FAIR USE NOTICE

A Bear Market Economics Blog Site

Follow Every Bear Market Economics blog post on Facebook here

FAIR USE NOTICE

This site may contain copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in an effort to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc. we believe this constitutes a ‘fair use’ of any such copyrighted material as provided for in section 107 of the US Copyright Law.

In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml

If you wish to use copyrighted material from this site for purposes of your own that go beyond ‘fair use’, you must obtain permission from the copyright owner.

FAIR USE NOTICE FAIR USE NOTICE: This page may contain copyrighted material the use of which has not been specifically authorized by the copyright owner. This website distributes this material without profit to those who have expressed a prior interest in receiving the included information for scientific, research and educational purposes. We believe this constitutes a fair use of any such copyrighted material as provided for in 17 U.S.C § 107.

Read more at: http://www.etupdates.com/fair-use-notice/#.UpzWQRL3l5M | ET. Updates
FAIR USE NOTICE FAIR USE NOTICE: This page may contain copyrighted material the use of which has not been specifically authorized by the copyright owner. This website distributes this material without profit to those who have expressed a prior interest in receiving the included information for scientific, research and educational purposes. We believe this constitutes a fair use of any such copyrighted material as provided for in 17 U.S.C § 107.

Read more at: http://www.etupdates.com/fair-use-notice/#.UpzWQRL3l5M | ET. Updates

All Blogs licensed under Creative Commons Attribution 3.0

Friday, October 28, 2011

A 51st State for Armed Robotic Drones

Dissident Voice: a radical newsletter in the struggle for peace and social justice

A 51st State for Armed Robotic Drones

A 51st State for Armed Robotic Drones

Weaponized UAVs (unmanned aerial vehicles), also known as drones, have their own caucus in Congress, and the Pentagon’s plan is to give them their own state as well.

Under this plan, 7 million acres (or 11,000 square miles) of land in the southeast corner of Colorado, and 60 million acres of air space (or 94,000 square miles) over Colorado and New Mexico would be given over to special forces testing and training in the use of remote-controlled flying murder machines. The full state of Colorado is itself 104,000 square miles. Rhode Island is 1,000 square miles. Virginia, where I live, is 43,000 square miles.

The U.S. military (including Army, Navy, Air Force, and Marines) is proceeding with this plan in violation of the public will, new state legislation on private property rights, an exceptionally strong federal court order, and a funding ban passed by the United States Congress, and in the absence of any approved Environmental Impact Statement. Public pressure has successfully put the law on the right side of this issue, and the military is disregarding the law.

I spoke with Jean Aguerre, whose organization “Not 1 More Acre“ is leading the pushback against this madness. Jean told me she grew up, during the 1960s, on the vast grasslands of southeast Colorado, where the Comanche National Grasslands makes up part of a system of grasslands put in place to help the prairie recover from the dust bowl. The dust bowl, Aguerre says, was the worst environmental disaster in the United States until BP filled the Gulf of Mexico with oil. The dust bowl had been brought on by the government’s policy of requiring homesteaders to plow the prairie. The recovery programs created large tracts of land, of 100,000 acres and more, owned by “generational ranchers,” that is families that would hand the ranches off to their children.

Aguerre said she grew up on a ranch of incredible beauty and natural wealth, with a 165-million-year-old dinosaur track way and petroglyphs from 12,000 years back. Grasslands are the most threatened ecosystems in the world because they are so accessible, Aguerre says, and the only intact short grassland left in this country is the one being targeted for the “51st state.”

Round One began in the 1980s. Fort Carson, an Army base in Colorado Springs, had been kept open after World War II and now began looking for more land. The people of the area were opposed. The U.S. Congressman representing the area agreed to oppose any land grab. But Senator Gary Hart took the opposite position. As a result, during the early 1980s, the Army Corps of Engineers started telling ranchers to sell out or risk seeing their land condemned and taken from them.

The ranch next to Aguerre’s is called Wine Glass Rourke. It was sold to a shill, as Aguerre describes the buyer. He ran the place into the ground with too many cattle, she says, and then sold it to the military, “And they were off and running!” With condemnations the military put together 250 thousand acres. Ranchers, along with their cattle, were moved off their own land by federal marshals. “We didn’t know when we’d be next,” Aguerre says of her own family.

Luckily for the people of Colorado and New Mexico, and all of us, Aguerre got involved in politics. She became a political director for Congressman Tim Werth who later became a U.S. senator. Aguerre took him to see the Wine Glass Rourke ranch and told him “Let’s take it back.” Werth dedicated his staff to the effort for three years, resulting in the transfer to the Forest Service of 17,000 key acres.

The Army used its new land less than twice a year for maneuvers, but caused horrible environmental damage whenever it did. That was the case for about 30 years, until the activity of recent years made everything that came before look sensitive and sustainable.

In the meantime, people like Dick Cheney and Donald Rumsfeld were theorizing the transformation of the U.S. military into a force for robotic warfare. Aguerre believes it was in 1996 that a decision was made that the military would need a robotic warfare center. Around 1999 the Programmatic Environmental Impact Statement was created. This precedes the more specific Site Environmental Impact Statements. The U.S. public, just like the public of any foreign nation where new U.S. bases are being planned, was told nothing.

In 2006, Aguerre was working in Oregon when friends started asking her to come home and help because something big was happening. An Army land expansion map had been leaked that showed plans for taking over 6.9 million acres, the whole southeast corner of the state. Aguerre thought she would come home for two weeks but has never left. An Environmental Impact Statement for the site was about to be released, and Aguerre knew that meant the project was pretty far along. She formed organizations and found a lawyer in Colorado Springs named Steve Harris to help. The two of them, she says, were absolutely dedicated to NEPA and FOIA. NEPA is the National Environmental Policy Act of 1969. FOIA is the Freedom of Information Act of 1966. “NEPA is intended to prevent our government taking our world apart piece by piece without our knowing it,” explains Aguerre.

Aguerre and others persuaded the area’s county commissioners to vote against the military’s plans in 2006, and the state legislature to pass a private property rights bill in January 2007 — a bill that required approval of such plans by the state legislature.

Ken Salazar was the military’s hired servant. He had been Attorney General of Colorado from 1999 to 2005. He was a U.S. Senator from 2005 to 2009. President Barack Obama has made him Secretary of the Interior. Around 2007, Jean Aguerre recounts, Salazar held a public meeting in Pueblo, Col., with about 300 ranchers packing the room. He turned his palms up to the ceiling and announced: “I will lift the golden curtain that falls at the end of El Paso county so that prosperity can flow onto the eastern plains.” This meant that military spending was economically beneficial. Military expansion, people were being told, was good for them — even if it stole their families’ land, and regardless of what momentum it created for the launching and continuing of wars.

“Instead of putting together frameworks for nonproliferation,” says Aguerre, “Ken Salazar worked to destroy the last intact short grass prairie because the money was too good.”

Senators Wayne Allard, who would join the military lobbyist company, the Livingston Group, within weeks of leaving the Senate, and Ken Salazar passed an authorization for taking land as part of the 2007 John Warner Defense Authorization Act. “None of the ranchers knew they were in line to be condemned for the second damn time,” says Aguerre.

John Salazar, Ken’s brother, at this time represented Colorado’s third congressional district, while Republican Marilyn Musgrave represented the fourth. Musgrave was persuaded by ranchers that there was no need for the government to take their land. Aguerre worked with Musgrave’s staff to draft a one-sentence funding ban. Aguerre and her allies then organized massive public pressure to recruit John Salazar as a Democratic co-sponsor. Ken Salazar failed in his effort to block this measure in the Senate. The ban passed both houses and became law, but it must be renewed every year.

In 2009, Aguerre and her allies won a federal court ruling throwing out the military’s Environmental Impact Statement with harsh and unequivocal language — “one of the strongest court orders under NEPA,” says Aguerre. By 2008, the military had begun using its land a lot more, and the court ruling did not stop them.

The funding ban, too, is not stopping increased activity. This past year, the funding ban was missing from a committee chairman’s markup in which it had appeared in previous years. Not 1 More Acre and its allies pressured Third-District Congressman Scott Tipton. People from all over the country phoned his office. They were told that as non-constituents their views did not matter. Aguerre advised people to reply: “When you pick my pocket you don’t ask what district I’m from.” Tipton was won over, and the funding ban, for what it’s worth, remains for now.

Nonetheless, says Aguerre, the military is proceeding with and increasing trainings and environmental destruction daily .

Senators Mark Udall and Michael Bennet of Colorado and Tom Udall of New Mexico don’t receive high marks from Jean Aguerre. “Mark Udall on Armed Services and Michael Bennet on Agriculture sit with their thumbs in their pie. Udall has never once come to southeastern Colorado and looked young ranchers in the eye and said ‘this is why we need this military takeover of your lands.’”

Aguerre continues: “And Tom Udall puts out this pap the other day, mumbo jumbo about the Air Force. It’s not Air Force; it’s Special Operations. Aguerre said that her group and others are preparing a comment letter seeking legal standing to challenge the Air Force, and potentially to pry loose more information from the iron grip of our “transparent” government. Aguerre points out that the Air Force Special Operations Command Environmental Assessment was written by SAIC, a global military contractor that also makes voting machines.

“We found out that the state national guard is completely involved in UAV warfare,” says Aguerre. “So when your house floods and you don’t have the national guard there, they may be remotely piloting something somewhere else.”

Aguerre says that in 2006 she knew of four countries that were manufacturing armed UAVs, and that now she knows of 56. So the argument that drones keep “people” out of harm’s way (with people redefined to mean U.S. citizens) doesn’t hold up very solidly. We have also already had a suicide bomb attack on a drone piloting location and had drone pilots commit suicide, not to mention the risks of long-term blowback, the damage being done to the rule of law, and all the human beings killed and injured from among the non-U.S. 95% of humanity.

Aguerre asks scientists who love unarmed UAVs to consider the full effect of supporting such technology. I would ask environmentalists to consider the full effect of not resisting the destruction of what Not 1 More Acre describes as:

• unique bioregions of canyon lands, forested mesas, grasslands and riparian systems providing habitat for diverse flora and fauna found nowhere else on Earth and the largest block of native prairie remaining on the High Plains;
• restored Dust Bowl lands – Comanche, Kiowa and Rita Blanca National Grasslands — offering robust safe haven to threatened and endangered species of plants and animals, including rare insects and reptiles yet to be named;
• wild rivers and complex wetlands vital to native fish, migrating birds, unique wildlife and environmental health.

I would ask opponents of drone warfare to consider the likely impact of setting aside 60 million acres of air space for testing drones.

“We cannot allow the sacrifice of our democracy to politicians who are bought by military contractors,” says Aguerre. “If they are able to get this 51st state for robotic warfare, I think the economy will be irretrievably lost. These are unbelievably beautiful and pristine lands. Our rural areas are where the genetically modified seeds are being planted, where the lands and mountains are being mined, and where the military is going to destroy an area the size of a state, because the rural people are so few. Gary Hart was able to attack the last short grass prairie without political cost.”

Why is there no political cost? Because “we can’t get the word out.”

Let’s help get the word out by sharing this link.

David Swanson is an anti-war activist. Read other articles by David.

Monday, October 24, 2011

Boomerang! Is the Pentagon Field-Testing ‘Son of Stuxnet’?

Dissident Voice: a radical newsletter in the struggle for peace and social justice

Boomerang! Is the Pentagon Field-Testing ‘Son of Stuxnet’?

When the cybersecurity firm Symantec announced they had discovered a sophisticated Trojan which shared many of the characteristics of the Stuxnet virus, I wondered: was the Pentagon and/or their Israeli partners in crime field-testing insidious new spyware?

According to researchers, the malicious program was dubbed “Duqu” because it creates files with the prefix “~DQ.” It is a remote access Trojan (RAT) that “is essentially the precursor to a future Stuxnet-like attack.” Mark that carefully.

In simple terms, a Trojan is malicious software that appears to perform a desirable function prior to its installation but, in fact, steals information from users spoofed into installing it, oftentimes via viral email attachments.

In the hands of enterprising security agencies, or criminals (the two are functionally synonymous), Trojans are primarily deployed for data theft, industrial or financial espionage, keystroke logging (surveillance) or the capture of screenshots which may reveal proprietary information.

“The threat” Symantec averred, “was written by the same authors (or those that have access to the Stuxnet source code) and appears to have been created since the last Stuxnet file was recovered.”

The malware, which began popping-up on the networks of several European firms, captured lists of running processes, account and domain information, network drives, user keystrokes and screenshots from active sessions and did so by using a valid, not a forged certificate, stolen from the Taipei-based firm, C-Media.

Whereas Stuxnet, believed to be a co-production of U.S. and Israeli cyber-saboteurs, was a weaponized virus programmed to destroy Iran’s civilian nuclear power infrastructure by targeting centrifuges that enrich uranium, Duqu is a stealthy bit of spy kit that filches data from manufacturers who produce systems that control oil pipelines, water systems and other critical infrastructure.

Sergey Golovanov, a malware expert at Kaspersky Labs told Forbes that Duqu is “is likely the brainchild of a government security apparatus. And it’s that government’s best work yet.”

Speaking from Moscow, Golovanov told Forbes in a telephone interview that “right now we are pretty sure that it is the next generation of Stuxnet.”

“We are pretty sure that Duqu is a government cyber tool and are 70% sure it is coming from the same source as Stuxnet,” Golovanov said.

“The victims’ computer systems were infected several days ago. Whatever it is,” Golovanov noted, “it is still in those systems, and still scanning for information. But what exactly it is scanning for, we don’t know. It could be gathering internal information for encryption devices. We only know that it is data mining right now, but we don’t know what kind of data and to what end it is collecting it.”

Whom, pray tell, would have “access to Stuxnet source code”?

While no government has claimed ownership of Stuxnet, IT experts told Forbes “with 100% certainty it was a government agency who created it.”

Suspects include cryptologists at the National Security Agency, or as is more likely given the outsourcing of intelligence work by the secret state, a combination of designers drawn from NSA, “black world” privateers from large defense firms along with specialists from Israel’s cryptologic division, Unit 8200, operating from the Israeli nuclear weapons lab at the Dimona complex, as The New York Times disclosed.

Analyst George Smith noted:

Stuxnet was widely distributed to many computer security experts. Many of them do contract work for government agencies, labor that would perhaps require a variety of security clearances and which would involve doing what would be seen by others to be black hat in nature. When that happened all bets were off.

Smith averred, “once a thing is in world circulation it is not protected or proprietary property.”

While one cannot demonstrably prove that Duqu is the product of one or another secret state satrapy, one can reasonably inquire: who has the means, motive and opportunity for launching this particular bit of nastiness into the wild?

“Duqu’s purpose,” Symantec researchers inform us, “is to gather intelligence data and assets from entities, such as industrial control system manufacturers, in order to more easily conduct a future attack against another third party.”

In other words, while Stuxnet was programmed to destroy industrial systems, Duqu is an espionage tool that will enable attackers “looking for information such as design documents that could help them mount a future attack on an industrial control facility.”

Although it can be argued, as Smith does, that “source code for malware has never been secure,” and “always becomes something coveted by many, often in direct proportion to its fame,” it also can’t be ruled out that military-intelligence agencies or corporate clones with more than a dog or two in the “cyberwar” hunt wouldn’t be very interested in obtaining a Trojan that clips “industrial design” information from friend and foe alike.

Black Programs

The circulation of malicious code such as Duqu’s is highly destabilizing. Considering that the U.S. Defense Department now considers computer sabotage originating in another country the equivalent to an act of war for which a military response is appropriate, the world is on dangerous new ground.

Speaking with MIT’s Technology Review, Ronald Deibert, the director of Citizen Lab, a University of Toronto think tank that researches cyberwarfare, censorship and espionage, told the publication that “in the context of the militarization of cyberspace, policymakers around the world should be concerned.”

Indeed, given the fact that it is the United States that is now the biggest proliferator in the so-called cyber “arms race,” and that billions of dollars are being spent by Washington to secure such weapons, recent history is not encouraging.

With shades of 9/11, the anthrax mailings and the Iraq invasion as a backdrop, one cannot rule out that a provocative act assigned to an “official enemy” by ruling elites just might originate from inside the U.S. security complex itself and serve as a convenient pretext for some future war.

A hint of what the Pentagon is up to came in the form of a controlled leak to The Washington Post.

Last spring, we were informed that “the Pentagon has developed a list of cyber-weapons and -tools, including viruses that can sabotage an adversary’s critical networks, to streamline how the United States engages in computer warfare.”

The list of “approved weapons” or “fires” are indicative of the military’s intention to integrate “cyberwar” capabilities into its overall military doctrine.

According to Ellen Nakashima, the “classified list of capabilities has been in use for several months and has been approved by other agencies, including the CIA.”

The Post reported that the new “framework clarifies, for instance, that the military needs presidential authorization to penetrate a foreign computer network and leave a cyber-virus that can be activated later.”

On the other hand, and here’s where Duqu may enter the frame, the “military does not need such approval, however, to penetrate foreign networks for a variety of other activities. These include studying the cyber-capabilities of adversaries or examining how power plants or other networks operate.”

Additionally, Nakashima wrote, Pentagon cyberwarriors “can also, without presidential authorization, leave beacons to mark spots for later targeting by viruses, the official said.”

As part of Washington’s on-going commitment to the rule of law and human rights, as the recent due process-free drone assassination of American citizen Anwar Al-Awlaki, followed by that of his teenage son and the revenge killing of former Libyan leader Muammar Qaddafi by–surprise!–Al Qaeda-linked militias funded by the CIA clearly demonstrate, the “use of any cyber-weapon would have to be proportional to the threat, not inflict undue collateral damage and avoid civilian casualties.”

Try selling that to the more than 3,600 people killed or injured by CIA drone strikes, as Pakistan Body Count reported, since our Nobel laureate ascended to his Oval Office throne.

As George Mason University researchers Jerry Brito and Tate Watkins described in their recent paper, Loving the Cyber Bomb? The Dangers of Threat Inflation in Cybersecurity Policy, despite overheated “rhetoric of ‘cyber doom’ employed by proponents of increased federal intervention,” there is a lack of “clear evidence of a serious threat that can be verified by the public.”

However, as Brito and Watkins warned, “the United States may be witnessing a bout of threat inflation similar to that seen in the run-up to the Iraq War,” one where “a cyber-industrial complex is emerging, much like the military-industrial complex of the Cold War. This complex may serve to not only supply cybersecurity solutions to the federal government, but to drum up demand for them as well.”

A “demand” which will inevitably feed the production, proliferation and deployment of a host of viral attack tools (Stuxnet) and assorted spybots (Duqu) that can and will be used by America’s shadow warriors and well-connected corporate spies seeking to get a leg-up on the competition.

While evidence of “a serious threat” may be lacking, and while proponents of increased “cybersecurity” spending advanced “no evidence … that opponents have ‘mapped vulnerabilities’ and ‘planned attacks’,” Brito and Watkins noted there is growing evidence these are precisely the policies being pursued by Washington.

Why might that be the case?

As a declining imperialist Empire possessing formidable military and technological capabilities, researcher Stephen Graham has pointed out in Cities Under Siege: The New Military Urbanism, the United States has embarked on a multibillion dollar program “to militarize the world’s global electronic infrastructures” with a stated aim to “gain access to, and control over, any and all networked computers, anywhere on Earth.”

Graham writes that “the sorts of on-the-ground realities that result from attacks on ordinary civilian infrastructure are far from the abstract niceties portrayed in military theory.”

Indeed, as “the experiences of Iraq and Gaza forcefully remind us,” robotized drone attacks and already-existent cyberwar capabilities buried in CIA and Pentagon black programs demonstrate that “the euphemisms of theory distract from the hard fact that targeting essential infrastructure in highly urbanized societies kills the weak, the old and the ill just as surely as carpet bombing.”

A Glimpse Inside the Complex

In the wake of the HBGary hack by Anonymous earlier this year, the secrecy-shredding web site Public Intelligence released a 2009 Defense Department contract proposal from the firm.

Among other things, it revealed that the Pentagon is standing-up offensive programs that “examine the architecture, engineering, functionality, interface and interoperability of Cyber Warfare systems, services and capabilities at the tactical, operational and strategic levels, to include all enabling technologies.”

HBGary, and one can assume other juiced defense contractors, are planning “operations and requirements analysis, concept formulation and development, feasibility demonstrations and operational support.”

“This will include,” according to the leaked proposal, “efforts to analyze and engineer operational, functional and system requirements in order to establish national, theater and force level architecture and engineering plans, interface and systems specifications and definitions, implementation, including hardware acquisition for turnkey systems.”

Indeed, the company will “perform analyses of existing and emerging Operational and Functional Requirements at the force, theater, Combatant Commands (COCOM) and national levels to support the formulation, development and assessment of doctrine, strategy, plans, concepts of operations, and tactics, techniques and procedures in order to provide the full spectrum of Cyber Warfare and enabling capabilities to the warfighter.”

During the course of their analysis Symantec learned that Duqu “uses HTTP and HTTPS to communicate with a command-and-control (C&C) server that at the time of writing is still operational.”

“The attackers were able to download additional executables through the C&C server, including an infostealer that can perform actions such as enumerating the network, recording keystrokes, and gathering system information. The information is logged to a lightly encrypted and compressed local file, which then must be exfiltrated out.”

To where, and more importantly by whom was that information “exfiltrated” is of course, the $64,000 question.

A working hypothesis may be provided by additional documents published by Public Intelligence.

According to a cyberwar proposal to the Pentagon by General Dynamics and HBGary, “Project C” is described as a program for the development “of a software application targeting the Windows XP Operating System that, when executed, loads and enables a covert kernel-mode implant that will exfiltrate a file from disk (or other remotely called commands) over a connected serial port to a remote device.”

We’re informed that Project C’s “primary objectives” was the design of an implant “that is clearly able to exfiltrate an on-disk file, opening of the CD tray, blinking of the keyboard lights, opening and deleting a file, and a memory buffer exfiltration over a connected serial line to a collection station.”

“As part of the exploit delivery package,” HBGary and General Dynamics told their prospective customers, presumably the NSA, that “a usermode trojan will assist in the loading of the implant, which will clearly demonstrate the full capability of the implant.”

Duqu, according to Symantec researchers, “uses a custom C&C protocol, primarily downloading or uploading what appear to be JPG files. However, in addition to transferring dummy JPG files, additional data for exfiltration is encrypted and sent, and likewise received.”

While we don’t know which firms were involved in the design of Stuxnet and now, Duqu, we do know, thanks to Anonymous, that HBGary had a Stuxnet copy, shared it amongst themselves and quite plausibly, given what we’ve learned about Duqu, Stuxnet source code may have been related to the above-mentioned “Project C.”

Kevin Haley, Symantec’s director of product management told The Register that “the people behind Stuxnet are not done. They’ve continued to do different things. This was not a one-shot deal.”

Tom Burghardt is a researcher and activist based in the San Francisco Bay Area. His articles are published in many venues. He is the editor of Police State America: U.S. Military "Civil Disturbance" Planning, distributed by AK Press. Read other articles by Tom, or visit Tom's website.

Insiders voice more doubts about CIA’s 9/11 story

Salon Home

Follow 9/11

Topic

9/11

Friday, Oct 14, 2011 8:00 AM EST

Insiders voice doubts about CIA’s 9/11 story

Former FBI agents say the agency's bin Laden unit misled them about two hijackers




Tom Kean, George Tenet, Richard Clarke

Tom Kean, George Tenet, Richard Clarke. Inset: The Pentagon on fire after an aircraft crashes into it, Sept. 11, 2001.

Topics:,

A growing number of former government insiders — all responsible officials who served in a number of federal posts — are now on record as doubting ex-CIA director George Tenet’s account of events leading up to the Sept. 11, 2001, attacks on the United States. Among them are several special agents of the FBI, the former counterterrorism head in the Clinton and Bush administrations, and the chairman of the 9/11 Commission, who told us the CIA chief had been “obviously not forthcoming” in his testimony and had misled the commissioners.

These doubts about the CIA first emerged among a group of 9/11 victims’ families whose struggle to force the government to investigate the causes of the attacks, we chronicled in our 2006 documentary film “Press for Truth.” At that time, we thought we were done with the subject. But tantalizing information unearthed by the 9/11 Commission’s final report and spotted by the families (Chapter 6, footnote 44) raised a question too important to be put aside:

Rory O’Connor is an award-winning journalist, author and filmmaker, and co-founder and president of the international media firm Globalvision. Producer-writer Ray Nowosielski made his documentary debut directing "Press for Truth" in 2006. Co-founder of the media production company Banded Artists, he also was a senior producer for Globalvision. More Rory O'Connor and Ray Nowosielski

Tuesday, October 18, 2011

Wall Street’s Second and Third Occupation: The Rise of the NYPD's Homeland Security State and American Empire Drones

AlterNet.org

OCCUPY WALL STREET
Are drones above New York City next as the police militarize Lower Manhattan?

Photo Credit: Nick Turse

These last weeks, there have been two “occupations” in lower Manhattan, one of which has been getting almost all the coverage -- that of the demonstrators camping out in Zuccotti Park. The other, in the shadows, has been hardly less massive, sustained, or in its own way impressive -- the police occupation of the Wall Street area.

On a recent visit to the park, I found the streets around the Stock Exchange barricaded and blocked off to traffic, and police everywhere in every form (in and out of uniform) -- on foot, on scooters, on motorcycles, in squad cars with lights flashing, on horses, in paddy wagons or minivans, you name it. At the park’s edge, there is a police observation tower capable of being raised and lowered hydraulically and literally hundreds of police are stationed in the vicinity. I counted more than 50 of them on just one of its sides at a moment when next to nothing was going on -- and many more can be seen almost anywhere in the Wall Street area, lolling in doorways, idling in the subway, ambling on the plazas of banks, and chatting in the middle of traffic-less streets.

This might be seen as massive overkill. After all, the New York police have already shelled out an extra $1.9 million, largely in overtime pay at a budget-cutting moment in the city. When, as on Thursday, 100 to 150 marchers suddenly headed out from Zuccotti Park to circle Chase Bank several blocks away, close to the same number of police -- some with ominous clumps of flexi-cuffs dangling from their belts -- calved off with them. It’s as if the Occupy Wall Street movement has an eternal dark shadow that follows it everywhere.

At one level, this is all mystifying. The daily crowds in the park remain remarkably, even startlingly, peaceable. (Any violence has generally been the product of police action.) On an everyday basis, a squad of 10 or 15 friendly police officers could easily handle the situation. There is, of course, another possibility suggested to me by one of the policemen loitering at the Park’s edge doing nothing in particular: “Maybe they’re peaceable because we’re here.” And here's a second possibility: as my friend Steve Fraser, author of Wall Street: America’s Dream Palace, said to me, “This is the most important piece of real estate on the planet and they’re scared. Look how amazed we are. Imagine how they feel, especially after so many decades of seeing nothing like it.”

And then there’s a third possibility: that two quite separate universes are simply located in the vicinity of each other and of what, since September 12, 2001, we’ve been calling Ground Zero. Think of it as Ground Zero Doubled, or think of it as the militarized recent American past and the unknown, potentially inspiring American future occupying something like the same space. (You can, of course, come up with your own pairings, some far less optimistic.) In their present state, New York’s finest represent a local version of the way this country has been militarized to its bones in these last years and, since 9/11, transformed into a full-scale surveillance-intelligence-homeland-security state.

Their stakeout in Zuccotti Park is geared to extreme acts, suicide bombers, and terrorism, as well as to a conception of protest and opposition as alien and enemy-like. They are trying to herd, lock in, and possibly strangle a phenomenon that bears no relation to any of this. They are, that is, policing the wrong thing, which is why every act of pepper spraying or swing of the truncheon, every aggressive act (as in the recent eviction threat to “clean” the park) blows back on them and only increases the size and coverage of the movement.

Though much of the time they are just a few feet apart, the armed state backing that famed 1%, or Wall Street, and the unarmed protesters claiming the other 99% might as well be in two different times in two different universes connected by a Star-Trekkian wormhole and meeting only where pepper spray hits eyes.

Which means anyone visiting the Occupy Wall Street site is also watching a strange dance of phantoms. Still, we do know one thing. This massive semi-militarized force we continue to call “the police” will, in the coming years, only grow more so. After all, they know but one way to operate.

Right now, for instance, over crowds of protesters the police hover in helicopters with high-tech cameras and sensors, but in the future there can be little question that in the skies of cities like New York, the police will be operating advanced drone aircraft. Already, as Nick Turse indicates in a groundbreaking report “America’s Secret Empire of Drone Bases,” the U.S. military and the CIA are filling the global skies with missile-armed drones and the clamor for domestic drones is growing. The first attack on an American neighborhood, not one in Iraq, Afghanistan, Pakistan, Somalia, Yemen, or Libya, surely lurks somewhere in our future. Empires, after all, have a way of coming home to roost.

Tom Engelhardt, co-founder of the American Empire Project and the author of The American Way of War: How Bush’s Wars Became Obama’s as well as The End of Victory Culture, runs the Nation Institute's TomDispatch.com. His latest book, The United States of Fear (Haymarket Books), will be published in November.

Sign up to receive the latest updates fromTomDispatch.com here.

Monday, October 17, 2011

US Officials Peddle False Intel to Support Terror Plot Claims

CommonDreams.org


by Gareth Porter

WASHINGTON - Officials of the Barack Obama administration have aggressively leaked information supposedly based on classified intelligence in recent days to bolster its allegation that two higher- ranking officials from Iran's Revolutionary Guard Corps (IRGC) were involved in a plot to assassinate Saudi Ambassador Adel al-Jubeir in Washington, D.C.

In this Sept. 22, 2011 photo, members of Iran's Revolutionary Guard march in front of the mausoleum of the late Iranian revolutionary founder Ayatollah Khomeini, just outside Tehran, Iran, during armed an forces parade marking the 31st anniversary of the start of the Iraq-Iran war. Among the many mysteries inside Iran's ruling hierarchy, the Quds Force, which sits atop the vast military and industrial network of the Revolutionary Guard, has a special place in the shadows. (AP Photo/Vahid Salemi) The media stories generated by the leaks helped divert press attention from the fact that there is no verifiable evidence of any official Iranian involvement in the alleged assassination plan, contrary to the broad claim being made by the administration.

But the information about the two Iranian officials leaked to NBC News, the Washington Post and Reuters was unambiguously false and misleading, as confirmed by official documents in one case and a former senior intelligence and counterterrorism official in the other.

The main target of the official leaks was Abdul Reza Shahlai, who was identified publicly by the Obama administration as a "deputy commander in the Quds Force" of the Islamic Revolutionary Guard Corps. Shahlai had long been regarded by U.S. officials as a key figure in the Quds Force's relationship to Moqtada al-Sadr's Mahdi Army in Iraq.

The primary objective of the FBI sting operation involving Iranian- American Manssor Arbabsiar and a Drug Enforcement Administration (DEA) informant that was started last June now appears to have been to use Arbabsiar to implicate Shahlai in a terror plot.

U.S. officials had learned from the DEA informant that Arbabsiar claimed that Shahlai was his cousin.

In September 2008, the Treasury Department designated Shahlai as an individual "providing financial, material and technical support for acts of violence that threaten the peace and stability of Iraq" and thus subject to specific financial sanctions. The announcement said Shahlai had provided "material support" to the Mahdi Army in 2006 and that he had "planned the Jan. 20, 2007 attack" by Mahdi Army "Special Groups" on U.S. troops at the Provincial Coordination Center in Karbala, Iraq.

Arbabsiar's confession claims that Shahlai approached him in early spring 2011 and asked him to find "someone in the narcotics business" to kidnap the Saudi ambassador to the United States, according to the FBI account. Arbabsiar implicates Shahlai in providing him with thousands of dollars for his expenses.

But Arbabsiar's charge against Shahlai was self-interested. Arbabsiar had become the cornerstone of the administration's case against Shahlai in order to obtain leniency on charges against him.

There is no indication in the FBI account of the investigation that there is any independent evidence to support Arbabsiar's claim of Shahlai's involvement in a plan to kill the ambassador.

The Obama administration planted stories suggesting that Shahlai had a terrorist past, and that it was therefore credible that he could be part of an assassination plot.

Laying the foundation for press stories on the theme, the Treasury Department announced Tuesday that it was sanctioning Shahlai, along with Arbabsiar and three other Quds Force officials, including the head of the organisation, Maj. Gen. Qasem Soleimani, for being "connected to" the assassination plot.

But Michael Issikof of NBC News reported the same day that Shahlai "had previously been accused of plotting a highly sophisticated attack that killed five U.S. soldiers in Iraq, according to U.S. government officials and documents made public Tuesday afternoon".

Isikoff, who is called "National Investigative Correspondent" at NBC News, reported that the Treasury Department had designated Shahlai as a "terrorist" in 2008, despite the fact that the Treasury announcement of the designation had not used the term "terrorist".

On Saturday, the Washington Post published a report closely paralleling the Issikof story but going even further in claiming documentary proof of Shahlai's responsibility for the January 2007 attack in Karbala. Post reporter Peter Finn wrote that Shahlai "was known as the guiding hand behind an elite militia of the cleric Moqtada al Sadr", which had carried out an attack on U.S. troops in Karbala in January 2007.

Finn cited the fact that the Treasury Department named Shahlai as the "final approving and coordinating authority" for training Sadr's militiamen in Iran. That fact would not in itself be evidence of involvement in a specific attack on U.S. forces. On the contrary, it would suggest that he was not involved in operational aspects of the Mahdi Army in Iraq.

Finn then referred to a "22-page memo that detailed preparations for the operation and tied it to the Quds Force…." But he didn't refer to any evidence that Shahlai personally had anything to do with the operation.

In fact, U.S. officials acknowledged in the months after the Karbala attack that they had found no evidence of any Iranian involvement in the operation.

Talking with reporters about the memo on Apr. 26, 2007, several weeks after it had been captured, Gen. David Petraeus conceded that it did not show that any Iranian official was linked to the planning of the Karbala operation. When a journalist asked him whether there was evidence of Iranian involvement in the Karbala operation, Petraeus responded, "No. No. No… [W]e do not have a direct link to Iran involvement in that particular case."

In a news briefing in Baghdad Jul. 2, 2007, Gen. Kevin Bergner confirmed that the attack in Karbala had been authorised by the Iraqi chief of the militia in question, Kais Khazali, not by any Iranian official.

Col. Michael X. Garrett, who had been commander of the U.S. Fourth Brigade combat team in Karbala, confirmed to this writer in December 2008 that the Karbala attack "was definitely an inside job".

Maj. Gen. Qasem Soleimani, the head of the Quds Force, is on the list of those Iranian officials "linked" to the alleged terror plot, because he "oversees the IRGC-QF officers who were involved in this plot" , as the Treasury Department announcement explained. But a Reuters story on Friday reported a claim of U.S. intelligence that two wire transfers totaling 100,000 dollars at the behest of Arbabsiar to a bank account controlled by the FBI implicates Soleimani in the assassination plot.

"While details are still classified," wrote Mark Hosenball and Caren Bohan, "one official said the wire transfers apparently had some kind of hallmark indicating they were personally approved" by Soleimani.

But the suggestion that forensic examination of the wire transfers could somehow show who had approved them is misleading. The wire transfers were from two separate non-Iranian banks in a foreign country, according to the FBI's account. It would be impossible to deduce who approved the transfer by looking at the documents.

"I have no idea what such a 'hallmark' could be," said Paul Pillar, a former head of the CIA's Counter-Terrorism Center who was also National Intelligence Officer for the Middle East until his retirement in 2005.

Pillar told IPS that the "hallmark" notion "pops up frequently in commentary after actual terrorist attacks,", but the concept is usually invoked "along the lines of 'the method used in this attack had the hallmark of group such and such'."

That "hallmark" idea "assumes exclusive ownership of a method of attack which does not really exist," said Pillar. "I expect the same could be said of methods of transferring money."

America’s Secret Empire of Drone Bases: Its Full Extent Revealed for the First Time

AlterNet.org

WORLD
A ground-breaking investigation examines the most secret aspect of America's shadowy drone wars and maps out a world of hidden bases dotting the globe.

Photo Credit: U.S. Air Force Photo/Lt. Col. Leslie Pratt

They increasingly dot the planet. There’s a facility outside Las Vegas where “pilots” work in climate-controlled trailers, another at a dusty camp in Africa formerly used by the French Foreign Legion, a third at a big air base in Afghanistan where Air Force personnel sit in front of multiple computer screens, and a fourth that almost no one talks about at an air base in the United Arab Emirates.

And that leaves at least 56 more such facilities to mention in an expanding American empire of unmanned drone bases being set up worldwide. Despite frequent news reports on the drone assassination campaign launched in support of America’s ever-widening undeclared wars and a spate of stories on drone bases in Africa and the Middle East, most of these facilities have remained unnoted, uncounted, and remarkably anonymous -- until now.

Run by the military, the Central Intelligence Agency, and their proxies, these bases -- some little more than desolate airstrips, others sophisticated command and control centers filled with computer screens and high-tech electronic equipment -- are the backbone of a new American robotic way of war. They are also the latest development in a long-evolving saga of American power projection abroad -- in this case, remote-controlled strikes anywhere on the planet with a minimal foreign “footprint” and little accountability.

Using military documents, press accounts and other open source information, an in-depth analysis by AlterNet has identified at least 60 bases integral to U.S. military and CIA drone operations. There may, however, be more, since a cloak of secrecy about drone warfare leaves the full size and scope of these bases distinctly in the shadows.

A Galaxy of Bases

Over the last decade, the American use of unmanned aerial vehicles (UAVs) and unmanned aerial systems (UAS) has expanded exponentially as has media coverage of their use. On September 21st, the Wall Street Journal reported that the military has deployed missile-armed MQ-9 Reaper drones on the “island nation of Seychelles to intensify attacks on al Qaeda affiliates, particularly in Somalia.” A day earlier, a Washington Post piece also mentioned the same base on the tiny Indian Ocean archipelago, as well as one in the African nation of Djibouti, another under construction in Ethiopia, and a secret CIA airstrip being built for drones in an unnamed Middle Eastern country (suspected of being Saudi Arabia).

Post journalists Greg Miller and Craig Whitlock reported that the “Obama administration is assembling a constellation of secret drone bases for counterterrorism operations in the Horn of Africa and the Arabian Peninsula as part of a newly aggressive campaign to attack al-Qaeda affiliates in Somalia and Yemen.” Within days, the Post also reported that a drone from the new CIA base in that unidentified Middle Eastern country had carried out the assassination of radical al-Qaeda preacher and American citizen Anwar al-Aulaqi in Yemen.

With the killing of al-Aulaqi, the Obama Administration has expanded its armed drone campaign to no fewer than six countries, though the CIA, which killed al-Aulaqi, refuses to officially acknowledge its drone assassination program. The Air Force is less coy about its drone operations, yet there are many aspects of those, too, that remain in the shadows. Air Force spokesman Lieutenant Colonel John Haynes recently told AlterNet that, “for operational security reasons, we do not discuss worldwide operating locations of Remotely Piloted Aircraft, to include numbers of locations around the world.”

Still, those 60 military and CIA bases around the world, directly connected to the drone program, tell us a lot about America’s war-making future. From command and control and piloting to maintenance and arming, these facilities perform key functions that allow drone campaigns to continued expanding as they have for more than a decade. Other bases are already under construction or in the planning stages. When presented with our list of Air Force sites within America’s galaxy of drone bases, Lieutenant Colonel Haynes responded, “I have nothing further to add to what I’ve already said.”

Even in the face of government secrecy, however, much can be discovered . Here, then, for the record is a AlterNet accounting of America’s drone bases in the United States and around the world.

The Near Abroad

News reports have frequently focused on Creech Air Force Base outside Las Vegas as ground zero in America’s military drone campaign. Sitting in darkened, air conditioned rooms, 7,500 miles from Afghanistan, drone pilots dressed in flight suits remotely control MQ-9 Reapers and their progenitors, the less heavily-armed MQ-1 Predators. Beside them, sensor operators manipulate the TV camera, infrared camera, and other high-tech sensors on board. Their faces lit up by digital displays showing video feeds from the battle zone, by squeezing a trigger on a joystick one of these Air Force “pilots” can loose a Hellfire missile on a person half a world away.

While Creech gets the lion’s share of attention -- it even has its own drones on site -- numerous other bases on U.S. soil have played critical roles in America’s drone wars. The same video-game-style warfare is carried out by U.S and British pilots not far away at Nevada’s Nellis Air Force Base, the home of the Air Force’s 2nd Special Operations Squadron (SOS). According to a factsheet provided to AlterNet by the Air Force, the 2nd SOS and its drone operators are scheduled to be relocated to the Air Force Special Operations Command at Hurlburt Field in Florida in the coming months.

Reapers or Predators are also being flown from Davis-Monthan Air Force Base in Arizona, Whiteman Air Force Base in Missouri, March Air Reserve Base in California, Springfield Air National Guard Base in Ohio, Cannon Air Force Base and Holloman Air Force Base in New Mexico, Ellington Airport in Houston, Texas, the Air National Guard base in Fargo, North Dakota, Ellsworth Air Force Base in South Dakota, and Hancock Field Air National Guard Base in Syracuse, New York. Recently, it was announced that Reapers, flown by Hancock’s pilots, would begin taking off on training missions from the Army’s Fort Drum, also in New York State. While at Langley Air Force Base in Virginia, according to a report by the New York Times earlier this year, teams of camouflage-clad Air Force analysts sit in a secret intelligence and surveillance installation monitoring cell phone intercepts, high altitude photographs, and most notably, multiple screens of streaming live video from drones in Afghanistan -- what they call “Death TV” -- while instant-messaging and talking to commanders on the ground in order to supply them with real-time intelligence on enemy troop movements.

CIA drone operators also reportedly pilot their aircraft from the Agency’s nearby Langley, Virginia headquarters. It was from here that analysts apparently watched footage of Osama bin Laden’s compound in Pakistan, for example, thanks to video sent back by the RQ-170 Sentinel, an advanced drone nicknamed the “Beast of Kandahar.” According to Air Force documents, the Sentinel is flown from both Creech Air Force Base and Tonopah Test Range in Nevada.

Predators, Reapers, and Sentinels are just part of the story. At Beale Air Force Base in California, Air Force personnel pilot the RQ-4 Global Hawk, an unmanned drone used for long-range, high-altitude surveillance missions, some of them originating from Anderson Air Force Base in Guam (a staging ground for drone flights over Asia). Other Global Hawks are stationed at Grand Forks Air Force Base in North Dakota, while the Aeronautical Systems Center at Wright-Patterson Air Force Base in Ohio manages the Global Hawk as well as the Predator and Reaper programs for the Air Force.

Other bases have been intimately involved in training drone operators, including Randolph Air Force Base in Texas and New Mexico’s Kirtland Air Force Base, as is the Army’s Fort Huachuca in Arizona which is home to, according to a report by National Defense magazine, “the world’s largest UAV training center.” There, hundreds of employees of defense giant General Dynamics train military personnel to fly smaller tactical drones like the Hunter and Shadow. The physical testing of drones goes on at adjoining Libby Army Airfield and “two UAV runways located approximately four miles west of Libby,” according to Global Security, an on-line clearinghouse for military information.

Additionally, small drone training for the Army is carried out at Fort Benning in Georgia while at Fort Rucker, Alabama -- “the home of Army aviation” -- the Unmanned Aircraft Systems program coordinates doctrine, strategy, and concepts pertaining to UAVs. Recently, Fort Benning also saw the early testing of true robotic drones – which fly without human guidance or a hand on any joystick. This is considered, wrote the Washington Post, the next step toward a future in which drones will “hunt, identify, and kill the enemy based on calculations made by software, not decisions made by humans.”

The Army has also carried out UAV training exercises at Dugway Proving Ground in Utah and, earlier this year, the Navy launched its X-47B, a next-generation semi-autonomous stealth drone, on its first flight at Edwards Air Force Base in California. That flying robot -- designed to operate from the decks of aircraft carriers -- has since been sent on to Maryland’s Naval Air Station Patuxent River for further testing. At nearby Webster Field, the Navy worked out kinks in its Fire Scout pilotless helicopter, which has also been tested at Fort Rucker, Yuma Proving Ground in Arizona, and Florida’s Mayport Naval Station and Jacksonville Naval Air Station. The latter base was also where the Navy’s Broad Area Maritime Surveillance (BAMS) unmanned aerial system was developed and is now, along with Naval Air Station Whidbey Island in Washington State, based.

Foreign Jewels in the Crown

The Navy is actively looking for a suitable site in the Western Pacific for a BAMS base, and is currently in talks with several Persian Gulf states for one in that region, as well. It already has Global Hawks perched at its base in Sigonella, Italy.

The Air Force is now negotiating with Turkey to relocate some of the Predator drones still operating in Iraq to the giant air base at Incirlik next year. Many different UAVs have been based in Iraq since the American invasion of that country, including small tactical models like Raven-B’s that troops launched by hand from Kirkuk Regional Air Base, Shadow UAVs that flew from Forward Operating Base Normandy in Baqubah Province, Predators operating out of Balad Airbase, miniature Desert Hawk drones launched from Tallil Air Base, and Scan Eagles based at Al Asad Air Base.

Elsewhere in the Greater Middle East, according to Aviation Week, the military is launching Global Hawks from Al Dhafra Air Base in the United Arab Emirates, piloted by personnel stationed at Naval Air Station Patuxent River in Maryland, to track “shipping traffic in the Persian Gulf, Strait of Hormuz and Arabian Sea.” There are unconfirmed reports that the CIA may be operating drones from that country as well. In the past, at least, other UAVs have apparently been flown from Kuwait’s Ali Al Salem Air Base and Al Jaber Air Base, as well as Seeb Air Base in Oman.

At Al-Udeid Air Base in Qatar, the Air Force runs an air operations command and control facility, critical to the drone wars in Afghanistan and Pakistan. The new secret CIA base on the Arabian peninsula, used to assassinate Anwar al-Aulaqi, may or may not be an airstrip in Saudi Arabia whose existence a senior U.S. military official recently confirmed to FOX News. In the past, the CIA has also operated UAVs out of Tuzel, Uzbekistan.

In neighboring Afghanistan, drones fly from many bases including Jalalabad Air Base, Kandahar Air Field, the air base at Bagram, Camp Leatherneck, Camp Dwyer, Combat Outpost Payne, Forward Operating Base (FOB) Edinburgh and FOB Delaram II, to name a few. Afghan bases are, however, more than just locations where drones take off and land.

It is a common misperception that U.S.-based operators are the only ones who “fly” America’s armed drones. In fact, in and around America’s war zones, UAVs begin and end their flights under the control of local “pilots.” Take Afghanistan’s massive Bagram Air Base. After performing preflight checks alongside a technician who focuses on the drone’s sensors, a local airman sits in front of a Dell computer tower and multiple monitors, two keyboards, a joystick, a throttle, a rollerball, a mouse, and various switches and oversees the plane’s takeoff before handing it over to a stateside counterpart with a similar electronics set-up. After the mission is complete, the controls are transferred back to the local operators for the landing. Additionally, crews in Afghanistan perform general maintenance and repairs on the drones.

In the wake of a devastating suicide attack by an al-Qaeda double agent that killed CIA officers and contractors at Forward Operating Base Chapman in Afghanistan’s eastern province of Khost in 2009, it came to light that the facility was heavily involved in target selection for drone strikes across the border in Pakistan. The drones themselves, as the Washington Post noted at the time, were “flown from separate bases in Afghanistan and Pakistan.”

Both the Air Force and CIA have conducted operations in Pakistani air space, with some missions originating in Afghanistan and others from inside Pakistan. In 2006, images of what appear to be Predator drones stationed at Shamsi Air Base in Pakistan's Balochistan province were found on Google Earth and later published. In 2009, the New York Times reported that operatives from Xe Services, the company formerly known as Blackwater, had taken over the task of arming Predator drones at the CIA’s “hidden bases in Pakistan and Afghanistan.”

Following the May Navy SEAL raid into Pakistan that killed Osama bin Laden, that country’s leaders reportedly ordered the United States to leave Shamsi. The Obama administration evidently refused and word leaked out, according to the Washington Post, that the base was actually owned and sublet to the U.S. by the United Arab Emirates, which had built the airfield “as an arrival point for falconry and other hunting expeditions in Pakistan.”

The U.S. and Pakistani governments have since claimed that Shamsi is no longer being used for drone strikes. True or not, the U.S. evidently also uses other drone bases in Pakistan, including possibly PAF Base Shahbaz, located near the city of Jacocobad, and another base located near Ghazi.

The New Scramble for Africa

Recently, the headline story, when it comes to the expansion of the empire of drone bases, has been Africa. For the last decade, the U.S. military has been operating out of Camp Lemonier, a former French Foreign Legion base in the tiny African nation of Djibouti. Not long after the attacks of September 11, 2001, it became a base for Predator drones and has since been used to conduct missions over neighboring Somalia.

For some time, rumors have also been circulating about a secret American base in Ethiopia. Recently, a U.S. official revealed to the Washington Post that discussions about a drone base there had been underway for up to four years, “but that plan was delayed because ‘the Ethiopians were not all that jazzed.’” Now construction is evidently underway, if not complete.

Then, of course, there is that drone base on the Seychelles in the Indian Ocean. A small fleet of Navy and Air Force drones began operating openly there in 2009 to track pirates in the region’s waters. Classified diplomatic cables obtained by Wikileaks, however, reveal that those drones have also secretly been used to carry out missions in Somalia. “Based in a hangar located about a quarter-mile from the main passenger terminal at the airport,” the Post reports, the base consists of three or four “Reapers and about 100 U.S. military personnel and contractors, according to the cables.”

The U.S. has also recently sent four smaller tactical drones to the African nations of Uganda and Burundi for use by those countries’ own militaries.

New and Old Empires

Even if the Pentagon budget were to begin to shrink in the coming years, expansion of America’s empire of drone bases is a sure thing in the years to come. Drones are now the bedrock of Washington’s future military planning and -- with counterinsurgency out of favor -- the preferred way of carrying out wars abroad.

During the eight years of George W. Bush’s presidency, as the U.S. was building up its drone fleets, the country launched wars in Afghanistan and Iraq, and carried out limited strikes in Yemen, Pakistan, and Somalia, using drones in at least four of those countries. In less than three years under President Obama, the U.S. has launched drone strikes in Afghanistan, Iraq, Libya, Pakistan, Somalia, and Yemen. It maintains that it has carte blanche to kill suspected enemies in any nation (or at least any nation in the global south).

According to a report by the Congressional Budget office published earlier this year, “the Department of Defense (DoD) plans to purchase about 730 new medium-sized and large unmanned aircraft systems” over the next decade. In practical terms, this means more drones like the Reaper.

Military officials told the Wall Street Journal that the Reaper “can fly 1,150 miles from base, conduct missions and return home… the time a drone can stay aloft depends on how heavily armed it is.” According to a drone operator training document obtained by AlterNet, at maximum payload, meaning with 3,750 pounds worth of Hellfire missiles and GBU-12 or GBU-30 bombs on board, the Reaper can remain aloft for 16 to 20 hours. Even a glance at a world map tells you that, if the U.S. is to carry out ever more drone strikes across the developing world, it will need more bases for its future UAVs. As an unnamed senior military official pointed out to a Washington Post reporter, speaking of all those new drone bases clustered around the Somali and Yemeni war zones, “If you look at it geographically, it makes sense -- you get out a ruler and draw the distances [drones] can fly and where they take off from.”

Earlier this year, an analysis by TomDispatch.com determined that there are more than 1,000 U.S. military bases scattered across the globe -- a shadowy base-world that provides plenty of existing sites that can, and no doubt will, host drones. But facilities selected for a pre-drone world may not always prove optimal locations for America’s current and future undeclared wars and assassination campaigns. So further expansion in Africa, the Middle East, and Asia is likely.

What are the Air Force’s plans in this regard? Lieutenant Colonel John Haynes was typically circumspect. “We are constantly evaluating potential operating locations based on evolving mission needs,” he said. If the last decade is any indication, those “needs” will only continue to grow.

Nick Turse is the associate editor of TomDispatch.com and a senior editor at AlterNet. His latest book is The Case for Withdrawal from Afghanistan (Verso). You can follow him on Twitter @NickTurse, on Tumblr, and on Facebook. This article marks another of Turse’s joint Alternet/TomDispatch investigative reports on U.S. national security policy and American empire.