Skip to main content

Home/ International Politics of the Middle East/ Group items tagged espionage

Rss Feed Group items tagged

Ed Webb

Flame and Stuxnet Cousin Targets Lebanese Bank Customers, Carries Mysterious Payload | ... - 0 views

  • Gauss marks the first time that apparently nation-state-created malware has been found stealing banking credentials, something that is commonly seen in malware distributed by criminal hacking groups.
  • Gauss appears to have been created sometime in mid-2011 and was first deployed in September or October of last year, around the same time that DuQu was uncovered by researchers in Hungary. DuQu was an espionage tool discovered on machines in Iran, Sudan, and other countries around August 2011 and was designed to steal documents and other data from machines. Stuxnet and DuQu appeared to have been built on the same framework, using identical parts and using similar techniques. Flame and Stuxnet also shared a component, and now Flame and Gauss have been found to be using similar code as well.
  • Extrapolating from the number of infected Kaspersky customers, they speculate that there may be as many as tens of thousands of other victims infected with Gauss. By comparison, Stuxnet infected more than 100,000 machines, primarily in Iran. DuQu infected an estimated 50 machines, but was not geographically focused. Flame is estimated to have infected about 1,000 machines in Iran and elsewhere in the Middle East.
  • ...4 more annotations...
  • Kaspersky suggests that “white” in the file name may refer to Lebanon, a name said to be derived from the Semitic root letters “lbn,” which are also the root letters for “white.” Although in Arabic — a Semitic language — white is “abayd,” in Hebrew — also a Semitic language — the word for white is “lavan,” which comes from the root letters “lbn.”
  • Like Flame, Gauss is modular, so that new functionality can be swapped in and out, depending on the needs of the attackers. To date, only a few modules have been uncovered — these are designed to steal browser cookies and passwords, harvest system configuration data including information about the BIOS and CMOS RAM, infect USB sticks, enumerate the content of drives and folders, and to steal banking credentials as well as account information for social networking accounts, e-mail and instant messaging.
  • Gauss also installs a custom font called Palida Narrow, the purpose of which is not known. The use of a custom font designed by the malware authors is reminiscent of DuQu, which used a font called Dexter fabricated by its creators to exploit victim machines. Kaspersky has found no malicious code in the Palida Narrow font files and has no idea why it’s in the code, though the font contains Western, Baltic and Turkish symbols.
  • the USB module appears to be aimed at bridging an airgap and getting the payload onto systems that are not connected to the internet, as it had been used previously to get Stuxnet onto industrial control systems in Iran that were not connected to the internet. As noted, the payload is only unleashed on systems that have a specific configuration. That specific configuration is currently unknown, but Schoewenberg says it has to do with paths and files that are on the system. This suggests that the attackers have extensive knowledge about what is on the target system they are seeking.
Ed Webb

Syria Comment » Archives » "Bush White House Wanted to Destroy the Syrian Sta... - 0 views

  •  
    Search Comment Search Poll Assad's statement with Ahmadinejad was appropriate and necessary over the top and asking for trouble View Results Polls Archive Categories announcement (28) Asad quotes (55) Authors (189) Book (20) Britain (4) Economics (189) Foreign Relations (2529) EU (32) France (78) Germany (6) Iran (112) Iraq (154) Israel (423) Lebanon (684) Hariri (96) Hizbullah (169) Palestine (110) Russia (26) Saudi (108) Turkey (87) UK (17) US (609) Golan (93) Jordan (8) nature (4) Omar Dahi (1) Politics (479) Religion and Ethnicity (134) Society & Culture (126) UN (48) Uncategorized (132) Weapons (113) Reading Syria Books Islam Books Middle East Books Greatest Hits Opposition Meeting Planned for Paris Collapses, August 25, 2005 Is Syria Ready for Democracy? March 12, 2005 Syria's Bourse - The Launch & Recommendations See All... Blogroll Creative Syria Juan Cole's Informed Comment Syrian History: Moubayed Thara - Womens Rights Ammar Abdulhamid Damascene Blog Nur al-Cubicle Innocent Criminal Syrian Diplomat in America Syria Planet (Aggregates Sy Blogs) Dove's Eye View Anthro in Dam Open Lebanon Lebanese Bloggers Mideast Policy Iraq Slogger POMED PostGlobal Syria News Wire by Sasa Rime Allaf abu muqawama Angry Arab Arabist Steve Clemons War in Context Levant Watch George Ajjan Patrick Seale Missing Links by Badger 'Just World News' by Cobban friday-lunch-club Wampum Col. Patrick Lang Yves Gonzalez Guide de Syrie-sur-Web All4Syria - Ayman Abdel Nour Lobelog - Jim Lobe and Friends China Matters LeftLink Mona Eltahawy Le Monde Diplo Blogs Syrian TV and Radio Forward - Sami Moubayed Rootless Cosmo by Karon Mondoweiss by Philip Weiss Marc Gopin Dreyfuss Report Qifa Nabki Belgravia - Greg Djerejian TurcoPundit Eighth Gate Toot - Choice M.E. Blogs One Region, One future Enduring America - Lucas et. al. Maghreb Blog Maghreb Blog - Daadaoui Syria Comment Bint Al-Beltway - Shana Marshall On Olives and Sake (Yazan Badran) Firas Azm
Ed Webb

Exclusive: Ex-NSA cyberspies reveal how they helped hack foes of UAE - 0 views

  • Project Raven, a clandestine team that included more than a dozen former U.S. intelligence operatives recruited to help the United Arab Emirates engage in surveillance of other governments, militants and human rights activists critical of the monarchy.
  • in 2016, the Emiratis moved Project Raven to a UAE cybersecurity firm named DarkMatter. Before long, Stroud and other Americans involved in the effort say they saw the mission cross a red line: targeting fellow Americans for surveillance.
  • former U.S. government hackers have employed state-of-the-art cyber-espionage tools on behalf of a foreign intelligence service that spies on human rights activists, journalists and political rivals
  • ...20 more annotations...
  • surveillance techniques taught by the NSA were central to the UAE’s efforts to monitor opponents
  • Various reports have highlighted the ongoing cyber arms race in the Middle East, as the Emirates and other nations attempt to sweep up hacking weapons and personnel faster than their rivals. The Reuters investigation is the first to reveal the existence of Project Raven, providing a rare inside account of state hacking operations usually shrouded in secrecy and denials.
  • While this activity raises ethical dilemmas, U.S. national security lawyers say the laws guiding what American intelligence contractors can do abroad are murky. Though it’s illegal to share classified information, there is no specific law that bars contractors from sharing more general spycraft knowhow, such as how to bait a target with a virus-laden email.
  • The hacking of Americans was a tightly held secret even within Raven, with those operations led by Emiratis instead. Stroud’s account of the targeting of Americans was confirmed by four other former operatives and in emails reviewed by Reuters.
  • Mansoor was convicted in a secret trial in 2017 of damaging the country’s unity and sentenced to 10 years in jail. He is now held in solitary confinement, his health declining, a person familiar with the matter said. Mansoor’s wife, Nadia, has lived in social isolation in Abu Dhabi. Neighbors are avoiding her out of fear security forces are watching. They are correct. By June 2017 Raven had tapped into her mobile device and given her the code name Purple Egret, program documents reviewed by Reuters show. To do so, Raven utilized a powerful new hacking tool called Karma, which allowed operatives to break into the iPhones of users around the world.
  • the UAE has been accused of suppressing free speech, detaining dissidents and other abuses by groups such as Human Rights Watch. The UAE says it is working closely with Washington to fight extremism “beyond the battlefield” and is promoting efforts to counter the “root causes” of radical violence. Raven’s targets eventually would include militants in Yemen, foreign adversaries such as Iran, Qatar and Turkey, and individuals who criticized the monarchy, said Stroud and eight other former Raven operatives. Their accounts were confirmed by hundreds of Raven program documents reviewed by Reuters.
  • “Some days it was hard to swallow, like [when you target] a 16-year-old kid on Twitter,” she said. “But it’s an intelligence mission, you are an intelligence operative. I never made it personal.”
  • the program took aim not just at terrorists and foreign government agencies, but also dissidents and human rights activists. The Emiratis categorized them as national security targets
  • Emirati security forces viewed human rights advocates as a major threat to “national stability,”
  • Reached by phone in London, Donaghy, now a graduate student pursuing Arab studies, expressed surprise he was considered a top national security target for five years. Donaghy confirmed he was targeted using the techniques described in the documents. “I’m glad my partner is sitting here as I talk on the phone because she wouldn’t believe it,” he said. Told the hackers were American mercenaries working for the UAE, Donaghy, a British citizen, expressed surprise and disgust. “It feels like a betrayal of the alliance we have,” he said.
  • Stroud had already made the switch from government employee to Booz Allen contractor, essentially performing the same NSA job at higher pay. Taking a job with CyberPoint would fulfill a lifelong dream of deploying to the Middle East and doing so at a lucrative salary. Many analysts, like Stroud, were paid more than $200,000 a year, and some managers received salaries and compensation above $400,000.
  • Karma was particularly potent because it did not require a target to click on any link to download malicious software. The operatives understood the hacking tool to rely on an undisclosed vulnerability in Apple’s iMessage text messaging software. In 2016 and 2017, it would be used against hundreds of targets across the Middle East and Europe, including governments of Qatar, Yemen, Iran and Turkey, documents show. Raven used Karma to hack an iPhone used by the Emir of Qatar, Sheikh Tamim bin Hamad al-Thani, as well as the phones of close associates and his brother.
  • Providing sensitive defense technologies or services to a foreign government generally requires special licenses from the U.S. State and Commerce Departments. Both agencies declined to comment on whether they issued such licenses to CyberPoint for its operations in the UAE. They added that human rights considerations figure into any such approvals.
  • But a 2014 State Department agreement with CyberPoint showed Washington understood the contractors were helping launch cyber surveillance operations for the UAE. The approval document explains CyberPoint’s contract is to work alongside NESA in the “protection of UAE sovereignty” through “collection of information from communications systems inside and outside the UAE” and “surveillance analysis.”
  • “It was incredible because there weren’t these limitations like there was at the NSA. There wasn’t that bullshit red tape,”
  • Under DarkMatter, Project Raven continued to operate in Abu Dhabi from the Villa, but pressure escalated for the program to become more aggressive. Before long, senior NESA officers were given more control over daily functions, former Raven operatives said, often leaving American managers out of the loop. By mid-2016, the Emirates had begun making an increasing number of sections of Raven hidden from the Americans still managing day-to-day operations. Soon, an “Emirate-eyes only” designation appeared for some hacking targets.
  • Stroud began searching a targeting request list usually limited to Raven’s Emirati staff, which she was still able to access because of her role as lead analyst. She saw that security forces had sought surveillance against two other Americans. When she questioned the apparent targeting of Americans, she received a rebuke from an Emirati colleague for accessing the targeting list, the emails show. The target requests she viewed were to be processed by “certain people. You are not one of them,” the Emirati officer wrote.
  • Days later, Stroud said she came upon three more American names on the hidden targeting queue.
  • occupations were listed: journalist
  • When Stroud kept raising questions, she said, she was put on leave by superiors, her phones and passport were taken, and she was escorted from the building. Stroud said it all happened so quickly she was unable to recall the names of the three U.S. journalists or other Americans she came across in the files. “I felt like one of those national security targets,” she said. “I’m stuck in the country, I’m being surveilled, I can’t leave.” After two months, Stroud was allowed to return to America. Soon after, she fished out the business card of the FBI agents who had confronted her at the airport. “I don’t think Americans should be doing this to other Americans,” she told Reuters. “I’m a spy, I get that. I’m an intelligence officer, but I’m not a bad one.”
Ed Webb

Scholars, Spies and the Gulf Military Industrial Complex | MERIP - 0 views

  • Until recently, there was little practical knowledge about what it meant for an academic to analyze the military activities of the Gulf states because there wasn’t much to study, other than some symbolic joint training exercises, sociological inquiry about the composition of the region’s armed forces, and limited Emirati participation in non-combat operations in places like Kosovo. The bulk of scholarship examined the Gulf in the context of petrodollar recycling (the exchange of the Gulf’s surplus oil capital for expensive Western military equipment) or the Gulf as the object of military intervention, but never as its agent.
  • Academic research is not espionage—but many parties (notably US and European governments) are implicated in the process that has allowed them to be conflated
  • The history of the United States and European states undermining regional governments—including its only democratically-elected ones—using covert agents posing as scholars, bureaucrats and businessmen is well-documented. Its legacy is clear in the region’s contemporary politics, where authoritarians and reactionary nationalists frequently paint democratic opposition forces as foreign agents and provocateurs. It’s also visible in the political staying power of religious conservatives, who were actively supported by the US and its allies in order to undermine leftist forces that threatened to nationalize oil fields and expropriate Western corporate property.
  • ...10 more annotations...
  • Another element of this legacy is the paranoia that makes it difficult for regional governments to distinguish between academic researchers and spies
  • Imagine if Syria had imprisoned a British PhD student and kept them in solitary confinement for seven months with one consular visit—or if Iran covered up the brutal murder of an Italian PhD student by their police forces, as happened in Egypt in 2016. The double standards pertaining to academic freedom and the rule of law in countries formally allied with the United States and Europe and those characterized as rogue actors is so obvious it barely merits pointing out. The Emirati authorities certainly recognize this, and will continue to exploit this double standard so long as it remains intact.
  • Oil money, along with a new generation of rulers eager to use military intervention to demonstrate their power to domestic and foreign audiences, has made the Gulf not just a major weapons customer but an industry partner. The story of the UAE today is no longer Dubai’s position as a global finance hub, but Abu Dhabi’s position as an emerging player in high-tech weapons development.
  • it is no coincidence that two decades of research and funding for domestic weapons development in the UAE is now manifested in armed interventions in Yemen, Libya and the horn of Africa
  • Matt’s arrest and detention, therefore, is a clear message from UAE authorities that research into the country’s growing arms industry is off-limits, in much the same way that researchers and activists working on labor rights have found themselves surveilled, intimidated and imprisoned
  • The slow erosion of public funding for universities has bled dry the resources reserved to support PhD students, meanwhile trustees and consultants urge the adoption of for-profit business practices that generate return on investment, including partnering with defense technology firms for research grants.[3] The fact that educational institutions must go begging—hat in hand—to billionaire philanthropists and weapons conglomerates reflects both the growing share of defense industry involvement in industrial and research activities as well as the failure of our political system to levy sufficient taxes on the ultra-rich to directly fund basic investments in public education.
  • what does the weakening of US and European governments vis-à-vis their Gulf counterparts mean for the protection of students and scholars conducting overseas research?
  • Before my research on the Gulf, my focus was on the role of regional militaries (primarily Egypt and Jordan) in their domestic economies. The more I studied these cases the more I realized their military economies are not some peculiarity of third world political development, but a legacy of colonial militarization, the obstacles facing newly-independent states trying to industrialize their economies, and the extraordinary organizational and financial resources that weapons producers dedicate to proliferating their products all over the globe.
  • I do not know of any studies estimating the total number of academics and non-government researchers working on security and military-related issues across the globe, but I expect it is in the tens of thousands at the very least. At my home institution alone—The George Washington University—there are maybe a dozen faculty working on everything from the psychology of drone operators to the role gender plays in government defense contracting—and I’m pretty sure none of these people are spies. This kind of security studies—which examines topics like defense technology, the global arms industry and government contracting—is a growing field, not least due to the proliferation of information about these issues coming from the booming private sector. And as multinational defense firms and their complementary industry partners continue to chase investment shifting from the core capitalist countries to emerging regional powers like the Gulf States these latter sites will become increasingly important targets for such research.
  • Matt’s case should make us question not only the safety of Western researchers and our students but, more importantly, the continued harassment, intimidation and imprisonment of academics and democratic activists across the Middle East.
Ed Webb

Pompeo visit fails to reassure Israel on Syria, Iran - 0 views

  • Pompeo was supposed to try to publicly assuage Israeli phobias that have soared since it turned out that Trump was speedily pulling out of Syria and leaving the arena to Turkey, Russia and Iran.
  • “The problem is that no one in the room will believe him.”
  • Sobering up from the Trump euphoria that has gripped Israel for almost three years is particularly painful, given that at stake is not only a prime strategic asset but also a political asset Netanyahu rode all the way to the ballot box. The collapse of Trump’s Middle East policy and Israel feeling abandoned and left alone to face the entrenching Shiite axis and the troubling Ankara-Moscow-Tehran connection are generating severe headaches across Israel’s chaotic political board
  • ...4 more annotations...
  • Israeli intelligence does not conduct surveillance or espionage of any kind in the United States since the Pollard [espionage] affair in the 1980s. That order is sweeping and aggressively enforced. Nonetheless, there is an attempt to understand events in the top echelons of the US administration and a concerted effort to understand what goes on in the head of the commander-in-chief. Now senior Israeli intelligence officials are at a loss.
  • Israeli intelligence did warn in the past that Trump may get tired of the Iranian story and roll back his policies at crunch time. This scenario is being played out now in front of their eyes.
  • Netanyahu tried to wring from Pompeo US commitments to maintain sanctions on Iran even if it enters into negotiations with Tehran and tried to hand Pompeo suggested guidelines for an alternative nuclear agreement with Iran if the sides end up engaging in talks on the issue. He also raised concern over Iran’s growing daring in carrying out terror and other attacks against US allies in the region.
  • Discussions of a defense treaty between Israel and the United States did not pan out prior to the Israeli September elections. Most senior security officials are opposed to a classical style defense treaty. Nonetheless, in order to boost his self-confidence and the basic (albeit crumbling) assumption that the Netanyahu-Trump friendship is a strategic defense pillar for Israel, Netanyahu tried to wrest through Pompeo an unambiguous presidential declaration regarding the US commitment to Israel’s security, as well as a severe warning that will be conveyed to Tehran.
Ed Webb

UAE meddled in U.S. political system, intelligence report says - The Washington Post - 0 views

  • The relationship is unique. Over the years, the United States has agreed to sell the UAE some of its most sophisticated and lethal military equipment, including MQ-9 aerial drones and advanced F-35 fighter jets, a privilege not bestowed on any other Arab country over concern about diminishing Israel’s qualitative military edge.Some of the influence operations described in the report are known to national security professionals, but such activities have flourished due to Washington’s unwillingness to reform foreign-influence laws or provide additional resources to the Department of Justice. Other activities more closely resemble espionage, people familiar with the report said.
  • The UAE has spent more than $154 million on lobbyists since 2016, according to Justice Department records. It has spent hundreds of millions of dollars more on donations to American universities and think tanks, many that produce policy papers with findings favorable to UAE interests.
  • Since 2012, it has been the third-biggest purchaser of U.S. weapons and built what many consider the most powerful military in the Arab world by cultivating close ties to the U.S. political, defense and military establishment.
  • ...7 more annotations...
  • The UAE is far from alone in using aggressive tactics to try to bend the U.S. political system to its liking. Saudi Arabia, Qatar, Israel, Taiwan and scores of other governments run influence campaigns in the United States in an effort to impact U.S. policy.
  • But the intelligence community’s scrutiny of the UAE indicates a heightened level of concern and a dramatic departure from the laudatory way the country is discussed in public by U.S. secretaries of state and defense and presidents, who routinely emphasize the “importance of further deepening the U.S.-UAE strategic relationship.”
  • People who shared information about the report declined to provide a copy of it. They said the activities attributed to the UAE in the report go well beyond mere influence peddling.Story continues below advertisementOne of the more brazen exploits involved the hiring of three former U.S. intelligence and military officials to help the UAE surveil dissidents, politicians, journalists and U.S. companies. In public legal filings, U.S. prosecutors said the men helped the UAE break into computers in the United States and other countries. Last year, all three admitted in court to providing sophisticated hacking technology to the UAE, agreeing to surrender their security clearances and pay about $1.7 million to resolve criminal charges. The Justice Department touted the settlement as a “first-of-its-kind resolution.”
  • The UAE’s armed forces have fought alongside U.S. troops in Afghanistan, Iraq and Syria. The country also hosts 5,000 U.S. military personnel at al-Dhafra Air Base and U.S. warships at the Jebel Ali deep-water port.
  • There are no elections or political parties in the UAE, and no independent judiciary. Criticism of the government is banned, and trade unions and homosexuality are outlawed. Freedom House ranks the gulf state among the least free countries in the world.
  • U.S. officials and independent watchdogs have warned that smuggling and money-laundering in the UAE have allowed criminals and militants to hide their wealth there
  • Though the UAE has maintained strong bipartisan support in the United States, it cultivated a particularly close connection to the Trump administration, which approved the $23 billion sale of F-35s, MQ-9s and other munitions to the gulf state. The transfer, which has faced resistance by congressional Democrats, has not moved forward yet but is supported by the Biden administration.
Ed Webb

Turkey and Russia react with fury to G20 spying revelations | World news | guardian.co.uk - 0 views

    • Ed Webb
       
      Spying on Turkey, a NATO ally, is actually a much bigger deal than spying on Russia. On the other hand, everyone spies on everyone. All this fuss is Casablanca-style "shocked! shocked!"
  • "Russia shouldn't take this [spying] for granted, but shouldn't dramatise the situation either. Intelligence agencies exist to spy not only on private citizens but on top government leaders too."
Ed Webb

Tough Guy Leaking - Salon.com - 0 views

  • The primary fear-mongering agenda item for the National Security and Surveillance State industry is now cyberwarfare
  • as is usually true when it comes to Washington warnings about the evils of Others — this is pure projection
  • Administration defenders will undoubtedly insist that unleashing cyber warfare was all necessary to prevent Iran from obtaining nuclear weapons and impeding an Israeli attack — even though the U.S. Government acknowledges there is no evidence that Iran is pursuing nuclear weapons; Iran has the absolute right to enrich uranium for civilian purposes, and it is far from clear that this virus meaningfully impeded Iran’s nuclear program. But no matter: once a Manichean storyline is implanted (Evil Iran v. Virtuous America), all acts of aggression by the super-hero against the villain are inherently justified.
  • ...4 more annotations...
  • This morning’s story by Sanger is but the latest in a long line of leaks about classified programs that have two attributes in common: (1) they come from senior Obama administration officials; and (2) they are designed to depict President Obama, in an Election Year, as a super-tough, hands-on, no-nonsense Warrior. Put another way, the administration that is pathologically fixated on secrecy and harshly punishing whistleblowers routinely leaks national security secrets when doing so can politically benefit the President.
  •  Dear Vital Jewish Voters in Crucial Swing States: behold what this great leader did in secret to pummel Iran.
  • consider the Obama administration’s ongoing efforts to prosecute former CIA agent Jeffrey Sterling under espionage statutes for allegedly telling The New York Times‘ James Risen — almost ten years ago — about dangerous mistakes the CIA made in trying to infiltrate Iran’s nuclear program (mistakes which actually resulted in helping the Iranian program)
  • aside from the tried-and-true strategy of Democratic politicians benefiting politically from provoking criticism from the “Left,” Obama officials (and their apparatchiks) are eager to depict him as a violence-wielding aggressor. As Digby put it this week, “the [Obama] campaign is happy about all this condemnation” aimed at the drone program as it “proves [his] macho bona fides.” Obama officials will undoubtedly be just as pleased with any objections to waging undeclared, unauthorized cyber-warfare on Iran’s perfectly legal nuclear program, thus bringing the world yet another new means of destructive warfare
Ed Webb

Israeli Defense Minister publicly divulges US intelligence report | The Back Channel - 0 views

  •  
    Heh. Likely consequences? Nil.
Ed Webb

Exclusive: UK's secret Mid-East internet surveillance base is revealed in Edward Snowde... - 0 views

  •  
    It seems fairly clear that this article is based on a deliberate leak by UK officials to a) argue that signals intelligence efforts are valuable to national security of UK & US and b) to head off any temptation on the part of Greenwald/Guardian to publish on this element of Snowden's materials.
Ed Webb

CIA Confirms Role in 1953 Iran Coup - 0 views

  • Marking the sixtieth anniversary of the overthrow of Iranian Prime Minister Mohammad Mosaddeq, the National Security Archive is today posting recently declassified CIA documents on the United States' role in the controversial operation. American and British involvement in Mosaddeq's ouster has long been public knowledge, but today's posting includes what is believed to be the CIA's first formal acknowledgement that the agency helped to plan and execute the coup.
  • CIA materials posted today include working files from Kermit Roosevelt, the senior CIA officer on the ground in Iran during the coup. They provide new specifics as well as insights into the intelligence agency's actions before and after the operation
  • The issue is more than academic. Political partisans on all sides, including the Iranian government, regularly invoke the coup to argue whether Iran or foreign powers are primarily responsible for the country's historical trajectory, whether the United States can be trusted to respect Iran's sovereignty, or whether Washington needs to apologize for its prior interference before better relations can occur
  • ...4 more annotations...
  • Despite the appearance of countless published accounts about the operation over the years - including Kermit Roosevelt's own detailed memoir, and the subsequent leak to The New York Times of the 200-page CIA narrative history[4] — intelligence agencies typically refused to budge. They have insisted on making a distinction between publicly available information on U.S. activities from non-government sources and official acknowledgement of those activities, even several decades after the fact
  • "There is no longer good reason to keep secrets about such a critical episode in our recent past. The basic facts are widely known to every school child in Iran. Suppressing the details only distorts the history, and feeds into myth-making on all sides."
  • they still leave wide gaps in the history, including on some fundamental questions which may never be satisfactorily answered — such as how to apportion responsibility for planning and carrying out the coup among all the Iranian and outside actors involved
  • all 21 of the CIA items posted today (in addition to 14 previously unpublished British documents — see Sidebar), reinforce the conclusion that the United States, and the CIA in particular, devoted extensive resources and high-level policy attention toward bringing about Mosaddeq's overthrow, and smoothing over the aftermath
1 - 20 of 38 Next ›
Showing 20 items per page