SlideShare a Scribd company logo
“With a license to kill” - with drones 
forsvarstema.blogspot.com /2014/08/with-license-to-kill-with-drones.html 
UK’s Bureau of Investigative Journalism estimates that at least 273 civilians in Pakistan, Yemen and 
Somalia have been killed by drone strikes launched under President Obama’s watch. 
The most common tactic employed in locating targets is known as ‘geolocation’, which entails locking on to 
the SIM card or handset of a suspected terrorist. NSA is doing this, like so many other things in the grey 
zone or directly on the wrong side of law and good ethics. A former drone sensor operator with the US Air 
Force, Brandon Bryant, told a journalist in the magazine Intercept last May that using the NSA metadata 
led to inaccuracies that killed civilians. 
The NSA uses a program called Geo Cell to follow potential targets and often do not verify whether the 
carrier of the phone is the intended target of the strike. 
“It’s really like we’re targeting a cell phone. We’re not going after people – we’re going after their phones, 
in the hopes that the person on the other end of that missile is the bad guy,” Bryant told the Intercept. 
Over the past five years the NSA has played an increasingly central role in drone killing, but the growing 
reliance on metadata to find terrorists is also targeting innocent civilians. As long as these people are non- 
American the US President has the necessary political support at home for this kind of warfare, even if the 
legal basis is thin - very thin indeed. Not to speak of the ethical aspect of it. Targeting a US citizen is a 
different matter, of course. 
A United States citizen accused of being an overseas “Al-Qaeda facilitator” could soon be killed by an 
American drone, the Associated Press reported a month back, but first the US government must find a way 
to legally launch such a strike. 
The name and suspected location of the person in question were withheld by the AP. He is believed by US 
officials to be actively plotting attacks abroad against other US citizens. But while the White House has 
previously admitted that four US citizens have been killed overseas by drone strikes since President 
Obama took office in 2009, a policy change made by his administration in 2013 is now causing 
complications while the government wrestles with deciding which action to take this time. 
In May 2013, President Obama said he would be making major changes to the nation’s overseas drone 
program and would be working towards transferring control of armed drones to the Department of Defense 
(DOD). According to at least one of the AP’s sources, however, the DOD is uncertain if the individual in 
question poses enough of an imminent threat to launch a lethal action ”to take him out” without first having 
that person tried in a court of law. 
Tough decision, of course, but I would be more concerned about the innocent civilians who will probably be 
hit by the same drone-carried missile, than the criminal US citizen plotting fellow countrymen as targets for 
Al-Qaeda terrorists abroad. 
Knut Harald Nylænde is a Norwegian businessman based in Oslo. He has through his companies during 
the last 15 years built a substantial investment portfolio with investments in Norway and abroad. 
Send dette via e-post Blogg dette! Del på Twitter Del på Facebook

More Related Content

What's hot

PROJECT BLUE BEAM: False Flag. Free Book. 2020
PROJECT BLUE BEAM: False Flag. Free Book. 2020PROJECT BLUE BEAM: False Flag. Free Book. 2020
PROJECT BLUE BEAM: False Flag. Free Book. 2020
The Free School
 
Obama plotting media related attack—cnn & fox news top terror targets
Obama plotting media related attack—cnn & fox news top terror targetsObama plotting media related attack—cnn & fox news top terror targets
Obama plotting media related attack—cnn & fox news top terror targetsPublicLeaker
 
ZAHRUZYTY ONLAYN\\ Where Law Ends: Inside the Mueller Investigation
 ZAHRUZYTY ONLAYN\\ Where Law Ends: Inside the Mueller Investigation ZAHRUZYTY ONLAYN\\ Where Law Ends: Inside the Mueller Investigation
ZAHRUZYTY ONLAYN\\ Where Law Ends: Inside the Mueller Investigation
grreeyvii
 
Digital Privacy and Cybersecurity: A 21st Century Journey or Illusion?
Digital Privacy and Cybersecurity: A 21st Century Journey or Illusion?Digital Privacy and Cybersecurity: A 21st Century Journey or Illusion?
Digital Privacy and Cybersecurity: A 21st Century Journey or Illusion?
Jay Jordan
 
Assarian- One Cool Topic Final Paper
Assarian- One Cool Topic Final PaperAssarian- One Cool Topic Final Paper
Assarian- One Cool Topic Final PaperMatthew Assarian
 
Targeted Surveillance: Big Brother Takes to the Sky
Targeted Surveillance: Big Brother Takes to the SkyTargeted Surveillance: Big Brother Takes to the Sky
Targeted Surveillance: Big Brother Takes to the SkyTeresa Long
 
Behind the scenes: Obama's birth certificate bombshell – The 1600 Report
Behind the scenes: Obama's birth certificate bombshell – The 1600 ReportBehind the scenes: Obama's birth certificate bombshell – The 1600 Report
Behind the scenes: Obama's birth certificate bombshell – The 1600 Report
splendidcrease580
 
germany chancellor
germany chancellorgermany chancellor
germany chancellorAli J
 
Comey Exposes Political Scandal of Watergate Calibre
Comey Exposes Political Scandal of Watergate CalibreComey Exposes Political Scandal of Watergate Calibre
Comey Exposes Political Scandal of Watergate Calibre
Willem Kleinendorst
 
Photographing Torture at Abu Ghraib: Gendered Violence and The Other
Photographing Torture at Abu Ghraib: Gendered Violence and The OtherPhotographing Torture at Abu Ghraib: Gendered Violence and The Other
Photographing Torture at Abu Ghraib: Gendered Violence and The OtherPeter Pawlick
 
Nsa responds snowden media contacts with usg
Nsa responds  snowden media contacts with usgNsa responds  snowden media contacts with usg
Nsa responds snowden media contacts with usgAnonDownload
 
State Department torpedoes NY Times Benghazi story - National Law Enforcement
State Department torpedoes NY Times Benghazi story - National Law EnforcementState Department torpedoes NY Times Benghazi story - National Law Enforcement
State Department torpedoes NY Times Benghazi story - National Law Enforcement
tiresomerat7000
 
Do Politicans Spark Wars Abroad to Keep Positions at Home?--International Rel...
Do Politicans Spark Wars Abroad to Keep Positions at Home?--International Rel...Do Politicans Spark Wars Abroad to Keep Positions at Home?--International Rel...
Do Politicans Spark Wars Abroad to Keep Positions at Home?--International Rel...Abbey Ellis
 
2013,9,24,rouseff blastsus spying
2013,9,24,rouseff blastsus spying2013,9,24,rouseff blastsus spying
2013,9,24,rouseff blastsus spyingWorld secrets
 
Lawmakers say Obama surveillance idea won't work
Lawmakers say Obama surveillance idea won't workLawmakers say Obama surveillance idea won't work
Lawmakers say Obama surveillance idea won't work
shockinggun5696
 
Lawmakers say Obama surveillance idea won't work
Lawmakers say Obama surveillance idea won't workLawmakers say Obama surveillance idea won't work
Lawmakers say Obama surveillance idea won't work
lowlypersonnel063
 
S_RM_Global_Risk_Bulletin_November_2016
S_RM_Global_Risk_Bulletin_November_2016S_RM_Global_Risk_Bulletin_November_2016
S_RM_Global_Risk_Bulletin_November_2016Carilee Osborne
 

What's hot (18)

PROJECT BLUE BEAM: False Flag. Free Book. 2020
PROJECT BLUE BEAM: False Flag. Free Book. 2020PROJECT BLUE BEAM: False Flag. Free Book. 2020
PROJECT BLUE BEAM: False Flag. Free Book. 2020
 
Obama plotting media related attack—cnn & fox news top terror targets
Obama plotting media related attack—cnn & fox news top terror targetsObama plotting media related attack—cnn & fox news top terror targets
Obama plotting media related attack—cnn & fox news top terror targets
 
ZAHRUZYTY ONLAYN\\ Where Law Ends: Inside the Mueller Investigation
 ZAHRUZYTY ONLAYN\\ Where Law Ends: Inside the Mueller Investigation ZAHRUZYTY ONLAYN\\ Where Law Ends: Inside the Mueller Investigation
ZAHRUZYTY ONLAYN\\ Where Law Ends: Inside the Mueller Investigation
 
Digital Privacy and Cybersecurity: A 21st Century Journey or Illusion?
Digital Privacy and Cybersecurity: A 21st Century Journey or Illusion?Digital Privacy and Cybersecurity: A 21st Century Journey or Illusion?
Digital Privacy and Cybersecurity: A 21st Century Journey or Illusion?
 
Assarian- One Cool Topic Final Paper
Assarian- One Cool Topic Final PaperAssarian- One Cool Topic Final Paper
Assarian- One Cool Topic Final Paper
 
Targeted Surveillance: Big Brother Takes to the Sky
Targeted Surveillance: Big Brother Takes to the SkyTargeted Surveillance: Big Brother Takes to the Sky
Targeted Surveillance: Big Brother Takes to the Sky
 
Behind the scenes: Obama's birth certificate bombshell – The 1600 Report
Behind the scenes: Obama's birth certificate bombshell – The 1600 ReportBehind the scenes: Obama's birth certificate bombshell – The 1600 Report
Behind the scenes: Obama's birth certificate bombshell – The 1600 Report
 
National Post Humber News
National Post Humber NewsNational Post Humber News
National Post Humber News
 
germany chancellor
germany chancellorgermany chancellor
germany chancellor
 
Comey Exposes Political Scandal of Watergate Calibre
Comey Exposes Political Scandal of Watergate CalibreComey Exposes Political Scandal of Watergate Calibre
Comey Exposes Political Scandal of Watergate Calibre
 
Photographing Torture at Abu Ghraib: Gendered Violence and The Other
Photographing Torture at Abu Ghraib: Gendered Violence and The OtherPhotographing Torture at Abu Ghraib: Gendered Violence and The Other
Photographing Torture at Abu Ghraib: Gendered Violence and The Other
 
Nsa responds snowden media contacts with usg
Nsa responds  snowden media contacts with usgNsa responds  snowden media contacts with usg
Nsa responds snowden media contacts with usg
 
State Department torpedoes NY Times Benghazi story - National Law Enforcement
State Department torpedoes NY Times Benghazi story - National Law EnforcementState Department torpedoes NY Times Benghazi story - National Law Enforcement
State Department torpedoes NY Times Benghazi story - National Law Enforcement
 
Do Politicans Spark Wars Abroad to Keep Positions at Home?--International Rel...
Do Politicans Spark Wars Abroad to Keep Positions at Home?--International Rel...Do Politicans Spark Wars Abroad to Keep Positions at Home?--International Rel...
Do Politicans Spark Wars Abroad to Keep Positions at Home?--International Rel...
 
2013,9,24,rouseff blastsus spying
2013,9,24,rouseff blastsus spying2013,9,24,rouseff blastsus spying
2013,9,24,rouseff blastsus spying
 
Lawmakers say Obama surveillance idea won't work
Lawmakers say Obama surveillance idea won't workLawmakers say Obama surveillance idea won't work
Lawmakers say Obama surveillance idea won't work
 
Lawmakers say Obama surveillance idea won't work
Lawmakers say Obama surveillance idea won't workLawmakers say Obama surveillance idea won't work
Lawmakers say Obama surveillance idea won't work
 
S_RM_Global_Risk_Bulletin_November_2016
S_RM_Global_Risk_Bulletin_November_2016S_RM_Global_Risk_Bulletin_November_2016
S_RM_Global_Risk_Bulletin_November_2016
 

Viewers also liked

Shereen Woo - The Changing Face of War (Drones)
Shereen Woo - The Changing Face of War (Drones)Shereen Woo - The Changing Face of War (Drones)
Shereen Woo - The Changing Face of War (Drones)cynrx
 
Drone Lobby Presentation
Drone Lobby PresentationDrone Lobby Presentation
Drone Lobby Presentationlhfang
 
A history of u.s. drone strikes on pakistan and its implications
A history of u.s. drone strikes on pakistan and its implicationsA history of u.s. drone strikes on pakistan and its implications
A history of u.s. drone strikes on pakistan and its implicationsAlexander Decker
 
Should the US agree to suspend drone attacks in Pakistan?
Should the US agree to suspend drone attacks in Pakistan?Should the US agree to suspend drone attacks in Pakistan?
Should the US agree to suspend drone attacks in Pakistan?Jodi Dobinsky
 
Drone attack's & their Reaction.
Drone attack's & their Reaction.Drone attack's & their Reaction.
Drone attack's & their Reaction.
Edara-e-Fatima Foundation.
 
Drone attacks
Drone attacksDrone attacks
Drones, Spies, Terrorists and Second Class Citizenship in Pakistan (Christine...
Drones, Spies, Terrorists and Second Class Citizenship in Pakistan (Christine...Drones, Spies, Terrorists and Second Class Citizenship in Pakistan (Christine...
Drones, Spies, Terrorists and Second Class Citizenship in Pakistan (Christine...
fatanews
 
Drone technology and drone attacks in pakistan
Drone technology and drone attacks in pakistanDrone technology and drone attacks in pakistan
Drone technology and drone attacks in pakistan
Waqas Ahmed
 
Causes, impacts & management of eq and floods in pakistan
Causes, impacts & management of eq and floods in pakistanCauses, impacts & management of eq and floods in pakistan
Causes, impacts & management of eq and floods in pakistan
Rizwan Samor
 
Drone Technology
Drone TechnologyDrone Technology
Drone Technology
Asad Qayyum Babar
 
UAV Presentation
UAV PresentationUAV Presentation
UAV Presentation
Ruyyan
 
Drone-Unmanned Aerial Vehicle
Drone-Unmanned Aerial VehicleDrone-Unmanned Aerial Vehicle
Drone-Unmanned Aerial Vehicle
shivu1234
 

Viewers also liked (12)

Shereen Woo - The Changing Face of War (Drones)
Shereen Woo - The Changing Face of War (Drones)Shereen Woo - The Changing Face of War (Drones)
Shereen Woo - The Changing Face of War (Drones)
 
Drone Lobby Presentation
Drone Lobby PresentationDrone Lobby Presentation
Drone Lobby Presentation
 
A history of u.s. drone strikes on pakistan and its implications
A history of u.s. drone strikes on pakistan and its implicationsA history of u.s. drone strikes on pakistan and its implications
A history of u.s. drone strikes on pakistan and its implications
 
Should the US agree to suspend drone attacks in Pakistan?
Should the US agree to suspend drone attacks in Pakistan?Should the US agree to suspend drone attacks in Pakistan?
Should the US agree to suspend drone attacks in Pakistan?
 
Drone attack's & their Reaction.
Drone attack's & their Reaction.Drone attack's & their Reaction.
Drone attack's & their Reaction.
 
Drone attacks
Drone attacksDrone attacks
Drone attacks
 
Drones, Spies, Terrorists and Second Class Citizenship in Pakistan (Christine...
Drones, Spies, Terrorists and Second Class Citizenship in Pakistan (Christine...Drones, Spies, Terrorists and Second Class Citizenship in Pakistan (Christine...
Drones, Spies, Terrorists and Second Class Citizenship in Pakistan (Christine...
 
Drone technology and drone attacks in pakistan
Drone technology and drone attacks in pakistanDrone technology and drone attacks in pakistan
Drone technology and drone attacks in pakistan
 
Causes, impacts & management of eq and floods in pakistan
Causes, impacts & management of eq and floods in pakistanCauses, impacts & management of eq and floods in pakistan
Causes, impacts & management of eq and floods in pakistan
 
Drone Technology
Drone TechnologyDrone Technology
Drone Technology
 
UAV Presentation
UAV PresentationUAV Presentation
UAV Presentation
 
Drone-Unmanned Aerial Vehicle
Drone-Unmanned Aerial VehicleDrone-Unmanned Aerial Vehicle
Drone-Unmanned Aerial Vehicle
 

Similar to With a license to kill with drones

Reply to below  posting in a paragraph of at least five sentences by.docx
Reply to below  posting in a paragraph of at least five sentences by.docxReply to below  posting in a paragraph of at least five sentences by.docx
Reply to below  posting in a paragraph of at least five sentences by.docx
carlt4
 
Edward J. Snowden, the thirty-year-old former National Security Agen.docx
Edward J. Snowden, the thirty-year-old former National Security Agen.docxEdward J. Snowden, the thirty-year-old former National Security Agen.docx
Edward J. Snowden, the thirty-year-old former National Security Agen.docx
elishaoatway
 
The Operations Of The National Security Agency
The Operations Of The National Security AgencyThe Operations Of The National Security Agency
The Operations Of The National Security Agency
Toya Shamberger
 
Intelligence chief defends internet spying program
Intelligence chief defends internet spying programIntelligence chief defends internet spying program
Intelligence chief defends internet spying program
abiross34
 
The costs and consequences of drone warfare MICHAEL J. BOYLE*
The costs and consequences of drone warfare MICHAEL J. BOYLE*The costs and consequences of drone warfare MICHAEL J. BOYLE*
The costs and consequences of drone warfare MICHAEL J. BOYLE*
MYO AUNG Myanmar
 
(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGSJun Hao Lim
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayCallum Craigie
 
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docxKrempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docx
DIPESH30
 
Argument for Snowden Clemency
Argument for Snowden ClemencyArgument for Snowden Clemency
Argument for Snowden Clemency
Margaret Hoisington
 
Article CritiqueThis assignment provides you with an opportunity t.docx
Article CritiqueThis assignment provides you with an opportunity t.docxArticle CritiqueThis assignment provides you with an opportunity t.docx
Article CritiqueThis assignment provides you with an opportunity t.docx
rosemaryralphs52525
 
Barack Obama's SECRET "KILL" List
Barack Obama's SECRET "KILL" ListBarack Obama's SECRET "KILL" List
Barack Obama's SECRET "KILL" ListVogelDenise
 

Similar to With a license to kill with drones (12)

Reply to below  posting in a paragraph of at least five sentences by.docx
Reply to below  posting in a paragraph of at least five sentences by.docxReply to below  posting in a paragraph of at least five sentences by.docx
Reply to below  posting in a paragraph of at least five sentences by.docx
 
Edward J. Snowden, the thirty-year-old former National Security Agen.docx
Edward J. Snowden, the thirty-year-old former National Security Agen.docxEdward J. Snowden, the thirty-year-old former National Security Agen.docx
Edward J. Snowden, the thirty-year-old former National Security Agen.docx
 
The Operations Of The National Security Agency
The Operations Of The National Security AgencyThe Operations Of The National Security Agency
The Operations Of The National Security Agency
 
Intelligence chief defends internet spying program
Intelligence chief defends internet spying programIntelligence chief defends internet spying program
Intelligence chief defends internet spying program
 
Prism
PrismPrism
Prism
 
The costs and consequences of drone warfare MICHAEL J. BOYLE*
The costs and consequences of drone warfare MICHAEL J. BOYLE*The costs and consequences of drone warfare MICHAEL J. BOYLE*
The costs and consequences of drone warfare MICHAEL J. BOYLE*
 
(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
 
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docxKrempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docx
 
Argument for Snowden Clemency
Argument for Snowden ClemencyArgument for Snowden Clemency
Argument for Snowden Clemency
 
Article CritiqueThis assignment provides you with an opportunity t.docx
Article CritiqueThis assignment provides you with an opportunity t.docxArticle CritiqueThis assignment provides you with an opportunity t.docx
Article CritiqueThis assignment provides you with an opportunity t.docx
 
Barack Obama's SECRET "KILL" List
Barack Obama's SECRET "KILL" ListBarack Obama's SECRET "KILL" List
Barack Obama's SECRET "KILL" List
 

Recently uploaded

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 

With a license to kill with drones

  • 1. “With a license to kill” - with drones forsvarstema.blogspot.com /2014/08/with-license-to-kill-with-drones.html UK’s Bureau of Investigative Journalism estimates that at least 273 civilians in Pakistan, Yemen and Somalia have been killed by drone strikes launched under President Obama’s watch. The most common tactic employed in locating targets is known as ‘geolocation’, which entails locking on to the SIM card or handset of a suspected terrorist. NSA is doing this, like so many other things in the grey zone or directly on the wrong side of law and good ethics. A former drone sensor operator with the US Air Force, Brandon Bryant, told a journalist in the magazine Intercept last May that using the NSA metadata led to inaccuracies that killed civilians. The NSA uses a program called Geo Cell to follow potential targets and often do not verify whether the carrier of the phone is the intended target of the strike. “It’s really like we’re targeting a cell phone. We’re not going after people – we’re going after their phones, in the hopes that the person on the other end of that missile is the bad guy,” Bryant told the Intercept. Over the past five years the NSA has played an increasingly central role in drone killing, but the growing reliance on metadata to find terrorists is also targeting innocent civilians. As long as these people are non- American the US President has the necessary political support at home for this kind of warfare, even if the legal basis is thin - very thin indeed. Not to speak of the ethical aspect of it. Targeting a US citizen is a different matter, of course. A United States citizen accused of being an overseas “Al-Qaeda facilitator” could soon be killed by an American drone, the Associated Press reported a month back, but first the US government must find a way to legally launch such a strike. The name and suspected location of the person in question were withheld by the AP. He is believed by US officials to be actively plotting attacks abroad against other US citizens. But while the White House has previously admitted that four US citizens have been killed overseas by drone strikes since President Obama took office in 2009, a policy change made by his administration in 2013 is now causing complications while the government wrestles with deciding which action to take this time. In May 2013, President Obama said he would be making major changes to the nation’s overseas drone program and would be working towards transferring control of armed drones to the Department of Defense (DOD). According to at least one of the AP’s sources, however, the DOD is uncertain if the individual in question poses enough of an imminent threat to launch a lethal action ”to take him out” without first having that person tried in a court of law. Tough decision, of course, but I would be more concerned about the innocent civilians who will probably be hit by the same drone-carried missile, than the criminal US citizen plotting fellow countrymen as targets for Al-Qaeda terrorists abroad. Knut Harald Nylænde is a Norwegian businessman based in Oslo. He has through his companies during the last 15 years built a substantial investment portfolio with investments in Norway and abroad. Send dette via e-post Blogg dette! Del på Twitter Del på Facebook