{"id":131648,"date":"2012-08-28T11:01:49","date_gmt":"2012-08-28T15:01:49","guid":{"rendered":"http:\/\/www.prosebeforehos.com\/?p=131648"},"modified":"2012-12-26T16:03:45","modified_gmt":"2012-12-26T21:03:45","slug":"history-american-assassination","status":"publish","type":"post","link":"https:\/\/www.prosebeforehos.com\/article-of-the-day\/08\/28\/history-american-assassination\/","title":{"rendered":"A History Of American Assassination"},"content":{"rendered":"

The Article:<\/strong> Assassination Nation<\/a> by Doug Noble in CounterPunch.<\/p>\n

The Text:<\/strong> <\/p>\n

\u201cA broad-gauged program of targeted assassination has now displaced counterinsurgency as the prevailing expression of the American way of war.\u201d<\/p>\n

\u2013Andrew Bacevich<\/p><\/blockquote>\n

This spring the US drone killing program has come out of the closet. Attorney General Eric Holder publicly defended the drone killing of an American citizen, while Obama\u2019s counter terrorism czar John Brennan publicly explained and justified the target killing program. And a New York Times article by Jo Becker and Scott Shane chronicled Obama\u2019s personal role in vetting a secret \u201cKill List.\u201d<\/p>\n

This striking new transparency, the official acknowledgment for the first time of a broad-based US assassination and targeted killing program, has resulted from the unprecedented and controversial visibility of drone warfare. Drones now make news every day, and those of us who have been protesting their use for years have heightened their visibility in the public eye, forcing official acknowledgment and fostering worldwide scrutiny. This new scrutiny focuses not only on drone use but also, and perhaps more importantly, on the targeted killing itself \u2013 and the \u201ckill lists\u201d that make them possible.<\/p>\n

This new exposure has set off a firestorm of reaction around the globe. Chris Woods of the Bureau of Investigative Journalism told Democracy Now! \u201cThe kill list got really heavy coverage \u2026 newspapers have all expressed significant concern about the existence of the kill list, the idea of this level of executive power.\u201d A Washington Post editorial noted that \u201cNo president has ever relied so extensively on the secret killing of individuals to advance the nation\u2019s security goals.\u201d Becker and Shane of the Times pronounced Obama\u2019s role \u201cwithout precedent in presidential history, of personally overseeing the shadow war \u2026\u201d [7] And former president Jimmy Carter insisted, in a recent editorial in The New York Times, \u201cWe don\u2019t know how many hundreds of innocent civilians have been killed in these [drone] attacks, each one approved by the highest authorities in Washington. This would have been unthinkable in previous times.\u201d [8]<\/p>\n

<\/p>\n

Really?<\/p>\n

In fact, US assassination and targeted killing, with presidential approval, has been going on covertly for at least half a century. Ironically, all this drone killing now offers us a new opportunity: to pry open the Pandora\u2019s box hiding long-held secrets of covert US assassination and targeted killing, and to expose them to the light of day. What we would find is that the only things new in the latest, more publicized revelations about kill lists and assassinations are the use of drones, the president\u2019s hands-on approach in vetting targets, and the global scope of the drone killing.<\/p>\n

Those of us in the Upstate Coalition to Ground the Drones, Code Pink and other groups protesting US drones for years have correctly focused on the use of drones as illegal, immoral and strategically counterproductive. We have abhorred the schizophrenic ease of remote killing, the uniquely frightening horror of a drone strike, and the unavoidable (even intentional) killing of countless civilian \u201cterrorist suspects\u201d in \u201csignature strikes.\u201d We have also warned of the proliferation of drones in countries around the globe and of their procurement by US police forces and border patrols, for surveillance and \u201cnon-lethal\u201d targeting.<\/p>\n

But drones are not the only, or even the most important, concern. It\u2019s the targeted killing itself, past and present. In this article I start to unravel what the latest demands for transparency should lead us to investigate fully: the fifty year history of US assassination and targeted killing that has resulted, quite directly, in the present moment. Those who are mortified by the latest revelations of Obama\u2019s kill list have much to learn from a more comprehensive, historical perspective on US killing around the globe. Who knows: Perhaps someone in Congress might even be prodded to do what Senators Fulbright and Church did in years past: hold hearings on this continuing execration taking place in our name. Until then, what follows is an introduction to this ongoing horror story.<\/p>\n

Section 1 of this article briefly reviews the lethal history of the US Phoenix Program in Vietnam, the original source of subsequent US counter terrorist tactics and strategies. Section 2 revisits briefly the well-worn history of US kill lists and assassinations in Latin American countries, followed by the somewhat less-well-known history of US kill lists and assassinations in countries on other continents. Section 3 traces the direct legacy of Phoenix, even its explicit resurrection by the key architects of the US targeted killing programs in Iraq and Afghanistan, and in a growing number of \u201ccountries we are not at war with.\u201d<\/p>\n

One point of clarification and definition. It is well known that in recent history the US has orchestrated assassination attempts, both successful and unsuccessful, on major world leaders. Examples include: Lumumba under Eisenhower, Castro and Diem under Kennedy, Gaddhafi under Reagan, Saddam Hussein under Bush, and Allende under Nixon. [9] The term \u201cassassination\u201d is typically restricted to such killings of political leaders, and President Ford\u2019s executive order banning assassination applies only to the assassination of foreign heads of state. The focus of this article is different. Here we discuss the US-generated kill lists used over the last half century, under direct presidential authority, for the targeted killing of thousands of civilians suspected of being or harboring terrorists\/ insurgents, from Vietnam to Guatemala, from Indonesia to Iraq, right up to the present day.<\/p>\n

The Phoenix Program <\/strong><\/p>\n

The US Phoenix Program was a secret, large scale counter terrorist effort in Vietnam. Developed in 1967 by the CIA, the Phoenix Program, called Phung Hoang by the Vietnamese, aimed a concerted effort to \u201cneutralize\u201d the Vietcong Infrastructure (VCI) consisting of South Vietnamese civilians suspected of supporting North Vietnamese or Viet Cong soldiers. The euphemism \u201cneutralize\u201d meant to kill or detain indefinitely. Then CIA Director William Colby, while insisting in 1971 Congressional hearings that \u201cthe Phoenix program is not a program of assassination,\u201d nonetheless conceded that Phoenix operations killed over 20,000 people between 1967 and 1972.<\/p>\n

Phoenix targeted civilians, not soldiers. Operations were carried out by \u201chunter-killer teams\u201d consisting both of US Green Berets and Navy Seals and by South Vietnamese Provincial Reconnaissance Units (PRUs), units of mercenaries set up for assassination and \u201ccounter terror.\u201d A Newsweek article in January 1970 described Phoenix as \u201ca highly secret and unconventional operation that counters VC terror with terror of its own.\u201d Robert Kaiser of the Washington Post reported Phoenix being called \u201can instrument of mass political murder\u2026sort of Vietnamese Murder Inc.,\u201d designed to terrorize the civilian population into submission.\u201d<\/p>\n

Until 1970 the computerized VCI blacklist was a unilateral American operation. After the devastating 1968 Tet offensive, South Vietnamese President Thieu declared: \u201cThe VCI must be eliminated\u2026and will be defeated by the Phoenix program.\u201d Phoenix became a ruthless \u201cbounty hunting\u201d program to eliminate the opposition. [15] The US and South Vietnamese created a list of tens of thousands of suspects for assassination. These names were centralized and distributed to Phoenix coordinators. From 1965-68 U.S. and Saigon intelligence services maintained an active list of Viet Cong cadre marked for assassination. The program for 1969 called for \u201cneutralizing\u201d 1800 a month.<\/p>\n

The VCI blacklist became corrupted by officers inserting their personal enemies\u2019 names to get even. Due process was nonexistent. Names supplied by anonymous informers showed up on blacklists. CIA Director Colby admitted in 1971 that the blacklists had been \u201cinaccurate.\u201d Few senior VCI leaders were caught in the Phoenix net. Instead its victims were typically innocent civilians. A Pentagon-contract study found that, between 1970 and 1971, ninety-seven per cent of the Vietcong targeted by the Phoenix Program were of negligible importance. By 1973, Phoenix generated 300,000 political prisoners in South Vietnam. Military operations such as My Lai used Phoenix intelligence; in fact, the My Lai massacre, hardly an isolated incident, was itself a Phoenix operation.<\/p>\n

Apologists have offered rationales for Phoenix that sound eerily similar to those used to defend current drone attacks. Phoenix was typically referred to as a \u201cscalpel\u201d replacing the \u201cbludgeon\u201d of search and destroy, aerial bombardment or artillery barrages. Alternatively, it was called a precision \u201crifle shot rather than a shotgun approach to target key political leaders \u2026 and activists in VCI.\u201d Military historian Dale Andrade explains, \u201cBoth SEALS and PRUs killed many VCI guerrillas \u2013 that was war. They also inevitably killed innocent civilians \u2013 that was regrettable\u2026.but [Phoenix] operations were much more discerning than the massive affairs launched by conventional \u2026forces. That fact was often lost in the rhetoric of assassination and murder \u2026\u201d<\/p>\n

Phoenix was created, organized, and funded by the CIA. Quotas were set by Americans. Informers were paid with US funds. The national system of identifying suspects, the elaboration of numerical goals and their use as measures of merit, was designed and funded by Americans. One former US Phoenix soldier conceded, \u201cIt was \u201cheinous,\u201d far worse than the things attributed to it.\u201d<\/p>\n

Kill Lists from Phoenix to Latin America<\/strong><\/p>\n

The US intelligence community formalized the lessons of the Phoenix Program in Vietnam by commissioning Project X, the Army\u2019s top-secret program for transmitting Vietnam\u2019s lessons to South America. [23] By the mid-1970s, the Project X materials were going to armies all over the world. These were textbooks for global counterinsurgency and terror warfare. These included a murder manual, \u201cPsychological Operations in Guerrilla Warfare,\u201d which openly instructed in the assassination of public officials, and was distributed to the Nicaraguan Contras. Another manual, \u201cHuman Resource Exploitation Training Manual,\u201d was used widely in Honduran counterrorism efforts.<\/p>\n

Use of the Project X material was temporarily suspended by Congress and the Carter administration for probable human rights violations, but the program was restored by the Reagan administration in 1982. By the mid-1980s, according to one detailed history, \u201ccounterguerrilla operations in Colombia and Central America would thus bear an eerie but explicable resemblance to South Vietnam.\u201d<\/p>\n

What follows is a brief sketch of the widespread application of US-promulgated Phoenix-derived reigns of terror, kill lists, and death squads throughout Latin America and beyond. Much of this is familiar territory to many activists and scholars, and is merely the tip of the iceberg, but it merits review as a backdrop for the current context of kill lists and targeted assassination.<\/p>\n

US KILL LISTS AND ASSASSINATION IN LATIN AMERICA<\/strong><\/p>\n

The U.S. Army\u2019s School of Americas (SOA), started in 1946, trained mass murderers and orchestrated coups in Peru, Panama, Argentina, Ecuador, Bolivia, Guatemala, El Salvador, and Mexico. The SOA trained more than 61,000 Latin American officers implicated in widespread slaughter of civilian populations across Latin America. From 1966-1976 the SOA trained hundreds of Latin American officers in Phoenix-derived methods. Between 1989-1991 the SOA issued almost 700 copies of Project X handbooks to at least ten Latin American countries, including Bolivia, Colombia, Peru, Venezuela, Guatemala, and Honduras. In 2001, SOA was renamed Western Hemisphere Institute for Security Cooperation (WHISC), but peace activists know it as School of Assassins.<\/p>\n

The CIA trained assassination groups such as Halcones in Mexico, the Mano Blanca in Guatemala, and the Escuadron de la Muerte in Brazil. In South America, in 1970-79, Operation Condor, the code-name for collection, exchange and storage of intelligence, was established among intelligence services in South America to eradicate Marxist activities. Operation Condor promoted joint operations including assassination against targets in member countries. In Central America, the CIA-supported death toll under the Reagan presidency alone exceeded 150,000. The CIA set up Ansesal and other networks of terror in El Salvador, Guatemala (Ansegat) and pre-Sandinista Nicaragua (Ansenic).<\/p>\n

Honduran death squads were active through the 1980s, the most infamous of which was Battalion 3\u201316, which assassinated hundreds of people, including teachers, politicians, and union leaders. Battalion 316 received substantial CIA support and training, and at least 19 members graduated from the School of the Americas.<\/p>\n

In Colombia, about 20,000 people were killed since 1986 and much of U.S. aid for counternarcotics was diverted to what Amnesty International labeled \u201cone of the worst killing fields.\u201d The US State Department also supported the Colombian army in creating a database of subversives, terrorists and drug dealers.<\/p>\n

In Bolivia, Amnesty International reported that from 1966-68 between 3,000 and 8,000 people were killed by death squads. The CIA supplied names of U.S. and other foreign missionaries and progressive priests.<\/p>\n

In Ecuador, the CIA maintained what was called the lynx list, aka the subversive control watch list of the most important left-wing activists to arrest. In Uruguay. Every CIA station maintained a subversive control watch list of most important left wing activists. From 1970-72 the CIA helped set up the Department of Information and Intelligence (DII), which served as a cover for death squads, and also co-ordinated meetings between Brazilian and Uruguayan death squads.<\/p>\n

In Nicaragua, the US provided illegal funds to the Contras, and Marine intelligence helped maintain a list of civilians marked for assassination when Contra forces entered the country.<\/p>\n

In Chile, 1970-73, CIA-created unions organized CIA-financed strikes leading to Allende\u2019s overthrow and subsequent suicide. By late 1971 the CIA was involved in the preparation of lists of nearly 20,000 middle-level leaders of people\u2019s organizations, scheduled to be assassinated after the Pinochet coup.<\/p>\n

In Haiti, U.S. officials with CIA backgrounds in Phoenix-like program activities coordinated with the Ton-Ton Macoute, \u201cBaby Doc\u201d Duvalier\u2019s private death squad, responsible for killing at least 3,000 people.<\/p>\n

For over thirty years the US military and the CIA helped organize, train, and fund death squad activity in El Salvador. From 1980-93, at least 63,000 Salvadoran civilians were killed, mostly by the government directly supported by the U.S. The CIA routinely supplied ANSESAL, the security forces, and the general staff with electronic, photographic, and personal surveillance of suspected dissidents and Salvadorans abroad who were later assassinated by death squads. US militray involvement in El Salvador allowed \u201cthe lessons learned in Vietnam to be put into practice \u2026 assisting an allied country in counterinsurgency operations.\u201d<\/p>\n

In Guatemala, as early as 1954, the U.S. Ambassador, after the CIA-orchestrated overthrow of the Arbenz government, gave to the new Armas government lists of radical opponents to be assassinated. Years later, throughout Guatemala\u2019s 36-year civil war, Washington continuously to supported the Guatemalan military\u2019s excesses against civilians, which killed 200,000 people.<\/p>\n

US Assassination Programs Exported to Other Countries<\/strong><\/p>\n

In Indonesia, 1965-66, the US embassy and the CIA provided the Indonesian military with lists of the names of PKI militants, which were used by Suharto to crush the PKI regime. This resulted in \u201cone of the worst episodes of mass murder of the twentieth century,\u201d with estimates as high as one million deaths.<\/p>\n

In Thailand, in 1976, the new junta used CIA-trained forces to crush student demonstrators during coup; two right-wing terrorist squads suspected for assassinations tied directly to CIA operations.<\/p>\n

In Iran, the CIA launched a coup installing the shah in power and helped establish the lethal secret police unit SAVAK. The CIA and SAVAK then exchanged intelligence, including information and arrest lists on the communist Tudeh party. Years later, in 1983, the CIA gave the Khomeni government a list of USSR KGB agents and collaborators operating in Iran, which the Khomeni regime used to execute 200 suspects and close down the communist Tudeh party.<\/p>\n

In the Philippines, in 1986, Reagan increased CIA involvement in Philippine counterinsurgency operations, carried out by more than 50 death squads. In 2001, before 9\/11, the Bush administration sent a unit of SOF to the Philippines \u201cto help train Philippine counter terrorist forces fighting against Muslim separatists\u201d within groups like Abu Sayyaf. After 9\/11 US-Filipino cooperation was stepped up and the ongoing separatist conflict was cast, to the benefit of both sides, as \u201cthe second front in the war on terror.\u201d In Feb, 2012, a US drone strike targeting leaders of Abu Sayyaf and other separatist groups killed 15 people, the first use of killer drones in Southeast Asia.<\/p>\n

A \u201cglobal Phoenix Program\u201d: drone targets worldwide<\/strong><\/p>\n

\u201cA global Phoenix program \u2026 would provide a useful start point\u201d for \u201ca new strategic approach to the Global War on Terrorism.\u201d<\/p>\n

\u2013David Kilcullen<\/p><\/blockquote>\n

Iraq<\/strong><\/p>\n

Despite the US-perpetrated counter terrorist slaughter in Latin America and elsewhere in the 1970s-1990s, the US Special Forces debacle in Mogadishu in 1993, popularized in the film Black Hawk Down, severely impacted US willingness to use Special Forces in counter terrorist missions for the next decade. But then, after 9\/11, things changed drastically. On September 17, 2001, President Bush signed a secret Presidential finding authorizing the C.I.A. to create paramilitary teams to hunt, capture, detain, or kill designated terrorists almost anywhere in the world. The pressure from the White House, in particular from Vice-President Dick Cheney, was intense, and in the scramble, a search of the C.I.A.\u2019s archives turned up \u2013 the Phoenix Program.<\/p>\n

In July 2002, Defense Secretary Donald Rumsfeld sent an order for a plan to make sure that special forces could be authorized to use lethal force \u2018in minutes and hours, not days and weeks.\u2019\u201d Rumsfeld prompted Bush to authorize the military to \u201cfind and finish\u201d terrorist targets. Here he was referring to \u201cthe F3EA targeting cycle\u201d used in anti-infrastructure operations by Special Operations Forces. F3EA, an abbreviation of find, fix, finish, exploit, analyze, utilizes comprehensive intelligence to \u201cfind a target amidst civilian clutter and fix his exact location . . . . enabling surgical finish operations \u2026 to catch a fleeting target.\u201d<\/p>\n

Lt General William (Jerry) Boykin, Delta commander in Mogadishu, deputy undersecretary for Defense for Intelligence and a key planner of the Special Forces offensive in Iraq, announced, \u201cWe\u2019re going after these people. Killing or capturing them \u2026 doing what the Phoenix program was designed to do, without all the secrecy.\u201d<\/p>\n

Back in 1963, the CIA had supplied lists of communists to the Baath party coup so that communists could be rounded up and eliminated. Now, forty years later, it was the Baathists\u2019 turn to be rounded up by Special Forces and CIA and executed. After the 2003 invasion of Iraq, the U.S. military notoriously developed a set of playing cards to help troops identify the most-wanted members of Saddam Hussein\u2018s government, mostly high-ranking Baath Party members. Less well-known was the secret targeted killing of thousands of Baathist civilians by US Special Forces.<\/p>\n

Seymour Hersh wrote in 2003 that \u201cThe Bush Administration authorized a major escalation of the Special Forces covert war in Iraq. \u2026 Its highest priority [being] the neutralization of the Baathist insurgents, by capture or assassination. [38] A former C.I.A. station chief described the strategy: \u201cThe only way we can win is to go unconventional. We\u2019re going to have to play their game. Guerrilla versus guerrilla. Terrorism versus terrorism. We\u2019ve got to scare the Iraqis into submission.\u201d [39] The US even hired thousands of contract killers previously responsible for US-sponsored extra-judicial killings and death squad activity in Latin America. The operation\u2014called \u201cpre\u00ebmptive manhunting\u201d by one Pentagon adviser\u2014had, according to Hersh, \u201cthe potential to turn into another Phoenix Program.\u201d<\/p>\n

Global Phoenix <\/strong><\/p>\n

In 2009, the Office of the Secretary of Defense sponsored a paper by the National Defense Research Institute entitled \u201cThe Phoenix Program and Contemporary Counterinsurgency.\u201d The paper notes, \u201cThe persistent insurgencies in Iraq and Afghanistan have generated fresh interest among military officers, policymakers, and civilian analysts in the history of counterinsurgency. The Phoenix Program in Vietnam\u2014the U.S. effort to improve intelligence coordination and operations aimed at identifying and dismantling the communist underground\u2014is the subject of much renewed attention.\u201d<\/p>\n

The paper continues, \u201cAs the United States and its allies shift their focus to Afghanistan and weigh counterinsurgency alternatives for that country, decision-makers would be wise to consider how Phoenix-style approaches might serve to pry open Taliban and Al-Qaeda black boxes.\u201d<\/p>\n

Two key architects of the current Phoenix-style global counterinsurgency efforts by the US are David Kilcullen and Michael Vickers. David Kilcullen has been counterinsurgency advisor to two former Middle East commanders, General Stanley McChrystal (formerly head of Special Operations) and General David Petraeus, now CIA Director. Michael G. Vickers, made famous in the book and film Charlie Wilson\u2019s War about the CIA\u2019s anti-Soviet Afghan campaign of the 1980s, is currently Under Secretary of Defense for Intelligence, wielding such vast authority over the US war on terror that, according to a Washington Post profile, Pentagon colleagues refer to as his \u201ctake-over-the-world-plan.\u201d [43]<\/p>\n

Kilcullen wrote in a much-quoted 2004 paper entitled \u201cCountering Global Insurgency\u201d that \u201cCounterinsurgency campaigns in Afghanistan and Iraq have reawakened official and analytical interest in the Phoenix Program.\u201d He proposed that \u201ca global Phoenix program \u2026 would provide a useful start point\u201d for \u201ca new strategic approach to the Global War on Terrorism,\u201d one which would focus on \u201cinterdicting links \u2026 between jihad theatres, denying sanctuary areas, \u2026 isolating Islamists from local populations and \u2026 disrupting inputs\u201d from others.<\/p>\n

Vickers issued a Phoenix-style directive in December 2008 to \u201cdevelop capabilities for extending U.S. reach into denied areas and uncertain environments by operating with and through indigenous foreign forces or by conducting low visibility operations.\u201d \u201cIt\u2019s not just the Middle East. It\u2019s not just the developing world. It\u2019s not just non-democratic countries \u2013 it\u2019s a global problem. Threats can emanate from Denmark, the United Kingdom, you name it.\u201d According to a Washington Post profile, \u201cthe most critical aspect of Vicker\u2019s plan targeting al-Qaeda-affiliated networks around the world involves US Special Forces working through foreign partners to uproot and fight terrorism.\u201d US military and Special Operations forces would \u201cpay indigenous fighters and paramilitaries who work with them in gathering intelligence, hunting terrorists, fomenting guerrilla warfare or putting down an insurgency.\u201d<\/p>\n

Pentagon colleagues have said of Vickers, \u201che tends to think like a gangster.\u201d [48] Pentagon press secretary Geoff Morrell revealed that getting Bin Laden in Pakistan was Vicker\u2019s \u201cbaby,\u201d and \u201cmore than anyone else in the department, he drove the issue.\u201d 2011 New York Times Vickers summarizes his strategy this: \u201cYou make a deal with the devil to defeat another devil.\u201d \u201cI just want to kill those guys.\u201d Such is the megalomaniacal mission underlying the US global war on terror, its kill lists and worldwide program of targeted assassination.<\/p>\n

Killer Drones Revisited<\/strong><\/p>\n

\u201cEngaging in any assassination blurs the line between the good guys and the bad.\u201d It is also \u201ca proclamation of weakness and an admission of failure.\u201d<\/p>\n

\u2013John Jacob Nutter, The CIA\u2019s Black Ops [52]<\/p><\/blockquote>\n

The purpose of this article is to reframe the current attention on killer drones and Obama\u2019s \u201ckill list\u201d within an historical perspective. The goal here is not to discourage the escalating protest against killer drones or against Obama\u2019s targeted assassination program around the globe. As stated at the outset, the unprecedented visibility of these nefarious activities and of the outraged public response to them is precisely what is needed at this time. This heightened awareness also affords a perfect opportunity to revisit the extraordinary history of US assassination and targeted killing that has led directly and explicitly to these activities.<\/p>\n

Focus on the drones alone will not be sufficient. For even the major counter terrorist mastermind David Kilcullen himself, an avid proponent of the global targeted killing program, has argued against the use of drones. In a 2009 New York Times editorial he argues that \u201cThe goal should be to isolate extremists from their communities; [they] must be defeated by indigenous forces\u2026Drone strikes make this harder, not easier.\u201d He adds, \u201cThe use of drones displays every characteristic of a tactic \u2013 or, more accurately, a piece of technology \u2013 substituting for a strategy, [with minimal understanding] of the tribal dynamics of the local population. This creates public outrage and a desire for revenge.\u201d<\/p>\n

Scholar Maria Ryan, in a 2011 article entitled \u201cWar in Countries We Are Not at War With,\u201d writes: \u201cIn 2006 the Pentagon announced that it had sent small teams of Special Operations troops to US embassies to gather intelligence on terrorism in Africa, South East Asia and South America\u2026There is, then, a covert side to the Global War on Terrorism that is not visible and not currently knowable in the absence of whistleblowers, leaks, or things gone wrong.\u201d<\/p>\n

The heightened public attention paid to drone killing might very well, in time, lead to some welcome success in curtailing their use. But too narrow a focus on the US deployment of Predator and Reaper drones might also distract us from other forms of Phoenix-derived targeted killing still being perpetrated globally \u2013 and covertly \u2013 by our Assassination Nation.<\/p>\n","protected":false},"excerpt":{"rendered":"

The Article: Assassination Nation by Doug Noble in CounterPunch. The Text: \u201cA broad-gauged program of targeted assassination has now displaced counterinsurgency as the prevailing expression of the American way of war.\u201d \u2013Andrew Bacevich This spring the US drone killing program has come out of the closet. Attorney General Eric Holder publicly defended the drone killing […]<\/p>\n","protected":false},"author":49,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[259],"tags":[],"yoast_head":"\nAssassination Nation<\/title>\n<meta name=\"description\" content=\"Fifty Years of US Targeted \u2018Kill Lists\u2019: From the Phoenix Program to Predator Drones.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.prosebeforehos.com\/article-of-the-day\/08\/28\/history-american-assassination\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Assassination Nation\" \/>\n<meta property=\"og:description\" content=\"Fifty Years of US Targeted \u2018Kill Lists\u2019: From the Phoenix Program to Predator Drones.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.prosebeforehos.com\/article-of-the-day\/08\/28\/history-american-assassination\/\" \/>\n<meta property=\"og:site_name\" content=\"Prose Before Hos\" \/>\n<meta property=\"article:published_time\" content=\"2012-08-28T15:01:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2012-12-26T21:03:45+00:00\" \/>\n<meta name=\"author\" content=\"Article of the Day\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pbhnetwork\" \/>\n<meta name=\"twitter:site\" content=\"@pbhnetwork\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Article of the Day\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"20 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.prosebeforehos.com\/article-of-the-day\/08\/28\/history-american-assassination\/\",\"url\":\"https:\/\/www.prosebeforehos.com\/article-of-the-day\/08\/28\/history-american-assassination\/\",\"name\":\"Assassination Nation\",\"isPartOf\":{\"@id\":\"https:\/\/www.prosebeforehos.com\/#website\"},\"datePublished\":\"2012-08-28T15:01:49+00:00\",\"dateModified\":\"2012-12-26T21:03:45+00:00\",\"author\":{\"@id\":\"https:\/\/www.prosebeforehos.com\/#\/schema\/person\/1e19d7cf2b1a9aea1805fd7b4b4b2b4e\"},\"description\":\"Fifty Years of US Targeted \u2018Kill Lists\u2019: From the Phoenix Program to Predator Drones.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.prosebeforehos.com\/article-of-the-day\/08\/28\/history-american-assassination\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.prosebeforehos.com\/article-of-the-day\/08\/28\/history-american-assassination\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.prosebeforehos.com\/article-of-the-day\/08\/28\/history-american-assassination\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.prosebeforehos.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A History Of American Assassination\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.prosebeforehos.com\/#website\",\"url\":\"https:\/\/www.prosebeforehos.com\/\",\"name\":\"Prose Before Hos\",\"description\":\"The Far Side Of Politics\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.prosebeforehos.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.prosebeforehos.com\/#\/schema\/person\/1e19d7cf2b1a9aea1805fd7b4b4b2b4e\",\"name\":\"Article of the Day\",\"sameAs\":[\"https:\/\/twitter.com\/pbhnetwork\"],\"url\":\"https:\/\/www.prosebeforehos.com\/author\/article-of-the-day\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Assassination Nation","description":"Fifty Years of US Targeted \u2018Kill Lists\u2019: From the Phoenix Program to Predator Drones.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.prosebeforehos.com\/article-of-the-day\/08\/28\/history-american-assassination\/","og_locale":"en_US","og_type":"article","og_title":"Assassination Nation","og_description":"Fifty Years of US Targeted \u2018Kill Lists\u2019: From the Phoenix Program to Predator Drones.","og_url":"https:\/\/www.prosebeforehos.com\/article-of-the-day\/08\/28\/history-american-assassination\/","og_site_name":"Prose Before Hos","article_published_time":"2012-08-28T15:01:49+00:00","article_modified_time":"2012-12-26T21:03:45+00:00","author":"Article of the Day","twitter_card":"summary_large_image","twitter_creator":"@pbhnetwork","twitter_site":"@pbhnetwork","twitter_misc":{"Written by":"Article of the Day","Est. reading time":"20 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.prosebeforehos.com\/article-of-the-day\/08\/28\/history-american-assassination\/","url":"https:\/\/www.prosebeforehos.com\/article-of-the-day\/08\/28\/history-american-assassination\/","name":"Assassination Nation","isPartOf":{"@id":"https:\/\/www.prosebeforehos.com\/#website"},"datePublished":"2012-08-28T15:01:49+00:00","dateModified":"2012-12-26T21:03:45+00:00","author":{"@id":"https:\/\/www.prosebeforehos.com\/#\/schema\/person\/1e19d7cf2b1a9aea1805fd7b4b4b2b4e"},"description":"Fifty Years of US Targeted \u2018Kill Lists\u2019: From the Phoenix Program to Predator Drones.","breadcrumb":{"@id":"https:\/\/www.prosebeforehos.com\/article-of-the-day\/08\/28\/history-american-assassination\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.prosebeforehos.com\/article-of-the-day\/08\/28\/history-american-assassination\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.prosebeforehos.com\/article-of-the-day\/08\/28\/history-american-assassination\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.prosebeforehos.com\/"},{"@type":"ListItem","position":2,"name":"A History Of American Assassination"}]},{"@type":"WebSite","@id":"https:\/\/www.prosebeforehos.com\/#website","url":"https:\/\/www.prosebeforehos.com\/","name":"Prose Before Hos","description":"The Far Side Of Politics","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.prosebeforehos.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.prosebeforehos.com\/#\/schema\/person\/1e19d7cf2b1a9aea1805fd7b4b4b2b4e","name":"Article of the Day","sameAs":["https:\/\/twitter.com\/pbhnetwork"],"url":"https:\/\/www.prosebeforehos.com\/author\/article-of-the-day\/"}]}},"_links":{"self":[{"href":"https:\/\/www.prosebeforehos.com\/wp-json\/wp\/v2\/posts\/131648"}],"collection":[{"href":"https:\/\/www.prosebeforehos.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.prosebeforehos.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.prosebeforehos.com\/wp-json\/wp\/v2\/users\/49"}],"replies":[{"embeddable":true,"href":"https:\/\/www.prosebeforehos.com\/wp-json\/wp\/v2\/comments?post=131648"}],"version-history":[{"count":3,"href":"https:\/\/www.prosebeforehos.com\/wp-json\/wp\/v2\/posts\/131648\/revisions"}],"predecessor-version":[{"id":133492,"href":"https:\/\/www.prosebeforehos.com\/wp-json\/wp\/v2\/posts\/131648\/revisions\/133492"}],"wp:attachment":[{"href":"https:\/\/www.prosebeforehos.com\/wp-json\/wp\/v2\/media?parent=131648"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.prosebeforehos.com\/wp-json\/wp\/v2\/categories?post=131648"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.prosebeforehos.com\/wp-json\/wp\/v2\/tags?post=131648"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}