10/23/12 Election DEADLINE: "disposition matrix" stage in state terror war

Digest: first, an edited, highlighted, version of the new Washington Post Exclusive that reveals how the failed US GWOT necessitates dropping the "friendly fascism" routine.
Following this is one short collection of documents illustrating historical continuity US imperialism's 'manifest destiny' agenda
Finally another collection on the US 'information war', merging soft & hard power, upon which this geostrategic agenda now depends.

Plan for hunting terrorists signals U.S. intends to keep adding names to kill lists

Over the past two years, the Obama administration has been secretly developing a new blueprint for pursuing terrorists, a next-generation targeting list called the “disposition matrix.”
The matrix contains the names of terrorism suspects arrayed against an accounting of the resources being marshaled to track them down, including sealed indictments and clandestine operations. U.S. officials said the database is designed to go beyond existing kill lists, mapping plans for the “disposition” of suspects beyond the reach of American drones...
Privately officials acknowledge the development of the matrix is part of a series of moves to embed counterterrorism tools into U.S. policy for the long haul.

Although the matrix is a work in progress, the effort to create it reflects a reality setting in among the nation’s counterterrorism ranks: US conventional wars are winding down, but the government expects to continue adding names to kill or capture lists for years. Among senior Obama administration officials, there is a broad consensus that such operations are likely to be extended at least another decade. Given the way al-Qaeda continues to metastasize, some officials said no clear end is in sight. “We can’t possibly kill everyone who wants to harm us. It’s a necessary part of what we do...We’re not going to wind up in 10 years in a world of everybody holding hands and saying, ‘We love America.’ ” a senior administration official said.
That timeline suggests that the United States has reached only the midpoint of what was known as the global war on terrorism...

Meanwhile, a significant milestone looms: The number of militants and civilians killed in the drone campaign over the past 10 years will soon exceed 3,000 by certain estimates, surpassing the number of people al-Qaeda killed in the Sept. 11 attacks. The Obama administration has touted its successes against the terrorist network, including the death of Osama bin Laden, as signature achievements that argue for President Obama’s reelection. The administration has taken tentative steps toward greater transparency, formally acknowledging US use of armed drones for the first time. Less visible is the extent to which Obama has institutionalized the highly classified practice of targeted killing, transforming ad-hoc elements into a counterterrorism infrastructure capable of sustaining a seemingly permanent war. Spokesmen for the White House, the National Counterterrorism Center [NCTC] , the CIA and other agencies declined to comment on the matrix or other counterterrorism programs.
White House counterterrorism adviser John O. Brennan is seeking to codify the administration’s approach to generating capture/kill lists, part of a broader effort to guide future administrations through the counterterrorism processes that Obama has embraced. CIA Director David H. Petraeus is pushing for an expansion of the agency’s fleet of armed drones. The proposal reflects the agency’s transformation into a paramilitary force, and makes clear it does not intend to dismantle its drone program and return to its pre-Sept. 11 focus on gathering intelligence.
The U.S. Joint Special Operations Command [JSOC] , which carried out the raid that killed bin Laden, has moved commando teams into suspected terrorist hotbeds in Africa. A U.S. outpost in Djibouti has been transformed into a launching pad for counterterrorism operations across the Horn of Africa and the Middle East. JSOC also has established a secret targeting center across the Potomac River from Washington, current and former U.S. officials said. The elite command’s targeting cells have traditionally been located near the front lines of its missions, including in Iraq and Afghanistan. But JSOC created a “national capital region” task force a 15-minute commute from the White House so it could be more directly involved in deliberations about al-Qaeda lists....

An evolving database
The US now operates multiple drone programs, including acknowledged U.S. military patrols over conflict zones in Afghanistan and Libya, and classified CIA surveillance flights over Iran.
Strikes against al-Qaeda, however, are carried out under secret lethal programs involving the CIA and JSOC. The matrix was developed by the NCTC, under former director Michael Leiter, to augment those organizations’ separate but overlapping kill lists, officials said. The result is a single, continually evolving database in which suspect biographies, locations, known associates and affiliated organizations are all catalogued. So are strategies for taking targets down, including extradition requests, capture operations and drone patrols...The database is to map out contingencies, creating an operational menu that spells out each agency’s role in case a suspect surfaces in an unexpected spot. “If he’s in Saudi Arabia, pick up with the Saudis,” the former official said. “If traveling overseas to al-Shabaab [in Somalia] we can pick him up by ship. If in Yemen, kill or have the Yemenis pick him up.” Officials declined to disclose identities of suspects on the matrix..“Clearly, people in Yemen on the matrix,” as well as others in Pakistan and Afghanistan, the former counterterrorism official said. The matrix was a way to be ready if they moved...
Officials described the matrix as a database in development, although its status is unclear.... The Arab spring upended U.S. counterterrorism partnerships in countries including Egypt where U.S. officials fear al-Qaeda could establish new roots.... in North Africa, al-Qaeda in the Islamic Maghreb, has seized territory in northern Mali and acquired weapons smuggled out of Libya....

Streamlining targeted killing
The creation of the matrix and the institutionalization of kill/capture lists reflect a shift as psychological as it is strategic.
Before the attacks of Sept. 11, 2001, the United States recoiled at the idea of targeted killing. The Sept. 11 commission recounted how the Clinton administration had passed on a series of opportunities to target bin Laden in the years before the attacks — before armed drones existed. President Bill Clinton approved a set of cruise-missile strikes in 1998 after al-Qaeda bombed embassies in East Africa, but after extensive deliberation, and the group’s leader escaped harm. Targeted killing is now so routine the Obama administration spent much of the past year codifying and streamlining the processes that sustain it... Now the system functions like a funnel, starting with input from half a dozen agencies and narrowing through layers of review until proposed revisions are laid on Brennan’s desk, and subsequently presented to the president...

The administration has also elevated the role of the NCTC conceived as a clearinghouse for threat data and no operational capability. Under Brennan, its founding director, the center has emerged as a targeting hub. Other entities have far more resources focused on al-Qaeda. The CIA, JSOC and U.S. Central Command have hundreds of analysts devoted to the terrorist network’s franchise in Yemen, while the NCTC has fewer than two dozen. But the center controls a key function. “It is the keeper of the criteria,” a former U.S. counterterrorism official said, meaning that it is in charge of culling names from al-Qaeda databases for targeting lists based on criteria dictated by the White House....
Obama approves the criteria for lists and signs off on drone strikes outside Pakistan, where decisions on when to fire are made by the CIA director. But aside from Obama’s presence at “Terror Tuesday” meetings — generally devoted to discussing terrorism threats and trends rather than approving targets — the president’s involvement is more indirect..
The review process is compressed when the CIA or JSOC has compelling intelligence and a narrow window in which to strike, officials said. The approach also applies to the development of criteria for “signature strikes” which allow the CIA and JSOC to hit targets based on patterns of activity...even when the identities of those who would be killed is unclear.
“When you rely on a particular tactic, it starts to become the core of your strategy — you see the puff of smoke, and he’s gone,” said Paul Pillar, a former deputy director of the CIA counterterrorism center. “When we institutionalize things, including targeted killing, it does cross a threshold that makes it harder to cross back....We are looking at something potentially indefinite” ...

"Whether the whites won the land by treaty, by armed conquest, or both...mattered little so long as the land was won...all men of sane and wholesome thought must dismiss with contempt the plea that these continents should be reserved for the use of a few scattered savages whose life was a few degrees less meaningless, squalid, and ferocious than that of the wild beasts." 
 "Democracy has justified itself by keeping for the white race the best portion's of the earth's surface."
Theodore Roosevelt
* March 8,1992 NYT "Excerpts From Pentagon's Plan: 'Prevent the Re-Emergence of a New Rival'", draft of "Defense Planning Guidance for the Fiscal Years 1994-1999"
This Defense Planning guidance addresses the fundamentally new situation created by the collapse of the Soviet Union, disintegration of the internal as well as the external empire, and discrediting of Communism as an ideology with global pretensions and influence. The new international environment has also been shaped by the victory of the U.S .and its coalition allies over Iraqi aggression -- the first post-cold-war conflict and a defining event in U.S. global leadership. In addition to these two victories, there has been a less visible one, the integration of Germany and Japan into a U.S.-led system of collective security and the creation of a democratic "zone of peace."

* 1996 A Clean Break: A New Strategy for Securing the Realm
Following is a policy blueprint prepared for the incoming Benjamin Netanyahu regime by The U.S. Institute for Advanced Strategic and Political Studies’ "Study Group on a New Israeli Strategy Toward 2000." The main substantive ideas in this paper emerge from a discussion in which prominent opinion makers, including Richard Perle, James Colbert, Charles Fairbanks, Jr., Douglas Feith, Robert Loewenberg, David Wurmser, and Meyrav Wurmser participated. The report is the framework for a series of follow-up reports on strategy.

* September 2000 "Rebuilding America's Defenses – Strategies, Forces and Resources for a New Century" (1997 "Project for the New American Century"}

* 2001 RAND Corporation Quadrennial Defense Review,: "Defense Planning in a Decade of Change"

* September 2002 " The National Security Strategy of the United States of America"

* March 2003 The Pentagon’s New Map - Why We’re Going To War And Why We’ll Keep Going To War, Thomas Barnett

Sep 30, 2008 Army Special Operations Forces Unconventional Warfare http://www.fas.org/irp/doddir/army/fm3-05-130.pdf
United States Army John F. Kennedy Special Warfare is the proponent of this manual ...
Our job is to effectively integrate foreign, military, and domestic intelligence in defense of the homeland and of United States interests abroad.
John Negroponte, Director of National Intelligence

Obama's New National Security Team Filled With Mostly Familiar Faces
VOA News April 28, 2011

U.S. counter-terrorism strategy to rely on surgical strikes, unmanned drones
6/29/11 latimes.com/news/politics/la-pn-al-qaeda-strategy-20110629,0,7494157.story
The Obama administration has concluded in the newly released counter-terrorism strategy, that precision strikes and raids, rather than large land wars, are the most effective way to defeat Al Qaeda. “Al Qaeda seeks to bleed us financially by drawing us into long, costly wars that also inflame anti-American sentiment,” John Brennan, President Obama’s counter-terrorism advisor, said unveiling the new strategy. “Going forward, we will be mindful that if our nation is threatened, our best offense won’t always be deploying large armies abroad but delivering targeted, surgical pressure to the groups that threaten us.”Brennan, a former CIA officer, spoke at the Paul H. Nitze School of Advanced International Studies at Johns Hopkins University as the White House posted the new strategy on its website. The strategy codifies policies the administration has been pursuing for two and a half years, much of it mirrors the practices of the Bush administration,

“all military-age males in a strike zone (considered) as combatants”
Secret ‘Kill List’ Proves a Test of Obama’s Principles and Will

total information war: small sample of the linchpin of US global domination war agenda:
"...Technology will make available to the leaders of major nations, techniques for conducting secret warfare, of which only a bare minimum of security forces need be appraised....techniques of weather modification could be employed to produce prolonged periods of drought or storm..
The technotronic era involves the gradual appearance of a more controlled society. Such a society would be dominated by an elite, unrestrained by traditional values. Soon it will be possible to assert almost continuous surveillance over every citizen and maintain up-to-date complete files containing even the most personal information about the citizen...millions of uncoordinated citizens, easily within the reach of magnetic and attractive personalities effectively exploiting the latest communications techniques to manipulate emotions and control reason... These files will be subject to instantaneous retrieve/review by the authorities...
Zbigniew Brzezinski, Between Two Ages: America’s Role in the Technetronic Era, 1970

Public Diplomacy in Grand Strategy Foreign Policy Analysis (2006)
onlinelibrary.wiley.com/doi/10.1111/j.1743-8594.2006.00025.x/abstract (brief excerpts)
"Public diplomacy’’ and ‘‘propaganda’’ are used interchangeably in this paper...the influence of the information revolution is not restricted to the developed world as evidenced in the resistance it meets from some non-democratic governments. Furthermore, one should not underestimate the exploitation of new technologies in third-world public diplomacy aimed at the developed world, especially at the US. All this should not obscure the continuing relevance of force (military power) to many interstate relations and increasingly terrorism which presents governments with a grand-strategic challenge: how to combine effectively soft and hard national means to obtain desired political outcomes...that especially in the current international system, depends on government’s ability to manage complicated balances and tradeoffs that inhere in the relationship between hard force and soft diplomacy... the traditional and time-honored concern of statecraft; ...however experience can be drawn from newer forms of force and communications, such as fighting terrorism in the age of global, real-time television and the Internet...

   "We have erased the organizational distinctions between what was viewed as hard power and soft power..."
1/26/12 H. Clinton, Quadrennial Diplomacy and Development Review
The First Quadrennial Diplomacy and Development Review (QDDR): Leading Through Civilian Power
"How can we do better?...we will build up our civilian power: the combined force of civilians working together across the U.S. government to practice diplomacy, carry out development projects, and prevent and respond to crises. Many different agencies contribute to these efforts today. But their work can be more unified, more focused, and more efficient. The State Department and USAID will take a lead role in making that happen."

5/9/12 DOJ Asks Court To Keep Secret Any Partnership Between Google and NSA
January 2010 Google blamed a cyber attack on the Chinese government prompting Google to embrace collaboration with NSA, the federal agency in charge of global electronic surveillance... “the alliance is being designed to allow the two organizations to share critical information” DOJ said media reports about the alleged Google partnership with NSA do not constitute official acknowledgement....Robert David Steele, a 20-year Marine Corps infantry and intelligence officer and a former clandestine services CIA case officer, CEO of OSS.net, claimed sources told him CIA seed money helped get the company [Google] off the ground

NSA’s Surveillance Algorithms See Into Your Life
National Security Agency (NSA) whistleblowers Thomas Drake, Kirk Wiebe and William Binney allegations surrounding NSA’s illegal domestic surveillance measures... specifically to 9/11 as the date after which electronic surveillance has reached new heights..."...there is a dossier for almost every American filled with data aggregated by the National Security Agency... data is resident in programs that pull it together... algorithms NSA created, according to whistle blower William Binney, are part of the U.S. Big Data Research and Development Initiative...

6/26/12 http://www.darpa.mil/NewsEvents/Releases/2012/06/26.aspx
During natural or man-made disasters, U.S. armed forces rapidly deployable airlift, sealift, communication, medical evacuation and care capabilities can supplement lead relief agencies providing aid to victims. The DOD 2012 strategic document includes humanitarian assistance and disaster relief operations as a 21st Century defense mission.

2010 Department of Homeland Security,  Science and Technology,
...With its Future Attribute Screening Technology (FAST) system, the Department of Homeland Security (DHS) seeks to enhance current screening procedures by using behavioral and physiological technology, deception theory, and observational techniques to detect individuals with malintent...The FAST Demonstration Laboratory supports human behavior screening research, development, and demonstrations at a variety of locations...FAST systems may include separate modules set up at different areas that wirelessly connect with a command center....