Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged Intel-professionals

Rss Feed Group items tagged

Paul Merrell

The Sultan of (Emergency) Swing - 0 views

  • Amidst an astonishing, relentless, wide-ranging purge that shows no signs of abating, with 60,000 – and counting – civil servants, academics, judges, prosecutors, policemen, soldiers jailed, fired, suspended or stripped of professional accreditation, it’s relatively established by now the Turkish government was very much informed a military coup was imminent on July 15. The information may have come from Russian intelligence, although neither Moscow nor Ankara will reveal any details. So, once and for all, this was no false flag.
  • As Erdogan solidifies his internal iron grip, a formerly iron clad connection – NATO/Turkey – slowly dissolves into thin air. It’s as if the fate of Incirlik air base was hangin’ – literally – by a few, selected radar threads. There’s extreme suspicion across the spectrum in Turkey that the Pentagon knew what the «rebels» were up to. It’s a fact that not a pin drops in Incirlik without the Americans knowing it. AKP members stress the use of NATO’s communication network to coordinate the putschists and thus escape Turkish intel. At a minimum, the putschists may have believed NATO would have their backs. No «NATO ally» deigned itself to warn Erdogan about the coup. Then there’s the saga of the refueling tanker for the «rebel» F-16s. The tankers in Incirlik are all the same model – KC-135R Stratotanker – for Americans and Turks alike. They work side by side and are all under the same command; the 10th Main Tanker Base, led by Gen. Bekir Ercan Van, who was duly arrested this past Sunday – as seven judges also confiscated all the control tower communications. Not by accident Gen. Bekir Ercan Van happened to be very close to Pentagon head Ash Carter. What happened in Turkish airspace after Erdogan’s Gulfstream IV left the Mediterranean coast and landed in Istanbul’s Ataturk airport has been largely mapped – but there are still some crucial gaps in the narrative open to speculation. As Erdogan has been tight-lipped in all his interviews, one is left with a Mission Impossible-style scenario featuring «rebel» F-16s «Lion One» and «Lion Two» on a «special mission» with their transponder off; their face off with loyalist «Falcon One» and «Falcon Two»; one of the «Lions» piloted by the none other than the man who shot down the Russian Su-24 last November; the by now famous tanker that took off from Incirlik to refuel the «rebels»; and three extra pairs of F-16s that took off from Dalaman, Erzurum and Balikesir to intercept the «rebels», including the pair that protected Erdogan’s Gulfsteam (which was using callsign THY 8456 to disguise it as a Turkish Airlines flight).
  • Notorious Saudi whistleblower «Mujtahid» caused a sensation as he revealed that the UAE not only «played a role» in the coup but also kept the House of Saud in the loop. As if this was not damning enough, the self-deposed emir of Qatar, Sheikh Hamad al-Thani, very close to Erdogan, has alleged that the US and another Western nation (France is a strong possibility) had staged the whole thing, with Saudi Arabian involvement. Ankara, predictably, denied all of it.
  • ...1 more annotation...
  • Once again, the basic facts; every intel operative in Southwest Asia knows that without a Pentagon green light, Turkish military factions would have had an extremely hard, if not impossible, time to organize a coup. Moreover, during that fateful night, until it was clear the coup was a failure, the plotters – from Washington to Brussels – were not exactly being described as «evil». A top American intel source, which does not subscribe to the usual Beltway consensus, is adamant that, «the Turkish military would not have moved without the green light from Washington. The same thing was planned for Saudi Arabia in April 2014, but was blocked at the highest levels in Washington by a friend of Saudi Arabia». The source, thinking outside the box, subscribes to what should be regarded as the key, current working hypothesis; the coup took place, or was fast-forwarded, essentially «because of Erdogan's sudden rapprochement with Russia». Turks across the spectrum would add fuel to the fire, insisting that more than likely the Istanbul airport bombing was an Operation Gladio. Rumor mills from East to West are already advancing that Erdogan should leave NATO sooner or later and join the Shanghai Cooperation Organization (SCO).
  •  
    It's ugly in Turkey. Thousands of schools closed, thousands of academics fired, tens of thousands of people being held in sports stadium makeshift prisons, 49 generals imprisoned, Amnesty International reports that torture and rape of prisoners is widespread, Erdogan has taken over the Turkish military. U.S. involvement in the failed coup attempt seems ironclad. Turkey's bid to join the E.U. is dead and it's expected to drop out of NATO as it swings toward Russian relations.
Paul Merrell

Warning Merkel on Russian 'Invasion' Intel | Consortiumnews - 0 views

  • Alarmed at the anti-Russian hysteria sweeping Official Washington – and the specter of a new Cold War – U.S. intelligence veterans took the unusual step of sending this Aug. 30 memo to German Chancellor Merkel challenging the reliability of Ukrainian and U.S. media claims about a Russian “invasion.” MEMORANDUM FOR: Angela Merkel, Chancellor of Germany FROM: Veteran Intelligence Professionals for Sanity (VIPS) SUBJECT: Ukraine and NATO We the undersigned are long-time veterans of U.S. intelligence. We take the unusual step of writing this open letter to you to ensure that you have an opportunity to be briefed on our views prior to the NATO summit on Sept. 4-5.
  •  
    Our buddies the Veteran Intelligence Professionals for Sanity (VIPS) are back, this time with a warning for German Chancellor Angela Merkel that John Kerry is lying about Russia invading Ukraine. The NATO Summit kicked off on the 4th; this was published on the 1st. 
Paul Merrell

Obama Should Release MH-17 Intel | Consortiumnews - 0 views

  • A year ago, the U.S. government issued a sketchy report on the Malaysia Airlines Flight 17 shoot-down citing “social media” and other flimsy data implicating eastern Ukrainian rebels and Russia, but then – as hard intelligence became available – went silent. Now, U.S. intelligence veterans are demanding release of that intel.MEMORANDUM FOR: The PresidentFROM: Veteran Intelligence Professionals for Sanity (VIPS)SUBJECT: Releasing an Intelligence Report on Shoot-Down of Malaysia Airlines Flight 17
  • In what follows, we former intelligence professionals with a cumulative total of some 360 years in various parts of U.S. intelligence provide our perspective on the issue and request for a second time that the intelligence over the downing be made public to counter the fuzzy and flimsy evidence that has over the past year been served up – some of it based on “social media.”
Paul Merrell

US Intel Vets Dispute Russia Hacking Claims - Consortiumnews - 0 views

  • As the hysteria about Russia’s alleged interference in the U.S. election grows, a key mystery is why U.S. intelligence would rely on “circumstantial evidence” when it has the capability for hard evidence, say U.S. intelligence veterans. Veteran Intelligence Professionals for Sanity MEMORANDUM Allegations of Hacking Election Are Baseless A New York Times report on Monday alluding to “overwhelming circumstantial evidence” leading the CIA to believe that Russian President Vladimir Putin “deployed computer hackers with the goal of tipping the election to Donald J. Trump” is, sadly, evidence-free. This is no surprise, because harder evidence of a technical nature points to an inside leak, not hacking – by Russians or anyone else.
  • We have gone through the various claims about hacking. For us, it is child’s play to dismiss them. The email disclosures in question are the result of a leak, not a hack. Here’s the difference between leaking and hacking: Leak: When someone physically takes data out of an organization and gives it to some other person or organization, as Edward Snowden and Chelsea Manning did. Hack: When someone in a remote location electronically penetrates operating systems, firewalls or any other cyber-protection system and then extracts data. All signs point to leaking, not hacking. If hacking were involved, the National Security Agency would know it – and know both sender and recipient. In short, since leaking requires physically removing data – on a thumb drive, for example – the only way such data can be copied and removed, with no electronic trace of what has left the server, is via a physical storage device.
  • These collection resources are extensive [see attached NSA slides 1, 2, 3, 4, 5]; they include hundreds of trace route programs that trace the path of packets going across the network and tens of thousands of hardware and software implants in switches and servers that manage the network. Any emails being extracted from one server going to another would be, at least in part, recognizable and traceable by all these resources. The bottom line is that the NSA would know where and how any “hacked” emails from the DNC, HRC or any other servers were routed through the network. This process can sometimes require a closer look into the routing to sort out intermediate clients, but in the end sender and recipient can be traced across the network. The various ways in which usually anonymous spokespeople for U.S. intelligence agencies are equivocating – saying things like “our best guess” or “our opinion” or “our estimate” etc. – shows that the emails alleged to have been “hacked” cannot be traced across the network. Given NSA’s extensive trace capability, we conclude that DNC and HRC servers alleged to have been hacked were, in fact, not hacked. The evidence that should be there is absent; otherwise, it would surely be brought forward, since this could be done without any danger to sources and methods. Thus, we conclude that the emails were leaked by an insider – as was the case with Edward Snowden and Chelsea Manning. Such an insider could be anyone in a government department or agency with access to NSA databases, or perhaps someone within the DNC.
  • ...1 more annotation...
  • As for the comments to the media as to what the CIA believes, the reality is that CIA is almost totally dependent on NSA for ground truth in the communications arena. Thus, it remains something of a mystery why the media is being fed strange stories about hacking that have no basis in fact. In sum, given what we know of NSA’s existing capabilities, it beggars belief that NSA would be unable to identify anyone – Russian or not – attempting to interfere in a U.S. election by hacking. For the Steering Group, Veteran Intelligence Professionals for Sanity (VIPS)
Paul Merrell

US Intel Vets Oppose Brennan's CIA Plan | Consortiumnews - 0 views

  • The original idea of the CIA was to have independent-minded experts assessing both short- and longer-term threats to U.S. national security. Mixing with operations and politics was always a danger, which is now highlighted by CIA Director Brennan’s reorganization, opposed by a group of U.S. intelligence veterans.MEMORANDUM FOR: The PresidentFROM: Veteran Intelligence Professionals for SanitySUBJECT: John Brennan’s Restructuring Plan for CIA
Paul Merrell

Testosterone Pit - Home - The Other Reason Why IBM Throws A Billion At Linux ... - 0 views

  • IBM announced today that it would throw another billion at Linux, the open-source operating system, to run its Power System servers. The first time it had thrown a billion at Linux was in 2001, when Linux was a crazy, untested, even ludicrous proposition for the corporate world. So the moolah back then didn’t go to Linux itself, which was free, but to related technologies across hardware, software, and service, including things like sales and advertising – and into IBM’s partnership with Red Hat which was developing its enterprise operating system, Red Hat Enterprise Linux. “It helped start a flurry of innovation that has never slowed,” said Jim Zemlin, executive director of the Linux Foundation. IBM claims that the investment would “help clients capitalize on big data and cloud computing with modern systems built to handle the new wave of applications coming to the data center in the post-PC era.” Some of the moolah will be plowed into the Power Systems Linux Center in Montpellier, France, which opened today. IBM’s first Power Systems Linux Center opened in Beijing in May. IBM may be trying to make hay of the ongoing revelations that have shown that the NSA and other intelligence organizations in the US and elsewhere have roped in American tech companies of all stripes with huge contracts to perfect a seamless spy network. They even include physical aspects of surveillance, such as license plate scanners and cameras, which are everywhere [read.... Surveillance Society: If You Drive, You Get Tracked].
  • Then another boon for IBM. Experts at the German Federal Office for Security in Information Technology (BIS) determined that Windows 8 is dangerous for data security. It allows Microsoft to control the computer remotely through a “special surveillance chip,” the wonderfully named Trusted Platform Module (TPM), and a backdoor in the software – with keys likely accessible to the NSA and possibly other third parties, such as the Chinese. Risks: “Loss of control over the operating system and the hardware” [read.... LEAKED: German Government Warns Key Entities Not To Use Windows 8 – Links The NSA.
  • It would be an enormous competitive advantage for an IBM salesperson to walk into a government or corporate IT department and sell Big Data servers that don’t run on Windows, but on Linux. With the Windows 8 debacle now in public view, IBM salespeople don’t even have to mention it. In the hope of stemming the pernicious revenue decline their employer has been suffering from, they can politely and professionally hype the security benefits of IBM’s systems and mention in passing the comforting fact that some of it would be developed in the Power Systems Linux Centers in Montpellier and Beijing. Alas, Linux too is tarnished. The backdoors are there, though the code can be inspected, unlike Windows code. And then there is Security-Enhanced Linux (SELinux), which was integrated into the Linux kernel in 2003. It provides a mechanism for supporting “access control” (a backdoor) and “security policies.” Who developed SELinux? Um, the NSA – which helpfully discloses some details on its own website (emphasis mine): The results of several previous research projects in this area have yielded a strong, flexible mandatory access control architecture called Flask. A reference implementation of this architecture was first integrated into a security-enhanced Linux® prototype system in order to demonstrate the value of flexible mandatory access controls and how such controls could be added to an operating system. The architecture has been subsequently mainstreamed into Linux and ported to several other systems, including the Solaris™ operating system, the FreeBSD® operating system, and the Darwin kernel, spawning a wide range of related work.
  • ...1 more annotation...
  • Among a slew of American companies who contributed to the NSA’s “mainstreaming” efforts: Red Hat. And IBM? Like just about all of our American tech heroes, it looks at the NSA and other agencies in the Intelligence Community as “the Customer” with deep pockets, ever increasing budgets, and a thirst for technology and data. Which brings us back to Windows 8 and TPM. A decade ago, a group was established to develop and promote Trusted Computing that governs how operating systems and the “special surveillance chip” TPM work together. And it too has been cooperating with the NSA. The founding members of this Trusted Computing Group, as it’s called facetiously: AMD, Cisco, Hewlett-Packard, Intel, Microsoft, and Wave Systems. Oh, I almost forgot ... and IBM. And so IBM might not escape, despite its protestations and slick sales presentations, the suspicion by foreign companies and governments alike that its Linux servers too have been compromised – like the cloud products of other American tech companies. And now, they’re going to pay a steep price for their cooperation with the NSA. Read...  NSA Pricked The “Cloud” Bubble For US Tech Companies
1 - 6 of 6
Showing 20 items per page