recommend"> <p>You must be logged in to recommend a comment.</p> <div class="inline padding-right-9"><a class="echo-sign-in icon right-arrow" href=""><strong>Sign in here</strong></a></div> </div> <div id="echo-comments-overview"> <p>Comments our editors find particularly useful or relevant are displayed in <strong>Top Comments</strong>, as are comments by users with these badges: <strong><span class="badge-list"></span></strong>. Replies to those posts appear here, as well as posts by staff writers.</p><p>All comments are posted in the <strong>All Comments</strong> tab.</p> <div class="inline padding-right-9 left"><a class="icon right-arrow" href="//www.washingtonpost.com/wp-srv/interactivity/get-a-badge.html"><strong>More about badges</strong></a></div><div class="inline padding-right-9 right"><a class="icon right-arrow" href="http://www.washingtonpost.com/wp-srv/interactivity/get-a-badge.html"><strong>Get a badge</strong></a></div> <div class="clear padding-top-10"> <p>To pause and restart automatic updates, click "Live" or "Paused". If paused, you'll be notified of the number of additional comments that have come in.</p> </div> </div> <div id="echo-more-comments-top"> <div style="font-size: 11px;"><br/>Comments our editors find particularly useful or relevant are displayed in <strong>Top Comments</strong>, as are comments by users with these badges: <strong><span class="badge-list"></span></strong>. Replies to those posts appear here, as well as posts by staff writers.</div> </div> </div> <div class="hide hidden utils"> <div id="comment-flag-container"> <div id="comment-flag-list"> <div class="arrow-one"></div> <div class="arrow-two"></div> <div class="flag-list"> <ul> <li id='flag-spam' class='report-button'>Spam</li> <li id='flag-offensive' class='report-button'>Offensive</li> <li id='flag-disagree' class='report-button'>Disagree</li> <li id='flag-offtopic' class='report-button'>Off-Topic</li> </ul> </div> </div> </div> </div> <!--[if IE 7]><style type="text/css">.comment-share-info #newsharebar li .more{position:relative;margin-left:-220px}.comment-share-info #newsharebar li .morebottom{height:110px;position:relative;top:10px;z-index:998}.comment-share-info #newsharebar li .morebottom .left,.comment-share-info #newsharebar li .morebottom .right{z-index:1000;height:110px}.comment-share-info #newsharebar li .morebottom ul li{width:100px}.comment-share-info #newsharebar li .arrow-one,.comment-share-info #newsharebar li .arrow-two{position:absolute;z-index:999;left:229px}.comment-share-info #newsharebar li .arrow-one{top:9px}.comment-share-info #newsharebar li .arrow-two{top:11px}</style><![endif]--> <div class="comment-share-info hide hidden"> <div id="newsharebar"> <div class="newshare"> <ul class="share mega-menu inline-list"> <li class="sharetop"> <div class="more" style="display: none;"> <div class="arrow-one"></div> <div class="arrow-two"></div> <div class="morebottom"> <div class="left"> <ul> <li><div class="shareitems facebook"></div> <a href="javascript:void(0)" class="facebook-link" onclick="window.open('https://www.facebook.com/share.php?u={shareURL}','','width=658,height=354,scrollbars=no');return false;">Facebook</a></li> <li><div class="shareitems twitter"></div> <a href="javascript:void(0)" onclick="window.open('https://www.twitter.com/intent/tweet?text={headline}&url={shareURL}','','width=550, height=350, scrollbars=no')">Twitter</a></li> <li><div class="shareitems reddit"></div> <a href="javascript:void(0)" onclick="window.open('//reddit.com/submit?url={shareURL}%3Ftid%3Dsm_btn_reddit&title={headline}','','width=550, height=350, scrollbars=no')">Reddit</a></li> </ul> </div> <div class="right"> <ul> <li><div class="shareitems stumbleupon"></div><a href="//www.stumbleupon.com/submit?url={shareURL}%3Ftid%3Dsm_btn_su&title={headline}">StumbleUpon</a></li> <li><div class="shareitems digg"></div> <a href="//digg.com/submit?phase=2&url={shareURL}%3Ftid%3Dsm_btn_digg&title={headline}">Digg</a></li> <li><div class="shareitems delicious"></div> <a href="//www.delicious.com/save?v=5&noui&jump=close&url={shareURL}%3Ftid%3Dsm_btn_delicious&title={headline}">Delicious</a></li> </ul> </div> <div style="clear:both;"></div> </div> </div> </li> </ul> </div> </div> </div></div> </div> <style>.pb-feature.pb-f-page-comments .pb-comment-wrapper{padding-right:0;border-bottom:none}.pb-feature.pb-f-page-comments{border-right:1px solid #d5d5d5;padding-right:50px}</style> </div> </div> <div class=" right-rail pb-layout-item pb-chain pb-c-default-chain pb-1" id="c6tF5M103PgCxp"> <div class="moat-trackable pb-f-theme-normal pb-1 pb-feature pb-layout-item pb-f-ad-flex" moat-id="ad/flex|world" data-chain-name="no-name" data-feature-name="no-name" data-feature-id="ad/flex" id="fT0sSy103PgCxp"> <div id="slug_flex_ss_bb_hp" class="pb-ad-container border-bottom-airy" style="display:none;" data-ad-type="flex_ss_bb_hp"></div> </div> <div class="moat-trackable pb-f-theme-normal pb-1 pb-feature pb-layout-item pb-f-knowledge-map-knowledge-map" moat-id="knowledge-map/knowledge-map|world" data-chain-name="no-name" data-feature-name="no-name" data-feature-id="knowledge-map/knowledge-map" id="f0B77ni03PgCxp"> <div id="kmap-modal-closer"> <i class="fa fa-times"></i> </div> <div id="knowledge-map-sidebar"></div> <div id="knowledge-map-signup"> <p class="series-sell todo"> Sign up for email updates from the "Confronting the Caliphate" series. </p> <p class="series-sell complete"> You have signed up for the "Confronting the Caliphate" series. </p> <form class="todo" method="post" action="https://link.washingtonpost.com/s"> <input type="text" name="email" class="newsLetter-field" placeholder="E-mail address"/> <input type="submit" value="Add" class="newsLetter-btn"> <input type="hidden" name="template" value="signup-confirm-caliphate"/> <input type="hidden" name="vars[simple_signup]" value="1"/> <input type="hidden" name="vars[simple]" value="follow_capliphate"/> <input type="hidden" name="vars[intent_caliphate]" value="1"/> <input type="hidden" name="redirect" value="####inserts page url####"/> </form> </div> <div id="knowledge-map-signup-modal" class="kmap-follow-modal"> <div class="kmap-follow-modal-close">&#x2715;</div> <div class="kmap-follow-modal-title">Thank you for signing up</div> <div class="kmap-follow-modal-desc">You'll receive e-mail when new stories are published in this series.</div> </div> </div> <div class="moat-trackable pb-f-theme-normal pb-1 pb-feature pb-layout-item pb-f-page-post-most" moat-id="page/post-most|world" data-chain-name="no-name" data-feature-name="no-name" data-feature-id="page/post-most" id="f0hzU5G03PgCxp"> <div id="post-most-rr" class="post-most border-bottom-airy"> <div class="label-wrapper text-align-inherit"> <div class="label label-kicker"> Most Read <span class="section"> </span> </div> </div> <ul class="skin skin-card large def-feed"> <li> <a href="https://www.washingtonpost.com/world/national-security/as-bombing-in-syria-intensifies-a-debate-about-the-rules-of-engagement/2015/12/22/d9dece84-a823-11e5-bff5-905b92f5f94b_story.html?tid=pm_world_pop_b"> <div class="number left">1</div> <img src="https://img.washingtonpost.com/rf/image_60x60/2010-2019/WashingtonPost/2015/12/22/National-Security/Images/Turkey_US_Carter-097f5-946.jpg" data-threshold="480" class="photo right small-img "/> <img src="https://img.washingtonpost.com/rf/image_138x92/2010-2019/WashingtonPost/2015/12/22/National-Security/Images/Turkey_US_Carter-097f5-946.jpg" data-threshold="480" class="photo right big-img "/> <div class="headline ">As bombing in Syria intensifies, a debate about the rules of engagement</div> <div class="clear"></div> </a> </li> <li> <a href="https://www.washingtonpost.com/news/worldviews/wp/2015/12/23/zimbabwes-curious-plan-to-adopt-chinas-currency/?tid=pm_world_pop_b"> <div class="number left">2</div> <img src="https://img.washingtonpost.com/rf/image_60x60/WashingtonPost/Content/Blogs/worldviews/201512/Images/AFP_6671P.jpg" data-threshold="480" class="photo right small-img "/> <img src="https://img.washingtonpost.com/rf/image_138x92/WashingtonPost/Content/Blogs/worldviews/201512/Images/AFP_6671P.jpg" data-threshold="480" class="photo right big-img "/> <div class="headline ">Zimbabwe&#8217;s curious plan to adopt China&#8217;s currency</div> <div class="clear"></div> </a> </li> <li> <a href="https://www.washingtonpost.com/news/worldviews/wp/2015/12/22/the-country-where-publicly-wearing-a-santa-hat-could-land-you-in-jail/?tid=pm_world_pop_b"> <div class="number left">3</div> <img src="https://img.washingtonpost.com/rf/image_60x60/WashingtonPost/Content/Blogs/worldviews/201512/Images/04702569.jpg" data-threshold="480" class="photo right small-img "/> <img src="https://img.washingtonpost.com/rf/image_138x92/WashingtonPost/Content/Blogs/worldviews/201512/Images/04702569.jpg" data-threshold="480" class="photo right big-img "/> <div class="headline ">The country where publicly wearing a Santa hat could land you in jail</div> <div class="clear"></div> </a> </li> <li> <a href="https://www.washingtonpost.com/world/violence-makes-for-a-somber-little-town-of-bethlehem-this-year/2015/12/22/98a30cf8-a81b-11e5-b596-113f59ee069a_story.html?tid=pm_world_pop_b"> <div class="number left">4</div> <img src="https://img.washingtonpost.com/rf/image_60x60/2010-2019/WashingtonPost/2015/12/22/Foreign/Images/05070971.jpg" data-threshold="480" class="photo right small-img "/> <img src="https://img.washingtonpost.com/rf/image_138x92/2010-2019/WashingtonPost/2015/12/22/Foreign/Images/05070971.jpg" data-threshold="480" class="photo right big-img "/> <div class="headline ">Violence makes for a somber Christmas in Bethlehem this year</div> <div class="clear"></div> </a> </li> <li class="last"> <a href="https://www.washingtonpost.com/news/worldviews/wp/2015/12/23/somalia-banned-christmas-and-new-years-even-though-it-celebrates-neither-heres-why/?tid=pm_world_pop_b"> <div class="number left">5</div> <img src="https://img.washingtonpost.com/rf/image_60x60/WashingtonPost/Content/Blogs/worldviews/201512/Images/Somalia_Car_Bomb-06630.jpg" data-threshold="480" class="photo right small-img "/> <img src="https://img.washingtonpost.com/rf/image_138x92/WashingtonPost/Content/Blogs/worldviews/201512/Images/Somalia_Car_Bomb-06630.jpg" data-threshold="480" class="photo right big-img "/> <div class="headline ">Somalia banned Christmas and New Year&#8217;s — even though it celebrates neither. Here&#8217;s why.</div> <div class="clear"></div> </a> </li> </ul> <div id="slug_postmost" class="pb-font-smoothing" data-ad-type="postmost" style="display:none;width:100%;margin-top:20px;"></div> </div> </div> <div class="moat-trackable pb-f-theme-normal pb-1 pb-feature pb-layout-item pb-f-most-sidebar" moat-id="most/sidebar|world" data-chain-name="no-name" data-feature-name="no-name" data-feature-id="most/sidebar" id="f0z1yXj03PgCxp"> <style>.the-most ul.large li{display:none}</style> <div id="the-most-rr" class=" the-most border-bottom-airy"> <div class="label-wrapper text-align-inherit"><div class="label label-kicker"> <a class="the-most-sb-header" href="//www.washingtonpost.com/themost?tid=themost_sb_header">The Most <span class="section">Popular All Over</span> </a><div id="slug_most_tile" style="float:right; position: relative; bottom: 15px;" data-ad-type="most_tile" style="display:none;"></div></div></div> <ul class="skin skin-card large"> <li> <div class="outer-div"> <a target="_blank" href="http://www.theatlantic.com/magazine/archive/2016/01/why-america-is-moving-left/419112/"> <img src="https://img.washingtonpost.com/wp-apps/imrs.php?src=http://cdn.theatlantic.com/static/newsroom/img/2015/12/WEL_Beinart_DEM_Opener3/lead_large.jpg?nzerxh&amp;w=60&amp;h=60" data-threshold="480" class="photo right small-img "/> <img src="https://img.washingtonpost.com/wp-apps/imrs.php?src=http://cdn.theatlantic.com/static/newsroom/img/2015/12/WEL_Beinart_DEM_Opener3/lead_large.jpg?nzerxh&amp;w=138&amp;h=92" data-threshold="480" class="photo right big-img "/> </a> <a target="_blank" href="http://www.theatlantic.com/"> <div class="feedname">The Atlantic</div> </a> <a target="_blank" href="http://www.theatlantic.com/magazine/archive/2016/01/why-america-is-moving-left/419112/"> <div class="line-outer"> <div class="line headline">Why America Is Moving Left</div> </div> </a> </div> <div class="clear"></div> </li> <li> <div class="outer-div"> <a target="_blank" href="http://feedproxy.google.com/~r/time/topstories/~3/HjgOpXmjEXU/"> <img src="https://img.washingtonpost.com/wp-apps/imrs.php?src=http://timedotcom.files.wordpress.com/2015/12/christmas-air-travel_gros.jpg?quality=75&amp;amp;strip=color&amp;amp;w=150&amp;w=60&amp;h=60" data-threshold="480" class="photo right small-img "/> <img src="https://img.washingtonpost.com/wp-apps/imrs.php?src=http://timedotcom.files.wordpress.com/2015/12/christmas-air-travel_gros.jpg?quality=75&amp;amp;strip=color&amp;amp;w=150&amp;w=138&amp;h=92" data-threshold="480" class="photo right big-img "/> </a> <a target="_blank" href="http://www.time.com"> <div class="feedname">TIME</div> </a> <a target="_blank" href="http://feedproxy.google.com/~r/time/topstories/~3/HjgOpXmjEXU/"> <div class="line-outer"> <div class="line headline">Airlines Prepare for the Holiday Crunch</div> </div> </a> </div> <div class="clear"></div> </li> <li> <div class="outer-div"> <a target="_blank" href="http://www.csmonitor.com/Science/2015/1222/China-s-Jade-Rabbit-rover-finds-curious-substance-on-moon"> <img src="https://img.washingtonpost.com/wp-apps/imrs.php?src=http://images.csmonitor.com/csm/2015/12/955065_1_1222-Chang%27e-3-moon-rock-basalt_standard.jpg?alias=standard_300x200&amp;w=60&amp;h=60" data-threshold="480" class="photo right small-img "/> <img src="https://img.washingtonpost.com/wp-apps/imrs.php?src=http://images.csmonitor.com/csm/2015/12/955065_1_1222-Chang%27e-3-moon-rock-basalt_standard.jpg?alias=standard_300x200&amp;w=138&amp;h=92" data-threshold="480" class="photo right big-img "/> </a> <a target="_blank" href="http://www.csmonitor.com/"> <div class="feedname">Christian Science Monitor</div> </a> <a target="_blank" href="http://www.csmonitor.com/Science/2015/1222/China-s-Jade-Rabbit-rover-finds-curious-substance-on-moon"> <div class="line-outer"> <div class="line headline">China's 'Jade Rabbit' rover finds curious substance on moon</div> </div> </a> </div> <div class="clear"></div> </li> <li> <div class="outer-div"> <a target="_blank" href="http://www.slate.com/articles/arts/movies/2015/12/the_hateful_eight_reviewed.html"> <img src="https://img.washingtonpost.com/wp-apps/imrs.php?src=http://www.slate.com/content/dam/slate/articles/arts/movies/2015/12/151223_MOV_HatefulEight.jpg.CROP.thumbnail-small.jpg&amp;w=60&amp;h=60" data-threshold="480" class="photo right small-img "/> <img src="https://img.washingtonpost.com/wp-apps/imrs.php?src=http://www.slate.com/content/dam/slate/articles/arts/movies/2015/12/151223_MOV_HatefulEight.jpg.CROP.thumbnail-small.jpg&amp;w=138&amp;h=92" data-threshold="480" class="photo right big-img "/> </a> <a target="_blank" href="http://www.slate.com"> <div class="feedname">Slate</div> </a> <a target="_blank" href="http://www.slate.com/articles/arts/movies/2015/12/the_hateful_eight_reviewed.html"> <div class="line-outer"> <div class="line headline">The Hateful Eight</div> </div> </a> </div> <div class="clear"></div> </li> <li> <div class="outer-div"> <a target="_blank" href="http://www.businessinsider.com/ghost-army-that-the-us-used-against-hitler-2015-12?utm_source=washingtonpost.com/pb/themost&amp;utm_medium=referral"> <img src="https://img.washingtonpost.com/wp-apps/imrs.php?src=http://www.businessinsider.com/image/56799ed02340f855008b7872&amp;w=60&amp;h=60" data-threshold="480" class="photo right small-img "/> <img src="https://img.washingtonpost.com/wp-apps/imrs.php?src=http://www.businessinsider.com/image/56799ed02340f855008b7872&amp;w=138&amp;h=92" data-threshold="480" class="photo right big-img "/> </a> <a target="_blank" href="http://www.businessinsider.com"> <div class="feedname">Business Insider</div> </a> <a target="_blank" href="http://www.businessinsider.com/ghost-army-that-the-us-used-against-hitler-2015-12?utm_source=washingtonpost.com/pb/themost&amp;utm_medium=referral"> <div class="line-outer"> <div class="line headline">The remarkable story of the World War II 'Ghost Army' that duped Hitler</div> </div> </a> </div> <div class="clear"></div> </li> <li> <div class="outer-div"> <a target="_blank" href="http://www.fastcompany.com/3054571/work-smart/the-better-time-management-strategy-this-googler-taught-his-coworkers?partner=themost&amp;utm_source=themost&amp;utm_medium=link"> <img src="https://img.washingtonpost.com/wp-apps/imrs.php?src=http://a.fastcompany.net/multisite_files/fastcompany/imagecache/300x166/poster/2015/12/3054571-poster-p-1-read-an-email-from-a-google-employee-about-his-time-management-strategy.jpg&amp;w=60&amp;h=60" data-threshold="480" class="photo right small-img "/> <img src="https://img.washingtonpost.com/wp-apps/imrs.php?src=http://a.fastcompany.net/multisite_files/fastcompany/imagecache/300x166/poster/2015/12/3054571-poster-p-1-read-an-email-from-a-google-employee-about-his-time-management-strategy.jpg&amp;w=138&amp;h=92" data-threshold="480" class="photo right big-img "/> </a> <a target="_blank" href="http://www.fastcompany.com"> <div class="feedname">Fast Company</div> </a> <a target="_blank" href="http://www.fastcompany.com/3054571/work-smart/the-better-time-management-strategy-this-googler-taught-his-coworkers?partner=themost&amp;utm_source=themost&amp;utm_medium=link"> <div class="line-outer"> <div class="line headline">Read This Google Email About Time Management Strategy</div> </div> </a> </div> <div class="clear"></div> </li> <li> <div class="outer-div"> <a target="_blank" href="http://thehill.com/blogs/pundits-blog/presidential-campaign/264023-in-blockbuster-poll-sanders-destroys-trump-by-13"> <img src="https://img.washingtonpost.com/wp-apps/imrs.php?src=http://thehill.com/sites/default/files/blogs/trumpsanders_121315getty.jpg&amp;w=60&amp;h=60" data-threshold="480" class="photo right small-img "/> <img src="https://img.washingtonpost.com/wp-apps/imrs.php?src=http://thehill.com/sites/default/files/blogs/trumpsanders_121315getty.jpg&amp;w=138&amp;h=92" data-threshold="480" class="photo right big-img "/> </a> <a target="_blank" href="http://thehill.com/"> <div class="feedname">The Hill</div> </a> <a target="_blank" href="http://thehill.com/blogs/pundits-blog/presidential-campaign/264023-in-blockbuster-poll-sanders-destroys-trump-by-13"> <div class="line-outer"> <div class="line headline">In blockbuster poll, Sanders destroys Trump by 13 points</div> </div> </a> </div> <div class="clear"></div> </li> <li> <div class="outer-div"> <a target="_blank" href="http://www.salon.com/2015/12/21/millennials_have_gotten_royally_screwed_thats_why_theyre_voting_for_bernie_sanders/"> <img src="https://img.washingtonpost.com/wp-apps/imrs.php?src=http://media.salon.com/2015/10/bernie_sanders23-300x200.jpg&amp;w=60&amp;h=60" data-threshold="480" class="photo right small-img "/> <img src="https://img.washingtonpost.com/wp-apps/imrs.php?src=http://media.salon.com/2015/10/bernie_sanders23-300x200.jpg&amp;w=138&amp;h=92" data-threshold="480" class="photo right big-img "/> </a> <a target="_blank" href="http://www.salon.com/"> <div class="feedname">Salon</div> </a> <a target="_blank" href="http://www.salon.com/2015/12/21/millennials_have_gotten_royally_screwed_thats_why_theyre_voting_for_bernie_sanders/"> <div class="line-outer"> <div class="line headline">Millennials have gotten royally screwed: That's why they're voting for Bernie Sanders</div> </div> </a> </div> <div class="clear"></div> </li> <li> <div class="outer-div"> <a target="_blank" href="http://fusion.net/video/246872/gay-rapper-experiment/?utm_source=rss&amp;utm_medium=feed&amp;utm_campaign=/feed/the-most-popular/"> <img src="https://img.washingtonpost.com/wp-apps/imrs.php?src=http://i0.wp.com/fusiondotnet.files.wordpress.com/2015/12/screen-shot-2015-12-18-at-10-39-30-am1.png?resize=300%2C200&amp;amp;quality=80&amp;amp;strip=all&amp;w=60&amp;h=60" data-threshold="480" class="photo right small-img "/> <img src="https://img.washingtonpost.com/wp-apps/imrs.php?src=http://i0.wp.com/fusiondotnet.files.wordpress.com/2015/12/screen-shot-2015-12-18-at-10-39-30-am1.png?resize=300%2C200&amp;amp;quality=80&amp;amp;strip=all&amp;w=138&amp;h=92" data-threshold="480" class="photo right big-img "/> </a> <a target="_blank" href="http://fusion.net"> <div class="feedname">Fusion</div> </a> <a target="_blank" href="http://fusion.net/video/246872/gay-rapper-experiment/?utm_source=rss&amp;utm_medium=feed&amp;utm_campaign=/feed/the-most-popular/"> <div class="line-outer"> <div class="line headline">Why it's so hard to be a gay rapper</div> </div> </a> </div> <div class="clear"></div> </li> <li> <div class="outer-div"> <a target="_blank" href="http://nymag.com/daily/intelligencer/2015/12/sorry-conservatives-obamacare-is-still-working.html?mid=full-rss-krang,dailyintel,scienceofus"> <img src="https://img.washingtonpost.com/wp-apps/imrs.php?src=https://pixel.nymag.com/imgs/daily/intelligencer/2015/12/22/22-obamacare.w560.h375.jpg&amp;w=60&amp;h=60" data-threshold="480" class="photo right small-img "/> <img src="https://img.washingtonpost.com/wp-apps/imrs.php?src=https://pixel.nymag.com/imgs/daily/intelligencer/2015/12/22/22-obamacare.w560.h375.jpg&amp;w=138&amp;h=92" data-threshold="480" class="photo right big-img "/> </a> <a target="_blank" href="http://nymag.com/"> <div class="feedname">NY Magazine</div> </a> <a target="_blank" href="http://nymag.com/daily/intelligencer/2015/12/sorry-conservatives-obamacare-is-still-working.html?mid=full-rss-krang,dailyintel,scienceofus"> <div class="line-outer"> <div class="line headline">Sorry, Conservatives, Obamacare Is Still Working</div> </div> </a> </div> <div class="clear"></div> </li> <li> <div class="outer-div"> <a target="_blank" href="http://grist.org/business-technology/heres-why-i-wont-be-buying-anything-from-amazon-again/?utm_source=syndication&amp;utm_medium=rss&amp;utm_campaign=feed"> <img src="https://img.washingtonpost.com/wp-apps/imrs.php?src=https://grist.files.wordpress.com/2015/08/amazonpackages.jpg?w=300&amp;amp;h=200&amp;amp;crop=1&amp;w=60&amp;h=60" data-threshold="480" class="photo right small-img "/> <img src="https://img.washingtonpost.com/wp-apps/imrs.php?src=https://grist.files.wordpress.com/2015/08/amazonpackages.jpg?w=300&amp;amp;h=200&amp;amp;crop=1&amp;w=138&amp;h=92" data-threshold="480" class="photo right big-img "/> </a> <a target="_blank" href="http://grist.org"> <div class="feedname">Grist</div> </a> <a target="_blank" href="http://grist.org/business-technology/heres-why-i-wont-be-buying-anything-from-amazon-again/?utm_source=syndication&amp;utm_medium=rss&amp;utm_campaign=feed"> <div class="line-outer"> <div class="line headline">Here's why I won't be buying anything from Amazon again</div> </div> </a> </div> <div class="clear"></div> </li> <li> <div class="outer-div"> <a target="_blank" href="http://artery.wbur.org/2015/12/22/cambridge-photographer-elsa-dorfman-retiring"> <img src="https://img.washingtonpost.com/wp-apps/imrs.php?src=https://s3.amazonaws.com/media.wbur.org/wordpress/18/files/2015/12/1222_elsa-dorfman02-square-130x108.jpg&amp;w=60&amp;h=60" data-threshold="480" class="photo right small-img "/> <img src="https://img.washingtonpost.com/wp-apps/imrs.php?src=https://s3.amazonaws.com/media.wbur.org/wordpress/18/files/2015/12/1222_elsa-dorfman02-square-130x108.jpg&amp;w=138&amp;h=92" data-threshold="480" class="photo right big-img "/> </a> <a target="_blank" href="http://wbur.org"> <div class="feedname">WBUR (Boston)</div> </a> <a target="_blank" href="http://artery.wbur.org/2015/12/22/cambridge-photographer-elsa-dorfman-retiring"> <div class="line-outer"> <div class="line headline">Portrait Photographer Elsa Dorfman, Known For Her Giant Polaroid Camera, Is Retiring</div> </div> </a> </div> <div class="clear"></div> </li> <li> <div class="outer-div"> <a target="_blank" href="http://baltimoresun.com/news/maryland/freddie-gray/bs-md-ci-gray-hearing-20151013-story.html"> <img src="https://img.washingtonpost.com/wp-apps/imrs.php?src=http://www.trbimg.com/img-561d09bc/turbine/bs-md-ci-gray-hearing-20151013&amp;w=60&amp;h=60" data-threshold="480" class="photo right small-img "/> <img src="https://img.washingtonpost.com/wp-apps/imrs.php?src=http://www.trbimg.com/img-561d09bc/turbine/bs-md-ci-gray-hearing-20151013&amp;w=138&amp;h=92" data-threshold="480" class="photo right big-img "/> </a> <a target="_blank" href="http://www.baltimoresun.com"> <div class="feedname">The Baltimore Sun</div> </a> <a target="_blank" href="http://baltimoresun.com/news/maryland/freddie-gray/bs-md-ci-gray-hearing-20151013-story.html"> <div class="line-outer"> <div class="line headline">One officers statements ruled admissible in Freddie Gray case, as 3 others withdraw efforts to block</div> </div> </a> </div> <div class="clear"></div> </li> <li> <div class="outer-div"> <a target="_blank" href="http://www.jsonline.com/news/crime/363267981.html"> <img src="https://img.washingtonpost.com/wp-apps/imrs.php?src=http://media.jrn.com/images/b99638880z.1_20151222222830_000_g5rdrh0l.1-1.jpg&amp;w=60&amp;h=60" data-threshold="480" class="photo right small-img "/> <img src="https://img.washingtonpost.com/wp-apps/imrs.php?src=http://media.jrn.com/images/b99638880z.1_20151222222830_000_g5rdrh0l.1-1.jpg&amp;w=138&amp;h=92" data-threshold="480" class="photo right big-img "/> </a> <a target="_blank" href="http://www.jsonline.com"> <div class="feedname">The Journal Sentinel (Milwaukee)</div> </a> <a target="_blank" href="http://www.jsonline.com/news/crime/363267981.html"> <div class="line-outer"> <div class="line headline">Whitefish Bay couple charged with health care, food benefits fraud</div> </div> </a> </div> <div class="clear"></div> </li> <li class="last"> <div class="outer-div"> <a target="_blank" href="http://www.ibtimes.co.uk/boxing-day-sales-everything-you-need-know-about-selfridges-next-harrods-more-1532807"> <img src="https://img.washingtonpost.com/wp-apps/imrs.php?src=http://d.ibtimes.co.uk/en/thumb/1474879/christmas-sales-shopping.jpg&amp;w=60&amp;h=60" data-threshold="480" class="photo right small-img "/> <img src="https://img.washingtonpost.com/wp-apps/imrs.php?src=http://d.ibtimes.co.uk/en/thumb/1474879/christmas-sales-shopping.jpg&amp;w=138&amp;h=92" data-threshold="480" class="photo right big-img "/> </a> <a target="_blank" href="http://www.ibtimes.co.uk"> <div class="feedname">International Business Times</div> </a> <a target="_blank" href="http://www.ibtimes.co.uk/boxing-day-sales-everything-you-need-know-about-selfridges-next-harrods-more-1532807"> <div class="line-outer"> <div class="line headline">Boxing Day Sales: Everything you need to know about Selfridges, Next, Harrods and more</div> </div> </a> </div> <div class="clear"></div> </li> </ul> <div id="slug_the_most"> <a id="the_most_sub_button" href="//www.washingtonpost.com/themost?tid=themost_sb_img" target="_blank"> <span>The Most</span> Popular stories around the web </a> </div> <div id="slug_most_logo" data-ad-type="most_logo" style="display:none;"></div> </div> </div> <div class="moat-trackable pb-f-theme-normal pb-1 pb-feature pb-layout-item pb-f-ad-flex-2" moat-id="ad/flex-2|world" data-chain-name="no-name" data-feature-name="no-name" data-feature-id="ad/flex-2" id="f0PxEYw03PgCxp"> <div id="slug_flex_ss_bb_hp_2" class="pb-ad-container border-bottom-airy" style="display:none;" data-ad-type-placeholder="flex_ss_bb_hp|2" data-ad-delivery="vi"></div> </div> <div class="moat-trackable pb-f-theme-normal pb-1 pb-feature pb-layout-item pb-f-games-gamesWidget" moat-id="games/gamesWidget|world" data-chain-name="no-name" data-feature-name="no-name" data-feature-id="games/gamesWidget" id="fpsOof103PgCxp"> <div class="right-rail game-module position-rel html5"> <div class="games-intro"> <h4>Our Online Games</h4> <p>Play right from this page</p> </div> <div class="position-abs on-right game-player-container ghide"> <div class="position-rel full-width full-height game-player-container-inner overflow-hidden"> <iframe frameborder="0"></iframe> <img class="screenshot position-abs on-left"/> </div> <div class="close-button position-abs"><i class="fa fa-2x fa-times-circle"></i></div> </div> <div class="full-width module component"> <div class="game-widgets-container position-rel"> <div id="online-game-carousel-right-rail"> <ul class="games"> <li> <a data-toggle="game-trigger" class="clear block flash"> <div class="game-item" onlineEmbeddedGameUrl="https://washingtonpost.as.arkadiumhosted.com/API/en-US/games/mahjongg-dimensions/flash?type=gamesembed" onlineGameCodeLanguage="flash" iframeWidth="640" iframeHeight="444"> <img src="https://images.washingtonpost.com/?url=https://amsarkadium-a.akamaihd.net/assets/global/game/mahjongg-dimensions/37a853fe-5523-4c7f-96a3-a59ed295157a/148x148.png&amp;op=noop"/> <div> <h4>Mahjongg Dimensions</h4> <h5>Genre(s):</h5><span>&nbsp;&nbsp;Strategy</span> <p> It's 3D Mahjongg- you don't even need to wear 3D glasses! </p> </div> </div> </a> </li> <li> <a data-toggle="game-trigger" class="clear block flash"> <div class="game-item" onlineEmbeddedGameUrl="https://washingtonpost.as.arkadiumhosted.com/API/en-US/games/sunday-crossword/flash?type=gamesembed" onlineGameCodeLanguage="flash" iframeWidth="660" iframeHeight="450"> <img src="https://images.washingtonpost.com/?url=https://amsarkadium-a.akamaihd.net/assets/80A67319-A53A-42DF-AFBE-56492553AF10/game/sunday-crossword/39008695-cb2a-41be-b37e-3a10dfd04826/148x148.png&amp;op=noop"/> <div> <h4>The Sunday Crossword by Evan Birnholz</h4> <h5>Genre(s):</h5><span>&nbsp;&nbsp;Word</span> <p> Online crossword. </p> </div> </div> </a> </li> <li> <a data-toggle="game-trigger" class="clear block html5"> <div class="game-item" onlineEmbeddedGameUrl="https://washingtonpost.as.arkadiumhosted.com/API/en-US/games/spider-solitaire/html5?type=gamesembed" onlineGameCodeLanguage="html5" iframeWidth="640" iframeHeight="480"> <img src="https://images.washingtonpost.com/?url=https://amsarkadium-a.akamaihd.net/assets/global/game/webgl-spider-solitaire/74fed3ef-93c6-4925-b8bf-b08250534230/292x194.jpg&amp;op=noop"/> <div> <h4>Spider Solitaire</h4> <h5>Genre(s):</h5><span>&nbsp;&nbsp;Card</span> <p> Spider Solitaire is known as the king of all solitaire games! </p> </div> </div> </a> </li> <li> <a data-toggle="game-trigger" class="clear block html5"> <div class="game-item" onlineEmbeddedGameUrl="https://washingtonpost.as.arkadiumhosted.com/API/en-US/games/daily-crossword/html5?type=gamesembed" onlineGameCodeLanguage="html5" iframeWidth="640" iframeHeight="480"> <img src="https://images.washingtonpost.com/?url=https://amsarkadium-a.akamaihd.net/assets/global/game/webgl-daily-crossword/e9d3e092-c66a-4f55-990f-6dc25a280de7/292x194.jpg&amp;op=noop"/> <div> <h4>Daily Crossword</h4> <h5>Genre(s):</h5><span>&nbsp;&nbsp;Word</span> <p> Challenge your crossword skills everyday with a huge variety of puzzles waiting for you to solve. </p> </div> </div> </a> </li> </ul> </div> <a href="#" id="ui-carousel-prev" class="up-arrow position-abs on-top on-right"><i class="icon-chevron-up icon-2x"></i></a> <a href="#" id="ui-carousel-next" class="down-arrow position-abs on-bottom on-right"><i class="icon-chevron-down icon-2x"></i></a> </div> </div> <div class="clear"></div> </div> </div> <div class="moat-trackable pb-f-theme-normal pb-1 pb-feature pb-layout-item pb-f-page-newsletter" moat-id="page/newsletter|world" data-chain-name="no-name" data-feature-name="no-name" data-feature-id="page/newsletter" id="f92T27103PgCxp"> <div id="signup-box-rr" class="border-bottom-airy"> <div class="hidden-data"> <p id="newsletter-section">world</p> <p id="newsletter-subsection">middle_east</p> <p id="newsletter-blogname"></p> </div> <div> <p class="headline" id="newsletter-headline"><i class="fa fa-check" id="headline-checked"></i></p> <p class="title" id="newsletter-tagline"></p> <p class="title" id="subscribed-confirmation"><span>Success!</span> Check your inbox for details.</p> <div id="newsletter-signUp-form"> <input type="text" name="email" id="newsLetter-input" class="newsLetter-field" placeholder="E-mail address"/> <input type="submit" value="Add" class="newsLetter-btn subscribe-newsLetter"> </div> <input type="submit" value="Sign me up" class="newsLetter-field newsletter-btn-signed-up subscribe-newsLetter" id="newsletter-signUp-button"/> <p class="newsLetter-error-msg"> Please enter a valid email address </p> </div> <div class="newsletter-suggestions-rr" id="newsletter-suggestions-rr"> <p class="title">You might also like: </p> <div class="suggestion-list"> <div class="suggestion recommended"> <input type="checkbox" checked class="checkbox" name="" value="" data-pos="1"/> <p class="title "></p> </div> <div class="suggestion recommended"> <input type="checkbox" checked class="checkbox" name="" value="" data-pos="2"/> <p class="title \"></p> </div> <div class="suggestion recommended"> <input type="checkbox" checked class="checkbox" name="" value="" data-pos="3"/> <p class="title"></p> </div> </div> <div class="suggestion-buttons"> <button class="newsLetter-btn suggestion-btn" id="subscribe-bundle">Sign Up</button> <button class="newsLetter-btn suggestion-btn" id="cancel-bundle">No Thanks</button> </div> </div> <p class="title" id="all-newsletters-lbl"><a href="https://subscribe.washingtonpost.com/newsletters">See all newsletters</a></p> <div class="clear"></div> </div> </div> <div class="moat-trackable pb-f-theme-normal pb-1 pb-feature pb-layout-item pb-f-page-editors-picks" moat-id="page/editors-picks|world" data-chain-name="no-name" data-feature-name="no-name" data-feature-id="page/editors-picks" id="fkox16203PgCxp"> </div> <div class="moat-trackable pb-f-theme-normal pb-1 pb-feature pb-layout-item pb-f-posttv-your-three" moat-id="posttv/your-three|world" data-chain-name="no-name" data-feature-name="no-name" data-feature-id="posttv/your-three" id="f0qysRJ03PgCxp"> <div class="generic-feature-wrapper border-bottom-airy"> <div class="posttv-your-three-container flex-item"> <span class="posttv-your-three-title"> <span class="label label-kicker" style="display: inline-block;">Your Three.&nbsp;<span class="label label-light" style="display: inline-block;">Video curated for you.</span> </span> </span> <script>var numberOfStacks=3,isAdminPage=!1;</script> <div class="posttv-your-three-main"> <div class="posttv-your-three-stacks" data-player-token="posttv-your-three-798311"> <div class="posttv-your-three-stack" id="posttv-your-three-stack-0" style="display: none;"> <div class="posttv-your-three-stack-video-wrapper"> <div class="posttv-your-three-stack-video"> <div class="moat-trackable pb-f-theme-normal pb-feature pb-layout-item pb-f-posttv-player" moat-id="posttv/player|world" data-chain-name="no-name" data-feature-name="no-name" data-feature-id="posttv/player" id=""> <div class="generic-feature-wrapper is-embedded flex-item flex-stack border-bottom-off"> <script>var posttvPlayerData=posttvPlayerData||{};posttvPlayerData["c56abfc8-a269-11e4-91fc-7dff95a14458-62673"]={};posttvPlayerData["c56abfc8-a269-11e4-91fc-7dff95a14458-62673"].isLive=!1;posttvPlayerData["c56abfc8-a269-11e4-91fc-7dff95a14458-62673"].videoTime=79;posttvPlayerData["c56abfc8-a269-11e4-91fc-7dff95a14458-62673"].isYourThree=!0;posttvPlayerData["c56abfc8-a269-11e4-91fc-7dff95a14458-62673"].requestLowBitRate=!0;</script> <script>try{posttvPlayerData["c56abfc8-a269-11e4-91fc-7dff95a14458-62673"].adOverride=$.parseJSON('[ { "homepage": [ { "disablePreroll": true, "dates": [ { "start": 1445011200000, "end": 1445184000000 } ] } ] }]')[0].homepage[0]}catch(ex){console.error("Failed to load ad override.")};</script> <div class="posttv-player-container" id="posttv-player-container-c56abfc8-a269-11e4-91fc-7dff95a14458-62673" data-moduleId="c56abfc8-a269-11e4-91fc-7dff95a14458-62673" data-shareUrl="http://wapo.st/15vXA33" data-autoPlay="false" data-startMuted="false" data-allowShare="false" data-showVideoText="false" data-share-headline="Learn to make traditional soup dumplings" data-uniqueToken="posttv-your-three-798311"> <div class="posttv-player-ondemand"> <div id="posttv-player-ondemand-wrapper-c56abfc8-a269-11e4-91fc-7dff95a14458-62673" class="mb0 posttv-player-video" data-video-uuid="c56abfc8-a269-11e4-91fc-7dff95a14458" data-player-type="posttv-pb-yourthree" data-auto-init="1" data-autoplay="0" data-ad-freq="0.5" data-show-ad="true" data-show-ads-for-first-video-only="0" data-companion-ad="1" data-adset-zone="wpni.video.yourthree" data-show-video-info="false" data-volume="0" data-show-play="0" data-hide-posttv-overlay-buttons="1" data-use-custom-scrubber="1" data-show-endscreen="0" data-truth-teller-enabled="0" data-show-posttv-overlay="0"> </div> </div> <div class="posttv-player-social"> <span class="fa-stack posttv-player-social-facebook"> <i class="fa fa-square fa-stack-1x"></i> <i class="fa fa-facebook-square fa-stack-1x"></i> </span> <span class="fa-stack posttv-player-social-twitter"> <i class="fa fa-square fa-stack-1x"></i> <i class="fa fa-twitter-square fa-stack-1x"></i> </span> </div> <div class="posttv-player-mute-overlay photo-wrapper"> <div class="posttv-player-full-mute overlay"> <i class="posttv-player-unmute fa fa-volume-up"></i>Listen </div> </div> <div class="posttv-player-full-image-overlay photo-wrapper"> <img src="https://img.washingtonpost.com/wp-apps/imrs.php?src=http%3a%2f%2fs3.amazonaws.com%2fposttv-thumbnails-prod%2fthumbnails%2f54c14a34e4b0cdc7cd12cceb%2fTITLE_GFX.jpg&amp;w=1248&amp;h=702" data-threshold="480" class=" "/> <div class="overlay"> <i class="fa fa-play icon-left"></i> <span>Play Videos</span> </div> </div> <script></script> </div> </div> </div> </div> <div class="posttv-your-three-video-promo photo-wrapper" style="position: absolute;"> <img src="https://img.washingtonpost.com/wp-apps/imrs.php?src=http%3a%2f%2fs3.amazonaws.com%2fposttv-thumbnails-prod%2fthumbnails%2f54c14a34e4b0cdc7cd12cceb%2fTITLE_GFX.jpg&amp;w=1248&amp;h=702" data-threshold="480" class=" "/> <div class="overlay"> <i class="fa fa-play icon-left"></i> <span>Play Videos</span> </div> </div> <div class="headline x-small highlight-style border-bottom-hairline-top-table posttv-your-three-video-headline"> Learn to make traditional soup dumplings </div> </div> <div class="posttv-your-three-list-item border-bottom-hairline-top-table" style="margin-top:1rem;display:none;" id="posttv-your-three-list-item-0" data-video-title="Learn to make traditional soup dumplings" data-video-blurb="The traditional Shanghai soup dumpling is different from the average dumpling -- in that there's actually soup on the inside. Restaurant owner Ivan Liang takes us into Bob's Shanghai 66 to show how it's made." data-video-image="http://s3.amazonaws.com/posttv-thumbnails-prod/thumbnails/54c14a34e4b0cdc7cd12cceb/TITLE_GFX.jpg" data-video-url="http://wapo.st/15vXA33" data-video-uuid="c56abfc8-a269-11e4-91fc-7dff95a14458" data-video-editor="Jhaan Elker" data-video-source="The Washington Post" data-video-duration="79.0" data-video-islive="false"> <div class="col-xs-4 art-left flex-stack-art posttv-your-three-list-thumbnail"><img src="https://images.washingtonpost.com/?url=https://img.washingtonpost.com/pb/resources/img/spacer.gif&amp;op=resize&amp;w=130&amp;h=81&amp;filter=nearest&fmt=png" data-hi-res-src="https://img.washingtonpost.com/wp-apps/imrs.php?src=http%3a%2f%2fs3.amazonaws.com%2fposttv-thumbnails-prod%2fthumbnails%2f54c14a34e4b0cdc7cd12cceb%2fTITLE_GFX.jpg&amp;w=480&amp;h=300" data-low-res-src="https://img.washingtonpost.com/wp-apps/imrs.php?src=http%3a%2f%2fs3.amazonaws.com%2fposttv-thumbnails-prod%2fthumbnails%2f54c14a34e4b0cdc7cd12cceb%2fTITLE_GFX.jpg&amp;w=130&amp;h=81" data-threshold="130" class="art-left unprocessed placeholder"/></div> <div class="flex-stack col-xs-8 flex-stack-text posttv-your-three-text"> <div class="headline x-small highlight-style posttv-your-three-text-headline">Learn to make traditional soup dumplings</div> <div class="standalone-overlay posttv-your-three-text-duration"> <span class="duration" style="padding: 0;">1:19</span> </div> </div> <div class="clear"></div> </div> <div class="posttv-your-three-list-item border-bottom-hairline-top-table" style="" id="posttv-your-three-list-item-1" data-video-title="A veteran finds healing on a dog sled" data-video-blurb="Veteran Steve Watkins, 38, is in pain from his service. Alaska is his comfort, the place he trains for two audacious goals." data-video-image="http://s3.amazonaws.com/posttv-thumbnails-prod/thumbnails/54f7988ee4b0c968349725fa/WP_AK_Steve_1CROP.jpg" data-video-url="http://wapo.st/1AO2xfn" data-video-uuid="37fc9e2a-c2c8-11e4-a188-8e4971d37a8d" data-video-editor="Lee Powell" data-video-source="The Washington Post" data-video-duration="321.0" data-video-islive="false"> <div class="col-xs-4 art-left flex-stack-art posttv-your-three-list-thumbnail"><img src="https://images.washingtonpost.com/?url=https://img.washingtonpost.com/pb/resources/img/spacer.gif&amp;op=resize&amp;w=130&amp;h=81&amp;filter=nearest&fmt=png" data-hi-res-src="https://img.washingtonpost.com/wp-apps/imrs.php?src=http%3a%2f%2fs3.amazonaws.com%2fposttv-thumbnails-prod%2fthumbnails%2f54f7988ee4b0c968349725fa%2fWP_AK_Steve_1CROP.jpg&amp;w=480&amp;h=300" data-low-res-src="https://img.washingtonpost.com/wp-apps/imrs.php?src=http%3a%2f%2fs3.amazonaws.com%2fposttv-thumbnails-prod%2fthumbnails%2f54f7988ee4b0c968349725fa%2fWP_AK_Steve_1CROP.jpg&amp;w=130&amp;h=81" data-threshold="130" class="art-left unprocessed placeholder"/></div> <div class="flex-stack col-xs-8 flex-stack-text posttv-your-three-text"> <div class="headline x-small highlight-style posttv-your-three-text-headline">A veteran finds healing on a dog sled</div> <div class="standalone-overlay posttv-your-three-text-duration"> <span class="duration" style="padding: 0;">5:21</span> </div> </div> <div class="clear"></div> </div> <div class="posttv-your-three-list-item " style="margin-bottom: 20px;" id="posttv-your-three-list-item-2" data-video-title="Perks of private flying" data-video-blurb="When it comes to traveling in style, nothing beats flying private. The Reliable Source takes a glimpse into the world of private aviation and the perks that come with it." data-video-image="http://s3.amazonaws.com/posttv-thumbnails-prod/thumbnails/55034ef7e4b0c96834975cc3/031315_PrivateJets.jpg" data-video-url="http://wapo.st/1xrvsFV" data-video-uuid="68b6cec6-c9c3-11e4-bea5-b893e7ac3fb3" data-video-editor="Alice Li" data-video-source="The Washington Post" data-video-duration="137.0" data-video-islive="false"> <div class="col-xs-4 art-left flex-stack-art posttv-your-three-list-thumbnail"><img src="https://images.washingtonpost.com/?url=https://img.washingtonpost.com/pb/resources/img/spacer.gif&amp;op=resize&amp;w=130&amp;h=81&amp;filter=nearest&fmt=png" data-hi-res-src="https://img.washingtonpost.com/wp-apps/imrs.php?src=http%3a%2f%2fs3.amazonaws.com%2fposttv-thumbnails-prod%2fthumbnails%2f55034ef7e4b0c96834975cc3%2f031315_PrivateJets.jpg&amp;w=480&amp;h=300" data-low-res-src="https://img.washingtonpost.com/wp-apps/imrs.php?src=http%3a%2f%2fs3.amazonaws.com%2fposttv-thumbnails-prod%2fthumbnails%2f55034ef7e4b0c96834975cc3%2f031315_PrivateJets.jpg&amp;w=130&amp;h=81" data-threshold="130" class="art-left unprocessed placeholder"/></div> <div class="flex-stack col-xs-8 flex-stack-text posttv-your-three-text"> <div class="headline x-small highlight-style posttv-your-three-text-headline">Perks of private flying</div> <div class="standalone-overlay posttv-your-three-text-duration"> <span class="duration" style="padding: 0;">2:17</span> </div> </div> <div class="clear"></div> </div> <div id="slug_yourthreelogo" class="posttv-your-three-banner" data-ad-type="yourthreelogo" style="display:none;"></div> <button class="posttv-your-three-show-button" type="button">Show Me More</button> </div> <div class="posttv-your-three-stack" id="posttv-your-three-stack-1" style="display: none;"> <div class="posttv-your-three-stack-video-wrapper"> <div class="posttv-your-three-video-promo photo-wrapper" style=""> <img src="https://img.washingtonpost.com/wp-apps/imrs.php?src=http%3a%2f%2fs3.amazonaws.com%2fposttv-thumbnails-prod%2fthumbnails%2f555f93cee4b0ba0b9fd3f4e2%2f20150522_GYM_OBAMA_image.jpg&amp;w=1248&amp;h=702" data-threshold="480" class=" "/> <div class="overlay"> <i class="fa fa-play icon-left"></i> <span>Play Videos</span> </div> </div> <div class="headline x-small highlight-style border-bottom-hairline-top-table posttv-your-three-video-headline"> Real people try Michelle Obama's workout </div> </div> <div class="posttv-your-three-list-item border-bottom-hairline-top-table" style="margin-top:1rem;display:none;" id="posttv-your-three-list-item-0" data-video-title="Real people try Michelle Obama's workout" data-video-blurb="A few Washington Post employees try out the #GimmeFive workout routine to see how they compare to first lady Michelle Obama." data-video-image="http://s3.amazonaws.com/posttv-thumbnails-prod/thumbnails/555f93cee4b0ba0b9fd3f4e2/20150522_GYM_OBAMA_image.jpg" data-video-url="http://wapo.st/1IQbs9C" data-video-uuid="86c36736-00c2-11e5-8c77-bf274685e1df" data-video-editor="Jason Aldag" data-video-source="The Washington Post" data-video-duration="93.0" data-video-islive="false"> <div class="col-xs-4 art-left flex-stack-art posttv-your-three-list-thumbnail"><img src="https://images.washingtonpost.com/?url=https://img.washingtonpost.com/pb/resources/img/spacer.gif&amp;op=resize&amp;w=130&amp;h=81&amp;filter=nearest&fmt=png" data-hi-res-src="https://img.washingtonpost.com/wp-apps/imrs.php?src=http%3a%2f%2fs3.amazonaws.com%2fposttv-thumbnails-prod%2fthumbnails%2f555f93cee4b0ba0b9fd3f4e2%2f20150522_GYM_OBAMA_image.jpg&amp;w=480&amp;h=300" data-low-res-src="https://img.washingtonpost.com/wp-apps/imrs.php?src=http%3a%2f%2fs3.amazonaws.com%2fposttv-thumbnails-prod%2fthumbnails%2f555f93cee4b0ba0b9fd3f4e2%2f20150522_GYM_OBAMA_image.jpg&amp;w=130&amp;h=81" data-threshold="130" class="art-left unprocessed placeholder"/></div> <div class="flex-stack col-xs-8 flex-stack-text posttv-your-three-text"> <div class="headline x-small highlight-style posttv-your-three-text-headline">Real people try Michelle Obama's workout</div> <div class="standalone-overlay posttv-your-three-text-duration"> <span class="duration" style="padding: 0;">1:33</span> </div> </div> <div class="clear"></div> </div> <div class="posttv-your-three-list-item border-bottom-hairline-top-table" style="" id="posttv-your-three-list-item-1" data-video-title="Behind a famous and fast steam locomotive" data-video-blurb="The baritone whistle of Norfolk and Western No. 611 drifts through the Virginia countryside, announcing the shiny black steam locomotive is back, hauling passengers once again." data-video-image="http://s3.amazonaws.com/posttv-thumbnails-prod/thumbnails/55756877e4b0227e9a79fba8/WP_NW611_Steam_1.jpg" data-video-url="http://wapo.st/1QErpz8" data-video-uuid="a0f6cbc4-0dc5-11e5-a0fe-dccfea4653ee" data-video-editor="Lee Powell" data-video-source="The Washington Post" data-video-duration="136.0" data-video-islive="false"> <div class="col-xs-4 art-left flex-stack-art posttv-your-three-list-thumbnail"><img src="https://images.washingtonpost.com/?url=https://img.washingtonpost.com/pb/resources/img/spacer.gif&amp;op=resize&amp;w=130&amp;h=81&amp;filter=nearest&fmt=png" data-hi-res-src="https://img.washingtonpost.com/wp-apps/imrs.php?src=http%3a%2f%2fs3.amazonaws.com%2fposttv-thumbnails-prod%2fthumbnails%2f55756877e4b0227e9a79fba8%2fWP_NW611_Steam_1.jpg&amp;w=480&amp;h=300" data-low-res-src="https://img.washingtonpost.com/wp-apps/imrs.php?src=http%3a%2f%2fs3.amazonaws.com%2fposttv-thumbnails-prod%2fthumbnails%2f55756877e4b0227e9a79fba8%2fWP_NW611_Steam_1.jpg&amp;w=130&amp;h=81" data-threshold="130" class="art-left unprocessed placeholder"/></div> <div class="flex-stack col-xs-8 flex-stack-text posttv-your-three-text"> <div class="headline x-small highlight-style posttv-your-three-text-headline">Behind a famous and fast steam locomotive</div> <div class="standalone-overlay posttv-your-three-text-duration"> <span class="duration" style="padding: 0;">2:16</span> </div> </div> <div class="clear"></div> </div> <div class="posttv-your-three-list-item " style="margin-bottom: 20px;" id="posttv-your-three-list-item-2" data-video-title="How to survive a shark attack" data-video-blurb="Here’s what you need to know about shark attacks and how to fight back if you're trapped." data-video-image="http://s3.amazonaws.com/posttv-thumbnails-prod/thumbnails/557f113ee4b06d8204a6a967/20150615_Shark.jpg" data-video-url="http://wapo.st/1dGvjL4" data-video-uuid="84c0b740-1387-11e5-8457-4b431bf7ed4c" data-video-editor="" data-video-source="The Washington Post" data-video-duration="57.0" data-video-islive="false"> <div class="col-xs-4 art-left flex-stack-art posttv-your-three-list-thumbnail"><img src="https://images.washingtonpost.com/?url=https://img.washingtonpost.com/pb/resources/img/spacer.gif&amp;op=resize&amp;w=130&amp;h=81&amp;filter=nearest&fmt=png" data-hi-res-src="https://img.washingtonpost.com/wp-apps/imrs.php?src=http%3a%2f%2fs3.amazonaws.com%2fposttv-thumbnails-prod%2fthumbnails%2f557f113ee4b06d8204a6a967%2f20150615_Shark.jpg&amp;w=480&amp;h=300" data-low-res-src="https://img.washingtonpost.com/wp-apps/imrs.php?src=http%3a%2f%2fs3.amazonaws.com%2fposttv-thumbnails-prod%2fthumbnails%2f557f113ee4b06d8204a6a967%2f20150615_Shark.jpg&amp;w=130&amp;h=81" data-threshold="130" class="art-left unprocessed placeholder"/></div> <div class="flex-stack col-xs-8 flex-stack-text posttv-your-three-text"> <div class="headline x-small highlight-style posttv-your-three-text-headline">How to survive a shark attack</div> <div class="standalone-overlay posttv-your-three-text-duration"> <span class="duration" style="padding: 0;">0:57</span> </div> </div> <div class="clear"></div> </div> </div> <div class="posttv-your-three-stack" id="posttv-your-three-stack-2" style="display: none;"> <div class="posttv-your-three-stack-video-wrapper"> <div class="posttv-your-three-video-promo photo-wrapper" style=""> <img src="https://img.washingtonpost.com/wp-apps/imrs.php?src=http%3a%2f%2fs3.amazonaws.com%2fposttv-thumbnails-prod%2fthumbnails%2f55919bb8e4b0368c236c7300%2fPORTLAND.jpg&amp;w=1248&amp;h=702" data-threshold="480" class=" "/> <div class="overlay"> <i class="fa fa-play icon-left"></i> <span>Play Videos</span> </div> </div> <div class="headline x-small highlight-style border-bottom-hairline-top-table posttv-your-three-video-headline"> Portland's most important meal of the day </div> </div> <div class="posttv-your-three-list-item border-bottom-hairline-top-table" style="margin-top:1rem;display:none;" id="posttv-your-three-list-item-0" data-video-title="Portland's most important meal of the day" data-video-blurb="Residents of Portland start their day off right by prioritizing breakfast and brunch. People line up for Screen Door's chicken and waffles hours before it opens, and neighborhood bakeries fill their cases with artisan pastries for customers who sit down and actually enjoy the morning." data-video-image="http://s3.amazonaws.com/posttv-thumbnails-prod/thumbnails/55919bb8e4b0368c236c7300/PORTLAND.jpg" data-video-url="http://wapo.st/1duBd1F" data-video-uuid="a36ecbb0-1e94-11e5-a135-935065bc30d0" data-video-editor="Jayne W. Orenstein" data-video-source="The Washington Post" data-video-duration="240.0" data-video-islive="false"> <div class="col-xs-4 art-left flex-stack-art posttv-your-three-list-thumbnail"><img src="https://images.washingtonpost.com/?url=https://img.washingtonpost.com/pb/resources/img/spacer.gif&amp;op=resize&amp;w=130&amp;h=81&amp;filter=nearest&fmt=png" data-hi-res-src="https://img.washingtonpost.com/wp-apps/imrs.php?src=http%3a%2f%2fs3.amazonaws.com%2fposttv-thumbnails-prod%2fthumbnails%2f55919bb8e4b0368c236c7300%2fPORTLAND.jpg&amp;w=480&amp;h=300" data-low-res-src="https://img.washingtonpost.com/wp-apps/imrs.php?src=http%3a%2f%2fs3.amazonaws.com%2fposttv-thumbnails-prod%2fthumbnails%2f55919bb8e4b0368c236c7300%2fPORTLAND.jpg&amp;w=130&amp;h=81" data-threshold="130" class="art-left unprocessed placeholder"/></div> <div class="flex-stack col-xs-8 flex-stack-text posttv-your-three-text"> <div class="headline x-small highlight-style posttv-your-three-text-headline">Portland's most important meal of the day</div> <div class="standalone-overlay posttv-your-three-text-duration"> <span class="duration" style="padding: 0;">4:00</span> </div> </div> <div class="clear"></div> </div> <div class="posttv-your-three-list-item border-bottom-hairline-top-table" style="" id="posttv-your-three-list-item-1" data-video-title="How hackers can control your car from miles away" data-video-blurb="Internet researcher Charlie Miller shows The Washington Post how a hacker can break into a car's computer and control everything from the brakes to the engine." data-video-image="http://s3.amazonaws.com/posttv-thumbnails-prod/thumbnails/55af795ae4b06e0263bd2d84/cahack2.jpg" data-video-url="http://wapo.st/1floM9A" data-video-uuid="ca4beb62-3061-11e5-a879-213078d03dd3" data-video-editor="Jorge Ribas" data-video-source="The Washington Post" data-video-duration="149.0" data-video-islive="false"> <div class="col-xs-4 art-left flex-stack-art posttv-your-three-list-thumbnail"><img src="https://images.washingtonpost.com/?url=https://img.washingtonpost.com/pb/resources/img/spacer.gif&amp;op=resize&amp;w=130&amp;h=81&amp;filter=nearest&fmt=png" data-hi-res-src="https://img.washingtonpost.com/wp-apps/imrs.php?src=http%3a%2f%2fs3.amazonaws.com%2fposttv-thumbnails-prod%2fthumbnails%2f55af795ae4b06e0263bd2d84%2fcahack2.jpg&amp;w=480&amp;h=300" data-low-res-src="https://img.washingtonpost.com/wp-apps/imrs.php?src=http%3a%2f%2fs3.amazonaws.com%2fposttv-thumbnails-prod%2fthumbnails%2f55af795ae4b06e0263bd2d84%2fcahack2.jpg&amp;w=130&amp;h=81" data-threshold="130" class="art-left unprocessed placeholder"/></div> <div class="flex-stack col-xs-8 flex-stack-text posttv-your-three-text"> <div class="headline x-small highlight-style posttv-your-three-text-headline">How hackers can control your car from miles away</div> <div class="standalone-overlay posttv-your-three-text-duration"> <span class="duration" style="padding: 0;">2:29</span> </div> </div> <div class="clear"></div> </div> <div class="posttv-your-three-list-item " style="margin-bottom: 20px;" id="posttv-your-three-list-item-2" data-video-title="How much can one woman eat?" data-video-blurb="Katie Pumphrey swam across the English Channel. That involves a lot of training and a lot of eating. Check out what Pumphrey needs to eat on a normal day just to keep her strength up." data-video-image="http://s3.amazonaws.com/posttv-thumbnails-prod/thumbnails/55b27bb2e4b09ff16888bd8b/20150724_Meals_splash1.jpg" data-video-url="http://wapo.st/1haz9Oy" data-video-uuid="f32c320e-322c-11e5-a879-213078d03dd3" data-video-editor="Whitney Leaming" data-video-source="The Washington Post" data-video-duration="77.0" data-video-islive="false"> <div class="col-xs-4 art-left flex-stack-art posttv-your-three-list-thumbnail"><img src="https://images.washingtonpost.com/?url=https://img.washingtonpost.com/pb/resources/img/spacer.gif&amp;op=resize&amp;w=130&amp;h=81&amp;filter=nearest&fmt=png" data-hi-res-src="https://img.washingtonpost.com/wp-apps/imrs.php?src=http%3a%2f%2fs3.amazonaws.com%2fposttv-thumbnails-prod%2fthumbnails%2f55b27bb2e4b09ff16888bd8b%2f20150724_Meals_splash1.jpg&amp;w=480&amp;h=300" data-low-res-src="https://img.washingtonpost.com/wp-apps/imrs.php?src=http%3a%2f%2fs3.amazonaws.com%2fposttv-thumbnails-prod%2fthumbnails%2f55b27bb2e4b09ff16888bd8b%2f20150724_Meals_splash1.jpg&amp;w=130&amp;h=81" data-threshold="130" class="art-left unprocessed placeholder"/></div> <div class="flex-stack col-xs-8 flex-stack-text posttv-your-three-text"> <div class="headline x-small highlight-style posttv-your-three-text-headline">How much can one woman eat?</div> <div class="standalone-overlay posttv-your-three-text-duration"> <span class="duration" style="padding: 0;">1:17</span> </div> </div> <div class="clear"></div> </div> </div> </div> </div> </div> </div> </div> <div class="moat-trackable pb-f-theme-normal pb-1 pb-feature pb-layout-item pb-f-page-footer-v2" moat-id="page/footer-v2|world" data-chain-name="no-name" data-feature-name="no-name" data-feature-id="page/footer-v2" id="f0Zquyj03PgCxp"> <ul class="footer-v2 plain"> <li><a href="//www.washingtonpost.com"><b>washingtonpost.com</b></a></li> <li>&copy; 1996-2015 The Washington Post</li> <li>&nbsp;</li> <li><a href="//www.washingtonpost.com/actmgmt/help/">Help and Contact Us</a></li> <li><a href="//www.washingtonpost.com/terms-of-service/2011/11/18/gIQAldiYiN_story.html">Terms of Service</a></li> <li><a href="//www.washingtonpost.com/privacy-policy/2011/11/18/gIQASIiaiN_story.html">Privacy Policy</a></li> <li><a href="//www.washingtonpost.com/terms-of-sale-for-print-products/2014/05/08/d60c4bc8-d6c0-11e3-aae8-c2d44bd79778_story.html">Print Products Terms of Sale</a></li> <li><a href="//www.washingtonpost.com/terms-of-sale-for-digital-products/2014/05/06/b7763844-cbf9-11e3-93eb-6c0037dde2ad_story.html">Digital Products Terms of Sale</a></li> <li><a href="//www.washingtonpost.com/discussion-and-submission-guidelines/2011/11/21/gIQAuvIbiN_story.html">Submissions and Discussion Policy</a></li> <li><a href="//www.washingtonpost.com/rss-terms-of-service/2012/01/16/gIQAadFYAQ_story.html">RSS Terms of Service</a></li> <li><a href="//www.washingtonpost.com/how-can-i-opt-out-of-online-advertising-cookies/2011/11/18/gIQABECbiN_story.html">Ad Choices</a></li> </ul> </div> <div class="moat-trackable pb-f-theme-normal pb-1 pb-feature pb-layout-item pb-f-ad-flex-3" moat-id="ad/flex-3|world" data-chain-name="no-name" data-feature-name="no-name" data-feature-id="ad/flex-3" id="fqSq0j203PgCxp"> <div id="slug_flex_ss_bb_hp_3" class="pb-ad-container border-bottom-airy" style="display:none;" data-ad-type-placeholder="flex_ss_bb_hp|3" data-ad-delivery="vi"></div> <script>(function(){TWP=window.TWP||{};TWP.Features=TWP.Features||{};TWP.Features.Ad=TWP.Features.Ad||{};TWP.Features.Ad.flexAd3={};TWP.Features.Ad.flexAd3.sticky=!0})();</script> </div> <div class="moat-trackable pb-f-theme-normal full pb-feature pb-layout-item pb-f-posttv-sticky-player" moat-id="posttv/sticky-player|world" data-chain-name="no-name" data-feature-name="no-name" data-feature-id="posttv/sticky-player" id="fhVvVQ103PgCxp"> <div class="posttv-sticky-player-video pb-font-smoothing hidden"> <div class="posttv-sticky-player-exit"><i class="fa fa-times"></i><span class="franklin-bold">Close video player</span></span></div> <div class="posttv-sticky-player-wrapper" id="posttv-sticky-player-wrapper"></div> <div class="posttv-sticky-player-text hidden"> <div class="label label-normal">Now Playing</div> <div class="posttv-sticky-player-caption pb-caption"></div> </div> </div> <div class="clear"></div> </div> </div> <div class="moat-trackable pb-f-theme-normal pb-3 pb-feature pb-layout-item pb-f-article-next-story" moat-id="article/next-story|world" data-chain-name="no-name" data-feature-name="no-name" data-feature-id="article/next-story" id="f0XzHaP03PgCxp"> <style type="text/css">.pb-f-article-next-story{display:none}</style> </div> <div class="moat-trackable pb-f-theme-normal pb-3 pb-feature pb-layout-item pb-f-ad-leaderboard-2" moat-id="ad/leaderboard-2|world" data-chain-name="no-name" data-feature-name="no-name" data-feature-id="ad/leaderboard-2" id="ffaMbc103PgCxp"> <div id="slug_leaderboard_bottom" data-ad-type="leaderboard_bottom" class="pb-ad-container leaderboard-2 border-bottom-tight" style="display:none;"> </div> <div class="mobile-leaderboard ad-hideable"> <div id="slug_mob_av" data-ad-type="mob_av" style="display:none;"></div> </div> </div> <div class="moat-trackable pb-f-theme-normal pb-1 pb-feature pb-layout-item pb-f-page-clavis" moat-id="page/clavis|world" data-chain-name="no-name" data-feature-name="no-name" data-feature-id="page/clavis" id="fTvXPh203PgCxp"> <script>try{wp_meta_data&&(wp_meta_data.clavis||(wp_meta_data.clavis={}),function(){var a=[],b=[];a.push("RW0");b.push("Child 2");a.push("KTT");b.push("New Auxiliary 30");a.push("sa6");b.push("New Auxiliary 37");a.push("4hr");b.push("New Auxiliary 38");a.push("g5c");b.push("New Auxiliary 39");a.push("3fv");b.push("New Auxiliary 40");a.push("8z8");b.push("Sensitive1");a.push("z0s");b.push("Copy of New Auxiliary 20");a.push("n8g");b.push("Copy of New Auxiliary 20");a.push("5k4");b.push("China_HongKong%20Exclusion%2012-12-14");
700
+ a.push("7f3");b.push("Copy of New Auxiliary 26");a.push("pdy");b.push("Travel%20Enthusiast%202.12.15");a.push("o1b");b.push("Defense%20and%20National%20Security%202.12.15");a.push("m1d");b.push("Copy%20of%20Defense%20and%20National%20Security%202.12.15");a.push("eqw");b.push("Affluent");a.push("mza");b.push("Government%20\x26%20Policy");a.push("5l0");b.push("International%20Conflicts%20\x26%20Relations");a.push("stu");b.push("Lifestyle");a.push("0cz");b.push("Society");a.push("7aq");b.push("Sensitive%202");
701
+ a.push("oe1");b.push("National%20Security");a.push("nfe");b.push("Travel");a.push("o6r");b.push("Wars,%20Conflicts%20and%20Terrorism");a.push("n7j");b.push("Race%20and%20Ethnicity");a.push("070");b.push("Religion%20and%20Belief");a.push("jua");b.push("New Auxiliary 192");a.push("uld");b.push("New Auxiliary 193");a.push("ngs");b.push("New Auxiliary 194");a.push("umq");b.push("New Auxiliary 195");a.push("uiu");b.push("New Auxiliary 196");a.push("zhn");b.push("Emissions");a.push("m9d");b.push("New Auxiliary 199");
702
+ a.push("q7s");b.push("New Auxiliary 200");a.push("zwn");b.push("Murdoch%20neg");a.push("w0i");b.push("New Auxiliary 205");a.push("3hv");b.push("New Auxiliary 210");a.push("dt5");b.push("New%20Auxiliary%20212%20Julien");a.push("ruq");b.push("New Auxiliary 222");a.push("1dy");b.push("New Auxiliary 223");a.push("lyc");b.push("New Auxiliary 224");a.push("8ls");b.push("New Auxiliary 226");a.push("x8u");b.push("New Auxiliary 229");a.push("0yz");b.push("New Auxiliary 231");wp_meta_data.clavis.auxiliaries=
703
+ a;wp_meta_data.clavis.auxiliary_names=b;a=[];b=[];a.push("National Security");b.push("sz");a.push("Race and Ethnicity");b.push("rm");a.push("Travel");b.push("ej");a.push("Religion and Belief");b.push("rj");a.push("Wars, Conflicts and Terrorism");b.push("qa");wp_meta_data.clavis.topics&&0!=wp_meta_data.clavis.topics.length||(wp_meta_data.clavis.topics=a);wp_meta_data.clavis.ct&&0!=wp_meta_data.clavis.ct.length||(wp_meta_data.clavis.ct=b)}())}catch(e){};</script> </div> <div class="moat-trackable pb-f-theme-normal pb-1 pb-feature pb-layout-item pb-f-page-targeting" moat-id="page/targeting|world" data-chain-name="no-name" data-feature-name="no-name" data-feature-id="page/targeting" id="foD4qC103PgCxp"> <script>(function(a){TWP=window.TWP||{};TWP.Features=TWP.Features||{};TWP.Features.Page=TWP.Features.Page||{};TWP.Features.Page.Targeting={};TWP.Features.Page.Targeting.endpointServer="https://targeting.wpdigital.net/TargetingWebAPP/targeting"})(jQuery);</script> </div> <div class="moat-trackable pb-f-theme-normal pb-3 pb-feature pb-layout-item pb-f-page-drawbridge-test-1" moat-id="page/drawbridge-test-1|world" data-chain-name="no-name" data-feature-name="no-name" data-feature-id="page/drawbridge-test-1" id="fHPVUD103PgCxp"> <script>var wp_pb=window.wp_pb||{};wp_pb.DrawbridgeTest={};wp_pb.DrawbridgeTest.subscription=wp_pb.DrawbridgeTest.subscription||{};wp_pb.DrawbridgeTest.subscription.titleMessage="To keep reading, please enter your e-mail address.";wp_pb.DrawbridgeTest.subscription.subscriptionMessage="You'll also receive from The Washington Post:\x3cul\x3e\x3cli\x3eA \x3cb\x3efree\x3c/b\x3e 6-week digital subscription\x3c/li\x3e\x3cli\x3eOur daily newsletter in your inbox\x3c/li\x3e\x3c/ul\x3e";
704
+ wp_pb.DrawbridgeTest.subscription.thankyouMessage="Check your inbox. We\u2019ve sent an email explaining how to set up an account and activate your free digital subscription.";wp_pb.DrawbridgeTest.subscription.placeholderImage="/pb/resources/img/drawbridge/drawbridge-placeholder.jpg";wp_pb.DrawbridgeTest.nosubscription=wp_pb.DrawbridgeTest.nosubscription||{};wp_pb.DrawbridgeTest.nosubscription.titleMessage="Your ad blocker is on.";wp_pb.DrawbridgeTest.nosubscription.subscriptionMessage="Enter your e-mail address to unlock this story - and subscribe to our First Reads newsletter.";
705
+ wp_pb.DrawbridgeTest.nosubscription.thankyouMessage="Enjoy the article, and check your inbox for our daily newsletter!";wp_pb.DrawbridgeTest.nosubscription.placeholderImage="/pb/resources/img/drawbridge/drawbridge-placeholder.jpg";wp_pb.DrawbridgeTest.overlay=wp_pb.DrawbridgeTest.overlay||{};wp_pb.DrawbridgeTest.overlay.titleMessage="We\u2019re committed to hosting safe ads and respecting your privacy.";wp_pb.DrawbridgeTest.overlay.subscriptionMessage="To keep reading, please disable your ad blocker.";
706
+ wp_pb.DrawbridgeTest.overlay.thankyouMessage="Thank you!";wp_pb.DrawbridgeTest.overlay.placeholderImage="/pb/resources/img/drawbridge/drawbridge-placeholder.jpg";</script> <div id="drawbridge-signup-overlay"> <div id="db-inner" class="row"> <div id="db-signup-email" class="show col-xs-12"> <div class="btn-close overlay-closer hide"></div> <h3 class="col-xs-12 titleMessage"> To keep reading, please enter your email address. </h3> <div class="col-xs-12 col-sm-5"> <img class="placeholderImage" src="/pb/resources/img/drawbridge/drawbridge-placeholder.jpg"/> </div> <div class="col-xs-12 col-sm-7 "> <div class="blurb subscriptionMessage"> You’ll also receive from The Washington Post: <ul> <li>A <strong>free</strong> 6-week digital subscription</li><li>Our daily newsletter in your inbox</li></ul> </div> <div id="subscribe-group"> <input type="text" name="email" id="email-field" class="form-field" placeholder="Enter your email address"/> <input type="submit" value="Go" class="btn subscribe-btn"/> <i class="fa fa-spinner fa-spin"></i> <p class="error-msg error-msg-email hide">Please enter a valid email address</p> </div> </div> <div id="agree-checkbox" class="col-xs-12 col-sm-7 pull-right"> <input type="checkbox" class="checkbox" checked name="agreed">I have read and agree to the <a href="https://www.washingtonpost.com/terms-of-service/2011/11/18/gIQAldiYiN_story.html">Terms of Service</a> and <a href="https://www.washingtonpost.com/privacy-policy/2011/11/18/gIQASIiaiN_story.html">Privacy Policy</a>. <p class="error-msg error-msg-checkbox hide">Please indicate agreement.</p> </div> <div class="col-xs-12 col-sm-7 pull-right" id="subscribe-link"> Already a subscriber?&nbsp;&nbsp;<a href="https://subscribe.washingtonpost.com/loginregistration/index.html#/loginhome/group/short?destination=http%3a%2f%2fwww.washingtonpost.com%2fpb%2fworld%2fmiddle_east%2fisrael-ambassador-to-us-sends-anti-boycott-message-with-gift%2f2015%2f12%2f23%2f652d639c-a99b-11e5-b596-113f59ee069a_story.html">Sign in</a> </div> </div> <div id="db-signup-thanks" class="hide col-xs-12"> <div class="btn-close overlay-closer"></div> <h3 class="col-xs-12"> Thank you. </h3> <div class="col-xs-12 col-sm-5"> <img class="placeholderImage" src="/pb/resources/img/drawbridge/drawbridge-placeholder.jpg"/> </div> <div class="col-xs-12 col-sm-7"> <div class="blurb thankyouMessage"> Check your inbox. We’ve sent an email explaining how to set up an account and activate your free digital subscription. </div> <div class="link-btn overlay-closer"> <a>Return to Article</a> </div> </div> </div> </div> <div class="clear"></div> </div> </div> <div class="moat-trackable pb-f-theme-normal pb-0 pb-feature pb-layout-item pb-f-bi-abtest" moat-id="bi/abtest|world" data-chain-name="no-name" data-feature-name="no-name" data-feature-id="bi/abtest" id="f0uRZk603PgCxp"> <script>var TWP=window.TWP||{};(function(a,b,c){a.TWP.ABTestUser=b;a._abtemptyfn=function(){}})(window,{trackPageviewEventBefore:"twpOmnitureInit",trackPageviewEventAfter:"afterTwpPageTrack.omniture",trackSetHandler:"TWP.ABTestMfr.track.omniture.trackSetHandler",trackUnsetHandler:"TWP.ABTestMfr.track.omniture.trackUnsetHandler",trackSendHandler:"s.sendDataToOmniture",trackValueDelimeter:","});</script> <script>TWP.ABTestBucket=TWP.ABTestBucket||[];
707
+ TWP.ABTestBucket.push({name:"knowledgemap",disabled:!1,features:[{name:"knowledgemap-experiment1",active:!0,"x-status":"1",increment:0,end:"1438228800000",segment:{mobile:!0,desktop:!0,touch:!0},_token:"bda397",variations:[{customOptions:{target:"70"},name:"experiment",track:[{name:"list1",dynamic:!1,value:"knowledgemap-experiment1:experiment"},{name:"prop56",dynamic:!1,value:"knowledgemap-experiment1:experiment"},{name:"list1",dynamic:!1,value:"knowledgemap-experiment1-bda397"},{name:"prop56",dynamic:!1,
708
+ value:"knowledgemap-experiment1-bda397"}]}],defaultTrack:[{name:"list1",dynamic:!1,value:"knowledgemap-experiment1:default"},{name:"prop56",dynamic:!1,value:"knowledgemap-experiment1:default"},{name:"list1",dynamic:!1,value:"knowledgemap-experiment1-bda397"},{name:"prop56",dynamic:!1,value:"knowledgemap-experiment1-bda397"}]},{name:"knowledgemap-isis",active:!0,"x-status":"1",increment:0,end:"1438228800000",segment:{mobile:!0,desktop:!0,touch:!0},_token:"6c497a",variations:[{customOptions:{target:"70"},
709
+ name:"experiment",track:[{name:"list1",dynamic:!1,value:"knowledgemap-isis:experiment"},{name:"prop56",dynamic:!1,value:"knowledgemap-isis:experiment"},{name:"list1",dynamic:!1,value:"knowledgemap-isis-6c497a"},{name:"prop56",dynamic:!1,value:"knowledgemap-isis-6c497a"}]}],defaultTrack:[{name:"list1",dynamic:!1,value:"knowledgemap-isis:default"},{name:"prop56",dynamic:!1,value:"knowledgemap-isis:default"},{name:"list1",dynamic:!1,value:"knowledgemap-isis-6c497a"},{name:"prop56",dynamic:!1,value:"knowledgemap-isis-6c497a"}]}]});
710
+ TWP.ABTestBucket.push({name:"recommendation",disabled:!1,features:[{name:"recommendation-uk",active:!1,"x-status":"1",increment:2,segment:{},_token:"4f29f5",variations:[{customOptions:{target:"50"},name:"uk",track:[{name:"list1",dynamic:!1,value:"recommendation-uk:uk"},{name:"prop56",dynamic:!1,value:"recommendation-uk:uk"},{name:"list1",dynamic:!1,value:"recommendation-uk-4f29f5"},{name:"prop56",dynamic:!1,value:"recommendation-uk-4f29f5"}]}],defaultTrack:[{name:"list1",dynamic:!1,value:"recommendation-uk:default"},
711
+ {name:"prop56",dynamic:!1,value:"recommendation-uk:default"},{name:"list1",dynamic:!1,value:"recommendation-uk-4f29f5"},{name:"prop56",dynamic:!1,value:"recommendation-uk-4f29f5"}]},{name:"recommendation-video",active:!1,"x-status":"1",increment:4,segment:{},_token:"af4014",variations:[{customOptions:{target:"50"},name:"video",track:[{name:"list1",dynamic:!1,value:"recommendation-video:video"},{name:"prop56",dynamic:!1,value:"recommendation-video:video"},{name:"list1",dynamic:!1,value:"recommendation-video-af4014"},
712
+ {name:"prop56",dynamic:!1,value:"recommendation-video-af4014"}]}],defaultTrack:[{name:"list1",dynamic:!1,value:"recommendation-video:default"},{name:"prop56",dynamic:!1,value:"recommendation-video:default"},{name:"list1",dynamic:!1,value:"recommendation-video-af4014"},{name:"prop56",dynamic:!1,value:"recommendation-video-af4014"}]}]});
713
+ TWP.ABTestBucket.push({name:"dummy",disabled:!1,features:[{name:"dummy-feature",active:!0,reglock:!1,end:"1418965200000",throttle:3.3333333333333335,_token:"14376b",defaultTrack:[{name:"list1",dynamic:!1,value:"dummy-feature:default"},{name:"list1",dynamic:!1,value:"dummy-feature-14376b"}],variations:[{customOptions:{target:"20"},name:"easy1",track:[{name:"list1",dynamic:!1,value:"dummy-feature:easy1"},{name:"list1",dynamic:!1,value:"dummy-feature-14376b"}]},{customOptions:{target:"10"},name:"easy2",
714
+ track:[{name:"list1",dynamic:!1,value:"dummy-feature:easy2"},{name:"list1",dynamic:!1,value:"dummy-feature-14376b"}]}]}]});
715
+ TWP.ABTestBucket.push({name:"header",disabled:!1,features:[{name:"header-mastHead2",active:!1,increment:0,end:"1416805200000",_token:"c15b6c",blacklist:{referrers:["","washingtonpost.com"],track:[{name:"list1",dynamic:!1,value:"header-mastHead2:direct"}]},defaultTrack:[{name:"list1",dynamic:!1,value:"header-mastHead2:default"},{name:"list1",dynamic:!1,value:"header-mastHead2-c15b6c"}],variations:[{customOptions:{target:"5"},name:"logoLarge",track:[{name:"list1",dynamic:!1,value:"header-mastHead2:logoLarge"},
716
+ {name:"list1",dynamic:!1,value:"header-mastHead2-c15b6c"}]}]},{name:"header-leaderboard",active:!1,increment:0,end:"1423630800000",_token:"1f6567",defaultTrack:[{name:"list1",dynamic:!1,value:"header-leaderboard:default"},{name:"list1",dynamic:!1,value:"header-leaderboard-1f6567"}],variations:[{customOptions:{target:"20"},name:"below_sharebar",track:[{name:"list1",dynamic:!1,value:"header-leaderboard:below_sharebar"},{name:"list1",dynamic:!1,value:"header-leaderboard-1f6567"}]}]}]});
717
+ TWP.ABTestBucket.push({name:"subscription",disabled:!1,features:[{name:"subscription-fronts",active:!0,"x-status":"1",increment:1,segment:{mobile:!0,desktop:!0,touch:!0},_token:"f422c0",variations:[{customOptions:{target:"100"},name:"both",track:[{name:"list1",dynamic:!1,value:"subscription-fronts:both"},{name:"prop56",dynamic:!1,value:"subscription-fronts:both"},{name:"list1",dynamic:!1,value:"subscription-fronts-f422c0"},{name:"prop56",dynamic:!1,value:"subscription-fronts-f422c0"}]}],defaultTrack:[{name:"list1",
718
+ dynamic:!1,value:"subscription-fronts:default"},{name:"prop56",dynamic:!1,value:"subscription-fronts:default"},{name:"list1",dynamic:!1,value:"subscription-fronts-f422c0"},{name:"prop56",dynamic:!1,value:"subscription-fronts-f422c0"}]},{name:"subscription-modal",active:!1,"x-status":"1",increment:4,segment:{mobile:!0,desktop:!0,touch:!0},_token:"d4657c",variations:[{customOptions:{target:"5"},name:"active",track:[{name:"list1",dynamic:!1,value:"subscription-modal:active"},{name:"prop56",dynamic:!1,
719
+ value:"subscription-modal:active"},{name:"list1",dynamic:!1,value:"subscription-modal-d4657c"},{name:"prop56",dynamic:!1,value:"subscription-modal-d4657c"}]}],defaultTrack:[{name:"list1",dynamic:!1,value:"subscription-modal:default"},{name:"prop56",dynamic:!1,value:"subscription-modal:default"},{name:"list1",dynamic:!1,value:"subscription-modal-d4657c"},{name:"prop56",dynamic:!1,value:"subscription-modal-d4657c"}]}]});
720
+ TWP.ABTestBucket.push({name:"newsletters",disabled:!1,features:[{name:"newsletters-articleUnits",active:!0,"x-status":"1",increment:0,segment:{desktop:!0},_token:"ef545e",variations:[{customOptions:{target:"50"},name:"banner",track:[{name:"list1",dynamic:!1,value:"newsletters-articleUnits:banner"},{name:"prop56",dynamic:!1,value:"newsletters-articleUnits:banner"},{name:"list1",dynamic:!1,value:"newsletters-articleUnits-ef545e"},{name:"prop56",dynamic:!1,value:"newsletters-articleUnits-ef545e"}]},
721
+ {customOptions:{target:"50"},name:"bottom",track:[{name:"list1",dynamic:!1,value:"newsletters-articleUnits:bottom"},{name:"prop56",dynamic:!1,value:"newsletters-articleUnits:bottom"},{name:"list1",dynamic:!1,value:"newsletters-articleUnits-ef545e"},{name:"prop56",dynamic:!1,value:"newsletters-articleUnits-ef545e"}]}],defaultTrack:[{name:"list1",dynamic:!1,value:"newsletters-articleUnits:default"},{name:"prop56",dynamic:!1,value:"newsletters-articleUnits:default"},{name:"list1",dynamic:!1,value:"newsletters-articleUnits-ef545e"},
722
+ {name:"prop56",dynamic:!1,value:"newsletters-articleUnits-ef545e"}]},{name:"newsletters-bannerReturnTime",active:!1,"x-status":"1",increment:0,segment:{desktop:!0},_token:"b6cf37",variations:[{customOptions:{target:"50"},name:"shorter",track:[{name:"list1",dynamic:!1,value:"newsletters-bannerReturnTime:shorter"},{name:"prop56",dynamic:!1,value:"newsletters-bannerReturnTime:shorter"},{name:"list1",dynamic:!1,value:"newsletters-bannerReturnTime-b6cf37"},{name:"prop56",dynamic:!1,value:"newsletters-bannerReturnTime-b6cf37"}]}],
723
+ defaultTrack:[{name:"list1",dynamic:!1,value:"newsletters-bannerReturnTime:default"},{name:"prop56",dynamic:!1,value:"newsletters-bannerReturnTime:default"},{name:"list1",dynamic:!1,value:"newsletters-bannerReturnTime-b6cf37"},{name:"prop56",dynamic:!1,value:"newsletters-bannerReturnTime-b6cf37"}]}]});
724
+ TWP.ABTestBucket.push({name:"ads",disabled:!1,features:[{name:"ads-outbrain",active:!0,"x-status":"1",increment:2,segment:{mobile:!0,desktop:!0,touch:!0},_token:"de8ec8",variations:[{customOptions:{target:"100"},name:"enabled",track:[{name:"list1",dynamic:!1,value:"ads-outbrain:enabled"},{name:"prop56",dynamic:!1,value:"ads-outbrain:enabled"},{name:"list1",dynamic:!1,value:"ads-outbrain-de8ec8"},{name:"prop56",dynamic:!1,value:"ads-outbrain-de8ec8"}]}],defaultTrack:[{name:"list1",dynamic:!1,value:"ads-outbrain:default"},
725
+ {name:"prop56",dynamic:!1,value:"ads-outbrain:default"},{name:"list1",dynamic:!1,value:"ads-outbrain-de8ec8"},{name:"prop56",dynamic:!1,value:"ads-outbrain-de8ec8"}]},{name:"ads-teads",active:!1,"x-status":"1",increment:0,segment:{},_token:"767af7",variations:[{customOptions:{target:"20"},name:"teadsVisible",track:[{name:"list1",dynamic:!1,value:"ads-teads:teadsVisible"},{name:"prop56",dynamic:!1,value:"ads-teads:teadsVisible"},{name:"list1",dynamic:!1,value:"ads-teads-767af7"},{name:"prop56",dynamic:!1,
726
+ value:"ads-teads-767af7"}]}],defaultTrack:[{name:"list1",dynamic:!1,value:"ads-teads:default"},{name:"prop56",dynamic:!1,value:"ads-teads:default"},{name:"list1",dynamic:!1,value:"ads-teads-767af7"},{name:"prop56",dynamic:!1,value:"ads-teads-767af7"}]}]});
727
+ TWP.ABTestBucket.push({name:"posttv_embeds",disabled:!1,features:[{name:"posttv_embeds-blurb",active:!1,"x-status":"1",increment:0,segment:{mobile:!0},_token:"1515a8",variations:[{customOptions:{target:"50"},name:"hidden",track:[{name:"list1",dynamic:!1,value:"posttv_embeds-blurb:hidden"},{name:"prop56",dynamic:!1,value:"posttv_embeds-blurb:hidden"},{name:"list1",dynamic:!1,value:"posttv_embeds-blurb-1515a8"},{name:"prop56",dynamic:!1,value:"posttv_embeds-blurb-1515a8"}]}],defaultTrack:[{name:"list1",
728
+ dynamic:!1,value:"posttv_embeds-blurb:default"},{name:"prop56",dynamic:!1,value:"posttv_embeds-blurb:default"},{name:"list1",dynamic:!1,value:"posttv_embeds-blurb-1515a8"},{name:"prop56",dynamic:!1,value:"posttv_embeds-blurb-1515a8"}]},{name:"posttv_embeds-html5",active:!1,"x-status":"1",increment:1,segment:{desktop:!0},_token:"140974",variations:[{customOptions:{target:"50"},name:"html5",track:[{name:"list1",dynamic:!1,value:"posttv_embeds-html5:html5"},{name:"prop56",dynamic:!1,value:"posttv_embeds-html5:html5"},
729
+ {name:"list1",dynamic:!1,value:"posttv_embeds-html5-140974"},{name:"prop56",dynamic:!1,value:"posttv_embeds-html5-140974"}]}],defaultTrack:[{name:"list1",dynamic:!1,value:"posttv_embeds-html5:default"},{name:"prop56",dynamic:!1,value:"posttv_embeds-html5:default"},{name:"list1",dynamic:!1,value:"posttv_embeds-html5-140974"},{name:"prop56",dynamic:!1,value:"posttv_embeds-html5-140974"}]}]});
730
+ TWP.ABTestBucket.push({name:"drawbridge",disabled:!0,features:[{name:"drawbridge-adb",active:!1,"x-status":"1",increment:1,segment:{desktop:!0},_token:"2c8919",variations:[{customOptions:{target:"20"},name:"subscription",track:[{name:"list1",dynamic:!1,value:"drawbridge-adb:subscription"},{name:"prop56",dynamic:!1,value:"drawbridge-adb:subscription"},{name:"list1",dynamic:!1,value:"drawbridge-adb-2c8919"},{name:"prop56",dynamic:!1,value:"drawbridge-adb-2c8919"}]},{customOptions:{target:"20"},name:"nosubscription",
731
+ track:[{name:"list1",dynamic:!1,value:"drawbridge-adb:nosubscription"},{name:"prop56",dynamic:!1,value:"drawbridge-adb:nosubscription"},{name:"list1",dynamic:!1,value:"drawbridge-adb-2c8919"},{name:"prop56",dynamic:!1,value:"drawbridge-adb-2c8919"}]},{customOptions:{target:"20"},name:"paywall",track:[{name:"list1",dynamic:!1,value:"drawbridge-adb:paywall"},{name:"prop56",dynamic:!1,value:"drawbridge-adb:paywall"},{name:"list1",dynamic:!1,value:"drawbridge-adb-2c8919"},{name:"prop56",dynamic:!1,value:"drawbridge-adb-2c8919"}]},
732
+ {customOptions:{target:"20"},name:"overlay",track:[{name:"list1",dynamic:!1,value:"drawbridge-adb:overlay"},{name:"prop56",dynamic:!1,value:"drawbridge-adb:overlay"},{name:"list1",dynamic:!1,value:"drawbridge-adb-2c8919"},{name:"prop56",dynamic:!1,value:"drawbridge-adb-2c8919"}]}],defaultTrack:[{name:"list1",dynamic:!1,value:"drawbridge-adb:default"},{name:"prop56",dynamic:!1,value:"drawbridge-adb:default"},{name:"list1",dynamic:!1,value:"drawbridge-adb-2c8919"},{name:"prop56",dynamic:!1,value:"drawbridge-adb-2c8919"}]}]});</script> <script>(function(c,d,e,k){var f=d.ABTestUser;c={};var h=(c.track={}).omniture={trackSetHandler:function(b){if(e.s)for(var a in b)b.hasOwnProperty(a)&&(s[a]?b[a]&&0>s[a].indexOf(b[a])&&(s[a]=[s[a],b[a]].join(f.trackValueDelimeter)):s[a]=[b[a]].join(f.trackValueDelimeter),/evar/gi.test(a)&&(e["wp_"+a.toLowerCase()]=b[a]))},trackUnsetHandler:function(b){if(e.s)for(var a in b)b.hasOwnProperty(a)&&(s[a]=(s[a]||"").replace(("string"==typeof b[a]?[b[a]]:b[a]).join(f.trackValueDelimeter),""),s[a]||(s[a]=void 0),
733
+ /evar/gi.test(a)&&(e["wp_"+a.toLowerCase()]=void 0))},trackSendHandler:function(b,a,g){if(e.s){var c,d;c=s.events;d=s.linkTrackEvents;a&&(s.events=("string"===typeof a?[a]:a).join(f.trackValueDelimeter)||void 0,s.linkTrackEvents=s.events);h.trackSetHandler(g);s.tl(!0,"o",b,{linkTrackVars:function(){var b=[];a&&b.push("events");for(var c in g)g.hasOwnProperty(c)&&b.push(c);return b.join(f.trackValueDelimeter)}()});s.events=c;s.linkTrackEvents=d;h.trackUnsetHandler(g)}}};d.ABTestMfr=c})(jQuery,TWP,
734
+ window);</script> </div> <div class="moat-trackable pb-f-theme-normal pb-3 pb-feature pb-layout-item pb-f-page-magnet" moat-id="page/magnet|world" data-chain-name="no-name" data-feature-name="no-name" data-feature-id="page/magnet" id="f0oKf9r03PgCxp"> <script id="PageMagnetTitle" type="text/html-template">
735
+ <div class="pb-magnet-title">
736
+
737
+
738
+
739
+
740
+
741
+ <a class="pb-magnet-h2" href=""></a>
742
+ <a class="tagline" href=""></a>
743
+
744
+
745
+ </div>
746
+ </script> </div> </div> <div class="moat-trackable pb-f-theme-normal full pb-feature pb-layout-item pb-f-posttv-player" moat-id="posttv/player|world" data-chain-name="no-name" data-feature-name="no-name" data-feature-id="posttv/player" id="f0HFyk303PgCxp"> </div> <div class="pb-container"> </div></div> <script src="/pb/gr/c/default/r5c0xp103PgCxp/js/da39a3ee5e.js?_=407d7"></script> <script src="https://www.washingtonpost.com/wp-stat/visitorsegment/shared/resources/build/latest.js"></script> <script src="/pb/gr/c/default/r5c0xp103PgCxp/js/4da9c5392f.js?_=407d7"></script> <script src="//js.washingtonpost.com/video/resources/js/posttv/vendor/pubsub.js"></script> <script src="//js.washingtonpost.com/video/resources/js/posttv/vendor/underscore-min.js"></script> <script src="//js.washingtonpost.com/video/resources/js/posttv/posttv-player.min.js"></script> <script src="/pb/gr/p/default/r5c0xp103PgCxp/render.js?_=bd289"></script> <script src="/pb/gr/p/default/r5c0xp103PgCxp/instance.js?_=bd289"></script> <script src="/pb/gr/c/default/r5c0xp103PgCxp/after_features/589702c7ec.js?_=6da07"></script> <script src="//js.washingtonpost.com/wp-stat/ad/loaders/latest/js/min/loader.min.js" async data-ad-page-type="responsive" data-ad-site="wp"></script> <script>__checkAdsLoaded=window.__checkAdsLoaded||!0;</script> <script>window.TWPHead.ready("main.js",function(){window.TWP&&TWP.Analytics&&TWP.Analytics.init("")});</script> <noscript><img src="https://sb.scorecardresearch.com/p?c1=2&c2=3005617&cv=2.0&cj=1"/></noscript> <noscript><img src="//me.effectivemeasure.net/em_image" alt="" style="position:absolute; left:-5px;"/></noscript> <script>(function(a){try{var b=a(".tweet-authors");!b.size()||window.twttr&&twttr.widgets||a.ajax({dataType:"script",cache:!0,url:"//platform.twitter.com/widgets.js",success:function(a){b.find(".pb-twitter-follow.unprocessed").removeClass("unprocessed")}});a.ajax({dataType:"script",cache:!0,url:"//ak.sail-horizon.com/horizon/v1.js",success:function(a){window.Sailthru&&Sailthru.setup({domain:"horizon.washingtonpost.com"})}})}catch(c){}})(jQuery);</script> <script>!function(){if(!(99<Math.floor(100*Math.random()))){var c,b,d,a=document.createElement("iframe");a.src="javascript:false";(a.frameElement||a).style.cssText="width: 0; height: 0; border: 0";d=document.getElementsByTagName("script")[0];d.parentNode.insertBefore(a,d);try{b=a.contentWindow.document}catch(e){c=document.domain,a.src="javascript:var d\x3ddocument.open();d.domain\x3d'"+c+"';void(0);",b=a.contentWindow.document}b.open()._l=function(){var a=this.createElement("script");c&&(this.domain=c);a.id=
747
+ "boomr-if-as";a.src="//js.washingtonpost.com/wp-stat/rum/wprum.min.js";this.body.appendChild(a)};b.write('\x3cbody onload\x3d"document._l();"\x3e');b.close()}}();</script> </body> </html>