Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged FBI-Gate

Rss Feed Group items tagged

Paul Merrell

On the Criminal Referral of Comey, Clinton et al: Will the Constitution Hold and the Me... - 0 views

  • Wednesday’s criminal referral by 11 House Republicans of former Secretary of State Hillary Clinton as well as several former and serving top FBI and Department of Justice (DOJ) officials is a giant step toward a Constitutional crisis. Named in the referral to the DOJ for possible violations of federal law are: Clinton, former FBI Director James Comey; former Attorney General Loretta Lynch; former Acting FBI Director Andrew McCabe; FBI Agent Peter Strzok; FBI Counsel Lisa Page; and those DOJ and FBI personnel “connected to” work on the “Steele Dossier,” including former Acting Attorney General Sally Yates and former Acting Deputy Attorney General Dana Boente. With no attention from corporate media, the referral was sent to Attorney General Jeff Sessions, FBI Director Christopher Wray, and U.S. Attorney for the District of Utah John Huber.  Sessions appointed Huber months ago to assist DOJ Inspector General (IG) Michael Horowitz.
  • This is no law-school case-study exercise, no arcane disputation over the fine points of this or that law. Rather, as we say in the inner-city, “It has now hit the fan.”  Criminal referrals can lead to serious jail time.  Granted, the upper-crust luminaries criminally “referred” enjoy very powerful support.  And that will come especially from the mainstream media, which will find it hard to retool and switch from Russia-gate to the much more delicate and much less welcome “FBI-gate.” As of this writing, a full day has gone by since the
  • letter/referral was reported, with total silence so far from The New York Times and The Washington Post and other big media as they grapple with how to spin this major development. News of the criminal referral also slipped by Amy Goodman’s non-mainstream DemocracyNow!, as well as many alternative websites. The 11 House members chose to include the following egalitarian observation in the first paragraph of the letter conveying the criminal referral: “Because we believe that those in positions of high authority should be treated the same as every other American, we want to be sure that the potential violations of law outlined below are vetted appropriately.” If this uncommon attitude is allowed to prevail at DOJ, it would, in effect, revoke the de facto “David Petraeus exemption” for the be-riboned, be-medaled, and well-heeled.
  • ...1 more annotation...
  • I think it can be said that readers of Consortiumnews.com may be unusually well equipped to understand the anatomy of FBI-gate as well as Russia-gate.  Listed below chronologically are several links that might be viewed as a kind of “whiteboard” to refresh memories.  You may wish to refer them to any friends who may still be confused. 2017 Russia-gate’s Mythical ‘Heroes’ June 6, 2017 The Democratic Money Behind Russia-gate Oct. 29, 2017 The Foundering Russia-gate ‘Scandal’ Dec. 13, 2017  What Did Hillary Clinton Know? Dec. 25, 2017 2018 The FBI Hand Behind Russia-gate Jan. 11, 2018 Will Congress Face Down the Deep State? Jan. 30, 2018 Nunes Memo Reports Crimes at Top of FBI and DOJ Feb. 2, 2018 ‘This is Nuts’: Liberals Launch ‘Largest Mobilization in History’ in Defense of Russiagate Probe Feb. 9, 2018 Nunes: FBI and DOJ Perps Could Be Put on Trial Feb. 19, 2018 ‘Progressive’ Journalists Jump the Shark on Russia-gate March 7, 2018 Intel Committee Rejects Basic Underpinning of Russiagate March 14, 2018 McCabe: A War on (or in) the FBI? March 18, 2018 Former CIA Chief Brennan Running Scared March 19, 2018
Paul Merrell

How the FBI Created a Terrorist - The Intercept - 0 views

  • Informant-led sting operations are central to the FBI’s counterterrorism program. Of 508 defendants prosecuted in federal terrorism-related cases in the decade after 9/11, 243 were involved with an FBI informant, while 158 were the targets of sting operations. Of those cases, an informant or FBI undercover operative led 49 defendants in their terrorism plots, similar to the way Osmakac was led in his. In these cases, the FBI says paid informants and undercover agents are foiling attacks before they occur. But the evidence suggests — and a recent Human Rights Watch report on the subject illustrates — that the FBI isn’t always nabbing would-be terrorists so much as setting up mentally ill or economically desperate people to commit crimes they could never have accomplished on their own.
  • At least in Osmakac’s case, FBI agents seem to agree with that criticism, though they never intended for that admission to become public. In the Osmakac sting, the undercover FBI agent went by the pseudonym “Amir Jones.” He’s the guy behind the camera in Osmakac’s martyrdom video. Amir, posing as a dealer who could provide weapons, wore a hidden recording device throughout the sting. The device picked up conversations, including, apparently, back at the FBI’s Tampa Field Office, a gated compound beneath the flight path of Tampa International Airport, among agents and employees who assumed their words were private and protected. These unintentional recordings offer an exclusive look inside an FBI counterterrorism sting, and suggest that, even in the eyes of the FBI agents involved, these sting targets aren’t always the threatening figures they are made out to be.
  • OW OSMAKAC CAME to the attention of law enforcement in the first place is still unclear. In a December 2012 Senate floor speech, Dianne Feinstein, chairwoman of the Senate Intelligence Committee, cited Osmakac’s case as one of nine that demonstrated the effectiveness of surveillance under the FISA Amendments Act. Senate legal counsel later walked back those comments, saying they were misconstrued. Osmakac is among terrorism defendants who were subjected to some sort of FISA surveillance, according to court records, but whether he was under individual surveillance or identified through bulk collection is unknown. Discovery material referenced in a defense motion included a surveillance log coversheet with the description, “CT-GLOBAL EXTREMIST INSPIRED.” If he first came onto the FBI’s radar as a result of eavesdropping, then it’s plausible that as part of the sting, the FBI manufactured another explanation for his targeting. This is a long-running, if controversial process known as “parallel construction,” which has also been used by the U.S. Drug Enforcement Administration when drug offenders are identified through bulk collection and then prosecuted for drug crimes. In court records, the FBI maintained that Osmakac came to agents’ attention through Dabus. The informant reached out to the FBI after meeting Osmakac, and soon offered him a job at Java Village.
  •  
    A judge denied the defense access to FBI transcripts of conversations among agents on grounds that they would provide no assistance to the defense beyond what was available to the defense by discovery. He also entered a protective order barring their disclosure. The defendant was found guilty and sentenced to 40 years in prison.  But the FBI transcripts were leaked to The Intercept, apparently by someone inside the Dept. of Justice or the judicial system, since the defense never was provided with them. The transcripts along with evidence from the case and gathered through interviews provide a chilling look into the methods the FBI uses to manufacture "terrorists" for prosecution and conviction (in this case victimizing a young Muslim American with a severe mental illness), obviously only for propaganda and to justify its counter-terrorism budget. This is an area that needs Congressional attention. The courts' protections from entrapment are far too lax, particularly when members of a particular religion are being targeted for political reasons and anti-Muslim hysteria is sweeping the land. The government should not be permitted to manufacture criminals.
Paul Merrell

The Still-Missing Evidence of Russia-gate - Consortiumnews - 0 views

  • A changing-places moment brought about by Russia-gate is that liberals who are usually more skeptical of U.S. intelligence agencies, especially their evidence-free claims, now question the patriotism of Americans who insist that the intelligence community supply proof to support the dangerous claims about Russian ‘hacking” of Democratic emails especially when some  veteran U.S. government experts say the data would be easily available if the Russians indeed were guilty. One of those experts is William Binney, a former high-level National Security Agency intelligence official who, after his 2001 retirement, blew the whistle on the extraordinary breadth of NSA surveillance programs. His outspoken criticism of the NSA during the George W. Bush administration made him the subject of FBI investigations that included a raid on his home in 2007. Even before Edward Snowden’s NSA whistleblowing, Binney publicly revealed that NSA had access to telecommunications companies’ domestic and international billing records, and that since 9/11 the agency has intercepted some 15 trillion to 20 trillion communications. Snowden has said: “I have tremendous respect for Binney, who did everything he could according to the rules.”
  • I spoke to Binney on Dec. 28 about Russia-gate and a host of topics having to do with spying and America’s expanding national security state.
  • Bernstein: Your expertise was in the Soviet Union and so you must know a lot about bugging.  Do you believe that Russia hacked and undermined our last election?  Can Trump thank Russia for the result? Binney:  We at Veteran Intelligence Professionals for Sanity (VIPS) published an article on this in July.  First of all, if any of the data went anywhere across the fiber optic world, the NSA would know.  Just inside the United States, the NSA has over a hundred tap points on the fiber lines, taking in everything.    Mark Klein exposed some of this at the AT&T facility in San Francisco. This is not for foreigners, by the way, this is for targeting US citizens.  If they wanted only foreigners, all they would have to do was look at the transatlantic cables where they surface on the coast of the United States.  But they are not there, they are distributed among the US population. Bernstein: So if, in fact, the Russians were tapping into DNC headquarters, the NSA would absolutely know about it. Binney: Yes, and they would also have trace routes on where they went specifically, in Russia or anywhere else.  If you remember, about three or four years ago, the Chinese hacked into somewhere in the United States and our government came out and confirmed that it was the Chinese who did it, and it came from a specific military facility in Shanghai.  The NSA had these trace route programs embedded by the hundreds across the US and all around the world.
  • ...3 more annotations...
  • The other data that came out from Guccifer 2.0, a download from the DNC, has been a charade.  It was a download and not a transfer across the Web.  The Web won’t manage such a high speed.  It could not have gotten across the Atlantic at that high speed.  You would have to have high capacity lines dedicated to that in order to do it. They have been playing games with us.  There is no factual evidence to back up any charge of hacking here. Bernstein: So was this a leak by somebody at Democratic headquarters? Binney: We don’t know that for sure, either.  All we know was that it was a local download.  We can likely attribute it to a USB device that was physically passed along.
  • Right now, our government is violating the first, fourth and fifth amendments in various ways.  Mueller did it, Comey did it, they were all involved in violating the Constitution.
  • Bernstein:  There seems to be a new McCarthyite operation around the Russia-gate investigation.  It appears that it is an attempt to justify the idea that Clinton lost because the Russians undermined the election. Binney: I have seen no evidence at all from anybody, including the intelligence community.  If you look at the Intelligence Community Assessment (ICA) report, they state on the first page that “We have high confidence that the Russians did this.”  But when you get toward the end of the report, they basically confess that “our judgment does not imply that we have evidence to back it up.” Bernstein:  It was initially put out that seventeen intelligence agencies found compelling evidence that the Russians hacked into our election.  You’re saying it was actually selected individuals from just three agencies.  Is there anything to the revelations that FBI agents talked about taking action to prevent Trump from becoming president? Binney: It certainly does seem that it is leaning that way, that is was all a frame-up.  It is a sad time in our history, to see the government working against itself internally. Bernstein:  I take it you are not a big supporter of Trump. Binney:  Well, I voted for him.  I couldn’t vote for a warmonger like Clinton.  She wanted to see our planes shooting down Russian planes in Syria.  She advocated for destabilizing Libya, for getting rid of Assad in Syria, she was a strong backer of the war in Iraq.
Gary Edwards

Multiple Agencies Involved with IRS in Intimidation - 0 views

  •  
    Tea party groups' allegations that the IRS has long been targeting them for their political beliefs were recently confirmed by an apology from the IRS. The scandal gained traction as congressional leaders began efforts to hold the IRS accountable and understand the depths of the federal government's politically-motivated abuses of power. True the Vote, a Houston-based nonprofit which focuses on election integrity issues, was formed by Catherine Engelbrecht and her King Street Patriots Tea Party group. True the Vote applied to the IRS for their 501(c3) non-profit status in July 2010, and almost immediately their problems began.  Within two years, multiple federal agencies, along with an EPA-affiliated Texas state agency, began auditing True the Vote and its founders, visiting their group, their businesses, and asking questions of people who knew them. The IRS was not the only governmental agency involved.  "Engelbrecht's application with the IRS for non-profit status allegedly triggered aggressive audits of one of her family's personal businesses as well. The FBI (Federal Bureau of Investigation) began a series of inquiries about her and her group; the BATF (Bureau of Alcohol Tobacco and Firearms) began demanding to see her family's firearms in surprise audits of her and her husband's small gun dealership--which had done less than $200 in sales; OSHA (Occupational Safety Hazards Administration) began a surprise audit of their small family manufacturing business; and the EPA-affiliated TCEQ (Texas Commission on Environment Quality) did a surprise visit and audit due to "a complaint being called in."  The Democratic Party of Texas filed a lawsuit against her, as did an ACORN affiliated group. Both the FBI and the BATF continued to poke around her life, the lives of people in her Tea Party group, and her businesses."
Paul Merrell

FBI Chief Under Fire Again With Justice Department Probe - Bloomberg - 0 views

  • New questions were raised Thursday about whether FBI Director James Comey will be able to keep his job after the Justice Department’s internal watchdog opened an investigation into his handling of Hillary Clinton’s use of a private e-mail server.The investigation by the department’s inspector general will examine whether the Federal Bureau of Investigation failed to follow appropriate procedures and improperly released information about the Clinton probe -- renewing scrutiny of one of the most contested developments of the 2016 election campaign.
Paul Merrell

Explosive Saudi 9/11 Evidence Still Ignored By Media - WhoWhatWhy - 0 views

  • The Times goes on to say that Moussaoui’s testimony, if found to be factually accurate, could change our understanding of Saudi Arabia and its relationship to 9/11: [T]he extent and nature of Saudi involvement in Al Qaeda, and whether it extended to the planning and financing of the Sept. 11 attacks, has long been a subject of dispute. *** That may be so, but the Times, like the rest of the traditional media, has ignored earlier evidence of deep Saudi royal ties to the 9/11 attacks—evidence that isn’t dependent on a man whose sanity has been questioned. Back in 2011, a small non-profit news outfit in South Florida, the Broward Bulldog, which does primarily local stories, published an article that also appeared in a major traditional newspaper, the Miami Herald. Despite the story’s explosive content, it was widely ignored.
  • That article revealed that a well-heeled Saudi family, living in a gated community in Sarasota, Florida, had direct connections to the hijackers. Phone records documented communication, dating back more than a year, between this Saudi family and the alleged plot leader, Mohammed Atta, his hijack pilots and 11 of the other hijackers. In addition, records from the guard house at the gated community showed Atta and other hijackers had visited the house.
  • The family left the country abruptly just before the 9/11 attacks. Family members abandoned enough valuable possessions—such as three cars—to testify to the speed of their departure. The article also revealed that the FBI had quietly investigated the family and documented numerous interactions between them and the alleged hijackers. They, however, neglected to tell Congressional investigators and the evidence didn’t appear in the 9/11 Commission Report. You might think these revelations would attract widespread attention, considering that 15 of the 19 purported hijackers were Saudi citizens. Yet the Bulldog story generated barely a blip.
  • ...3 more annotations...
  • Next, our small non-profit news outfit, WhoWhatWhy, which covers primarily international and national investigative stories, took the reporting to another level. Our story established that the owner of the house, Esam Ghazzawi, was a direct lieutenant to a powerful member of the Saudi royal family who’d learned to fly in Florida years earlier. Ghazzawi was director of the UK division of EIRAD Trading and Contracting Co. Ltd., which among other things, holds the Saudi franchise for many multinational brands including UPS. Ghazzawi’s boss, the chairman of EIRAD Holding Co. Ltd., is Prince Sultan bin Salman bin Abdul Aziz Al-Saud.
  • A fighter pilot who also flew on a Space Shuttle mission, Prince Sultan is the son of the new Saudi king, Salman. WhoWhatWhy’s reporting raised serious questions about whether high-ranking Saudis were directly involved with the 9/11 operation, and whether the U.S. government covered up what it knew. WhoWhatWhy paid a major news distribution outfit to send our story to thousands of news outlets, major and minor, in the United States. Again, the silence was deafening. *** The debate about Moussaoui’s newly released testimony centers on whether he can be trusted. But there is no debate about the Sarasota evidence we uncovered. We’re still waiting for the Times, along with the rest of the mainstream media, to acknowledge that material. Whatever happened in Florida, whatever the veracity of Moussaoui’s claims, anyone with an open mind will smell enough smoke to wonder whose interests are being served by pretending there’s no fire in the Saudi-9/11 connection.
  • For more on the Bush family’s relationship to the Saudi royal family, see Russ Baker’s book, Family of Secrets.
Paul Merrell

FBI 'Lovers' New Texts Expose Obama Complicity: He "Wants To Know Everything We're Doin... - 0 views

  • The messages include an exchange about preparing talking points for then-FBI Director James Comey to give to President Obama, who wanted “to know everything we’re doing.”
  •  
    At the time, Strzok and Page were near the top of the command chain on both investigations into Hillary's use of a private email server and into the alleged Russian "collusion." BTW, I am reserving judgment on whether Page and Strzok actually were lovers. So far there's no lovers' language in their text messages that have been released.
Paul Merrell

For sale: Systems that can secretly track where cellphone users go around the globe - T... - 0 views

  • Makers of surveillance systems are offering governments across the world the ability to track the movements of almost anybody who carries a cellphone, whether they are blocks away or on another continent. The technology works by exploiting an essential fact of all cellular networks: They must keep detailed, up-to-the-minute records on the locations of their customers to deliver calls and other services to them. Surveillance systems are secretly collecting these records to map people’s travels over days, weeks or longer, according to company marketing documents and experts in surveillance technology.
  • The world’s most powerful intelligence services, such as the National Security Agency and Britain’s GCHQ, long have used cellphone data to track targets around the globe. But experts say these new systems allow less technically advanced governments to track people in any nation — including the United States — with relative ease and precision.
  • It is unclear which governments have acquired these tracking systems, but one industry official, speaking on the condition of anonymity to share sensitive trade information, said that dozens of countries have bought or leased such technology in recent years. This rapid spread underscores how the burgeoning, multibillion-dollar surveillance industry makes advanced spying technology available worldwide. “Any tin-pot dictator with enough money to buy the system could spy on people anywhere in the world,” said Eric King, deputy director of Privacy International, a London-based activist group that warns about the abuse of surveillance technology. “This is a huge problem.”
  • ...9 more annotations...
  • Yet marketing documents obtained by The Washington Post show that companies are offering powerful systems that are designed to evade detection while plotting movements of surveillance targets on computerized maps. The documents claim system success rates of more than 70 percent. A 24-page marketing brochure for SkyLock, a cellular tracking system sold by Verint, a maker of analytics systems based in Melville, N.Y., carries the subtitle “Locate. Track. Manipulate.” The document, dated January 2013 and labeled “Commercially Confidential,” says the system offers government agencies “a cost-effective, new approach to obtaining global location information concerning known targets.”
  • tracking systems that access carrier location databases are unusual in their ability to allow virtually any government to track people across borders, with any type of cellular phone, across a wide range of carriers — without the carriers even knowing. These systems also can be used in tandem with other technologies that, when the general location of a person is already known, can intercept calls and Internet traffic, activate microphones, and access contact lists, photos and other documents. Companies that make and sell surveillance technology seek to limit public information about their systems’ capabilities and client lists, typically marketing their technology directly to law enforcement and intelligence services through international conferences that are closed to journalists and other members of the public.
  • Security experts say hackers, sophisticated criminal gangs and nations under sanctions also could use this tracking technology, which operates in a legal gray area. It is illegal in many countries to track people without their consent or a court order, but there is no clear international legal standard for secretly tracking people in other countries, nor is there a global entity with the authority to police potential abuses.
  • (Privacy International has collected several marketing brochures on cellular surveillance systems, including one that refers briefly to SkyLock, and posted them on its Web site. The 24-page SkyLock brochure and other material was independently provided to The Post by people concerned that such systems are being abused.)
  • Verint, which also has substantial operations in Israel, declined to comment for this story. It says in the marketing brochure that it does not use SkyLock against U.S. or Israeli phones, which could violate national laws. But several similar systems, marketed in recent years by companies based in Switzerland, Ukraine and elsewhere, likely are free of such limitations.
  • The tracking technology takes advantage of the lax security of SS7, a global network that cellular carriers use to communicate with one another when directing calls, texts and Internet data. The system was built decades ago, when only a few large carriers controlled the bulk of global phone traffic. Now thousands of companies use SS7 to provide services to billions of phones and other mobile devices, security experts say. All of these companies have access to the network and can send queries to other companies on the SS7 system, making the entire network more vulnerable to exploitation. Any one of these companies could share its access with others, including makers of surveillance systems.
  • Companies that market SS7 tracking systems recommend using them in tandem with “IMSI catchers,” increasingly common surveillance devices that use cellular signals collected directly from the air to intercept calls and Internet traffic, send fake texts, install spyware on a phone, and determine precise locations. IMSI catchers — also known by one popular trade name, StingRay — can home in on somebody a mile or two away but are useless if a target’s general location is not known. SS7 tracking systems solve that problem by locating the general area of a target so that IMSI catchers can be deployed effectively. (The term “IMSI” refers to a unique identifying code on a cellular phone.)
  • Verint can install SkyLock on the networks of cellular carriers if they are cooperative — something that telecommunications experts say is common in countries where carriers have close relationships with their national governments. Verint also has its own “worldwide SS7 hubs” that “are spread in various locations around the world,” says the brochure. It does not list prices for the services, though it says that Verint charges more for the ability to track targets in many far-flung countries, as opposed to only a few nearby ones. Among the most appealing features of the system, the brochure says, is its ability to sidestep the cellular operators that sometimes protect their users’ personal information by refusing government requests or insisting on formal court orders before releasing information.
  • Another company, Defentek, markets a similar system called Infiltrator Global Real-Time Tracking System on its Web site, claiming to “locate and track any phone number in the world.” The site adds: “It is a strategic solution that infiltrates and is undetected and unknown by the network, carrier, or the target.”
  •  
    The Verint company has very close ties to the Iraeli government. Its former parent company Comverse, was heavily subsidized by Israel and the bulk of its manufacturing and code development was done in Israel. See https://en.wikipedia.org/wiki/Comverse_Technology "In December 2001, a Fox News report raised the concern that wiretapping equipment provided by Comverse Infosys to the U.S. government for electronic eavesdropping may have been vulnerable, as these systems allegedly had a back door through which the wiretaps could be intercepted by unauthorized parties.[55] Fox News reporter Carl Cameron said there was no reason to believe the Israeli government was implicated, but that "a classified top-secret investigation is underway".[55] A March 2002 story by Le Monde recapped the Fox report and concluded: "Comverse is suspected of having introduced into its systems of the 'catch gates' in order to 'intercept, record and store' these wire-taps. This hardware would render the 'listener' himself 'listened to'."[56] Fox News did not pursue the allegations, and in the years since, there have been no legal or commercial actions of any type taken against Comverse by the FBI or any other branch of the US Government related to data access and security issues. While no real evidence has been presented against Comverse or Verint, the allegations have become a favorite topic of conspiracy theorists.[57] By 2005, the company had $959 million in sales and employed over 5,000 people, of whom about half were located in Israel.[16]" Verint is also the company that got the Dept. of Homeland Security contract to provide and install an electronic and video surveillance system across the entire U.S. border with Mexico.  One need not be much of a conspiracy theorist to have concerns about Verint's likely interactions and data sharing with the NSA and its Israeli equivalent, Unit 8200. 
Paul Merrell

Under Intense Pressure to Silence Wikileaks, Secretary of State Hillary Clinton Propose... - 0 views

  • Clinton’s State Department was getting pressure from President Obama and his White House inner circle, as well as heads of state internationally, to try and cutoff Assange’s delivery of the cables and if that effort failed, then to forge a strategy to minimize the administration’s public embarrassment over the contents of the cables. Hence, Clinton’s early morning November meeting of State’s top brass who floated various proposals to stop, slow or spin the Wikileaks contamination. That is when a frustrated Clinton, sources said, at some point blurted out a controversial query. “Can’t we just drone this guy?” Clinton openly inquired, offering a simple remedy to silence Assange and smother Wikileaks via a planned military drone strike, according to State Department sources. The statement drew laughter from the room which quickly died off when the Secretary kept talking in a terse manner, sources said. Clinton said Assange, after all, was a relatively soft target, “walking around” freely and thumbing his nose without any fear of reprisals from the United States. Clinton was upset about Assange’s previous 2010 records releases, divulging secret U.S. documents about the war in Afghanistan in July and the war in Iraq just a month earlier in October, sources said. At that time in 2010, Assange was relatively free and not living cloistered in in the embassy of Ecuador in London. Prior to 2010, Assange focused Wikileaks’ efforts on countries outside the United States but now under Clinton and Obama, Assange was hammering America with an unparalleled third sweeping Wikileaks document dump in five months. Clinton was fuming, sources said, as each State Department cable dispatched during the Obama administration was signed by her.
  • Following Clinton’s alleged drone proposal, another controversial remedy was floated in the State Department to place a reward or bounty for Assange’s capture and extradition to the United States, sources said. Numbers were discussed in the realm of a $10 million bounty. A State Department source described that staff meeting as bizarre. One minute staffers were inquiring about the Secretary’s blue and black checkered knit sweater and the next minute, the room was discussing the legalities of a drone strike on Assange and financial bounties, sources said. Immediately following the conclusion of the wild brainstorming session, one of Clinton’s top aides, State Department Director of Policy Planning Ann-Marie Slaughter, penned an email to Clinton, Chief of Staff Cheryl Mills, and aides Huma Abebin and Jacob Sullivan at 10:29 a.m. entitled “an SP memo on possible legal and nonlegal strategies re Wikileaks.” “Nonlegal strategies.” How did that phrasing make it into an official State Department email subject line dealing with solving Wikileaks and Assange? Why would the secretary of state and her inner circle be discussing any “nonlegal strategies” for anything whatsoever? Against anyone? Shouldn’t all the strategies discussed by the country’s top diplomat be strictly legal only? And is the email a smoking gun to confirm Clinton was actually serious about pursuing an obvious “nonlegal strategy” proposal to allegedly assassinate Assange? Numerous attempts were made to try and interview and decipher Slaughter’s choice of email wording, however, she could not be reached for comment.
  • Slaughter’s cryptic email also contained an attached document called “SP Wikileaks doc final11.23.10.docx.” That attachment portion of Slaughter’s “nonlegal strategies” email has yet to be recovered by federal investigators and House committee investigators probing Clinton’s email practices while at State. Even Wikileaks does not have the document. Slaughter, however, shed some light on the attachment: “The result is the attached memo, which has one interesting legal approach and I think some very good suggestions about how to handle our public diplomacy.” But did it also include details on the “nonlegal strategies” teased in the subject line? Sources confirm Clinton took the email and attachment with her to the White House for an afternoon meeting with Secretary of Defense Bob Gates and National Security Advisor Tom Donilon prior to an additional evening meeting at the White House. President Obama, sources said, did not attend the early meeting with Gates as he was traveling with Vice President Joe Biden. President Obama did attend the second meeting, however, and Wikileaks and Assange’s planned release of secret cables were discussed at length, sources said. Attending this meeting were President Obama, Clinton, Gates, Donilon, Director of National Intelligence James Clapper, Deputy Secretary of State James Steinberg, Under Secretary of Defense for Policy Michele Flournoy, Chairman of the Joint Chiefs of Staff Admiral “Mike” Mullen, Vice Chairman of the Joint Chiefs of Staff Gen. James Cartwright as well as a half dozen or more various policy aides, sources confirmed. Did Clinton also share her alleged morning query of droning Assange with the members of the National Security Council and the President? Was it discussed among the top secret subjects in the meeting? Or was Clinton planning to conduct or hatch her own secret foreign policy in defiance of the President, a likely violation of the Logan Act?
  • ...3 more annotations...
  • The FBI’s 302 report from Clinton’s email investigation interview, again, specified that Clinton had “many discussions” related to “nominating” drone strikes on individuals: “Clinton could not recall a specific process for nominating a target for a drone strike and recalled much debate pertaining to the concurrence process. Clinton knew there was a role for DOD, State and the CIA but could not provide specifics as to what it was. Due to a disagreement between these agencies, Clinton recalled having many discussions related to nominating an individual for a drone strike. When Clinton exchanged classified information pertaining to the drone program internally at State, it was in her office or on a secure call. When Clinton exchanged classified information pertaining to the drone program externally it was at the White House. Clinton never had a concern with how classified information pertaining to the drone program was handled.” Sources said Clinton’s comments on neutralizing Assange fits a pattern of callousness when combined with the FBI testimony that she often considered droning individuals and then coupled with her reaction to Libyan leader Moammar Gaddafi’s death in Oct. 2011.
  • Unable to legally counter or stop Wikileaks, and likely abandoning any and all legal and “nonlegal strategies,” Clinton and her staff were forced to weather the collateral damage of CableGate. In fact, just five days after Clinton’s meetings on Mahogany Row in the State Department and the White House, Wikileaks began releasing cables to news outlets globally on Sunday November 28, 2010. Shortly after CableGate, the WikiLeaks founder sought refuge from authorities and threats by hiding at the Ecuadorian Embassy in London. Now 45, Assange is in his fifth year living quarantined inside the embassy. Clinton remains the Democratic nominee for the presidency of the United States.
  • Perhaps Democratic political operative Bob Beckel wasn’t a party outlier during this controversial Fox broadcast. Likely, Beckel was projecting what others, including Clinton, had already privately proposed.
Gary Edwards

Secret White House Email Accounts Uncover IRS-Obama Smoking Gun : palookavillepost.com - 0 views

  • During an investigation of President Barack Hussein Obama’s political appointees and White House aides, FBI agents discovered secret government email accounts they say were used as primary means for Obama’s staff to interact with IRS officials for day-to-day business.
  • Investigators became curious about the possibility of such accounts after Congress requested all emails from the White House regarding the Benghazi, IRS and other scandals, and the White House could only produce a handful of emails that discussed those topics.
  • “We had one of our hackers get into a White House intern’s computer, and that’s where we located a slew of private email accounts not associated with Federal government accounts,” said a spokesman for the powerful federal police agency.
  • ...6 more annotations...
  • “The content of the emails is still being reviewed, but it is clear that people inside the White House knew about the IRS targeting conservatives, and that somebody with the nickname “Basketball Jones” was the person who told American forces to stand down during the attacks in Benghazi.”
  • Emails sent to people outside of the secret network of White House email accounts were programmed to automatically be deleted five minutes after opening the message, just like on Mission Impossible. This explains the absence of White House emails received by IRS officials.
  • “The White House tried to cover their tracks by saying that former IRS Commissioner Douglas Shulman visited the White House 157 times, and that they never used email to communicate,” said the FBI spokesman.
  • Only a few of the emails have been reviewed, but already several of them indicate that President Obama not only knew about the scheme, but he himself ordered the IRS to flood the Tea Party with paperwork and fees.
  • Here is one transcript of a hidden email from an unknown White House aide in April, 2011:
  • “Hey Shulman… What’s up?… Don’t forget BJ(Basketball Jones) wants you to kick up the fees on anyone with Tea Party or Conservative in their names… try to see if you can make them hire expensive tax attorneys too… bog them down with paperwork so they can’t campaign for milk boy(Mitt Romney) or Ru Paul(Ron Paul)… sorry you missed the Easter Egg Hunt… maybe next year… I’d invite you to stay in the Lincoln bedroom but that costs real money… send me a report on how many Tea Party groups quit because of being jerked around…ASAP… Chow!”
  •  
    Although this article has zero credibility and even less reference checking, everyone in America knows that Obama ordered the IRS hit on Tea Party Patriots, Conservatives and Jewish Homeland organizations.  That the IRS admits to violating the Constitutional civil rights of tens of millions of law abviding Americans, and did so in ways that only benefit the Obama re-election campaign is proof enough for anyone who loves liberty.
Paul Merrell

Andrew McCabe, a Symbol of Trump's F.B.I. Ire, Faces Possible Firing - The New York Times - 0 views

  • Attorney General Jeff Sessions is reviewing a recommendation to fire the former F.B.I. deputy director, Andrew G. McCabe, just days before he is scheduled to retire on Sunday, people briefed on the matter said. Mr. McCabe was a frequent target of attack from President Trump, who taunted him both publicly and privately.Mr. McCabe is ensnared in an internal review that includes an examination of his decision in 2016 to allow F.B.I. officials to speak with reporters about an investigation into the Clinton Foundation. The Justice Department’s inspector general concluded that Mr. McCabe was not forthcoming during the review, according to the people briefed on the matter. That yet-to-be-released report triggered an F.B.I. disciplinary process that recommended his termination — leaving Mr. Sessions to either accept or reverse that decision.Lack of candor is a fireable offense, but like so much at the F.B.I., Mr. McCabe’s fate is also entangled in presidential politics and the special counsel investigation. He was involved from the beginning in the investigation into the Trump campaign’s ties to Russia. He is also a potential witness in the inquiry into whether Mr. Trump tried to obstruct justice.
Paul Merrell

MoA - Gas From Israel And The Flynn Wiretapping - Behind The Deep-State Infighting Over... - 0 views

  • What is really behind the deep-state infighting over the U.S. elections and the "wire tapping" of the Trump campaign? Why was the CIA-Neocon axis vehemently lobbying against Trump? What foreign interests and what money is involved in this? Answers to these questions are now emerging. The former director of the CIA under Clinton, James Woolsey, went to the Wall Street Journal and offered some information (likely some true and some false) on the retired General Flynn and the lobbying businesses he was involved in. Woolsey is an arch-neoconservative. He had worked on the transition team of Trump but got fired over "growing tensions over Trump’s vision for intelligence agencies." Flynn is the former National Security Advisor of Trump who later also got fired. Woolsey was a board member of Flynn's former lobbying company FIG. Woolsey claims: In September 2016 he took part in a meeting between Flynn and high level Turkish officials, including the Turkish foreign minister and the energy minister who is the son-in-law of the Turkish president Erdogan. During the meeting, Woolsey claims, a brainstorming took place over how the Turkish cult leader Fethullah Gülen could -probably by illegal means- be removed from the U.S. and handed over to Turkey. Gülen is accused by the Erdogan mafia of initiating a coup attempt against it. The U.S. claims officially that there is no evidence for such an accusation and that Gülen can therefore not be rendered to Turkey. Gülen is an old CIA asset that helped the U.S. deep state to control Turkey.  Erdogan divorced from the Gülen organization after it became useless for his neo-Ottoman project. Here is the WSJ report on the Woolsey claims and a video clip with parts of his WSJ interview. Woolsey also went on CNN where he repeated his WSJ story. Flynn was accused by the anti-Trump campaign to have worked for Russia. He had taken several $10,000 for speeches he gave in Moscow. He also, at times, had argued for better U.S. relations with Russia. But Flynn's pro-Russia stand was probably honest. (Or the bribes involved were just smaller than the ones paid by others.) The money he got on the speaker circus was rather small for a man in his position. Flynn's real corruption was on another issue. After having been fired from the Trump administration, Flynn retroactively filed under the Foreign Agent Registration Act (FARA). His lobbying firm had a contract over $530,000 to work for a company near to the Turkish president Erdogan: In its filing, Mr. Flynn’s firm said its work from August to November “could be construed to have principally benefited the Republic of Turkey.” The filing said his firm’s fee, $530,000, wasn’t paid by the government but by Inovo BV, a Dutch firm owned by a Turkish businessman, Ekim Alptekin.
  • This lobbying, not the alleged Flynn-Putin relation, is the real scandal and part of the Trump/CIA/Clinton deep-state in-fighting. The meeting Woolsey described was under the "Turkish" Flynn contract. The Turkish business man, and owner of Inovo, Ekim Alptekin is a member of the Erdogan gang. But hidden at the very end of the WSJ story is the real key to understand the shady network: Inovo hired Mr. Flynn on behalf of an Israeli company seeking to export natural gas to Turkey, the filing said, and Mr. Alptekin wanted information on the U.S.-Turkey political climate to advise the gas company about its Turkish investments. It was the Israeli gas company, not the Alptekin outlet, that drove the issue. The Leviatan (and Tamar) gas fields in the Mediterranean along the Israeli coast are a huge energy and profit resource IF the gas from them can be exported to Europe. Several companies are involved in the exploration and all are looking for ways to connect the fields to the European gas network. There are (likely true) rumors that huge bribes have been payed in Israel, Jordan and elsewhere to win exploration contracts and to sell the gas. Negotiations between Israel and Turkey over the pipeline have been on and off. They depend on a positive climate towards Israel in the Turkish government which again depends on the often changing political position of the Erdogan gang.
  • The picture evolving here (lots of sleuthing and sources) is this: An Israeli company (or whoever is behind it) wants a gas pipeline to Turkey. It hires Flynn and Alptekin to arrange a positive climate for the Leviathan pipeline within the Turkish government. It offers Flynn more than half a million for a little (4-month long) influence work. His job is to create a "friendly atmosphere" for the deal by using his influence in the U.S. to accommodate Erdogan. A major point that is expected from Flynn is to arrange the handover of Gülen, by whatever means, from the U.S. to Erdogan. After accepting the (lobbying) bribe Flynn-the-whore suddenly changes his former anti-Turkish, pro-Russian, pro-Kurdish political position into a pro-Turkish, neutral-Russian and anti-Kurdish one. (His lobbying firm also makes some smaller payments related to the Clinton email-server scandal. This may be related to links between the Clinton family and the Gülen school empire.) He has a meeting with the Turkish government/Erdogan officials part of which is a discussion of a removal of Gülen to Turkey. He pens a pro Erdogan anti-Gülen op-ed which is published on the day of the election and he denigrates the Pentagon plan to work with the Kurds in Syria. The NSA, CIA and the FBI are listening to Flynn's conversations with Turkish and Israeli interests. (For the old and long history of such "wiretapping" of Turkish and Israeli connections and various dirty and criminal deals they revealed read and ask Sibel Edmonds.) The projects which Flynn is involved in, especially removing Gülen, are against the long term interests of the (neoconservative-driven) CIA. Selected tapes of his talks are transcribed and distributed within the anti-Trump campaign. This is the origin of the "wiretapping" of the Trump Tower the U.S. president lamented about. The stuff the CIA dug up about Flynn's dealing was and is used against Trump. Woolsey is caught up in this as he also worked for Flynn's lobbying firm. (His neocon-pro-Zionist history suggests that he is the senior Israeli watchdog over Flynn in all this.) He is now engaged in damage control and is "coming clean" and selectively leaking his anti-Flynn stuff to exculpate himself. (There is probably also some new, better deal involved that will pay off from him.) The Israeli-Turkish pipeline and the related deep-state fight are not the only issue involved in the campaign against Trump. There are also British interests and British intelligence involvement especially with the accusations against Russia of "hacking" of the DNC. If and how these fit in with above has not yet been revealed.
Paul Merrell

The Real Huma-gate Crime is the Muslim Brotherhood! - nsnbc international | nsnbc inter... - 0 views

  • The real crime revealed in the Hillary Clinton emails sent from her private server has been carefully covered up, at least until now. It is a criminal conspiracy–yes, a real conspiracy–to hide something from the American people and from the world. It’s so explosive that it could not only derail Clinton’s bizarre Presidential campaign. It is so dangerous to those implicated that an US Attorney General and a Director of the FBI covered it up at risk of career. It could likely lead to impeachment charges against President Barack Obama for criminal complicity in heinous crimes against the United States. This is what’s being covered up.
  • The key person to examine is Huma Mahmood Abedin, Hillary’s ever-constant companion since she was Hillary’s aide in the scandal-ridden Bill Clinton White House beginning 1996. Today 40-year-old Huma Abedin is Presidential candidate Hillary’s Vice Campaign Manager.
Paul Merrell

Shady Companies With Ties to Israel Wiretap the U.S. for the NSA | Threat Level | Wired... - 0 views

  • In addition to constructing the Stellar Wind center, and then running the operation, secretive contractors with questionable histories and little oversight were also used to do the actual bugging of the entire U.S. telecommunications network. According to a former Verizon employee briefed on the program, Verint, owned by Comverse Technology, taps the communication lines at Verizon, which I first reported in my book The Shadow Factory in 2008. Verint did not return a call seeking comment, while Verizon said it does not comment on such matters. At AT&T the wiretapping rooms are powered by software and hardware from Narus, now owned by Boeing, a discovery made by AT&T whistleblower Mark Klein in 2004. Narus did not return a call seeking comment. What is especially troubling is that both companies have had extensive ties to Israel, as well as links to that country’s intelligence service, a country with a long and aggressive history of spying on the U.S.
  • In fact, according to Binney, the advanced analytical and data mining software the NSA had developed for both its worldwide and international eavesdropping operations was secretly passed to Israel by a mid-level employee, apparently with close connections to the country. The employee, a technical director in the Operations Directorate, “who was a very strong supporter of Israel,” said Binney, “gave, unbeknownst to us, he gave the software that we had, doing these fast rates, to the Israelis.” Because of his position, it was something Binney should have been alerted to, but wasn’t. “In addition to being the technical director,” he said, “I was the chair of the TAP, it’s the Technical Advisory Panel, the foreign relations council. We’re supposed to know what all these foreign countries, technically what they’re doing…. They didn’t do this that way, it was under the table.” After discovering the secret transfer of the technology, Binney argued that the agency simply pass it to them officially, and in that way get something in return, such as access to communications terminals. “So we gave it to them for switches,” he said. “For access.”
  • But Binney now suspects that Israeli intelligence in turn passed the technology on to Israeli companies who operate in countries around the world, including the U.S. In return, the companies could act as extensions of Israeli intelligence and pass critical military, economic and diplomatic information back to them. “And then five years later, four or five years later, you see a Narus device,” he said. “I think there’s a connection there, we don’t know for sure.” Narus was formed in Israel in November 1997 by six Israelis with much of its money coming from Walden Israel, an Israeli venture capital company. Its founder and former chairman, Ori Cohen, once told Israel’s Fortune Magazine that his partners have done technology work for Israeli intelligence. And among the five founders was Stanislav Khirman, a husky, bearded Russian who had previously worked for Elta Systems, Inc. A division of Israel Aerospace Industries, Ltd., Elta specializes in developing advanced eavesdropping systems for Israeli defense and intelligence organizations. At Narus, Khirman became the chief technology officer.
  • ...4 more annotations...
  • A few years ago, Narus boasted that it is “known for its ability to capture and collect data from the largest networks around the world.” The company says its equipment is capable of “providing unparalleled monitoring and intercept capabilities to service providers and government organizations around the world” and that “Anything that comes through [an Internet protocol network], we can record. We can reconstruct all of their e-mails, along with attachments, see what Web pages they clicked on, we can reconstruct their [Voice over Internet Protocol] calls.” Like Narus, Verint was founded by in Israel by Israelis, including Jacob “Kobi” Alexander, a former Israeli intelligence officer. Some 800 employees work for Verint, including 350 who are based in Israel, primarily working in research and development and operations, according to the Jerusalem Post. Among its products is STAR-GATE, which according to the company’s sales literature, lets “service providers … access communications on virtually any type of network, retain communication data for as long as required, and query and deliver content and data …” and was “[d]esigned to manage vast numbers of targets, concurrent sessions, call data records, and communications.”
  • In a rare and candid admission to Forbes, Retired Brig. Gen. Hanan Gefen, a former commander of the highly secret Unit 8200, Israel’s NSA, noted his former organization’s influence on Comverse, which owns Verint, as well as other Israeli companies that dominate the U.S. eavesdropping and surveillance market. “Take NICE, Comverse and Check Point for example, three of the largest high-tech companies, which were all directly influenced by 8200 technology,” said Gefen. “Check Point was founded by Unit alumni. Comverse’s main product, the Logger, is based on the Unit’s technology.”
  • According to a former chief of Unit 8200, both the veterans of the group and much of the high-tech intelligence equipment they developed are now employed in high-tech firms around the world. “Cautious estimates indicate that in the past few years,” he told a reporter for the Israeli newspaper Ha’artez in 2000, “Unit 8200 veterans have set up some 30 to 40 high-tech companies, including 5 to 10 that were floated on Wall Street.” Referred to only as “Brigadier General B,” he added, “This correlation between serving in the intelligence Unit 8200 and starting successful high-tech companies is not coincidental: Many of the technologies in use around the world and developed in Israel were originally military technologies and were developed and improved by Unit veterans.
  • Equally troubling is the issue of corruption. Kobi Alexander, the founder and former chairman of Verint, is now a fugitive, wanted by the FBI on nearly three dozen charges of fraud, theft, lying, bribery, money laundering and other crimes. And two of his top associates at Comverse, Chief Financial Officer David Kreinberg and former General Counsel William F. Sorin, were also indicted in the scheme and later pleaded guilty, with both serving time in prison and paying millions of dollars in fines and penalties. When asked about these contractors, the NSA declined to “verify the allegations made.”
  •  
    So, allegedly a Zionist working in NSA passed NSA's telecommunications data mining software to Israel, was identified, but was never prosecuted. And the Verint CEO is now a fugitive from justice on charges of "fraud, theft, lying, money laundering, and other crimes." What's not to like in having this company processing all of our telephone metadata?
Paul Merrell

Data Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the Bahama... - 0 views

  • The National Security Agency is secretly intercepting, recording, and archiving the audio of virtually every cell phone conversation on the island nation of the Bahamas. According to documents provided by NSA whistleblower Edward Snowden, the surveillance is part of a top-secret system – code-named SOMALGET – that was implemented without the knowledge or consent of the Bahamian government. Instead, the agency appears to have used access legally obtained in cooperation with the U.S. Drug Enforcement Administration to open a backdoor to the country’s cellular telephone network, enabling it to covertly record and store the “full-take audio” of every mobile call made to, from and within the Bahamas – and to replay those calls for up to a month. SOMALGET is part of a broader NSA program called MYSTIC, which The Intercept has learned is being used to secretly monitor the telecommunications systems of the Bahamas and several other countries, including Mexico, the Philippines, and Kenya. But while MYSTIC scrapes mobile networks for so-called “metadata” – information that reveals the time, source, and destination of calls – SOMALGET is a cutting-edge tool that enables the NSA to vacuum up and store the actual content of every conversation in an entire country.
  • All told, the NSA is using MYSTIC to gather personal data on mobile calls placed in countries with a combined population of more than 250 million people. And according to classified documents, the agency is seeking funding to export the sweeping surveillance capability elsewhere. The program raises profound questions about the nature and extent of American surveillance abroad. The U.S. intelligence community routinely justifies its massive spying efforts by citing the threats to national security posed by global terrorism and unpredictable rival nations like Russia and Iran. But the NSA documents indicate that SOMALGET has been deployed in the Bahamas to locate “international narcotics traffickers and special-interest alien smugglers” – traditional law-enforcement concerns, but a far cry from derailing terror plots or intercepting weapons of mass destruction.
  • By targeting the Bahamas’ entire mobile network, the NSA is intentionally collecting and retaining intelligence on millions of people who have not been accused of any crime or terrorist activity. Nearly five million Americans visit the country each year, and many prominent U.S. citizens keep homes there, including Sen. Tom Harkin (D-Iowa), Bill Gates, and Oprah Winfrey.
  • ...12 more annotations...
  • The Intercept has confirmed that as of 2013, the NSA was actively using MYSTIC to gather cell-phone metadata in five countries, and was intercepting voice data in two of them. Documents show that the NSA has been generating intelligence reports from MYSTIC surveillance in the Bahamas, Mexico, Kenya, the Philippines, and one other country, which The Intercept is not naming in response to specific, credible concerns that doing so could lead to increased violence. The more expansive full-take recording capability has been deployed in both the Bahamas and the unnamed country. MYSTIC was established in 2009 by the NSA’s Special Source Operations division, which works with corporate partners to conduct surveillance. Documents in the Snowden archive describe it as a “program for embedded collection systems overtly installed on target networks, predominantly for the collection and processing of wireless/mobile communications networks.”
  • If an entire nation’s cell-phone calls were a menu of TV shows, MYSTIC would be a cable programming guide showing which channels offer which shows, and when. SOMALGET would be the DVR that automatically records every show on every channel and stores them for a month. MYSTIC provides the access; SOMALGET provides the massive amounts of storage needed to archive all those calls so that analysts can listen to them at will after the fact. According to one NSA document, SOMALGET is “deployed against entire networks” in the Bahamas and the second country, and processes “over 100 million call events per day.”
  • When U.S. drug agents need to tap a phone of a suspected drug kingpin in another country, they call up their counterparts and ask them set up an intercept. To facilitate those taps, many nations – including the Bahamas – have hired contractors who install and maintain so-called lawful intercept equipment on their telecommunications. With SOMALGET, it appears that the NSA has used the access those contractors developed to secretly mine the country’s entire phone system for “signals intelligence” –recording every mobile call in the country. “Host countries,” the document notes, “are not aware of NSA’s SIGINT collection.” “Lawful intercept systems engineer communications vulnerabilities into networks, forcing the carriers to weaken,” says Christopher Soghoian, the principal technologist for the American Civil Liberties Union. “Host governments really should be thinking twice before they accept one of these Trojan horses.”
  • The DEA has long been in a unique position to help the NSA gain backdoor access to foreign phone networks. “DEA has close relationships with foreign government counterparts and vetted foreign partners,” the manager of the NSA’s drug-war efforts reported in a 2004 memo. Indeed, with more than 80 international offices, the DEA is one of the most widely deployed U.S. agencies around the globe. But what many foreign governments fail to realize is that U.S. drug agents don’t confine themselves to simply fighting narcotics traffickers. “DEA is actually one of the biggest spy operations there is,” says Finn Selander, a former DEA special agent who works with the drug-reform advocacy group Law Enforcement Against Prohibition. “Our mandate is not just drugs. We collect intelligence.” What’s more, Selander adds, the NSA has aided the DEA for years on surveillance operations. “On our reports, there’s drug information and then there’s non-drug information,” he says. “So countries let us in because they don’t view us, really, as a spy organization.”
  • “I seriously don’t think that would be your run-of-the-mill legal interception equipment,” says the former engineer, who worked with hardware and software that typically maxed out at 1,000 intercepts. The NSA, by contrast, is recording and storing tens of millions of calls – “mass surveillance,” he observes, that goes far beyond the standard practices for lawful interception recognized around the world. The Bahamas Telecommunications Company did not respond to repeated phone calls and emails.
  • The proliferation of private contractors has apparently provided the NSA with direct access to foreign phone networks. According to the documents, MYSTIC draws its data from “collection systems” that were overtly installed on the telecommunications systems of targeted countries, apparently by corporate “partners” cooperating with the NSA. One NSA document spells out that “the overt purpose” given for accessing foreign telecommunications systems is “for legitimate commercial service for the Telco’s themselves.” But the same document adds: “Our covert mission is the provision of SIGINT,” or signals intelligence.
  • According to the NSA documents, MYSTIC targets calls and other data transmitted on  Global System for Mobile Communications networks – the primary framework used for cell phone calls worldwide. In the Philippines, MYSTIC collects “GSM, Short Message Service (SMS) and Call Detail Records” via access provided by a “DSD asset in a Philippine provider site.” (The DSD refers to the Defence Signals Directorate, an arm of Australian intelligence. The Australian consulate in New York declined to comment.) The operation in Kenya is “sponsored” by the CIA, according to the documents, and collects “GSM metadata with the potential for content at a later date.” The Mexican operation is likewise sponsored by the CIA. The documents don’t say how or under what pretenses the agency is gathering call data in those countries. In the Bahamas, the documents say, the NSA intercepts GSM data that is transmitted over what is known as the “A link”–or “A interface”–a core component of many mobile networks. The A link transfers data between two crucial parts of GSM networks – the base station subsystem, where phones in the field communicate with cell towers, and the network subsystem, which routes calls and text messages to the appropriate destination. “It’s where all of the telephone traffic goes,” says the former engineer.
  • When U.S. drug agents wiretap a country’s phone networks, they must comply with the host country’s laws and work alongside their law enforcement counterparts. “The way DEA works with our allies – it could be Bahamas or Jamaica or anywhere – the host country has to invite us,” says Margolis. “We come in and provide the support, but they do the intercept themselves.” The Bahamas’ Listening Devices Act requires all wiretaps to be authorized in writing either by the minister of national security or the police commissioner in consultation with the attorney general. The individuals to be targeted must be named. Under the nation’s Data Protection Act, personal data may only be “collected by means which are both lawful and fair in the circumstances of the case.” The office of the Bahamian data protection commissioner, which administers the act, said in a statement that it “was not aware of the matter you raise.” Countries like the Bahamas don’t install lawful intercepts on their own. With the adoption of international standards, a thriving market has emerged for private firms that are contracted by foreign governments to install and maintain lawful intercept equipment. Currently valued at more than $128 million, the global market for private interception services is expected to skyrocket to more than $970 million within the next four years, according to a 2013 report from the research firm Markets and Markets.
  • If the U.S. government wanted to make a case for surveillance in the Bahamas, it could point to the country’s status as a leading haven for tax cheats, corporate shell games, and a wide array of black-market traffickers. The State Department considers the Bahamas both a “major drug-transit country” and a “major money laundering country” (a designation it shares with more than 60 other nations, including the U.S.). According to the International Monetary Fund, as of 2011 the Bahamas was home to 271 banks and trust companies with active licenses. At the time, the Bahamian banks held $595 billion in U.S. assets. But the NSA documents don’t reflect a concerted focus on the money launderers and powerful financial institutions – including numerous Western banks – that underpin the black market for narcotics in the Bahamas. Instead, an internal NSA presentation from 2013 recounts with pride how analysts used SOMALGET to locate an individual who “arranged Mexico-to-United States marijuana shipments” through the U.S. Postal Service.
  • The presentation doesn’t say whether the NSA shared the information with the DEA. But the drug agency’s Special Operations Divison has come under fire for improperly using classified information obtained by the NSA to launch criminal investigations – and then creating false narratives to mislead courts about how the investigations began. The tactic – known as parallel construction – was first reported by Reuters last year, and is now under investigation by the Justice Department’s inspector general. So: Beyond a desire to bust island pot dealers, why would the NSA choose to apply a powerful collection tool such as SOMALGET against the Bahamas, which poses virtually no threat to the United States? The answer may lie in a document that characterizes the Bahamas operation as a “test bed for system deployments, capabilities, and improvements” to SOMALGET. The country’s small population – fewer than 400,000 residents – provides a manageable sample to try out the surveillance system’s features. Since SOMALGET is also operational in one other country, the Bahamas may be used as a sort of guinea pig to beta-test improvements and alterations without impacting the system’s operations elsewhere. “From an engineering point of view it makes perfect sense,” says the former engineer. “Absolutely.”
  • SOMALGET operates under Executive Order 12333, a Reagan-era rule establishing wide latitude for the NSA and other intelligence agencies to spy on other countries, as long as the attorney general is convinced the efforts are aimed at gathering foreign intelligence. In 2000, the NSA assured Congress that all electronic surveillance performed under 12333 “must be conducted in a manner that minimizes the acquisition, retention, and dissemination of information about unconsenting U.S. persons.” In reality, many legal experts point out, the lack of judicial oversight or criminal penalties for violating the order render the guidelines meaningless. “I think it would be open, whether it was legal or not,” says German, the former FBI agent. “Because we don’t have all the facts about how they’re doing it. For a long time, the NSA has been interpreting their authority in the broadest possible way, even beyond what an objective observer would say was reasonable.” “An American citizen has Fourth Amendment rights wherever they are,” adds Kurt Opsahl, an attorney with the Electronic Frontier Foundation. “Nevertheless, there have certainly been a number of things published over the last year which suggest that there are broad, sweeping programs that the NSA and other government agencies are doing abroad that sweep up the communications of Americans.”
  • Legal or not, the NSA’s covert surveillance of an entire nation suggests that it will take more than the president’s tepid “limits” to rein in the ambitions of the intelligence community. “It’s almost like they have this mentality – if we can, we will,” says German. “There’s no analysis of the long-term risks of doing it, no analysis of whether it’s actually worth the effort, no analysis of whether we couldn’t take those resources and actually put them on real threats and do more good.” It’s not surprising, German adds, that the government’s covert program in the Bahamas didn’t remain covert. “The undermining of international law and international cooperation is such a long-term negative result of these programs that they had to know would eventually be exposed, whether through a leak, whether through a spy, whether through an accident,” he says. “Nothing stays secret forever. It really shows the arrogance of these agencies – they were just going to do what they were going to do, and they weren’t really going to consider any other important aspects of how our long-term security needs to be addressed.”
  •  
    Words fail me.
Paul Merrell

ISIL, Turkey: The Dream of Restoring the Glories of Sublime Ottoman State , by Israa Al... - 0 views

  • The ISIL’s funding father is Erdogan’s personal friend The name of the Saudi businessman Yassin al-Qadi has been linked to organizations classified as terrorist internationally. In particular, the foreign press and the Turkish opposition media describe him as “al-Qaeda’s funding father”. After the events of September 11/2001, al-Qadi- along with other figures- has been included in the world’s list of terrorists, and his name was stereotyped as a terrorist man. This made several countries ban him from entering into their territories, Turkey was one of them. Earlier, the Turkish media documented a photo scandal: Erdogan’s meetings with Yassin al-Qadi as well as long meetings with his son Bilal Recep Tayyip Erdogan. The scandal that was leaked by Turkish security elements came in the context of the case of corruption of which the son of the former Turkish Prime Minister has been accused. Based upon this, a large number of elements of the security corps were arrested being accused of plotting a coup against the government.
  • Nevertheless, the French journalist Thierry Meyssan describes Yassin al-Qadi as a personal friend of both Dick Cheney (former U.S. Vice President) and Recep Tayyip Erdogan. According to him, al-Qadi visited Turkey four times during 2012, and “his plane used to land at the second airport of Istanbul, and was being welcomed by the Prime Minister personally, without going through the smart gate, and after cutting the security cameras’ power supply”. The Turkish Gmehoriet Newspaper intended to publish details about the investigations conducted by the Turkish judiciary on the same case, and mentioned that Recep Tayyip Erdogan introduced Yassine al-Qadi as a Saudi businessman visiting Turkey to invest and denied that he is a terrorist. It quoted him as saying: “I trust Mr. Al-Qadi just as I trust myself. He is an almsgiver”.
  • The Turkish newspaper, after publishing Erdogan’s utterances before the Turkish judiciary, revealed that the Turkish police monitored 12 visits made by the Saudi man to Turkey. Seven out of these visits have been made with the help of Erdogan, the period when he was banned from entering Turkey, because his name was added as one of the world wanted terrorists in the list of the American FBI. The newspaper commented saying: “When the Turkish police was looking for al-Qadi, he was holding meetings with the Prime Minister”. Also, it published a photograph that showed separately the aforesaid man, Erdogan, and the Turkish intelligence chief Hakan Fidan, when they were going to a meeting that gathered them. The newspaper noted that Fidan himself met with al-Qadi 5 times when Al-Qadi has been banned from entering the Turkish territory.
  • ...7 more annotations...
  • Yet, the interesting thing is the leaked recordings published by the newspaper that disclose that Yassin al-Qadi used to give orders to the Erdogan’s office. He used to call to inform them that he had decided today to meet with Erdogan, and that the latter should not engage in any other obligations. The newspaper reported details about the dates of the meetings between the two men, what implies that the meetings were being attended by Fidan and by the Egyptian businessman Osama Qutob; the son of Muhammad Qutob the brother of the Brotherhood leader Sayyid Qutob who holds the Turkish citizenship and is living with his father in Turkey at present. This also mean that the meetings were taking place sometimes at the home of the Turkish businessman Mustafa Latif Topas in Istanbul, attended by Erdogan’s son and Moaz the son of al-Qadi. The recordings verify that Qutob was in charge of delivering the messages from the insurgents in the battlefield in Syria to Erdogan, what signifies that the meetings of these figures exceeded the issues of investment, and perhaps they exploited the title of a charity practice!
  • Those returning from Turkey refer to the public sympathy in the pro-government Turkish street with the ISIL. Social networking websites publish photos of Islamic libraries in Istanbul selling “T-shirts” and goods with the ISIL logo on them. Perhaps this news is no longer shocking after what the German (ARD) Television has revealed regarding the opening of an office for the ISIL in al-Fateh Street in Istanbul, being ran by Turks. Through it, the process of supporting and supplying the Takfiri organization in Iraq and Syria with funds and fighters takes place.
  • The German channel itself revealed in a video report aired by it that the ISIL has training camps on the Turkish territory: 1- The GAZIANTEP Camp: a training camp for the ISIL fighters According to the report published by the website of “Today’s Zaman”, an English-language newspaper in Turkey, the Governor of the Gaziantep (Erdal Ata) rushed to hold a press conference to deny what has been revealed by the German television. However, he spoke about the arrest of 19 elements that belong to the ISIL in the city, among those who came from European countries before committing them to trial.
  • Additionally, the Lebanese journalist Hassan Hamade, in an earlier interview with Al-Manar, drew attention to the existence of three training camps in Turkey for the fighters of extremist organizations [3]. 2- The ORFA Camp, southeastern Turkey: a camp out of which the gunmen came when they attacked the Kasab city that its residents are predominantly Armenian.
  • 3- The OSMANIYA camp in Adana, southern Turkey: It is directly near the major bases of the U.S. Air Force in the Turkish territory. Yet, what is interesting is that the Osmaniya camp is a stone’s throw away from the gas pipelines points of intersection coming from Iraq and Central Asia that empty the freight in the Turkish port of Ceyhan on the Mediterranean Sea. 4- The KARMAN camp, it is also in Adana but is much closer to Istanbul. Moreover, a document published by the French journalist Thierry Meyssan, earlier, revealed that Turkey facilitated the infiltration of 5,000 fighters, who belong to al-Qaeda, to the Syrian territory after receiving training in Libya.
  • Perhaps the report of the American TV Network clarifies the argument of the Turkish journalist Orhan Kama Genghis: “The strongholds of the ISIL are located close to the Turkish border, and this did not happen coincidentally”. The Turkish journalist Kadri Gursel talks about the fact that the Turkish border territories have turned into an easy pathway facilitating the arrival and departure of the militants, where there are no formal procedures (visas, etc…) that could bother them, referring to the cooperation of the Turkish intelligence agency with the militants. Above and beyond, the Turkish opposition Republican People’s Party MP Muharram Ingee said that the ISIL leader “Mazen Abu Mohammed” received treatment in one of the Turkish government hospitals in the city of Hatay on April 2014, publishing a photo of the terrorist man in the hospital.
  • Reviewing these data provide an early answer to the question of the Saudi writer, Nawaf Qadimi, who is known for his support for the Muslim Brotherhood, where the phenomenon of the ISIL leads us to evoke history. The Seljuks drew the policies to expand their influence and their tools were the advocates of takfir and the recruiting of fighters in the name of religion. Here is Erdogan in actual fact walking in the footsteps of the ancestors and painting policies, and the tools are the texts of takfir for which he is recruiting fighters in the name of religion itself! That is how history is enabling us to understand our present...
Paul Merrell

Kim Dotcom: I Knew Seth Rich, He Was The Wikileaks Source - 0 views

  • Last week, Fox News dropped a bombshell report officially confirming, via anonymous FBI sources, what many had suspected for quite some time, that murdered DNC staffer Seth Rich was the WikiLeaks source for leaks which proved that the DNC was intentionally undermining the campaign of Bernie Sanders. In addition to exposing the corruption of the DNC, the leaks cost Debbie Wasserman In addition to exposing the corruption of the DNC, the leaks cost Debbie Wasserman Schultz her job as Chairwoman. Of course, if it’s true that WikiLeaks’ emails came from a DNC insider it would end the “Russian hacking” narrative that has been perpetrated by Democrats and the mainstream media for the past several months.
  • Moreover, it would corroborate the one confirmation that Julian Assange has offered regarding his source, namely that it was “not a state actor.” Meanwhile, the plot thickened a little more over the weekend when Kim Dotcom confirmed via Twitter that he was working with Seth Rich to get leaked emails to WikiLeaks.
  • Meanwhile, Kim Dotcom has promised more information will be released on his interaction with Seth Rich by tomorrow.
  • ...1 more annotation...
  • why is he just now coming forward with such information? Second, while Seth Rich may explain the DNC leaks we still don’t know who is responsible for the “Podesta Files” which we’re certain will continue to be attributed to “Russian hackers.” Which leads to the most important question of all: is this all just another fake news diversion, or is there more to the Seth Rich murder?
1 - 17 of 17
Showing 20 items per page