Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged director

Rss Feed Group items tagged

6More

Ex-IAEA Chief Warns on Using Unverified Intel to Pressure Iran « LobeLog - 0 views

  • In a critique of the handling of the Iran file by the International Atomic Energy Agency, former IAEA Director General Han Blix has called for greater skepticism about the intelligence documents and reports alleging Iranian nuclear weapons work and warned that they may be used to put diplomatic pressure on Tehran. In an interview with this writer in his Stockholm apartment late last month, Blix, who headed the IAEA from 1981 to 1997, also criticized the language repeated by the IAEA under its current director general, Yukiya Amano, suggesting that Iran is still under suspicion of undeclared nuclear activity. Blix, who clashed with US officials when he was head of the United Nations Monitoring, Verification and Inspection Commission (UNMOVIC) on weapons of mass destruction in Iraq from 2000 to 2003, said he has long been skeptical of intelligence that has been used to accuse Iraq and Iran of having active nuclear-weapons programs. “I’ve often said you have as much disinformation as information” on alleged weaponization efforts in those countries, Blix said.
  • Referring to the allegations of past Iranian nuclear weapons research that have been published in IAEA reports, Blix said, “Something that worries me is that these accusations that come from foreign intelligence agencies can be utilized by states to keep Iran under suspicion.” Such allegations, according to Blix, “can be employed as a tactic to keep the state in a suspect light—to keep Iran on the run.” The IAEA, he said, “should be cautious and not allow itself to be drawn into such a tactic.” Blix warned that compromising the independence of the IAEA by pushing it to embrace unverified intelligence was not in the true interests of those providing the intelligence. The IAEA Member States providing the intelligence papers to the IAEA “have a long-term interest in an international service that seeks to be independent,” said Blix. “In the Security Council they can pursue their own interest, but the [IAEA] dossier has to be as objective as possible.”
  • In 2005, the George W. Bush administration gave the IAEA a large cache of documents purporting to derive from a covert Iranian nuclear weapons research and development program from 2001 to 2003. Israel provided a series of documents and intelligence reports on alleged Iranian nuclear weapons work in 2008 and 2009. Blix’s successor as IAEA director general, Mohamed ElBaradei, recalled in his 2011 memoirs having doubts about the authenticity of both sets of intelligence documents. ElBaradei resisted pressure from the United States and its European allies in 2009 to publish an “annex” to a regular IAEA report based on those unverified documents. But Amano agreed to do so, and the annex on “possible military dimensions” of the Iranian nuclear program was published in November 2011. During the current negotiations with Iran, the P5+1 (US, UK, Russia, China, France plus Germany) has taken the position that Iran must explain the intelligence documents and reports described in the annex.
  • ...3 more annotations...
  • Blix said he is “critical” of the IAEA for the boilerplate language used in its reports on Iran that the Agency is “not in a position to provide credible assurances about the absence of undeclared nuclear material and activities….” Blix added that it is “erroneous” to suggest that the IAEA would be able to provide such assurances if Iran or any other state were more cooperative. As head of UNMOVIC, Blix recalled, “I was always clear that there could always be small things in a big geographical area that can be hidden, and you can never guarantee completely that there are no undeclared activities.” “In Iraq we didn’t maintain there was nothing,” he said. “We said we had made 700 inspections at 500 sites and we had not seen anything.” Blix emphasized that he was not questioning the importance of maximizing inspections, or of Iran’s ratification of the Additional Protocol. “I think the more inspections you can perform the smaller the residue of uncertainty,” he said.
  • The provenance of the largest part of the intelligence documents—the so-called “laptop documents”—was an unresolved question for years after they were first reported in 2004 and 2005. But former senior German foreign office official Karsten Voigt confirmed in 2013 that the Iranian exile opposition group, the Mujahedeen E-Khalq (MEK), gave the original set of documents to the German intelligence service (BND) in 2004. The MEK has been reported by Seymour Hersh, Connie Bruck, and a popular history of the Mossad’s covert operations to have been a client of Israel’s foreign intelligence agency, the Mossad, serving to “launder” intelligence that Mossad did not want to have attributed to Israel. Blix has been joined by two other former senior IAEA officials in criticizing the agency for its uncritical presentation of the intelligence documents cited in the November 2011 annex. Robert Kelley, the head of the Iraq team under both Blix and ElBaradei, and Tariq Rauf, the former head of the Agency’s Verification and Security Policy Coordination Office, have written that the annex employed “exaggeration, innuendo and careful choice of words” in presenting intelligence information from an unidentified Member State of the IAEA on the alleged cylinder at the Parchin military facility.
  • n a critique of the handling of the Iran file by the International Atomic Energy Agency, former IAEA Director General Han Blix has called for greater skepticism about the intelligence documents and reports alleging Iranian nuclear weapons work and warned that they may be used to put diplomatic pressure on Tehran. In an interview with this writer in his Stockholm apartment late last month, Blix, who headed the IAEA from 1981 to 1997, also criticized the language repeated by the IAEA under its current director general, Yukiya Amano, suggesting that Iran is still under suspicion of undeclared nuclear activity. Blix, who clashed with US officials when he was head of the United Nations Monitoring, Verification and Inspection Commission (UNMOVIC) on weapons of mass destruction in Iraq from 2000 to 2003, said he has long been skeptical of intelligence that has been used to accuse Iraq and Iran of having active nuclear-weapons programs. “I’ve often said you have as much disinformation as information” on alleged weaponization efforts in those countries, Blix said.
5More

Jamie Dimon's $13 Billion Secret | The Nation - 0 views

  • In the end, the abject fear of Ben Wagner got Jamie Dimon to cave.For much of 2013, Dimon, the chairman and chief executive of the formidable JPMorgan Chase & Company, was telling anyone who would listen that it was unfair and unjust for federal and state prosecutors to blame him and his bank for the manufacture and sale of mortgage-backed securities that occurred at Bear Stearns & Company and at Washington Mutual in the years leading up to the financial crisis. When JPMorgan Chase bought those two failing firms in 2008, Dimon argued, he was just doing what Ben Bernanke, Hank Paulson and Timothy Geithner had asked him to do. Why should his bank be held financially accountable for the bad behavior at Bear and WaMu?It was a clever argument—and wrong. Dimon's relentless effort to spin his patriotic story soon collided with the fact that Wagner, the US Attorney for the Eastern District of California, had uncovered evidence that JPMorgan itself was guilty of many of the same greedy and irresponsible behaviors. Piles of subpoenaed documents and e-mails revealed that JPMorgan bankers and traders had underwritten billions of dollars' worth of questionable mortgage-backed securities that Dimon had been telling everyone had originated at Bear Stearns and WaMu. Worse, the bad behavior had occurred on Dimon's watch.
  • The likelihood that the Justice Department would file Wagner's civil complaint last fall—exposing publicly for the first time the litany of wrongdoing at JPMorgan and threatening to push it off the perch that Dimon had so artfully constructed for it over the years—ultimately brought Dimon to the table. On September 26, just weeks after the Justice Department shared a draft copy of Wagner's complaint with Dimon, the two sides arranged for a summit meeting between Dimon and Attorney General Eric Holder. By mid-November, the bank had agreed to pay $13 billion in a comprehensive settlement of mortgage-related securities claims with various branches of the federal government and a group of states, led by the attorneys general of New York, California, Illinois, Massachusetts and Delaware.It was the largest financial settlement of all time, and it kept Wagner's complaint away from the prying eyes of the public. One thing is clear: Dimon's claim that his own bankers and traders had done nothing wrong in the years leading up to the financial crisis wasn't true. "The investigators and the lawyers were uncovering very viable evidence," explains Associate Attorney General Tony West, who headed up the settlement negotiations on behalf of the Justice Department. "I think there was recognition that we had enough evidence there that would support the complaint and would support a robust lawsuit."
  • [A disclosure of my own: after JPMorgan Chase fired me as a managing director in January 2004, I brought—and lost—a wrongful-dismissal arbitration against the bank. Separately, I remain in litigation with the bank as the result of a soured investment I made in 1999.]
  • ...1 more annotation...
  • Dimon was more circumspect. In a conference call the day the settlement was announced, he mostly kept quiet while Marianne Lake, the firm's CFO, led financial analysts through the details, including how $7 billion of the $13 billion fine would be tax-deductible.
  •  
    In a Matt Taibbi-quality lengthy report, William Cohan takes the reader inside the lengthy negotiations of JPMorgan's $13 billion settlement with state and federal prosecutors. JPMorgan admitted to criminal wrongdoing, and the settlement does not include immunity from criminal prosecution for anybody. But the author notes that there is not even a hint that anyone is working on criminal charges. There's a lot of discussion of dissension within the ranks of different state and federal attorneys involved. The article paints Ben Wagner, the US Attorney for the Eastern District of California, as the hero.  In my book, no one involved deserves hero status because no criminal charges have been filed against any JPMorgan managers or board members, hence there is still no incentive for any of the fraudsters who brought down the economy in 2008 to behave differently in the future. JPMorgan emains not too big to fail but too politically connected for its principals to be jailed. According to the article, the government lawyers had iron-clad proof that a group of JPMorgan managing directors had been informed that pools of mortages they were planning to buy were toxic but "buy two of the loan pools anyway, including those with the squirrelly mortgages. JPMorgan then proceeded to bundle "hundreds of millions of dollars of loans from those pools into one security." Wagner found that between the start of 2006 and the middle of 2007-when the mortgage securitization frenzy was at its peak-JPMorgan packaged and sold securities containing thousands of mortgages that were rated by a third-party evaluator to be of extremely low quality, meeting few, if any, of the bank's underwriting standards." If true, that is very serious fraud deserving of the directors' prosecution for criminal fraud and lengthy prison sentences.   The article touches on A.G. Holder's too big to jail argument but that argument, in my opinion, deserves no credibility before antitrust actions are filed to c
6More

Billionaires Make War on Iran - The Unz Review - 0 views

  • All the pro-Israel anti-Iran groups engage in pressure tactics on Capitol Hill and have been effective in dominating the political debate. Of thirty-six outside witnesses brought in to testify at seven Senate hearings on Iran since 2012 only one might be characterized as sensitive to Iranian concerns. The enormous lobbying effort enables the anti-Iran groups to define the actual policies, move their drafts of legislation through congress, and eventually see their bills pass with overwhelming majorities in both the House and Senate. It is democracy in action if one accepts that popular rule ought to be guided by money and pressure groups rather than by national interests. Less well known is United Against Nuclear Iran, which has a budget just shy of $2 million. UANI is involved in the New York lawsuit. The group, which has somehow obtained a 501[c]3 “educational” tax status that inter alia allows it to conceal its donors, has offices in Rockefeller Center in New York City. It is active on Capitol Hill providing “expert testimony” on Iran for congressional committees, to include “help” in drafting legislation. At a July Senate Foreign Relations Committee hearing on Iran all three outside witnesses were from UANI. It is also active in the media but is perhaps best known for its “name and shame” initiatives in which it exposes companies that it claims are doing business with Tehran in violation of US sanctions.
  • UANI is being sued by a Greek billionaire Victor Restis whom it had outed in 2013. Restis, claiming the exposure was fraudulent and carried out to damage his business, has filed suit demanding that UANI and billionaire Thomas Kaplan turn over documents and details of relationships regarding UANI donors who it is claimed are linked to the case. Kaplan, a New York City resident, made his initial fortune on energy exploration and development. More recently he has been involved in commodities trading in precious metals. His wife Daphne is Israeli and his involvement in various Jewish philanthropies both in the US and in Israel have invited comparison with controversial deceased commodities trader Marc Rich, who reportedly worked closely with the Israeli government on a number of projects. The Justice department would like to the see the UANI lawsuit go away as it is aware that what is being described as “law enforcement” documents would include both privileged and classified Treasury Department work product relating to individuals and companies that it has investigated for sanctions busting. Passing either intelligence related or law enforcement documents to a private organization is illegal but the Justice Department’s only apparent concern is that the activity might be exposed. There is no indication that it would go after UANI for having acquired the information and it perhaps should be presumed that the source of the leak is the Treasury Department itself.
  • Who or what provided the documents to a private advocacy group that is also a tax exempt foundation supported by prominent businessmen with interests in the Middle East is consequently not completely clear but Restis is assuming that the truth will out if he can get hold of the evidence. The lawsuit claims that UANI intimidates its targets by defaming their business practices as well as by demanding both examination of their books and an audit carried out by one of its own accountants followed by review from an “independent counsel.” Kaplan is named in the suit as he appears to be the gray eminence behind UANI. He once boasted “we’ve (UANI) done more to bring Iran to heel than any other private sector initiative.” Kaplan also employs as a director or officer in six of his companies the Executive Director of UANI Mark Wallace and reportedly arranged the awarding of the Executive Director position at Harvard’s Belfer Center to its President Gary Samore. Kaplan is a business competitor to Restis, whose lawyers are apparently seeking to demonstrate two things: first, that the US government has been feeding sometimes only partially vetted information to UANI to help in its “name and shame” program and second, that UANI is itself supported by partisan business interests like Kaplan as well as by foreign sources, which apparently is meant to imply Israel. Or even the Israeli intelligence service Mossad. Meir Dagan, former head of Mossad, is on the UANI advisory board, which also includes ex-Senator Joseph Lieberman and former Senior Diplomat Dennis Ross, both of whom have frequently been accused of favoring Israeli interests and both of whom might well have easy access to US government generated information.
  • ...2 more annotations...
  • And then there is the Muhadedin-e-Khalq, the Iranian terrorist group that has assassinated at least six Americans and is now assisting the Israeli government in killing Iranian scientists, a prima facie definition of what constitutes terrorism. The group was on the State Department terrorist list from 1997 until 2012, when Secretary of State Hillary Clinton de-listed it in response to demands coming from friends of Israel in Congress as well as from a large group of ex government officials, many of whom were paid large honoraria by the group to serve as advocates. The paid American shills included former CIA Directors James Woolsey and Porter Goss, New York City Mayor Rudolph Giuliani, former Vermont Governor Howard Dean, former Director of the Federal Bureau of Investigation Louis Freeh and former United Nations Ambassador John Bolton. The promoters of MEK in congress and elsewhere claimed to be primarily motivated by MEK’s being an enemy of the current regime in Tehran, though its virulent anti-Americanism and terrorist history make it a somewhat unlikely poster child for the “Iranian resistance.”
  • Supporters of MEK also ignore the fact that the group is run like a cult, routinely executes internal dissidents, and has virtually no political support within Iran. But such are the ways of the corrupt Washington punditocracy, lionizing an organization that it should be shunning. MEK’s political arm is located in Paris and it has long been assumed that it is funded by the Israeli government and by at least some of the same gaggle of billionaires, possibly including their Israeli counterparts, who support the anti-Iranian agenda in the United States.
  •  
    More detail about the extraordinary action of the Dept. of Justice to negotiate a settlement because discovery requested from the United Against Nuclear Iran private organization would include privileged and classified "law enforcement" records.
13More

Federal Chief Information Officers (CIO) Council Wins Rosemary Award - 0 views

  • Hillary Clinton E-Mail Controversy Illuminates Government-Wide Failure National Security Archive Lawsuit Established E-Mails as Records in 1993 CIO Council Repeats as Rosemary "Winner" for Doubling Down On "Lifetime Failure" Only White House Saves Its E-Mail Electronically, Agencies No Deadline Until 2016
  • The Federal Chief Information Officers (CIO) Council has won the infamous Rosemary Award for worst open government performance of 2014, according to the citation published today by the National Security Archive at www.nsarchive.org. The National Security Archive had hoped that awarding the 2010 Rosemary Award to the Federal Chief Information Officers Council for never addressing the government's "lifetime failure" of saving its e-mail electronically would serve as a government-wide wakeup call that saving e-mails was a priority. Fallout from the Hillary Clinton e-mail debacle shows, however, that rather than "waking up," the top officials have opted to hit the "snooze" button. The Archive established the not-so-coveted Rosemary Award in 2005, named after President Nixon's secretary, Rose Mary Woods, who testified she had erased 18-and-a-half minutes of a crucial Watergate tape — stretching, as she showed photographers, to answer the phone with her foot still on the transcription pedal. Bestowed annually to highlight the lowlights of government secrecy, the Rosemary Award has recognized a rogue's gallery of open government scofflaws, including the CIA, the Treasury Department, the Air Force, the FBI, the Justice Department, and Director of National Intelligence James Clapper.
  • Chief Information Officer of the United States Tony Scott was appointed to lead the Federal CIO Council on February 5, 2015, and his brief tenure has already seen more references in the news media to the importance of maintaining electronic government records, including e-mail, and the requirements of the Federal Records Act, than the past five years. Hopefully Mr. Scott, along with Office of Management & Budget Deputy Director for Management Ms. Beth Cobert will embrace the challenge of their Council being named a repeat Rosemary Award winner and use it as a baton to spur change rather than a cross to bear.
  • ...9 more annotations...
  • Many on the Federal CIO Council could use some motivation, including the beleaguered State Department CIO, Steven Taylor. In office since April 3, 2013, Mr. Taylor is in charge of the Department's information resources and IT initiatives and services. He "is directly responsible for the Information Resource Management (IRM) Bureau's budget of $750 million, and oversees State's total IT/ knowledge management budget of approximately one billion dollars." Prior to his current position, Taylor served as Acting CIO from August 1, 2012, as the Department's Deputy Chief Information Officer (DCIO) and Chief Technology Officer of Operations from June 2011, and was the Program Director for the State Messaging and Archival Retrieval Toolset (SMART). While Hillary Clinton repeatedly claimed that because she sent her official e-mail to "government officials on their State or other .gov accounts ... the emails were immediately captured and preserved," a recent State Department Office of Inspector General report contradicts claims that DOS' e-mail archiving system, ironically named SMART, did so.
  • The report found that State Department "employees have not received adequate training or guidance on their responsibilities for using those systems to preserve 'record emails.'" In 2011, while Taylor was State's Chief Technology Officer of Operations, State Department employees only created 61,156 record e-mails out of more than a billion e-mails sent. In other words, roughly .006% of DOS e-mails were captured electronically. And in 2013, while Taylor was State's CIO, a paltry seven e-mails were preserved from the Office of the Secretary, compared to the 4,922 preserved by the Lagos Consulate in Nigeria. Even though the report notes that its assessments "do not apply to the system used by the Department's high-level principals, the Secretary, the Deputy Secretaries, the Under Secretaries, and their immediate staffs, which maintain separate systems," the State Department has not provided any estimation of the number of Clinton's e-mails that were preserved by recipients through the Department's anachronistic "print and file" system, or any other procedure.
  • The unfortunate silver lining of Hillary Clinton inappropriately appropriating public records as her own is that she likely preserved her records much more comprehensively than her State Department colleagues, most of whose e-mails have probably been lost under Taylor's IT leadership. 2008 reports by CREW, right, and the GAO, left, highlighted problems preserving e-mails. Click to enlarge. The bigger issue is that Federal IT gurus have known about this problem for years, and the State Department is not alone in not having done anything to fix it. A 2008 survey by Citizens for Responsibility and Ethics in Washington (CREW) and OpenTheGovernment.org did not find a single federal agency policy that mandates an electronic record keeping system agency-wide. Congressional testimony in 2008 by the Government Accountability Office indicted the standard "print and file" approach by pointing out:
  • 2011- the Justice Department (for doing more than any other agency to eviscerate President Obama's Day One transparency pledge through pit-bull whistleblower prosecutions, recycled secrecy arguments in court cases, retrograde FOIA regulations, and mixed FOIA responsiveness) 2010 - the Federal Chief Information Officers' Council (for "lifetime failure" to address the crisis in government e-mail preservation) 2009 - the FBI (for having a record-setting rate of "no records" responses to FOIA requests) 2008 - the Treasury Department (for shredding FOIA requests and delaying responses for decades) 2007 - the Air Force (for disappearing its FOIA requests and having "failed miserably" to meet its FOIA obligations, according to a federal court ruling) 2006 - the Central Intelligence Agency (for the biggest one-year drop-off in responsiveness to FOIA requests yet recorded).
  • Troublingly, current Office of Management and Budget guidance does not require federal agencies to manage "all email records in an electronic format" until December 31, 2016. The only part of the federal government that seems to be facing up to the e-mail preservation challenge with any kind of "best practice" is the White House, where the Obama administration installed on day one an e-mail archiving system that preserves and manages even the President's own Blackberry messages. The National Security Archive brought the original White House e-mail lawsuit against President Reagan in early 1989, and continued the litigation against Presidents George H.W. Bush and Bill Clinton, until court orders compelled the White House to install the "ARMS" system to archive e-mail. The Archive sued the George W. Bush administration in 2007 after discovering that the Bush White House had junked the Clinton system without replacing its systematic archiving functions. CREW subsequently joined this suit and with the Archive negotiated a settlement with the Obama administration that included the recovery of as many as 22 million e-mails that were previously missing or misfiled.
  • s a result of two decades of the Archive's White House e-mail litigation, several hundred thousand e-mails survive from the Reagan White House, nearly a half million from the George H.W. Bush White House, 32 million from the Clinton White House, and an estimated 220 million from the George W. Bush White House. Previous recipients of the Rosemary Award include: 2013 - Director of National Intelligence James Clapper (for his "No, sir" lie to Senator Ron Wyden's question: "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?") 2012 - the Justice Department (in a repeat performance, for failing to update FOIA regulations to comply with the law, undermining congressional intent, and hyping its open government statistics)
  • Rogue Band of Federal E-mail Users and Abusers Compounds Systemic Problems Former Secretary of State Hillary Clinton and other federal officials who skirt or even violate federal laws designed to preserve electronic federal records compound e-mail management problems. Top government officials who use personal e-mail for official business include: Clinton; former U.S. Ambassador to Kenya Scott Gration; chairman of the U.S. Chemical Safety Board Rafael Moure-Eraso; and former Secretary of State Colin Powell, who told ABC's This Week "I don't have any to turn over. I did not keep a cache of them. I did not print them off. I do not have thousands of pages somewhere in my personal files." Others who did not properly save electronic federal records include Environmental Protection Agency former administrator Lisa Jackson who used the pseudonym Richard Windsor to receive email; current EPA administrator Gina McCarthy, who improperly deleted thousands of text messages (which also are federal records) from her official agency cell phone; and former Internal Revenue Service official Lois Lerner, whose emails regarding Obama's political opponents "went missing or became destroyed."
  • "agencies recognize that devoting significant resources to creating paper records from electronic sources is not a viable long-term strategy;" yet GAO concluded even the "print and file" system was failing to capture historic records "for about half of the senior officials."
  • The destruction of other federal records was even more blatant. Jose Rodriguez, the former CIA official in charge of the agency's defunct torture program ordered the destruction of key videos documenting it in 2005, claiming that "the heat from destroying [the torture videos] is nothing compared to what it would be if the tapes ever got into the public domain;" Admiral William McRaven, ordered the immediate destruction of any emails about Operation Neptune Spear, including any photos of the death of Osama bin Laden ("destroy them immediately"), telling subordinates that any photos should have already been turned over to the CIA — presumably so they could be placed in operational files out of reach of the FOIA. These rogues make it harder — if not impossible — for agencies to streamline their records management, and for FOIA requesters and others to obtain official records, especially those not exchanged with other government employees. The US National Archives currently trusts agencies to determine and preserve e-mails which agencies have "deemed appropriate for preservation" on their own, often by employing a "print and file" physical archiving process for digital records. Any future reforms to e-mail management must address the problems of outdated preservation technology, Federal Records Act violators, and the scary fact that only one per cent of government e-mail addresses are saved digitally by the National Archive's recently-initiated "Capstone" program.
  •  
    Complete with photos, names, titles, of the 41 federal department and independent agency CIOs. The March 2015 Insopector General report linked from the article belies Hillary Clinton's claim that all emails she sent to State Department staff had been preserved by the Department.   
1More

Court convicts MCD EX-joint director for usurping plots meant for poor - 0 views

  •  
    New Delhi: Delhi court on Monday convicted an ex-joint Director of MCD and three other for usurping the plots meant for poor to shift them in the resettlement colony. A total of 15 accused was made in the case that includes DDA, Delhi Government and MCD officers
5More

Connecting the Dots on PRISM, Phone Surveillance, and the NSA's Massive Spy Center | Th... - 0 views

  • As someone who has written many books and articles about the agency, I have seldom seen the NSA in such a state. Like a night prowler with a bag of stolen goods suddenly caught in a powerful Klieg light, it now finds itself under the glare of nonstop press coverage, accused of robbing the public of its right to privacy. Despite the standard denials from the agency’s public relations office, the documents outline a massive operation to secretly keep track of everyone’s phone calls on a daily basis – billions upon billions of private records; and another to reroute the pipes going in and out of Google, Apple, Yahoo, and the other Internet giants through Fort Meade – figuratively if not literally. 
  • But long before Edward Snowden walked out of the NSA with his trove of documents, whistleblowers there had been trying for years to bring attention to the massive turn toward domestic spying that the agency was making.
  • Without documents to prove their claims, the agency simply dismissed them as falsehoods and much of the mainstream press simply accepted that. “We don’t hold data on U.S. citizens,” Alexander said in a talk at the American Enterprise Institute last summer, by which time he had been serving as the head of the NSA for six years. Director of National Intelligence James Clapper made similar claims. At a hearing of the Senate Intelligence Committee last March, he was asked, “Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?” To which Clapper responded, “No, sir.” The documents released by Snowden, pointing to the nationwide collection of telephone data records and not denied by government officials, prove the responses untrue.
  • ...1 more annotation...
  • The deception by General Alexander is especially troubling. In my new cover story for Wired’s July issue, which will be published online Thursday, I show how he has become the most powerful intelligence chief in the nation’s history. Never before has anyone in America’s intelligence sphere come close to his degree of power, the number of people under his command, the expanse of his rule, the length of his reign, or the depth of his secrecy. A four-star Army general, his authority extends across three domains: He is director of the world’s largest intelligence service, the National Security Agency; chief of the Central Security Service; and commander of the U.S. Cyber Command. As such, he has his own secret military, presiding over the Navy’s 10th Fleet, the 24th Air Force, and the Second Army.
  •  
    Check the video on CSPAN  linked from the paragraph about NSA head General Keith Alexander's talk at the American Enterprise Institute. In response to a Fox News question, Alexander lied at length and in detail along the theme of "We don't hold data on U.S. citizens." With both Alexander and National Intelligence DIrector James Clapper both now caught flat-out lying about keeping records on Americans, why should any Executive Branch statements about the scope of their domestic spying be trusted in the least, given that any official statement on the topic would have to rely on information provided by these two men. We know that they are perfectly willing to lie to the public on that topic. 
7More

How the NSA is still harvesting your online data | World news | guardian.co.uk - 0 views

  • A review of top-secret NSA documents suggests that the surveillance agency still collects and sifts through large quantities of Americans' online data – despite the Obama administration's insistence that the program that began under Bush ended in 2011.Shawn Turner, the Obama administration's director of communications for National Intelligence, told the Guardian that "the internet metadata collection program authorized by the Fisa court was discontinued in 2011 for operational and resource reasons and has not been restarted."But the documents indicate that the amount of internet metadata harvested, viewed, processed and overseen by the Special Source Operations (SSO) directorate inside the NSA is extensive.While there is no reference to any specific program currently collecting purely domestic internet metadata in bulk, it is clear that the agency collects and analyzes significant amounts of data from US communications systems in the course of monitoring foreign targets.
  • On December 26 2012, SSO announced what it described as a new capability to allow it to collect far more internet traffic and data than ever before. With this new system, the NSA is able to direct more than half of the internet traffic it intercepts from its collection points into its own repositories. One end of the communications collected are inside the United States.The NSA called it the "One-End Foreign (1EF) solution". It intended the program, codenamed EvilOlive, for "broadening the scope" of what it is able to collect. It relied, legally, on "FAA Authority", a reference to the 2008 Fisa Amendments Act that relaxed surveillance restrictions.This new system, SSO stated in December, enables vastly increased collection by the NSA of internet traffic. "The 1EF solution is allowing more than 75% of the traffic to pass through the filter," the SSO December document reads. "This milestone not only opened the aperture of the access but allowed the possibility for more traffic to be identified, selected and forwarded to NSA repositories."
  • It continued: "After the EvilOlive deployment, traffic has literally doubled."The scale of the NSA's metadata collection is highlighted by references in the documents to another NSA program, codenamed ShellTrumpet.On December 31, 2012, an SSO official wrote that ShellTrumpet had just "processed its One Trillionth metadata record".
  • ...4 more annotations...
  • Explaining that the five-year old program "began as a near-real-time metadata analyzer … for a classic collection system", the SSO official noted: "In its five year history, numerous other systems from across the Agency have come to use ShellTrumpet's processing capabilities for performance monitoring" and other tasks, such as "direct email tip alerting."Almost half of those trillion pieces of internet metadata were processed in 2012, the document detailed: "though it took five years to get to the one trillion mark, almost half of this volume was processed in this calendar year".
  • Another SSO entry, dated February 6, 2013, described ongoing plans to expand metadata collection. A joint surveillance collection operation with an unnamed partner agency yielded a new program "to query metadata" that was "turned on in the Fall 2012". Two others, called MoonLightPath and Spinneret, "are planned to be added by September 2013."A substantial portion of the internet metadata still collected and analyzed by the NSA comes from allied governments, including its British counterpart, GCHQ.
  • An SSO entry dated September 21, 2012, announced that "Transient Thurible, a new Government Communications Head Quarters (GCHQ) managed XKeyScore (XKS) Deep Dive was declared operational." The entry states that GCHQ "modified" an existing program so the NSA could "benefit" from what GCHQ harvested."Transient Thurible metadata [has been] flowing into NSA repositories since 13 August 2012," the entry states.
  • A review of top-secret NSA documents suggests that the surveillance agency still collects and sifts through large quantities of Americans' online data – despite the Obama administration's insistence that the program that began under Bush ended in 2011.Shawn Turner, the Obama administration's director of communications for National Intelligence, told the Guardian that "the internet metadata collection program authorized by the Fisa court was discontinued in 2011 for operational and resource reasons and has not been restarted."But the documents indicate that the amount of internet metadata harvested, viewed, processed and overseen by the Special Source Operations (SSO) directorate inside the NSA is extensive.While there is no reference to any specific program currently collecting purely domestic internet metadata in bulk, it is clear that the agency collects and analyzes significant amounts of data from US communications systems in the course of monitoring foreign targets.
1More

Wife Of FBI Official Probing Clinton Emails Got $675K In Donations From Dems - 0 views

  • Just months after the FBI launched an investigation into Hillary Clinton’s private email server, Democratic Party operatives made a generous donation to the political campaign of the wife of the FBI official who would eventually oversee that investigation. The FBI ultimately cleared Clinton of any criminal wrongdoing, creating the impression that the Democrats may have bribed the Bureau to keep their nominee out of trouble. According to a report published Monday by The Wall Street Journal, Virginia Gov. Terry McAuliffe, a long-time associate of the Clintons, helped funnel over $675,000 of donations into the 2015 Virginia state Senate campaign of Jill McCabe, the wife of Andrew McCabe, who is now the deputy director of the FBI. Of the total, $467,500 came directly from Common Good VA, McAuliffe’s PAC, while an additional $207,788 came out of the coffers of the Virginia Democratic Party, over which McAuliffe exerts almost total control. Devlin Barrett, a Wall Street Journal reporter who covers the Justice Department, noted that Andrew McCabe was promoted as deputy director after the donations were made. He added: “Mr. McAuliffe and other state party leaders recruited Dr. McCabe to run, according to party officials. She lost the election to incumbent Republican Dick Black.” According to Barrett, the donations represented about one-third of Jill McCabe’s total campaign war chest.
3More

Pepe Escobar - The real November surprise -- Puppet Masters -- Sott.net - 0 views

  • "As bad as it is the folks above the President make the decisions. They may have decided on Trump. These things do not happen by accident." Thus spoke a high-level US business mover and shaker with secure transit in rarified Masters of the Universe-related circles, amidst the utter political chaos provoked by head of the FBI James Comey's latest bombshell. It's virtually established by now that US Attorney General Loretta Lynch told Comey not to release his letter to Congress. But Comey did it anyway. If he had not, and a scandal would - inevitably - spring up after the US presidential election, Lynch would be perfectly positioned to deny she knew anything, and Comey would be on the firing line. Lynch is a certified Clinton machine asset. In 1999 then-President Bill Clinton appointed her to run the Brooklyn US Attorney's office. She left in 2002, taking the private practice revolving door. She was back to the Brooklyn office in 2010, urged by Obama. Five years later she became the 83rd US Attorney General, replacing the dodgy Eric Holder. A plausible case has been made that Comey took his fateful decision based on a serious internal revolt at the FBI - led by key people he trusts — as well as being egged-on by his wife. Yet one of the key questions that refuse to go away is why the FBI waited until 11 days before the US presidential election to supposedly "find" an email trove on certified sexting pervert Anthony Weiner's laptop.
  •      "As bad as it is the folks above the President make the decisions. They may have decided on Trump. These things do not happen by accident." Thus spoke a high-level US business mover and shaker with secure transit in rarified Masters of the Universe-related circles, amidst the utter political chaos provoked by head of the FBI James Comey's latest bombshell. It's virtually established by now that US Attorney General Loretta Lynch told Comey not to release his letter to Congress. But Comey did it anyway. If he had not, and a scandal would - inevitably - spring up after the US presidential election, Lynch would be perfectly positioned to deny she knew anything, and Comey would be on the firing line. Lynch is a certified Clinton machine asset. In 1999 then-President Bill Clinton appointed her to run the Brooklyn US Attorney's office. She left in 2002, taking the private practice revolving door. She was back to the Brooklyn office in 2010, urged by Obama. Five years later she became the 83rd US Attorney General, replacing the dodgy Eric Holder. A plausible case has been made that Comey took his fateful decision based on a serious internal revolt at the FBI - led by key people he trusts — as well as being egged-on by his wife. Yet one of the key questions that refuse to go away is why the FBI waited until 11 days before the US presidential election to supposedly "find" an email trove on certified sexting pervert Anthony Weiner's laptop.
  • The business source, although unsympathetic to the Clinton machine, especially in foreign policy, is a realpolitik practitioner, not a conspiracy theorist. He is adamant that, "the FBI reversal could not have happened without orders above the President. If the Masters [of the Universe] have changed their mind, then they will destroy Hillary." He adds, "they can make a deal with Donald just like anyone else; Donald wins; the Masters win; the people think that their voice has been heard. And then there will be some sort of (controlled) change." What's paramount in the whole soap opera is that faith in the US political system — as corrupt as it may be — must endure. That mirrors the faith in the US dollar; if confidence in the US dollar fails, the US as a hegemonic financial power is no more. The source is equally adamant that, "it is almost unprecedented to see a cover-up as extensive as Hillary's. A secret meeting between Bill Clinton and the Attorney General; the FBI ignoring all evidence and initially clearing Hillary to near rebellion of the whole of the FBI, attested to by Rudolf Giuliani whose reputation as a federal prosecutor is unquestioned; the Clinton "pay for play" foundation. The Masters are troubled that this is getting out of hand." The record shows that "the Masters do not usually have to go to such lengths to protect their own. They did manage to save Bill Clinton from the Monica Lewinsky perjury and keep him in the presidency. The Masters were not attacked in this case. They even got away with the 1987 cash settlement crash and the theft surrounding the Lehman debacle. In all these cases there were no overarching challenges to their control, as we see now open to the public by Trump. They antagonized and insulted the wrong man."
2More

Pentagon and intelligence community chiefs have urged Obama to remove the head of the N... - 0 views

  • The heads of the Pentagon and the nation’s intelligence community have recommended to President Obama that the director of the National Security Agency, Adm. Michael S. Rogers, be removed. The recommendation, delivered to the White House last month, was made by Defense Secretary Ashton B. Carter and Director of National Intelligence James R. Clapper Jr., according to several U.S. officials familiar with the matter. Action has been delayed, some administration officials said, because relieving Rogers of his duties is tied to another controversial recommendation: to create separate chains of command at the NSA and the military’s cyberwarfare unit, a recommendation by Clapper and Carter that has been stalled because of other issues. The news comes as Rogers is being considered by President-elect Donald Trump to be his nominee for director of national intelligence to replace Clapper as the official who oversees all 17 U.S. intelligence agencies. In a move apparently unprecedented for a military officer, Rogers, without notifying superiors, traveled to New York to meet with Trump on Thursday at Trump Tower. That caused consternation at senior levels of the administration, according to the officials, who spoke on the condition of anonymity to discuss internal personnel matters.
  • The White House, Pentagon and Office of the Director of National Intelligence declined to comment. The NSA did not respond to requests for comment. Carter has concerns with Rogers’s performance, officials said. The driving force for Clapper, meanwhile, was the separation of leadership roles at the NSA and U.S. Cyber Command, and his stance that the NSA should be headed by a civilian.
9More

First Unitarian Church of Los Angeles v. NSA | Electronic Frontier Foundation - 0 views

  • Twenty-two organizations including Unitarian church groups, gun ownership advocates, and a broad coalition of membership and political advocacy organizations filed suit against the National Security Agency for violating their First Amendment right of association by illegally collecting their call records. The coalition is represented by EFF. At the heart of First Unitarian Church of Los Angeles v. NSA is the bulk telephone records collection program that was confirmed by the publication of an order from the Foreign Intelligence Surveillance Court (FISC) in June of 2013. The Director of National Intelligence (DNI) further confirmed that this formerly secret document was authentic, and part of a broader program to collect all major telecommunications customers’ call history. The order demands wholesale collection of every call made, the location of the phone, the time of the call, the duration of the call, and other “identifying information” for every phone and call for all customers of Verizon for a period of three months. Government officials further confirmed that this was just one of series of orders issued on a rolling basis since at least 2006. First Unitarian v. NSA argues that this spying violates the First Amendment, which protects the freedom to associate and express political views as a group.
  • Twenty-two organizations including Unitarian church groups, gun ownership advocates, and a broad coalition of membership and political advocacy organizations filed suit against the National Security Agency for violating their First Amendment right of association by illegally collecting their call records. The coalition is represented by EFF. At the heart of First Unitarian Church of Los Angeles v. NSA is the bulk telephone records collection program that was confirmed by the publication of an order from the Foreign Intelligence Surveillance Court (FISC) in June of 2013. The Director of National Intelligence (DNI) further confirmed that this formerly secret document was authentic, and part of a broader program to collect all major telecommunications customers’ call history. The order demands wholesale collection of every call made, the location of the phone, the time of the call, the duration of the call, and other “identifying information” for every phone and call for all customers of Verizon for a period of three months. Government officials further confirmed that this was just one of series of orders issued on a rolling basis since at least 2006. First Unitarian v. NSA argues that this spying violates the First Amendment, which protects the freedom to associate and express political views as a group.
  • The case challenges the mass telephone records collection that was confirmed by the FISA Order that was published on June 5, 2013 and confirmed by the Director of National Intelligence (DNI) on June 6, 2013. The DNI confirmed that the collection was “broad in scope” and conducted under the “business records” provision of the Foreign Intelligence Surveillance Act, also known as section 215 of the Patriot Act and 50 U.S.C. section 1861. The facts have long been part of EFF’s Jewel v. NSA case. The case does not include section 702 programs, which includes the recently made public and called the PRISM program or the fiber optic splitter program that is included (along with the telephone records program) in the Jewel v. NSA case. 
  • ...5 more annotations...
  • Our goal is to highlight one of the most important ways that the government collection of telephone records is unconstitutional: it violates the First Amendment right of association. When the government gets access to the phone records of political and activist organizations and their members, it knows who is talking to whom, when, and for how long. This so-called “metadata,” especially when collected in bulk and aggregated, tracks the associations of these organizations. After all, if the government knows that you call the Unitarian Church or Calguns or People for the American Way or Students for Sensible Drug Policy regularly, it has a very good indication that you are a member and it certainly knows that you associate regularly. The law has long recognized that government access to associations can create a chilling effect—people are less likely to associate with organizations when they know the government is watching and when the government can track their associations. 
  • Twenty-two organizations including Unitarian church groups, gun ownership advocates, and a broad coalition of membership and political advocacy organizations filed suit against the National Security Agency for violating their First Amendment right of association by illegally collecting their call records. The coalition is represented by EFF. At the heart of First Unitarian Church of Los Angeles v. NSA is the bulk telephone records collection program that was confirmed by the publication of an order from the Foreign Intelligence Surveillance Court (FISC) in June of 2013. The Director of National Intelligence (DNI) further confirmed that this formerly secret document was authentic, and part of a broader program to collect all major telecommunications customers’ call history. The order demands wholesale collection of every call made, the location of the phone, the time of the call, the duration of the call, and other “identifying information” for every phone and call for all customers of Verizon for a period of three months. Government officials further confirmed that this was just one of series of orders issued on a rolling basis since at least 2006. First Unitarian v. NSA argues that this spying violates the First Amendment, which protects the freedom to associate and express political views as a group.
  • The First Amendment right of association is a well established doctrine that prevents the government “interfering with the right to peaceably assemble or prohibit the petition for a governmental redress of grievances.” The most famous case embracing it is a 1958 Supreme Court Case from the Civil Rights era called  NAACP v. Alabama. In that case the Supreme Court held that it would violate the First Amendment for the NAACP to have to turn over its membership lists in litigation. The right stems from the simple fact that the First Amendment protects the freedom to associate and express political views as a group. This constitutional protection is critical because, as the court noted “[e]ffective advocacy of both public and private points of view, particularly controversial ones, is undeniably enhanced by group association[.]” NAACP v. Alabama, 357 U.S. at 460. As another court noted: the Constitution protects freedom of association to encourage the “advancing ideas and airing grievances” Bates v. City of Little Rock, 361 U.S. 516, 522-23 (1960).
  • The collection and analysis of telephone records give the government a broad window into our associations. The First Amendment protects against this because, as the Supreme Court has recognized, “it may induce members to withdraw from the association and dissuade others from joining it because of fear of exposure of their beliefs shown through their associations and of the consequences of their exposure.” NAACP v. Alabama, 357 U.S. at 462-63. See also Bates, 361 U.S. at 523; Gibson v. Florida Legislative Investigation Comm., 372 U.S. 539 (1963).  Privacy in one’s associational ties is also closely linked to freedom of association: “Inviolability of privacy in group association may in many circumstances be indispensable to preservation of freedom of association, particularly where a group espouses dissident beliefs.” NAACP v. Alabama, 357 U.S. at 462. 
  • The Supreme Court has made clear that infringements on freedom of association may survive constitutional scrutiny only when they “serve compelling state interests, unrelated to the suppression of ideas, that cannot be achieved through means significantly less restrictive of associational freedoms.” Roberts v. United States Jaycees, 468 U.S. 609, 623 (1984); see also NAACP v. Button, 371 U.S. at 341; Knox v. SEIU, Local 1000, 132 S. Ct. 2277, 2291 (2012)  Here, the wholesale collection of telephone records of millions of innocent Americans’ communications records, and thereby collection of their associations, is massively overbroad, regardless of the government’s interest. Thus, the NSA spying program fails under the basic First Amendment tests that have been in place for over fifty years.
  •  
    This case is related to EFF's earlier pending case, Jewel v. NSA and has been assigned to Judge Whyte, the same judge who ruled earlier in Jewel that the State Secrets Privilege does not apply to NSA's call metadata "haystack." The plaintiffs are 22 different groups who would make strange bedfellows indeed, except in opposition to government surveillance and repression. 
3More

Congressmen Call For DNI Clapper's Ouster | Threatpost - English - Global - threatpost.com - 0 views

  • A group of six Congressmen have asked President Barack Obama to remove James Clapper as director of national intelligence as a result of his misstatements to Congress about the NSA’s dragnet data-collection programs. The group, led by Rep. Darrell Issa (R-Calif.), said that Clapper’s role as DNI “is incompatible with the goal of restoring trust in our security programs”.
  • Clapper is the former head of the National Geospatial Intelligence Agency and has been DNI since 2010. In their letter to Obama, the group of Congressmen calling for his ouster said that he lied to Congress and should no longer be in office. “The continued role of James Clapper as Director of National Intelligence is incompatible with the goal of restoring trust in our security programs and ensuring the highest level of transparency. Director Clapper continues to hold his position despite lying to Congress, under oath, about the existence of bulk data collection programs in March 2013. Asking Director Clapper, and other federal intelligence officials who misrepresented programs to Congress and the courts, to report to you on needed reforms and the future role of government surveillance is not a credible solution,” the letter from Issa, Ted Poe, Paul Broun, Doug Collins, Walter Jones and Alan Grayson says. The Congressmen sent the letter to Obama on Monday, 10 days after the president gave a much-anticipated speech on the NSA’s role and some new limits he wants to place on the scope of its data collection. Security experts and privacy advocates were not enthusiastic about the changes Obama announced, which included a recommendation that a third party hold phone metadata records, which are now stored by the NSA.
  • One issue that Obama didn’t address in his speech was the agency’s alleged subversion of cryptographic standards and algorithms. In their letter, Issa and his colleagues urged Obama to address this issue. “While the collection of bulk telephone records (meta-data) under Section 215 of the PATRIOT Act has understandably garnered the most significant public debate over government overreach, considerable concern has been raised about the govemment’s exploitation of the Internet through circumvention of encryption. The Review Group recognized the potential hazard created by exposing vulnerabilities in encryption data and recommended that your Administration support, rather than undermine, efforts to protect the integrity of these systems.3 However, your January 17′th speech failed to address the future of encryption related programs. Internet freedom is indispensible, and reports regarding the govemment’s treatment of encryption protocols underscore the need to provide leadership and clarity beyond the collection of telephone records,” the letter says.
5More

NSA chief criticises media and suggests UK was right to detain David Miranda | World ne... - 0 views

  • The outgoing director of the National Security Agency lashed out at media organizations reporting on Edward Snowden’s surveillance revelations, suggesting that British authorities were right to detain David Miranda on terrorism charges and that reporters lack the ability to properly analyze the NSA’s broad surveillance powers.General Keith Alexander, who has furiously denounced the Snowden revelations, said at a Tuesday cybersecurity panel that unspecified “headway” on what he termed “media leaks” was forthcoming in the next several weeks, possibly to include “media leaks legislation.”
  • The general, who is due to retire in the next several weeks, said that the furore over Snowden’s surveillance revelations – which he referred to only as “media leaks” – was complicating his ability to get congressional support for a bill that would permit the NSA and the military Cyber Command he also helms to secretly communicate with private entities like banks about online data intrusions and attacks.“We’ve got to handle media leaks first,” Alexander said.“I think we are going to make headway over the next few weeks on media leaks. I am an optimist. I think if we make the right steps on the media leaks legislation, then cyber legislation will be a lot easier,” Alexander said.The specific legislation to which Alexander referred was unclear. Angela Canterbury, the policy director for the Project on Government Oversight, a watchdog group, said she was unaware of any such bill. Neither was Steve Aftergood, an intelligence policy analyst at the Federation of American Scientists.The NSA’s public affairs office did not immediately respond to a request for comment.Alexander has previously mused about “stopping” journalism related to the Snowden revelations.“We ought to come up with a way of stopping it. I don’t know how to do that. That’s more of the courts and the policymakers but, from my perspective, it’s wrong to allow this to go on,” he told an official Defense Department blog in October.
  • While Attorney General Eric Holder said last year that he had no plans to pursue charges against Greenwald, pro-NSA officials have recently taken to using loaded legal language when referring to the journalists reporting on the Snowden documents.James Clapper, the director of national intelligence, called on Snowden and unnamed “accomplices” to return the surveillance documents cache during congressional testimony in January. The chairman of the House intelligence committee, Mike Rogers of Michigan, called Greenwald a “thief” last month.Like other NSA officials and their allies over the past several months, Alexander has become more visible to the public, part of the NSA’s push to regain control of the public narrative as the Obama administration and members of Congress debate the future scope of the NSA’s powers.In an October interview with the New York Times, Alexander said: “I do feel it’s important to have a public, transparent discussion on cyber so that the American people know what’s going on.”
  • ...1 more annotation...
  • But staff at Georgetown University, which sponsored the Tuesday cybersecurity forum, took the microphone away from a Guardian reporter who attempted to ask Alexander if the NSA had missed the signs of Russia’s invasion and occupation of Ukraine, which appeared to take Obama administration policymakers by surprise.Although the event was open to reporters, journalists were abruptly told following the NSA director’s remarks that they were not permitted to ask questions of Alexander, who did not field the Ukraine question. Following the event, security staff closed a stairwell gate on journalists who attempted to ask Alexander questions on his way out.
  •  
    The scary part is that Alexander apparently believes Congress will pass such legislation and the Supreme Court will uphold it. That's despite even mainstream media having declared open season on the NSA because of government prosecutions of members of the media for publishing leaks and prosecutions of members of the media for refusing to reveal sources.  
14More

How the NSA Plans to Infect 'Millions' of Computers with Malware - The Intercept - 0 views

  • Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process. The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks. The covert infrastructure that supports the hacking efforts operates from the agency’s headquarters in Fort Meade, Maryland, and from eavesdropping bases in the United Kingdom and Japan. GCHQ, the British intelligence agency, appears to have played an integral role in helping to develop the implants tactic.
  • The NSA began rapidly escalating its hacking efforts a decade ago. In 2004, according to secret internal records, the agency was managing a small network of only 100 to 150 implants. But over the next six to eight years, as an elite unit called Tailored Access Operations (TAO) recruited new hackers and developed new malware tools, the number of implants soared to tens of thousands. To penetrate foreign computer networks and monitor communications that it did not have access to through other means, the NSA wanted to go beyond the limits of traditional signals intelligence, or SIGINT, the agency’s term for the interception of electronic communications. Instead, it sought to broaden “active” surveillance methods – tactics designed to directly infiltrate a target’s computers or network devices. In the documents, the agency describes such techniques as “a more aggressive approach to SIGINT” and says that the TAO unit’s mission is to “aggressively scale” these operations. But the NSA recognized that managing a massive network of implants is too big a job for humans alone.
  • “One of the greatest challenges for active SIGINT/attack is scale,” explains the top-secret presentation from 2009. “Human ‘drivers’ limit ability for large-scale exploitation (humans tend to operate within their own environment, not taking into account the bigger picture).” The agency’s solution was TURBINE. Developed as part of TAO unit, it is described in the leaked documents as an “intelligent command and control capability” that enables “industrial-scale exploitation.”
  • ...10 more annotations...
  • TURBINE was designed to make deploying malware much easier for the NSA’s hackers by reducing their role in overseeing its functions. The system would “relieve the user from needing to know/care about the details,” the NSA’s Technology Directorate notes in one secret document from 2009. “For example, a user should be able to ask for ‘all details about application X’ and not need to know how and where the application keeps files, registry entries, user application data, etc.” In practice, this meant that TURBINE would automate crucial processes that previously had to be performed manually – including the configuration of the implants as well as surveillance collection, or “tasking,” of data from infected systems. But automating these processes was about much more than a simple technicality. The move represented a major tactical shift within the NSA that was expected to have a profound impact – allowing the agency to push forward into a new frontier of surveillance operations. The ramifications are starkly illustrated in one undated top-secret NSA document, which describes how the agency planned for TURBINE to “increase the current capability to deploy and manage hundreds of Computer Network Exploitation (CNE) and Computer Network Attack (CNA) implants to potentially millions of implants.” (CNE mines intelligence from computers and networks; CNA seeks to disrupt, damage or destroy them.)
  • But not all of the NSA’s implants are used to gather intelligence, the secret files show. Sometimes, the agency’s aim is disruption rather than surveillance. QUANTUMSKY, a piece of NSA malware developed in 2004, is used to block targets from accessing certain websites. QUANTUMCOPPER, first tested in 2008, corrupts a target’s file downloads. These two “attack” techniques are revealed on a classified list that features nine NSA hacking tools, six of which are used for intelligence gathering. Just one is used for “defensive” purposes – to protect U.S. government networks against intrusions.
  • The NSA has a diverse arsenal of malware tools, each highly sophisticated and customizable for different purposes. One implant, codenamed UNITEDRAKE, can be used with a variety of “plug-ins” that enable the agency to gain total control of an infected computer. An implant plug-in named CAPTIVATEDAUDIENCE, for example, is used to take over a targeted computer’s microphone and record conversations taking place near the device. Another, GUMFISH, can covertly take over a computer’s webcam and snap photographs. FOGGYBOTTOM records logs of Internet browsing histories and collects login details and passwords used to access websites and email accounts. GROK is used to log keystrokes. And SALVAGERABBIT exfiltrates data from removable flash drives that connect to an infected computer. The implants can enable the NSA to circumvent privacy-enhancing encryption tools that are used to browse the Internet anonymously or scramble the contents of emails as they are being sent across networks. That’s because the NSA’s malware gives the agency unfettered access to a target’s computer before the user protects their communications with encryption. It is unclear how many of the implants are being deployed on an annual basis or which variants of them are currently active in computer systems across the world.
  • Infiltrating cellphone networks, however, is not all that the malware can be used to accomplish. The NSA has specifically tailored some of its implants to infect large-scale network routers used by Internet service providers in foreign countries. By compromising routers – the devices that connect computer networks and transport data packets across the Internet – the agency can gain covert access to monitor Internet traffic, record the browsing sessions of users, and intercept communications. Two implants the NSA injects into network routers, HAMMERCHANT and HAMMERSTEIN, help the agency to intercept and perform “exploitation attacks” against data that is sent through a Virtual Private Network, a tool that uses encrypted “tunnels” to enhance the security and privacy of an Internet session.
  • Eventually, the secret files indicate, the NSA’s plans for TURBINE came to fruition. The system has been operational in some capacity since at least July 2010, and its role has become increasingly central to NSA hacking operations. Earlier reports based on the Snowden files indicate that the NSA has already deployed between 85,000 and 100,000 of its implants against computers and networks across the world, with plans to keep on scaling up those numbers. The intelligence community’s top-secret “Black Budget” for 2013, obtained by Snowden, lists TURBINE as part of a broader NSA surveillance initiative named “Owning the Net.” The agency sought $67.6 million in taxpayer funding for its Owning the Net program last year. Some of the money was earmarked for TURBINE, expanding the system to encompass “a wider variety” of networks and “enabling greater automation of computer network exploitation.”
  • Before it can extract data from an implant or use it to attack a system, the NSA must first install the malware on a targeted computer or network. According to one top-secret document from 2012, the agency can deploy malware by sending out spam emails that trick targets into clicking a malicious link. Once activated, a “back-door implant” infects their computers within eight seconds. There’s only one problem with this tactic, codenamed WILLOWVIXEN: According to the documents, the spam method has become less successful in recent years, as Internet users have become wary of unsolicited emails and less likely to click on anything that looks suspicious. Consequently, the NSA has turned to new and more advanced hacking techniques. These include performing so-called “man-in-the-middle” and “man-on-the-side” attacks, which covertly force a user’s internet browser to route to NSA computer servers that try to infect them with an implant.
  • To perform a man-on-the-side attack, the NSA observes a target’s Internet traffic using its global network of covert “accesses” to data as it flows over fiber optic cables or satellites. When the target visits a website that the NSA is able to exploit, the agency’s surveillance sensors alert the TURBINE system, which then “shoots” data packets at the targeted computer’s IP address within a fraction of a second. In one man-on-the-side technique, codenamed QUANTUMHAND, the agency disguises itself as a fake Facebook server. When a target attempts to log in to the social media site, the NSA transmits malicious data packets that trick the target’s computer into thinking they are being sent from the real Facebook. By concealing its malware within what looks like an ordinary Facebook page, the NSA is able to hack into the targeted computer and covertly siphon out data from its hard drive. A top-secret animation demonstrates the tactic in action.
  • The TURBINE implants system does not operate in isolation. It is linked to, and relies upon, a large network of clandestine surveillance “sensors” that the agency has installed at locations across the world.
  • The NSA’s headquarters in Maryland are part of this network, as are eavesdropping bases used by the agency in Misawa, Japan and Menwith Hill, England. The sensors, codenamed TURMOIL, operate as a sort of high-tech surveillance dragnet, monitoring packets of data as they are sent across the Internet. When TURBINE implants exfiltrate data from infected computer systems, the TURMOIL sensors automatically identify the data and return it to the NSA for analysis. And when targets are communicating, the TURMOIL system can be used to send alerts or “tips” to TURBINE, enabling the initiation of a malware attack. The NSA identifies surveillance targets based on a series of data “selectors” as they flow across Internet cables. These selectors, according to internal documents, can include email addresses, IP addresses, or the unique “cookies” containing a username or other identifying information that are sent to a user’s computer by websites such as Google, Facebook, Hotmail, Yahoo, and Twitter. Other selectors the NSA uses can be gleaned from unique Google advertising cookies that track browsing habits, unique encryption key fingerprints that can be traced to a specific user, and computer IDs that are sent across the Internet when a Windows computer crashes or updates.
  • Documents published with this article: Menwith Hill Station Leverages XKeyscore for Quantum Against Yahoo and Hotmail Five Eyes Hacking Large Routers NSA Technology Directorate Analysis of Converged Data Selector Types There Is More Than One Way to Quantum NSA Phishing Tactics and Man in the Middle Attacks Quantum Insert Diagrams The NSA and GCHQ’s QUANTUMTHEORY Hacking Tactics TURBINE and TURMOIL VPN and VOIP Exploitation With HAMMERCHANT and HAMMERSTEIN Industrial-Scale Exploitation Thousands of Implants
  •  
    *Very* long article. Only small portions quoted.
8More

Half of Federal Agencies Still Use Outdated Freedom of Information Regulations - 0 views

  • Nearly half (50 out of 101) of all federal agencies have still not updated their Freedom of Information Act regulations to comply with Congress's 2007 FOIA amendments, and even more agencies (55 of 101) have FOIA regulations that predate and ignore President Obama's and Attorney General Holder's 2009 guidance for a "presumption of disclosure," according to the new National Security Archive FOIA Audit released today to mark Sunshine Week. Congress amended the Freedom of Information Act in 2007 to prohibit agencies from charging processing fees if they missed their response deadlines, to include new online journalists in the fee waiver category for the media, to order agencies to cooperate with the new FOIA ombudsman (the Office of Government Information Services, OGIS), and to require reports of specific data on their FOIA output, among other provisions co-authored by Senators Patrick Leahy (D-VT) and John Cornyn (R-TX). But half the government has yet to incorporate these changes in their regulations, according to the latest National Security Archive FOIA Audit. After President Obama's "Day One" commitments to open government, Attorney General Eric Holder issued new FOIA guidance on March 19, 2009, declaring that agencies should adopt a "presumption of disclosure," encourage discretionary releases if there was no foreseeable harm (even if technically covered by an exemption), proactively post the records of greatest public interest online, and remove "unnecessary bureaucratic hurdles" from the FOIA process. But five years later, the Archive found a majority of agencies have old regulations that simply ignore this guidance.
  • The Archive's FOIA Audit also highlights some good news this Sunshine Week: New plans from both the House of Representatives and White House have the potential to compel delinquent agencies to update their regulations. "Both Congress and the White House now recognize the problem of outdated FOIA regulations, and that is something to celebrate," said Archive director Tom Blanton. "But new regs should not follow the Justice Department's terrible lead, they must follow the best practices already identified by the FOIA ombuds office and FOIA experts." "If and when this important FOIA reform occurs, open government watchdogs must be vigilant to ensure that the agencies' updated regulations are progressive, rather than regressive, and embrace best practices to ensure that more documents are released to requesters, more quickly" said Nate Jones, the Archive's FOIA coordinator.
  • In 2011, the back-to-back Rosemary Award-winning Department of Justice proposed FOIA regulations that would have — among many other FOIA setbacks — allowed the Department to lie to FOIA requesters, eliminated online-only publications from receiving media fee status, and made it easier to destroy records. After intense pushback by openness advocates, the DOJ temporarily pulled these regulations, and Pustay claimed, "some people misinterpreted what we were trying to do, misconstrued some of the provisions, and didn't necessarily understand some of the fee guidelines." Pustay also claimed — to an incredulous Senate Judiciary Committee — that updating FOIA regulations to conform with the 2007 OPEN Government Act was merely optional and "not required." National Security Archive director Tom Blanton warned in his own 2013 Senate testimony that these terrible "vampire" regulations were not gone for good. This year, Pustay testified that the Department of Justice has indeed resubmitted its FOIA regulations for OMB approval; their content is unknown to the public.
  • ...4 more annotations...
  • The House of Representatives recently unanimously passed the bipartisan Freedom of Information Act Implementation Act (H.R. 1211), which includes a provision compelling agencies to update their FOIA regulations. The House bill — which now awaits Senate approval — would require each agency to update its FOIA regulations "not later than 180 days after the enactment of this Act." The White House is also addressing the problem of outdated FOIA regulations, albeit in a different manner. In its latest Open Government Partnership National Action Plan, the White House has committed (on paper, at least) to creating one "core FOIA regulation and common set of practices [that] would make it easier for requesters to understand and navigate the FOIA process and easier for the Government to keep regulations up to date." Transparency watchdogs went on alert this week after the Department of Justice's Director of Information Policy Melanie Pustay announced during her Senate testimony on March 11, 2014 that, "My office is leading that project" to create the White House-backed common regulation which, she estimated will be, "a one or two year project." Despite Pustay's pledge that she would accept input from OGIS and the requester community, her Department's history of crafting FOIA regulations has been anything but stellar.
  • As the Department of Justice and other agencies have demonstrated, new regulations do not necessarily make good regulations. As such, the National Security Archive has recommended that any updated FOIA regulations must: mandate that FOIA officers embrace direct communications with requesters; require agencies to receive requests by e-mail and post all responses and documents online; direct agencies to update their FOIA processing software so documents can be posted to any online repository, including the government-sponsored FOIAonline; encourage agencies to join FOIAonline to make their FOIA processing more cost-effective and efficient; stream-line inter and intra-agency "referral" black holes — and keep requesters abreast of where their requests are if the agency does have to refer them; include language encouraging use of the OGIS, which can help requesters and agencies mediate disputes to avoid animosity and costly litigation; end the practice of using fees to discourage FOIA requesters. The Office of Government Information Services — which reviews and comments on agency regulations as they are proposed — has also compiled a list of best practices for agencies to consider while crafting regulations. These include: "let the Freedom of Information Act itself" — and its presumption for disclosure — "be your guide;" bring attorneys, FOIA processors, records managers and IT pros to the table; include your plan for records management and preservation; and alert requesters of their option to contact OGIS for mediation and dispute resolution services.
  • A useful compilation of current agency FOIA regulation language — already on the books — put together by the Center of Effective Government also includes helpful guidelines on preventing the destruction of requested records; narrowly interpreting claims of confidential business information; and clarifying fee waivers and procedures. FOIA experts are currently working to craft model, pro-transparency, CFR-ready language that agencies — or the drafters of government-wide common regulations — can use to bring agencies' Freedom of Information Act regulations up to standard. Watch this space, and then watch the Code of Federal Regulations (CFR). "As the staffer who waded through every single federal agencies' FOIA website and CFR chapter to locate their — sometimes hidden — regulations, I learned FOIA officials often say they view their FOIA requesters as customers," said Archive researcher Lauren Harper, "I think easy to find, updated model FOIA regulations are the best way for agencies to demonstrate they truly value their customer service, and the spirit of the FOIA."
  • The National Security Archive has conducted thirteen FOIA audits since 2002. Modeled after the California Sunshine Survey and subsequent state "FOI Audits," the Archive's FOIA Audits use open-government laws to test whether or not agencies are obeying those same laws. Recommendations from previous Archive FOIA Audits have led directly to laws and executive orders which have: set explicit customer service guidelines, mandated FOIA backlog reduction, assigned individualized FOIA tracking numbers, forced agencies to report the average number of days needed to process requests, and revealed the (often embarrassing) ages of the oldest pending FOIA requests. The surveys include:
  •  
    Article includes tables indicating which agencies are out of compliance with which FOIA directives. 
1More

You Won't BELIEVE What's Going On with Government Spying on Americans - BlackListedNews... - 1 views

  •  
    "New Revelations Are Breaking Every Day" This web page is very well sourced and filled with links where you will get lost for hours. Excellent reference document ............................ Revelations about the breathtaking scope of government spying are coming so fast that it's time for an updated roundup: - Just weeks after NSA boss Alexander said that a review of NSA spying found not even one violation, the Washington Post published an internal NSA audit showing that the agency has broken its own rules thousands of times each year - 2 Senators on the intelligence committee said the violations revealed in the Post article were just the "tip of the iceberg" - Glenn Greenwald notes:  "One key to the WashPost story: the reports are internal, NSA audits, which means high likelihood of both under-counting & white-washing".(Even so, the White House tried to do damage control by retroactively changing on-the-record quotes) - The government is spying on essentially everything we do. It is not just "metadata" … although that is enough to destroy your privacy - The government has adopted a secret interpretation of the Patriot Act which allows it to pretend that "everything" is relevant … so it spies on everyone - NSA whistleblowers say that the NSA collects all of our conversations word-for-word - It's not just the NSA … Many other agencies, like the FBI and IRS - concerned only with domesticissues - spy on Americans as well - The information gained through spying is shared with federal, state and local agencies, and they are using that information to prosecute petty crimes such as drugs and taxes.  The agencies are instructed to intentionally "launder" the information gained through spying, i.e. to pretend that they got the information in a more legitimate way … and to hide that from defense attorneys and judges - Top counter-terror experts say that the government's mass spying doesn't keep us
4More

Quitting Over Syria | The American Conservative - 0 views

  • The release of the White House “Government Assessment” on August 30, providing the purported evidence to support a bombing attack on Syria, defused a conflict with the intelligence community that had threatened to become public through the mass resignation of a significant number of analysts. The intelligence community’s consensus view on the status of the Syrian chemical-weapons program was derived from a National Intelligence Estimate (NIE) completed late last year and hurriedly updated this past summer to reflect the suspected use of chemical weapons against rebels and civilians. The report maintained that there were some indications that the regime was using chemicals, while conceding that there was no conclusive proof. There was considerable dissent from even that equivocation, including by many analysts who felt that the evidence for a Syrian government role was subject to interpretation and possibly even fabricated. Some believed the complete absence of U.S. satellite intelligence on the extensive preparations that the government would have needed to make in order to mix its binary chemical system and deliver it on target was particularly disturbing. These concerns were reinforced by subsequent UN reports suggesting that the rebels might have access to their own chemical weapons. The White House, meanwhile, considered the somewhat ambiguous conclusion of the NIE to be unsatisfactory, resulting in considerable pushback against the senior analysts who had authored the report.
  • In a scenario unfortunately reminiscent of the lead up to Iraq, the National Security Council tasked the various intelligence agencies to beat the bushes and come up with more corroborative information. Israel obligingly provided what was reported to be interceptions of telephone conversations implicating the Syrian army in the attack, but it was widely believed that the information might have been fabricated by Tel Aviv, meaning that bad intelligence was being used to confirm other suspect information, a phenomenon known to analysts as “circular reporting.” Other intelligence cited in passing by the White House on the trajectories and telemetry of rockets that may have been used in the attack was also somewhat conjectural and involved weapons that were not, in fact, in the Syrian arsenal, suggesting that they were actually fired by the rebels. Also, traces of Sarin were not found in most of the areas being investigated, nor on one of the two rockets identified. Whether the victims of the attack suffered symptoms of Sarin was also disputed, and no autopsies were performed to confirm the presence of the chemical. 
  • With all evidence considered, the intelligence community found itself with numerous skeptics in the ranks, leading to sharp exchanges with the Director of Central Intelligence John Brennan and Director of National Intelligence James Clapper. A number of analysts threatened to resign as a group if their strong dissent was not noted in any report released to the public, forcing both Brennan and Clapper to back down. This led to the White House issuing its own assessment, completely divorcing the process from any direct connection to the intelligence community. The spectacle of CIA Director George Tenet sitting behind Secretary of State Colin Powell in the United Nations, providing him with credibility as Powell told a series of half-truths, would not be repeated. Philip Giraldi, a former CIA officer, is executive director of the Council for the National Interest.
  •  
    More detail about backing up previous reports that the information supplied in the White House "Government Assessment of the Syrian Government's Use of Chemical Weapons on August 21, 2013" cooking of intelligence to justify missile strikes on Syria. Note that the same day the Assessment was published by the White House Offiice of the Press Secretary, active duty intelligence officials passed a message to Obama through veteran intelligence officers that the intelligence in the report was unreliable and that there was strong evidence that it was the "rebels" rather than Syrian government that had used sarin gas. http://www.globalresearch.ca/u-s-military-and-intelligence-officials-to-obama-assad-not-responsible-for-chemical-attack/5348576 Next came a report three days later citing and quoting an anonymous former intelligence official who said the format used and its publication by the White House rather than by the Chief of Intelligence were both strong indications that the document was not the product of the intelligence community. http://www.ipsnews.net/2013/09/obamas-case-for-syria-didnt-reflect-intel-consensus/ Now we learn the reason the White House had to cook its own "public summary of intelligence,"  because many top intelligence threatened to resign if the cherry-picked version of events without reservations explaining the likelihood that it was the rebels who did it. So the Obama Administration, like the Bush II Administration, deliberately lied to the public in an attempt to stampede the nation into another foreign war in the Mideast. The only relevant difference is that Obama didn't get away with launching his own "shock and awe" campaign. Impeachable offense? Yes. Likely to happen? No. Too many hawks in Congress who want war against both Syria and Iran.
4More

U.S. spy chiefs face Congress amid spying rift with Europe | Reuters - 0 views

  • When top U.S. intelligence officials testified at a congressional hearing weeks ago, the public uproar was over the National Security Agency collecting the phone and email records of Americans. But when the NSA director and other spy chiefs appear at a House Intelligence Committee hearing on Tuesday it will be against a backdrop of angry European allies accusing the United States of spying on their leaders and citizens.
  • The most prominent target appears to have been German Chancellor Angela Merkel, whose mobile phone was allegedly tapped by the NSA.More than any previous disclosures from material given to journalists by former NSA contractor Edward Snowden, the reports of spying on close U.S. allies have forced the White House to promise reforms and even acknowledge that America's electronic surveillance may have gone too far."We recognize there needs to be additional constraints on how we gather and use intelligence," White House spokesman Jay Carney said on Monday.U.S. Senator Dianne Feinstein, who chairs the Senate's intelligence committee, joined the ranks of critics on Monday, expressing outrage at U.S. intelligence collection on allies, and pique that her committee was not informed."With respect to NSA collection of intelligence on leaders of U.S. allies - including France, Spain, Mexico and Germany -let me state unequivocally: I am totally opposed," said Feinstein, who appeared to confirm U.S. spying on Merkel's communications since 2002.
  • NSA Director General Keith Alexander, NSA Deputy Director Chris Inglis, Director of National Intelligence James Clapper and Deputy Attorney General James Cole will testify at an open hearing of the House Intelligence Committee at 1:30 p.m. (1730 GMT) on Tuesday.Their testimony will cover NSA programs and potential changes to the Foreign Intelligence Surveillance Act, which regulates electronic eavesdropping.
  •  
    Two major developments, likely not isolated from each other: [i] Sen. Feinstein says the Senate oversight committee was not informed of spying on world leaders and moves into the NSA reform camp; [ii] the WhiteHouse falls back to a position calling for additional restraints on NSA. These two events are likely akin to that of rats escaping a sinking ship. Meanwhile, both the head of the NSA and his top deputy are to resign in the next few months, supposedly voluntarily. http://www.upi.com/Top_News/US/2013/10/17/NSA-chief-Gen-Keith-Alexander-to-retire/UPI-91531381982460/ (The "voluntarily" part ignores that high officials who embarrass their superiors are often given their choice between resigning or being fired.) The retirement announcement (notably unattributed) followed only a week after a report in Foreign Affairs that the NSA leaders felt that they had been left hung out to dry by the Obama Administration. http://www.foreignpolicy.com/articles/2013/10/10/nsa_veterans_the_white_house_is_hanging_us_out_to_dry  So there is reason to suspect that the resignations were the direct result of their criticism of Obama, sourced only two four unidentified high NSA officials. The bottom line: we have finally passed the tipping point: NSA spying will be curbed. The only remaining issues: in what manner and to what extent?      
3More

Son of US Vice President joins Board of Directors of Burisma Holdings Ukraine - 0 views

  • Hunter Biden will head  legal unit and will provide support for the Company among international organizations.
  • Russian media is fanning this story and calling it a deal between Kiev leadership to US to please people in power in Congress. It may be mentioned that US Vice President visited Kiev on April 21-22 and commented that new leadership of Ukraine should look grave affairs and stressed the need for the new authorities to tackle corruption, adding: “The opportunity to generate a united Ukraine, getting it right is within your grasp.”
  • R. Hunter Biden is a counsel to Boies, Schiller & Flexner LLP, a national law firm based in New York, USA, which served in cases including “Bush vs. Gore”, and “U.S. vs. Microsoft”. Biden has experience in public service and foreign policy. He is a director for the U.S. Global Leadership Coalition, The Center for National Policy, and the Chairman’s Advisory Board for the National Democratic Institute. Having served as a Senior Vice President at MBNA bank, former U.S. President Bill Clinton appointed him an Executive Director of E-Commerce Policy Coordination under Secretary of Commerce William Daley. Mr. Biden served as Honorary Co-Chair of the 2008 Obama-Biden Inaugural Committee
4More

Panetta Says Rahm Emanuel Cussed Him Out for Cooperating With Torture Inquiry - The Int... - 0 views

  • Former CIA Director Leon Panetta, in his new book, describes being summoned to a White House meeting and cussed out by President Obama’s chief of staff after he agreed to give the Senate intelligence committee access to documents chronicling the agency’s use of torture during the Bush administration. “The president wants to know who the fuck authorized this release to the committees,” Rahm Emanuel, who served as Obama’s chief of staff and enforcer in 2009 and 2010, is quoted as saying while slamming the table for emphasis.
  • He describes being micromanaged and second-guessed by White House aides who seemed focused on political appearance over substance. White House pushback on the Senate torture inquiry, which came despite Obama’s pledge to run the most transparent administration ever, is in that way typical – as is Emanuel’s profane tirade. (Emanuel, as I’ve written before, saw even the most deeply moral and legal decisions in purely political terms.)
  • Here’s what he said happened next: I was summoned down to a meeting in the Situation Room, where I was told I would have to “explain” this deal to Rahm… It did not take long to get ugly. “The president wants to know who the fuck authorized this release to the committees,” Rahm said, slamming his hand down on the table. “I have a president with his hair on fire, and I want to know what the fuck you did to fuck this up so bad!” Panetta describes then-director of national intelligence Dennis Blair as coming to his rescue, asking Emanuel: “If the president’s hair is on fire,” he retorted, “I want to know who the fuck set his hair on fire.”
  • ...1 more annotation...
  • Blair was fired in May 2010 and replaced by James Clapper, with sources citing as a main reason “the mutual distrust between the White House and members of Mr. Blair’s staff.” John Brennan, who was then Obama’s counter-terrorism adviser and is now CIA director, was one of the people Panetta implied had set the president’s hair on fire. This new account from Panetta has particular relevance today, said Katherine Hawkins, national security fellow at pro-transparency group Open the Government. “It seems that the White House’s and Director Brennan’s opposition to Senate Intelligence Committee oversight over the torture program began sooner than we knew,” she wrote in an email. “This explains why, over six months after the President promised to support release of the torture report, the White House and CIA are still insisting on unacceptable redactions. It also explains why there have been no consequences for Brennan’s role in the unlawful search of Senate computers.”
‹ Previous 21 - 40 of 688 Next › Last »
Showing 20 items per page