Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged Big-Data-Intelligence-Conference

Rss Feed Group items tagged

Paul Merrell

LAPD scopes out Israeli drones, 'Big Data' solutions | Nation | Jewish Journal - 0 views

  • For the first nine days of February, eight of the Los Angeles Police Department’s top brass were 7,500 miles away from home, being shuttled around Israel in a minibus.
  • LAPD Deputy Chief Jose Perez, a good-natured 30-year veteran of the department who oversees its central bureau, tweeted updates at nearly every stop. On Feb. 2, he shared a group photo of the Los Angeles delegation visiting the corporate headquarters of Nice Systems, an Israeli security and cyber intelligence company that can intercept and instantly analyze video, audio and text-based communications. (A seemingly tongue-in-cheek inspirational poster on the wall behind them reads: “Every voice deserves to be heard.”)
  • The group visited private security firms and drone manufacturers, as well as the terror-prone Ashdod Port, a museum in Sderot full of old rockets shot from nearby Gaza (the same one United States President Barack Obama visited on his 2008 campaign trip to Israel), and a “safe city” underground control center in the large suburb of Rishon LeZion, which receives live streams from more than 1,000 cameras with license plate recognition installed throughout the city.
  • ...8 more annotations...
  • Frank was joined by seven of his fellow command staff at the Big Data Intelligence Conference hosted by i-HLS in the beach town of Herzliya, Israel, on Feb. 6. “On behalf of my chief of police, Chief Charlie Beck, and the 13,000-plus sworn and non-sworn members of the Los Angeles Police Department, a very heartfelt thanks to all of you for having me here,” Frank said in an opening statement for the conference, which brought together some of Israel’s — and the world’s — top cyber security and intelligence experts.
  • Frank said he was especially impressed by what he saw while visiting Israeli companies Nice Systems (as tweeted by Perez) and Verint, one of the companies whose services the National Security Administration (NSA) reportedly used in the infamous United States wiretapping scandal. Both companies already count the LAPD as a client. But, Frank said, “we’re looking at some of their additional solutions … They have a lot of new technologies that we are very much interested in.” Nice System’s  president of security, Yaron Tchwella, spoke at the conference about the company’s ability to help government agencies capture and store the billions of calls, emails, messages and social media posts that their populations generate each day, then analyze it in real time to detect potential threats.
  • Perez said he hoped the LAPD, too, would eventually be able to “use technology to incorporate all the systems that we have. That’s the wave of the future. We’re definitely looking at the ability to get that information out to the officers on the beat with a handheld. Something happens, and you’re looking at the handheld — almost like ‘The Bourne Supremacy’ — here’s a picture of the guy you’re looking for.”
  • Also in Khan’s crosshairs is Special Order 1, an LAPD policy that allows officers to document any otherwise lawful activity that they, or other members of the community, deem suspicious. (Including, for example, the photographing of certain government sites.) And new LAPD intel collection methods or surveillance drones, said Khan, would only be “adding more to their toolbox of being highly militarized in counterinsurgency forces” against protesters and movements such as Occupy. “Yet it is wrapped in this whole language of community policing.” Two separate L.A. Weekly investigations in 2012 found that the LAPD uses expensive StingRay devices, which can locate cellphones (and their users) by acting like cellphone towers, and license-plate recognition cameras that track millions of drivers. Although both devices technically require a warrant to be used in a police investigation, there is little way to know whether police are always complying with the rules.
  • Surveillance drones manufactured by Israel Aerospace Industries (IAI) and Sky Sapience were also hot items on the LAPD tour. Both Frank and Perez lit up when talking about the HoverMast, a new tethered drone from Sky Sapience that was just released to the IDF late last year. “There are several things on the wish list, but we did like Sky Sapience — that was incredible,” Perez said. “For me personally, just for my command, which is five stations, and all the special events that I have, crowd control and being able to see everything would be some technology that is needed immediately.” However, Frank added, the HoverMast “has its challenges: from a political standpoint, convincing our political leaders, and from a community standpoint, convincing the community that it’s not Big Brother watching over you.”
  • A spokeswoman for Sky Sapience said the HoverMast can intercept wireless communications, and its cameras are capable of facial recognition. A spokeswoman for IAI said that while showing LAPD officers their drones, the company “wanted to emphasize the fact that drones can be very helpful in giving intelligence in urban scenarios… you need it now, you need it quick, you need to see what’s inside a window, and what’s behind this building.”
  • Many of the companies attracting LAPD interest have one thing in common: They were formed by veterans of the IDF’s elite, top-secret 8200 Unit, better known as Israel’s version of the NSA.
  • Perez emphasized that as a local police agency, the LAPD has much tighter legal constraints than federal agencies to adhere to when adopting army-born surveillance and “big data” technologies.
Paul Merrell

The Agency That Could Be Big Brother - New York Times - 0 views

  • December 25, 2005
  • DEEP in a remote, fog-layered hollow near Sugar Grove, W.Va., hidden by fortress-like mountains, sits the country's largest eavesdropping bug. Located in a "radio quiet" zone, the station's large parabolic dishes secretly and silently sweep in millions of private telephone calls and e-mail messages an hour. Run by the ultrasecret National Security Agency, the listening post intercepts all international communications entering the eastern United States. Another N.S.A. listening post, in Yakima,Wash., eavesdrops on the western half of the country. A hundred miles or so north of Sugar Grove, in Washington, the N.S.A. has suddenly taken center stage in a political firestorm. The controversy over whether the president broke the law when he secretly ordered the N.S.A. to bypass a special court and conduct warrantless eavesdropping on American citizens has even provoked some Democrats to call for his impeachment. According to John E. McLaughlin, who as the deputy director of the Central Intelligence Agency in the fall of 2001 was among the first briefed on the program, this eavesdropping was the most secret operation in the entire intelligence network, complete with its own code word - which itself is secret.
  • But the agency is still struggling to adjust to the war on terror, in which its job is not to monitor states, but individuals or small cells hidden all over the world. To accomplish this, the N.S.A. has developed ever more sophisticated technology that mines vast amounts of data. But this technology may be of limited use abroad. And at home, it increases pressure on the agency to bypass civil liberties and skirt formal legal channels of criminal investigation. Originally created to spy on foreign adversaries, the N.S.A. was never supposed to be turned inward. Thirty years ago, Senator Frank Church, the Idaho Democrat who was then chairman of the select committee on intelligence, investigated the agency and came away stunned. "That capability at any time could be turned around on the American people," he said in 1975, "and no American would have any privacy left, such is the capability to monitor everything: telephone conversations, telegrams, it doesn't matter. There would be no place to hide." He added that if a dictator ever took over, the N.S.A. "could enable it to impose total tyranny, and there would be no way to fight back."
  • ...3 more annotations...
  • Before the Sept. 11 attacks, the N.S.A. normally eavesdropped on a small number of American citizens or resident aliens, often a dozen or less, while the F.B.I., whose low-tech wiretapping was far less intrusive, requested most of the warrants from FISA. Despite the low odds of having a request turned down, President Bush established a secret program in which the N.S.A. would bypass the FISA court and begin eavesdropping without warrant on Americans. This decision seems to have been based on a new concept of monitoring by the agency, a way, according to the administration, to effectively handle all the data and new information. At the time, the buzzword in national security circles was data mining: digging deep into piles of information to come up with some pattern or clue to what might happen next. Rather than monitoring a dozen or so people for months at a time, as had been the practice, the decision was made to begin secretly eavesdropping on hundreds, perhaps thousands, of people for just a few days or a week at a time in order to determine who posed potential threats. Those deemed innocent would quickly be eliminated from the watch list, while those thought suspicious would be submitted to the FISA court for a warrant. In essence, N.S.A. seemed to be on a classic fishing expedition, precisely the type of abuse the FISA court was put in place to stop.At a news conference, President Bush himself seemed to acknowledge this new tactic. "FISA is for long-term monitoring," he said. "There's a difference between detecting so we can prevent, and monitoring.
  • In 2002, it was revealed that the Pentagon had launched Total Information Awareness, a data mining program led by John Poindexter, a retired rear admiral who had served as national security adviser under Ronald Reagan and helped devise the plan to sell arms to Iran and illegally divert the proceeds to rebels in Nicaragua. Total Information Awareness, known as T.I.A., was intended to search through vast data bases, promising to "increase the information coverage by an order-of-magnitude." According to a 2002 article in The New York Times, the program "would permit intelligence analysts and law enforcement officials to mount a vast dragnet through electronic transaction data ranging from credit card information to veterinary records, in the United States and internationally, to hunt for terrorists." After press reports, the Pentagon shut it down, and Mr. Poindexter eventually left the government. But according to a 2004 General Accounting Office report, the Bush administration and the Pentagon continued to rely heavily on data-mining techniques. "Our survey of 128 federal departments and agencies on their use of data mining," the report said, "shows that 52 agencies are using or are planning to use data mining. These departments and agencies reported 199 data-mining efforts, of which 68 are planned and 131 are operational." Of these uses, the report continued, "the Department of Defense reported the largest number of efforts."
  • "I don't want to see this country ever go across the bridge," Senator Church said. "I know the capacity that is there to make tyranny total in America, and we must see to it that this agency and all agencies that possess this technology operate within the law and under proper supervision, so that we never cross over that abyss. That is the abyss from which there is no return." James Bamford is the author of "Puzzle Palace" and"Body of Secrets: Anatomy of the Ultra-Secret National Security Agency."
  •  
    James Bamford's 2005 article in The New York Times that raised public awareness of what the Bush-II administration had done by bypass the FISA Court. 
Paul Merrell

Is the "military option" on Iran off the table? - Baltimore Sun - 0 views

  • f, as seems likely, President Barack Obama retains enough support to complete the nuclear deal with Iran, it will be largely because enough members of the House and Senate are persuaded by his argument that the only other real option is war.This was the rhetorical gauntlet the president threw down at his press conference last week. Equally significant, Mr. Obama omitted the until-now obligatory warning that "all options, including the military one, remain on the table."
  • Since then, Israeli media have been pressing hard to restore the military option to its accustomed place "on the table." Flying to Israel Sunday night for a handholding mission with top Israeli officials, U.S. Defense Secretary Ashton Carter tried to make his reception in Tel Aviv less frosty, telling accompanying journalists that the nuclear deal with Iran "does nothing to prevent the military option." The context, however, seemed to be one in which Iran was caught cheating on the nuclear deal.That this kind of rhetoric, even when it is not from the president, is still poison to Tehran was clear in the immediate reaction by Iran's Foreign Minister, Mohammad Javad Zarif, who insisted Monday: "Applying force ... is not an option but an unwise and dangerous temptation."
  • Looking for changes in official public statements was my bread and butter during a long tenure as a Kremlinologist. So on Wednesday, as I watched Mr. Obama defend the deal with Iran, I leaned way forward at each juncture — and there were several — where the timeworn warning about all options being "on the table" would have been de rigueur. He avoided saying it. "All options on the table?" The open-ended nature of this Bush/Cheney-esque bully-type warning is at odds with Western international understandings spanning more than three and half centuries — from the treaties of Westphalia (1648), to the Kellogg-Briand Pact (1928) to the post-World War II Nuremberg Tribunal to the UN Charter (1945). Try raising that with Establishment Washington, though, and be prepared to be dismissed as "picky-picky," or as quaint and as obsolete as the Geneva Conventions. Undergirding all this is the chauvinism reflected in President Obama's repeated reminders that the U.S. "is the sole indispensable country in the world."But in the wake of last week's accord with Iran in Vienna, it is possible now to hope that the "military option" is finally off the table — in reality, if not in occasional rhetorical palliatives for Israel.
  • ...1 more annotation...
  • Most Americans have no idea of how close we came to making war on Iran in 2008, the last year of the Bush/Cheney administration. Nor do they know of the essential role played by courageous managers of intelligence who, for the first time on the Iran nuclear issue, supervised a strictly evidence-based, from-the-bottom-up National Intelligence Estimate (NIE) that concluded in November 2007 that Iran had stopped working on a nuclear weapon at the end of 2003 and had not resumed that work. That key judgment issued unanimously and "with high confidence" by all 16 U.S. intelligence agencies played a huge role in strengthening the hand of Mike Mullen, then-chairman of the Joint Chiefs of Staff, and other reasonable national security leaders in dissuading President Bush from following Vice President Cheney's prompting to launch a war that would have made the war in Iraq look like a volleyball match between the Quaker School and Ursuline Academy.The juggernaut toward war with Iran was already rolling downhill. Recall that then-CENTCOM commander Adm. William Fallon was abruptly cashiered after saying "we're not going to do Iran on my watch." And Mr. Cheney later admitted churlishly that Mr. Bush had been a big disappointment in giving in to intelligence and military officials on Iran.In Mr. Bush's memoir "Decision Points," he complains bitterly that the NIE "tied my hands on the military side. ... After the NIE, how could I possibly explain using the military to destroy the nuclear facilities of a country the intelligence community said had no active nuclear weapons program?"
  •  
    By former CIA senior analyst Ray McGovern. 
Gary Edwards

The Empire Takes a Hit: NSA Update - 2 views

........................................................................................ NSA Conversation with retired lawyer and Open Source legal expert, "Marbux". ...........................

Federal-Reserve-Bankster-Cartel NSA

started by Gary Edwards on 15 Jun 13 no follow-up yet
Paul Merrell

European Human Rights Court Deals a Heavy Blow to the Lawfulness of Bulk Surveillance |... - 0 views

  • In a seminal decision updating and consolidating its previous jurisprudence on surveillance, the Grand Chamber of the European Court of Human Rights took a sideways swing at mass surveillance programs last week, reiterating the centrality of “reasonable suspicion” to the authorization process and the need to ensure interception warrants are targeted to an individual or premises. The decision in Zakharov v. Russia — coming on the heels of the European Court of Justice’s strongly-worded condemnation in Schrems of interception systems that provide States with “generalised access” to the content of communications — is another blow to governments across Europe and the United States that continue to argue for the legitimacy and lawfulness of bulk collection programs. It also provoked the ire of the Russian government, prompting an immediate legislative move to give the Russian constitution precedence over Strasbourg judgments. The Grand Chamber’s judgment in Zakharov is especially notable because its subject matter — the Russian SORM system of interception, which includes the installation of equipment on telecommunications networks that subsequently enables the State direct access to the communications transiting through those networks — is similar in many ways to the interception systems currently enjoying public and judicial scrutiny in the United States, France, and the United Kingdom. Zakharov also provides a timely opportunity to compare the differences between UK and Russian law: Namely, Russian law requires prior independent authorization of interception measures, whereas neither the proposed UK law nor the existing legislative framework do.
  • The decision is lengthy and comprises a useful restatement and harmonization of the Court’s approach to standing (which it calls “victim status”) in surveillance cases, which is markedly different from that taken by the US Supreme Court. (Indeed, Judge Dedov’s separate but concurring opinion notes the contrast with Clapper v. Amnesty International.) It also addresses at length issues of supervision and oversight, as well as the role played by notification in ensuring the effectiveness of remedies. (Marko Milanovic discusses many of these issues here.) For the purpose of the ongoing debate around the legitimacy of bulk surveillance regimes under international human rights law, however, three particular conclusions of the Court are critical.
  • The Court took issue with legislation permitting the interception of communications for broad national, military, or economic security purposes (as well as for “ecological security” in the Russian case), absent any indication of the particular circumstances under which an individual’s communications may be intercepted. It said that such broadly worded statutes confer an “almost unlimited degree of discretion in determining which events or acts constitute such a threat and whether that threat is serious enough to justify secret surveillance” (para. 248). Such discretion cannot be unbounded. It can be limited through the requirement for prior judicial authorization of interception measures (para. 249). Non-judicial authorities may also be competent to authorize interception, provided they are sufficiently independent from the executive (para. 258). What is important, the Court said, is that the entity authorizing interception must be “capable of verifying the existence of a reasonable suspicion against the person concerned, in particular, whether there are factual indications for suspecting that person of planning, committing or having committed criminal acts or other acts that may give rise to secret surveillance measures, such as, for example, acts endangering national security” (para. 260). This finding clearly constitutes a significant threshold which a number of existing and pending European surveillance laws would not meet. For example, the existence of individualized reasonable suspicion runs contrary to the premise of signals intelligence programs where communications are intercepted in bulk; by definition, those programs collect information without any consideration of individualized suspicion. Yet the Court was clearly articulating the principle with national security-driven surveillance in mind, and with the knowledge that interception of communications in Russia is conducted by Russian intelligence on behalf of law enforcement agencies.
  • ...6 more annotations...
  • This element of the Grand Chamber’s decision distinguishes it from prior jurisprudence of the Court, namely the decisions of the Third Section in Weber and Saravia v. Germany (2006) and of the Fourth Section in Liberty and Ors v. United Kingdom (2008). In both cases, the Court considered legislative frameworks which enable bulk interception of communications. (In the German case, the Court used the term “strategic monitoring,” while it referred to “more general programmes of surveillance” in Liberty.) In the latter case, the Fourth Section sought to depart from earlier European Commission of Human Rights — the court of first instance until 1998 — decisions which developed the requirements of the law in the context of surveillance measures targeted at specific individuals or addresses. It took note of the Weber decision which “was itself concerned with generalized ‘strategic monitoring’, rather than the monitoring of individuals” and concluded that there was no “ground to apply different principles concerning the accessibility and clarity of the rules governing the interception of individual communications, on the one hand, and more general programmes of surveillance, on the other” (para. 63). The Court in Liberty made no mention of any need for any prior or reasonable suspicion at all.
  • In Weber, reasonable suspicion was addressed only at the post-interception stage; that is, under the German system, bulk intercepted data could be transmitted from the German Federal Intelligence Service (BND) to law enforcement authorities without any prior suspicion. The Court found that the transmission of personal data without any specific prior suspicion, “in order to allow the institution of criminal proceedings against those being monitored” constituted a fairly serious interference with individuals’ privacy rights that could only be remedied by safeguards and protections limiting the extent to which such data could be used (para. 125). (In the context of that case, the Court found that Germany’s protections and restrictions were sufficient.) When you compare the language from these three cases, it would appear that the Grand Chamber in Zakharov is reasserting the requirement for individualized reasonable suspicion, including in national security cases, with full knowledge of the nature of surveillance considered by the Court in its two recent bulk interception cases.
  • The requirement of reasonable suspicion is bolstered by the Grand Chamber’s subsequent finding in Zakharov that the interception authorization (e.g., the court order or warrant) “must clearly identify a specific person to be placed under surveillance or a single set of premises as the premises in respect of which the authorisation is ordered. Such identification may be made by names, addresses, telephone numbers or other relevant information” (para. 264). In making this finding, it references paragraphs from Liberty describing the broad nature of the bulk interception warrants under British law. In that case, it was this description that led the Court to find the British legislation possessed insufficient clarity on the scope or manner of exercise of the State’s discretion to intercept communications. In one sense, therefore, the Grand Chamber seems to be retroactively annotating the Fourth Section’s Liberty decision so that it might become consistent with its decision in Zakharov. Without this revision, the Court would otherwise appear to depart to some extent — arguably, purposefully — from both Liberty and Weber.
  • Finally, the Grand Chamber took issue with the direct nature of the access enjoyed by Russian intelligence under the SORM system. The Court noted that this contributed to rendering oversight ineffective, despite the existence of a requirement for prior judicial authorization. Absent an obligation to demonstrate such prior authorization to the communications service provider, the likelihood that the system would be abused through “improper action by a dishonest, negligent or overly zealous official” was quite high (para. 270). Accordingly, “the requirement to show an interception authorisation to the communications service provider before obtaining access to a person’s communications is one of the important safeguards against abuse by the law-enforcement authorities” (para. 269). Again, this requirement arguably creates an unconquerable barrier for a number of modern bulk interception systems, which rely on the use of broad warrants to authorize the installation of, for example, fiber optic cable taps that facilitate the interception of all communications that cross those cables. In the United Kingdom, the Independent Reviewer of Terrorism Legislation David Anderson revealed in his essential inquiry into British surveillance in 2015, there are only 20 such warrants in existence at any time. Even if these 20 warrants are served on the relevant communications service providers upon the installation of cable taps, the nature of bulk interception deprives this of any genuine meaning, making the safeguard an empty one. Once a tap is installed for the purposes of bulk interception, the provider is cut out of the equation and can no longer play the role the Court found so crucial in Zakharov.
  • The Zakharov case not only levels a serious blow at bulk, untargeted surveillance regimes, it suggests the Grand Chamber’s intention to actively craft European Court of Human Rights jurisprudence in a manner that curtails such regimes. Any suggestion that the Grand Chamber’s decision was issued in ignorance of the technical capabilities or intentions of States and the continued preference for bulk interception systems should be dispelled; the oral argument in the case took place in September 2014, at a time when the Court had already indicated its intention to accord priority to cases arising out of the Snowden revelations. Indeed, the Court referenced such forthcoming cases in the fact sheet it issued after the Zakharov judgment was released. Any remaining doubt is eradicated through an inspection of the multiple references to the Snowden revelations in the judgment itself. In the main judgment, the Court excerpted text from the Director of the European Union Agency for Human Rights discussing Snowden, and in the separate opinion issued by Judge Dedov, he goes so far as to quote Edward Snowden: “With each court victory, with every change in the law, we demonstrate facts are more convincing than fear. As a society, we rediscover that the value of the right is not in what it hides, but in what it protects.”
  • The full implications of the Zakharov decision remain to be seen. However, it is likely we will not have to wait long to know whether the Grand Chamber intends to see the demise of bulk collection schemes; the three UK cases (Big Brother Watch & Ors v. United Kingdom, Bureau of Investigative Journalism & Alice Ross v. United Kingdom, and 10 Human Rights Organisations v. United Kingdom) pending before the Court have been fast-tracked, indicating the Court’s willingness to continue to confront the compliance of bulk collection schemes with human rights law. It is my hope that the approach in Zakharov hints at the Court’s conviction that bulk collection schemes lie beyond the bounds of permissible State surveillance.
Gary Edwards

THE TRUTH ABOUT SPYING: The Feds Are Intercepting Your Internet Data And Tech Giants Kn... - 0 views

  • Last year James Bamford of Wired — who wrote the book "The Shadow Factory: The NSA from 9/11 to the Eavesdropping on America" — reported that the NSA hired secretive companies linked to Israeli intelligence to establish 10 to 20 wiretapping rooms at key Internet Service Provider (ISP) telecommunication points throughout the country.
  • In 2004 AT&T engineer Mark Klein discovered that a special NSA network actively "vacuumed up Internet and phone-call data from ordinary Americans with the cooperation of AT&T," emphasizing that "much of the data sent through AT&T to the NSA was purely domestic."
  • Glenn Greenwald revealed that the National Security Agency (NSA) is secretly using the so-called "business records" provision of the Patriot Act to collect telephone records of millions of Americans from Verizon. Greenwald noted that "previous reporting has suggested the NSA has collected cell records from all major mobile networks," which was best illustrated by this ACLU infographic graphic illustrating how the NSA intercepts more than a billion electronic records and communications every day.
  • ...4 more annotations...
  • NSA whistleblowers William Binney and Thomas Drake corroborated Klein's assertions: Binney contends that the NSA analyzes the information "to be able to monitor what people are doing" and who they are doing it with while Drake maintains that the NSA is using Israeli-made NARUS hardware to "seize and save all personal electronic communications."
  • Eric Lichtblau and James Risen of the New York Times won a Pulitzer-Prize for this 2005 story: As part of the program approved by President Bush for domestic surveillance without warrants, the N.S.A. has gained the cooperation of American telecommunications companies to obtain backdoor access to streams of domestic and international communications, the officials said.
  • in January Google released a transparency report detailing the government's use of controversial legislation that bypasses judicial approval to access the online information of private citizens.
  • Given the fact that the CIA's recently visited tech conference to detail the Agency's vision for collecting and analyzing all of the information people put on the Internet, it would be naïve to think that American tech giants hasn't know that all their data belongs to NSA.
  •  
    Timeline for reports and whistleblower information going public about NSA world wide dragnet of information and communications.  Note that the official timeline the NSA slides depict the start of the Internet dragnet as late 2007, when the Bush Administration wrangled Microsoft as a source.  The whistleblower timeline starts in 2001 and is rolling worldwide by 2004.
Paul Merrell

UN confirms Syria chemical use, US rues rebel setbacks - Yahoo News - 0 views

  • Damascus (AFP) - A UN report has concluded chemical weapons were used at least five times before Syria agreed to dismantle its arsenal, as Washington called setbacks for moderate rebels a "big problem."A major winter storm has meanwhile brought severe weather to the war-ravaged country, delaying a UN aid airlift and compounding the misery of Syrians holed up in besieged towns and refugees sheltering in tents across the border in Lebanon.The UN report released late Thursday cites "credible evidence" and "evidence consistent with the probable use of chemical weapons" at Ghouta, Khan al-Asal, Jubar, Saraqeb and Ashrafieh Sahnaya.
  • A former US Central Intelligence Agency chief meanwhile said a victory for Assad could be the best outcome to avoid a regional conflagration.Michael Hayden, who headed the CIA until 2009, saw three possible outcomes -- a continuation of the civil war pitting ever more extreme Sunni and Shiite factions against one another, the "dissolution" of Syria or a victory by Assad. View gallery Syrian children stand in the snow in a refugee camp in the town of Arsal, in the Lebanese Bekaa vall … "As ugly as it sounds, I'm kind of trending toward option three as the best out of three very, very ugly possible outcomes," Hayden told a conference of terror experts.
  •  
    The U.N. report, as expected, does not accuse either side of the sarin gas attack. But a further sign of a U.S. foreign policy change from former CIA head Michael Hayden, who says he's leaning toward an Assad victory as the best outcome of the Syrian War.
1 - 7 of 7
Showing 20 items per page