Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged false-intelligence

Rss Feed Group items tagged

Paul Merrell

Three House panels to investigate whether ISIS intelligence was cooked | TheHill - 0 views

  • Three House committees will jointly investigate allegations U.S. Central Command altered intelligence reports, their chairmen announced Friday.“Today, the House Armed Services Committee, the House Permanent Select Committee on Intelligence and the House Appropriations Committee established a Joint Task Force to investigate allegations that senior U.S. Central Command (CENTCOM) officials manipulated intelligence products,” Reps. David Nunes (R-Calif.), Mac Thornberry (R-Texas) and Rodney Frelinghuysen (R-N.J.) said in a joint statement.Analysts at Centcom have alleged that senior officials altered their reports to paint a rosier picture of the fight against the Islamic State in Iraq and Syria (ISIS).The Pentagon’s inspector general is already conducting an investigation into the allegations.Magazine Foreign Policy reported last month that the task force would be formed.
  • In their statement, Nunes, Thornberry and Frelinghuysen said the task force would look into the specific allegations, as well as whether there are “systemic problems across the intelligence enterprise in CENTCOM or any other pertinent intelligence organizations.”Reps. Ken Calvert (R-Calif.), Mike Pompeo (R-Kan.) and Brad Wenstrup (R-Ohio) will lead the investigation.“Any accusation of intelligence being altered to fit a political narrative must be fully investigated and those responsible held accountable,” Pompeo said in a written statement. “This matters both to those who gather the intelligence, often at great risk to their personal safety, and to the policymakers who use this intelligence to make what are often life threatening decisions.”In an interview on Fox News, Thornberry said the issue was too important to wait to investigate until after the inspector general.
  • Democrats are participating, too, he said in the interview.  “They are participating in the investigation,” he said. “Their staff had been involved in the discussions we have had with a variety of folks from Centcom and elsewhere. So again we want to be careful and do it right, but it's important.” The task force expects to have preliminary results early next year, according to the chairmen’s statement.
Paul Merrell

Mastermind of The Bamako Terror Attack Mokhtar Belmokhtar: A CIA Sponsored "Intelligenc... - 0 views

  • In response to the tragic Paris events of November 13, Central Intelligence Agency director  John Brennan  warned that “ISIL is planning additional attacks… It is clear to me that ISIL has an external agenda, that they are determined to carry out these types of attacks.” (Quoted in Daily Telegraph, November 16, 2015) Five days later following the CIA Chief’s  premonition, the Bamako Radisson Hotel Blu in Mali’s capital was the object of a terrorist attack, resulting in  21 people dead. Following the attack and the taking of hostages by the terrorists, French and Malian special forces raided the hotel. US. Africa Command (AFRICOM) also confirmed that US special forces were involved.
  • The Bamako terror operation was allegedly coordinated by Mokhtar Belmokhtar (aka Khaled Abu al-Abbas), leader of an affiliate of Al Qaeda in the Islamic Maghreb (AQIM), the Islamist al-Mulathameen (Masked) Brigade, or “Those who Sign with Blood.” Belmokhtar’s group was created in 2012 in the wake of the war on Libya. His organization has also allegedly been involved in the drug trade, smuggling as well kidnapping operations of foreigners in North Africa.  While his whereabouts are said to be known, French intelligence has dubbed Belmokhtar “the uncatchable”. In June he was reported dead  as a result in a U.S. air strike in Libya. His death was subsequently denied. Based on shaky evidence, The New York Times report below (November 20) concludes that Belmokhtar’s group (together with AQIM) is unequivocally behind the Bamako attacks:
  • A member of Al Qaeda in Africa confirmed Saturday that the attack Friday on a hotel in Bamako, Mali, had been carried out by a jihadist group loyal to Mokhtar Belmokhtar, an Algerian operative for Al Qaeda. The Qaeda member, who spoke via an online chat, said that an audio message and a similar written statement in which the group claimed responsibility for the attack were authentic. The SITE Intelligence Group, which monitors jihadist groups, also confirmed the authenticity of the statement. The Qaeda member, who refused to be named for his protection, said that Mr. Belmokhtar’s men had collaborated with the Saharan Emirate of Al Qaeda in the Islamic Maghreb, … In the audio recording, the group, known as Al Mourabitoun, says it carried out the operation in conjunction with Al Qaeda’s branch in the Islamic Maghreb. The recording was released to the Al Jazeera network and simultaneously to Al Akhbar, … The recording states: “We, in the group of the Mourabitoun [Arabic Rebel Group], in cooperation with our brothers in Al Qaeda in Islamic Maghreb, the great desert area, claim responsibility for the hostage-taking operation in the Radisson hotel in Bamako.” (emphasis added)
  • ...7 more annotations...
  • In turn, the French Minister of Defense acknowledged –prior to the conduct of a police investigation– that the authors of the attack were “most likely” led by Mokhtar Belmokhtar’s group in association with Al Qaeda in the Islamic Maghreb (AQIM). What Defense Minister Jean-Yves Le Drain failed to mention was that both Belmokhtar and AQIM have longstanding links to the CIA, which in turn has a working relationship with France’s  General Directorate for External Security, Direction générale de la sécurité extérieure (DGSE).  Casually ignored by the Western media, the leaders of Al Qaeda in the Islamic Maghreb (AQIM) including Belmokhtar were trained and recruited by the CIA in Afghanistan. Acknowledged by the Washington based Council on Foreign Relations (CFR): Most of AQIM’s major leaders are believed to have trained in Afghanistan during the 1979-1989 war against the Soviets as part of a group of North African volunteers known as “Afghan Arabs” that returned to the region and radicalized Islamist movements in the years that followed. The group is divided into “katibas” or brigades, which are clustered into different and often independent cells. The group’s top leader, or emir, since 2004 has been  Abdelmalek Droukdel, also known as Abou Mossab Abdelwadoud, a trained engineer and explosives expert who has fought in Afghanistan and has roots with the GIA in Algeria. (Council on Foreign Relations, Al Qaeda in the Islamic Maghreb, cfr.org, undated)
  • Mokhtar Belmokhtar: Post Cold War CIA intelligence asset?  The Council on Foreign Relations erroneously describes “Mokhtar Belmokhtar as the one-eyed veteran of the anti-Soviet Afghan insurgency.” (CFR, op cit, emphasis added). Belmokhtar (born in 1972) did not fight in the Soviet-Afghan war (1979-1989). He was recruited in 1991 at the age of 19 in the immediate wake of the Cold War. CIA recruitment continued in the wake of the Cold War. It was in large part directed against the Russian Federation and the former Soviet Republics as well as the Middle East. The purpose of this later CIA recruitment was to establish a network of “intelligence assets” to be used in the CIA’s post-cold war insurgencies. Leaders of the Chechen Islamist insurgencies were also trained in CIA camps in Afghanistan and Pakistan, including the notorious leader of the Chechen insurrection Ibn al-Khattab (a citizen of Saudi Arabia).
  • Following his training and recruitment and a two year stint in Afghanistan (1991-1993), Mokhtar Belmokhtar was sent back to Algeria in 1993 at age 21 where he joined the  Salafist Group for Preaching and Combat (GSPC) (emblem left). The latter was initially part of the so-called Armed Islamic Group  (Groupe islamique armé (GIA)) in Algeria which sought to overthrow the secular Algerian Government with a view to installing a theocratic Islamic State. Supported covertly by the CIA, Belmokhtar fought in Southern Algeria in the civil war opposing Islamist forces and the secular government. He was also  instrumental in the integration and merging of “jihadist” forces. In January 2007,  the Armed islamic Group (GIA) which had been prominent in the 1990s, officially changed its name to the Al-Qaeda Organization in the Islamic Maghreb (AQIM). In turn, as of 2007, the newly formed AQIM established a close relationship with the Libya Islamic Fighting Group (LIFG), which was directly supported by NATO during the 2011 war on Libya, “providing weapons, training, special forces and even aircraft to support them in the overthrow of Libya’s government.” (Tony Cartalucci, The Geopolitical Reordering of Africa: US Covert Support to Al Qaeda in Northern Mali, France “Comes to the Rescue”, Global Research, January 2013). British SAS Special Forces had also been brought into Libya prior to the onset of the insurrection, acting as military advisers to the LIFG. In fact, what has unfolded since the war on Libya is the merging of LIFG and AQIM forces. In turn, many of the LIFG operatives have been dispatched to Syria to fight within the ranks of Al Nusrah and the ISIS.
  • It is worth noting that the 2007  restructuring  of jihadist forces in Algeria and the Maghreb coincided with  the appointment of Robert Stephen Ford as US ambassador to Algeria in August 2006. Ford had been reassigned by the State Department from Baghdad to Algiers. From 2004 to 2006, he worked closely with Ambassador John Negroponte at the US embassy in Baghdad in supporting the creation of  both Shia and Sunni death squads in Iraq. This project consisted in recruiting and training terrorists modelled on the so-called “Salvador Option” which had been applied by the CIA in Central America. Negroponte as we recall played a central role in supporting the Contras terrorists in Nicaragua as ambassador to Honduras from 1981-1985. For further details see Michel Chossudovsky, “The Salvador Option For Syria”: US-NATO Sponsored Death Squads Integrate “Opposition Forces”, Global Research,  May 28, 2012) The 2006 appointment of Robert Stephen Ford to head the US Embassy in Algeria was timely. It coincided with the consolidation of jihadist groups within Algeria and the Maghreb. It preceded the 2011 US-NATO sponsored insurrections in Libya and Syria. In 2010, Ford was approved by the US Congress as US Ambassador to Syria. He presented his credentials to president Bashar al Assad in January 2011, barely two months prior to the onslaught of the terrorist insurrection in the border city of Daraa in mid-March 2011. Ford played a central role in assisting the channelling of US and allied support to Syrian “opposition” groups including Al Nusrah and the ISIS.
  • Belmokhtar’s history and involvement in Afghanistan confirms that from the very outset he was an instrument of US intelligence. While, he operates with a certain degree of independence and autonomy in relation to his intelligence sponsors, he and his organization are bona fide CIA “intelligence assets”, which can be used by the CIA as part of a covert agenda. There are various definitions of  an “intelligence asset”. From the standpoint of US intelligence, “assets” linked up to terrorist organizations must not be aware that they are supported and monitored by Western intelligence. With regard to Al Qaeda, from the outset in 1979, the CIA chose to operate through various front organizations as well as indirectly through its Saudi, Qatari and Pakistani intelligence partners. CIA’s Milton Beardman who played a central role in the Soviet Afghan war confirms that members of Al Qaeda including Osama bin Laden were not aware of the role they were playing on behalf of Washington. In the words of bin Laden (quoted by Beardman): “neither I, nor my brothers saw evidence of American help”(Michel Chossudovsky, Who is Osama bin Laden, Global Research, September 12, 2001): Motivated by nationalism and religious fervor, the Islamic warriors were unaware that they were fighting the Soviet Army on behalf of Uncle Sam. While there were contacts at the upper levels of the intelligence hierarchy, Islamic rebel leaders in theatre had no contacts with Washington or the CIA.  (Ibid) Amply documented, Al Qaeda in the Islamic Maghreb (AQIM)and its affiliated groups including the Libya Islamic Fighting Group (LIFG) was serving the interests of the Western military alliance. Confirmed by the Washington Post, June 29, 2011 (See below), France was supplying weapons to the LIFG at the height of NATO’s bombing raids.
  • AQIM in turn was receiving weapons from the LIFG, which was supported by NATO. Moreover, LIFG mercenaries had integrated AQIM brigades. According to alleged Terror Mastermind Mokhtar Belmokhtar, who also coordinated the 2013 In Amenas Mali kidnapping operation: “We have been one of the main beneficiaries of the revolutions in the Arab world. As for our benefiting from the (Libyan) weapons, this is a natural thing in these kinds of circumstances.” http://www.hanford.gov/c.cfm/oci/ci_terrorist.cfm?dossier=174 Al Qaeda in the Islamic Maghreb (AQIM) is indelibly tied into a Western intelligence agenda. While it is described  as  ”one of the region’s wealthiest, best-armed militant groups”, financed covertly by Saudi Arabia and Qatar. France’s  Canard enchaîné revealed (June 2012) that Qatar (a staunch ally of the United States) has been funding various terrorist entities in Mali: The original report cites a French military intelligence report as indicating that Qatar has provided financial support to all three of the main armed groups in northern Mali: Iyad Ag Ghali’s Ansar Ed-Dine, al-Qa’ida in the Islamic Maghreb (AQIM) and the Movement for Unity and Jihad in West Africa (MUJWA). The amount of funding given to each of the groups is not mentioned but it mentions that repeated reports from the French DGSE to the Defense Ministry have mentioned Qatar’s support for ‘terrorism’ in northern Mali. (quoted by Jeune Afrique June 2012)
  • Qatar is a proxy state, a de facto Persian Gulf territory largely controlled by Washington. It hosts  a number of Western military and intelligence facilities. The Emir of Qatar does not finance terrorism without the consent of the CIA. And with regard to Mali, the CIA coordinates its activities in liaison with its French intelligence partners and counterparts, including la Direction du renseignement militaire (DRM) and the Direction générale de la sécurité extérieure (DGSE). The implications are obvious and should be carefully understood by Western public opinion. Inasmuch as Belmokhtar and AQIM are “intelligence assets”, both US and French intelligence are (indirectly) behind the Bamako attacks. Both US and French intelligence are complicit in the State sponsorship of terrorism.
Paul Merrell

U.S. Military and Intelligence Officials to Obama: "Assad NOT Responsible for Chemical ... - 1 views

  • MEMORANDUM FOR: The President FROM: Veteran Intelligence Professionals for Sanity (VIPS) SUBJECT: Is Syria a Trap? Precedence: IMMEDIATE We regret to inform you that some of our former co-workers are telling us, categorically, that contrary to the claims of your administration, the most reliable intelligence shows that Bashar al-Assad was NOT responsible for the chemical incident that killed and injured Syrian civilians on August 21, and that British intelligence officials also know this. In writing this brief report, we choose to assume that you have not been fully informed because your advisers decided to afford you the opportunity for what is commonly known as “plausible denial.” We have been down this road before – with President George W. Bush, to whom we addressed our first VIPS memorandumimmediately after Colin Powell’s Feb. 5, 2003 U.N. speech, in which he peddled fraudulent “intelligence” to support attacking Iraq. Then, also, we chose to give President Bush the benefit of the doubt, thinking he was being misled – or, at the least, very poorly advised.
  • The fraudulent nature of Powell’s speech was a no-brainer. And so, that very afternoon we strongly urged your predecessor to “widen the discussion beyond …  the circle of those advisers clearly bent on a war for which we see no compelling reason and from which we believe the unintended consequences are likely to be catastrophic.” We offer you the same advice today. Our sources confirm that a chemical incident of some sort did cause fatalities and injuries on August 21 in a suburb of Damascus. They insist, however, that the incident was not the result of an attack by the Syrian Army using military-grade chemical weapons from its arsenal. That is the most salient fact, according to CIA officers working on the Syria issue. They tell us that CIA Director John Brennan is perpetrating a pre-Iraq-War-type fraud on members of Congress, the media, the public – and perhaps even you. We have observed John Brennan closely over recent years and, sadly, we find what our former colleagues are now telling us easy to believe. Sadder still, this goes in spades for those of us who have worked with him personally; we give him zero credence. And that goes, as well, for his titular boss, Director of National Intelligence James Clapper, who has admitted he gave “clearly erroneous” sworn testimony to Congress denying NSA eavesdropping on Americans.
  • That Secretary of State John Kerry would invoke Clapper’s name this week in Congressional testimony, in an apparent attempt to enhance the credibility of the four-page “Government Assessment” strikes us as odd. The more so, since it was, for some unexplained reason, not Clapper but the White House that released the “assessment.” This is not a fine point. We know how these things are done. Although the “Government Assessment” is being sold to the media as an “intelligence summary,” it is a political, not an intelligence document. The drafters, massagers, and fixers avoided presenting essential detail. Moreover, they conceded upfront that, though they pinned “high confidence” on the assessment, it still fell “short of confirmation.”
  • ...3 more annotations...
  • There is a growing body of evidence from numerous sources in the Middle East — mostly affiliated with the Syrian opposition and its supporters — providing a strong circumstantial case that the August 21 chemical incident was a pre-planned provocation by the Syrian opposition and its Saudi and Turkish supporters. The aim is reported to have been to create the kind of incident that would bring the United States into the war. According to some reports, canisters containing chemical agent were brought into a suburb of Damascus, where they were then opened. Some people in the immediate vicinity died; others were injured. We are unaware of any reliable evidence that a Syrian military rocket capable of carrying a chemical agent was fired into the area. In fact, we are aware of no reliable physical evidence to support the claim that this was a result of a strike by a Syrian military unit with expertise in chemical weapons. In addition, we have learned that on August 13-14, 2013, Western-sponsored opposition forces in Turkey started advance preparations for a major, irregular military surge. Initial meetings between senior opposition military commanders and Qatari, Turkish and U.S. intelligence officials took place at the converted Turkish military garrison in Antakya, Hatay Province, now used as the command center and headquarters of the Free Syrian Army (FSA) and their foreign sponsors.
  • Senior opposition commanders who came from Istanbul pre-briefed the regional commanders on an imminent escalation in the fighting due to “a war-changing development,” which, in turn, would lead to a U.S.-led bombing of Syria. At operations coordinating meetings at Antakya, attended by senior Turkish, Qatari and U.S. intelligence officials as well as senior commanders of the Syrian opposition, the Syrians were told that the bombing would start in a few days. Opposition leaders were ordered to prepare their forces quickly to exploit the U.S. bombing, march into Damascus, and remove the Bashar al-Assad government The Qatari and Turkish intelligence officials assured the Syrian regional commanders that they would be provided with plenty of weapons for the coming offensive. And they were. A weapons distribution operation unprecedented in scope began in all opposition camps on August 21-23. The weapons were distributed from storehouses controlled by Qatari and Turkish intelligence under the tight supervision of U.S. intelligence officers.
  • We hope your advisers have warned you that retaliation for attacks on Syrian are not a matter of IF, but rather WHERE and WHEN. Retaliation is inevitable. For example, terrorist strikes on U.S. embassies and other installations are likely to make what happened to the U.S. “Mission” in Benghazi on Sept. 11, 2012, look like a minor dust-up by comparison. One of us addressed this key consideration directly a week ago in an article titled “Possible Consequences of a U.S. Military Attack on Syria – Remembering the U.S. Marine Barracks Destruction in Beirut, 1983.”
  •  
    This report by Veteran Intelligence Professionals for Sanity is almost certainly the most credible report contradicting the White House's "intelligence summary" that included zero evidence supporting the claim that Syrian government forces had unleashed the August 21, 2013 chemical attack in Ghoutu, near Damascus and less than five miles away from the just-arrived UN investigative team.  Spread it far and wide. 
  •  
    Wow!! The cover-up of this false flag operation designed to get us into another civil war is incredible. Yet the truth continues to leak out. The ruling elites must be so pissed right now. The Internet is changing the world balance of power - in real time no less. And we are witness. Awesome stuff Paul.
Paul Merrell

Trump's 'Wag the Dog' Moment - Consortiumnews - 0 views

  • Just two days after news broke of an alleged poison-gas attack in northern Syria, President Trump brushed aside advice from some U.S. intelligence analysts doubting the Syrian regime’s guilt and launched a lethal retaliatory missile strike against a Syrian airfield.
  • Trump immediately won plaudits from Official Washington, especially from neoconservatives who have been trying to wrestle control of his foreign policy away from his nationalist and personal advisers since the days after his surprise victory on Nov. 8. There is also an internal dispute over the intelligence. On Thursday night, Secretary of State Rex Tillerson said the U.S. intelligence community assessed with a “high degree of confidence” that the Syrian government had dropped a poison gas bomb on civilians in Idlib province. But a number of intelligence sources have made contradictory assessments, saying the preponderance of evidence suggests that Al Qaeda-affiliated rebels were at fault, either by orchestrating an intentional release of a chemical agent as a provocation or by possessing containers of poison gas that ruptured during a conventional bombing raid. One intelligence source told me that the most likely scenario was a staged event by the rebels intended to force Trump to reverse a policy, announced only days earlier, that the U.S. government would no longer seek “regime change” in Syria and would focus on attacking the common enemy, Islamic terror groups that represent the core of the rebel forces.
  • The source said the Trump national security team split between the President’s close personal advisers, such as nationalist firebrand Steve Bannon and son-in-law Jared Kushner, on one side and old-line neocons who have regrouped under National Security Adviser H.R. McMaster, an Army general who was a protégé of neocon favorite Gen. David Petraeus. White House Infighting In this telling, the earlier ouster of retired Gen. Michael Flynn as national security adviser and this week’s removal of Bannon from the National Security Council were key steps in the reassertion of neocon influence inside the Trump presidency. The strange personalities and ideological extremism of Flynn and Bannon made their ousters easier, but they were obstacles that the neocons wanted removed. Though Bannon and Kushner are often presented as rivals, the source said, they shared the belief that Trump should tell the truth about Syria, revealing the Obama administration’s CIA analysis that a fatal sarin gas attack in 2013 was a “false-flag” operation intended to sucker President Obama into fully joining the Syrian war on the side of the rebels — and the intelligence analysts’ similar beliefs about Tuesday’s incident. Instead, Trump went along with the idea of embracing the initial rush to judgment blaming Assad for the Idlib poison-gas event. The source added that Trump saw Thursday night’s missile assault as a way to change the conversation in Washington, where his administration has been under fierce attack from Democrats claiming that his election resulted from a Russian covert operation. If changing the narrative was Trump’s goal, it achieved some initial success with several of Trump’s fiercest neocon critics, such as neocon Senators John McCain and Lindsey Graham, praising the missile strike, as did Israeli Prime Minister Benjamin Netanyahu. The neocons and Israel have long sought “regime change” in Damascus even if the ouster of Assad might lead to a victory by Islamic extremists associated with Al Qaeda and/or the Islamic State.
  • ...6 more annotations...
  • Trump employing a “wag the dog” strategy, in which he highlights his leadership on an international crisis to divert attention from domestic political problems, is reminiscent of President Bill Clinton’s threats to attack Serbia in early 1999 as his impeachment trial was underway over his sexual relationship with intern Monica Lewinsky. (Clinton also was accused of a “wag-the-dog” strategy when he fired missiles at supposed Al Qaeda bases in Afghanistan and Sudan in 1998 in retaliation for the bombing of U.S. embassies in Kenya and Tanzania.)
  • Trump’s advisers, in briefing the press on Thursday night, went to great lengths to highlight Trump’s compassion toward the victims of the poison gas and his decisiveness in bombing Assad’s military in contrast to Obama’s willingness to allow the intelligence community to conduct a serious review of the evidence surrounding the 2013 sarin-gas case. Ultimately, Obama listened to his intelligence advisers who told him there was no “slam-dunk” evidence implicating Assad’s regime and he pulled back from a military strike at the last minute – while publicly maintaining the fiction that the U.S. government was certain of Assad’s guilt. In both cases – 2013 and 2017 – there were strong reasons to doubt Assad’s responsibility. In 2013, he had just invited United Nations inspectors into Syria to investigate cases of alleged rebel use of chemical weapons and thus it made no sense that he would launch a sarin attack in the Damascus suburbs, guaranteeing that the U.N. inspectors would be diverted to that case. Similarly, now, Assad’s military has gained a decisive advantage over the rebels and he had just scored a major diplomatic victory with the Trump administration’s announcement that the U.S. was no longer seeking “regime change” in Syria. The savvy Assad would know that a chemical weapon attack now would likely result in U.S. retaliation and jeopardize the gains that his military has achieved with Russian and Iranian help. The counter-argument to this logic – made by The New York Times and other neocon-oriented news outlets – essentially maintains that Assad is a crazed barbarian who was testing out his newfound position of strength by baiting President Trump. Of course, if that were the case, it would have made sense that Assad would have boasted of his act, rather than deny it.
  • Alarm within the U.S. intelligence community about Trump’s hasty decision to attack Syria reverberated from the Middle East back to Washington, where former CIA officer Philip Giraldi reported hearing from his intelligence contacts in the field that they were shocked at how the new poison-gas story was being distorted by Trump and the mainstream U.S. news media.
  • Giraldi told Scott Horton’s Webcast: “I’m hearing from sources on the ground in the Middle East, people who are intimately familiar with the intelligence that is available who are saying that the essential narrative that we’re all hearing about the Syrian government or the Russians using chemical weapons on innocent civilians is a sham.” Giraldi said his sources were more in line with an analysis postulating an accidental release of the poison gas after an Al Qaeda arms depot was hit by a Russian airstrike. “The intelligence confirms pretty much the account that the Russians have been giving … which is that they hit a warehouse where the rebels – now these are rebels that are, of course, connected with Al Qaeda – where the rebels were storing chemicals of their own and it basically caused an explosion that resulted in the casualties. Apparently the intelligence on this is very clear.” Giraldi said the anger within the intelligence community over the distortion of intelligence to justify Trump’s military retaliation was so great that some covert officers were considering going public. “People in both the agency [the CIA] and in the military who are aware of the intelligence are freaking out about this because essentially Trump completely misrepresented what he already should have known – but maybe he didn’t – and they’re afraid that this is moving toward a situation that could easily turn into an armed conflict,” Giraldi said before Thursday night’s missile strike. “They are astonished by how this is being played by the administration and by the U.S. media.”
  • Regarding this week’s events, Trump’s desperation to reverse his negative media coverage and the dubious evidence blaming Assad for the Idlib incident could fit with the “Wag the Dog” movie from 1997 in which an embattled president creates a phony foreign crisis in Albania.
  • In the movie, the White House operation is a cynical psychological operation to convince the American people that innocent Albanian children, including an attractive girl carrying a cat, are in danger when, In reality, the girl was an actor posing before a green screen that allowed scenes of fiery ruins to be inserted as background. Today, because Trump and his administration are now committed to convincing Americans that Assad really was responsible for Tuesday’s poison-gas tragedy, the prospects for a full and open investigation are effectively ended. We may never know if there is truth to those allegations or whether we are being manipulated by another “wag the dog” psyop.
Paul Merrell

THE 9/11 READER. The September 11, 2001 Terror Attacks | Global Research - 0 views

  • GLOBAL RESEARCH ONLINE INTERACTIVE READER SERIES GR I-BOOK No.  7  THE 9/11 READER The September 11, 2001 Terror Attacks 9/11 Truth: Revealing the Lies,  Commemorating the 9/11 Tragedy
  • August 2012 The 911/ Reader is part of Global Research’s Online Interactive I-Book Reader, which brings together, in the form of chapters, a collection of Global Research feature articles, including debate and analysis, on a broad theme or subject matter.  To consult our Online Interactive I-Book Reader Series, click here.
  • Table of Contents of the 9/11 Reader In Part I, the 911 Reader provides a review of what happened on the morning of 9/11, at the White House, on Capitol Hill, the Pentagon, at Strategic Command Headquarters (USSTRATCOM), What was the response of the US Air Force in the immediate wake of the attacks?  Part II focusses on “What Happened on the Planes” as described in the 9/11 Commission Report. Part III sheds light on what caused the collapse of the World Trade Center buildings. It also challenges the official narrative with regard to the attack on the Pentagon. Part IV reviews and refutes the findings of the 9/11 Commission Report. Part V focusses on the issue of foreknowledge by Western intelligence agencies. Part VI examines the issue of how foreknowledge of the attacks was used as an instrument of insider trading on airline stocks in the days preceding September 11, 2001. The bonanza financial gains resulting from insurance claims to the leaseholders of the WTC buildings is also examined.
  • ...15 more annotations...
  • Part VII focusses on the history and central role of Al Qaeda as a US intelligence asset. Since the Soviet-Afghan war, US intelligence has supported the formation of various jihadist organizations. An understanding of this history is crucial in refuting the official 9/11 narrative which claims that Al Qaeda, was behind the attacks. Part VIII centers on the life and death of 9/11 “Terror Mastermind” Osama bin Laden, who was recruited by the CIA in the heyday of the Soviet Afghan war. This section also includes an analysis of the mysterious death of Osama bin Laden, allegedly executed by US Navy Seals in a suburb of Islamabad in May 2011. Part  IX  focusses on “False Flags” and the Pentagon’s “Second 9/11″. Part X examines the issue of “Deep Events” with contributions by renowned scholars Peter Dale Scott and Daniele Ganser. Part XI  examines the structure of 9/11 propaganda which consists in “creating” as well “perpetuating” a  “9/11 Legend”. How is this achieved? Incessantly, on a daily basis, Al Qaeda, the alleged 9/11 Mastermind is referred to by the Western media, government officials, members of the US Congress, Wall Street analysts, etc. as an underlying cause of numerous World events. Part XII focusses on the practice of 9/11 Justice directed against the alleged culprits of the 9/11 attacks. The legitimacy of 9/11 propaganda requires fabricating “convincing evidence” and “proof” that those who are accused actually carried out the attacks. Sentencing of Muslims detained in Guantanamo is part of war propaganda. It depicts innocent men who are accused of the 9/11 attacks, based on confessions acquired through systematic torture throughout their detention. Part  XIII focusses on 9/11 Truth.  The objective of 9/11 Truth is to ultimately dismantle the propaganda apparatus which is manipulating the human mindset. The 9/11 Reader concludes with a retrospective view of 9/11 ten years later.
  • PART  I Timeline: What Happened on the Morning of September 11, 2001 Nothing Urgent: The Curious Lack of Military Action on the Morning of September. 11, 2001 - by George Szamuely – 2012-08-12 Political Deception: The Missing Link behind 9-11 - by Michel Chossudovsky – 2002-06-20 On the morning of September 11, Pakistan’s Chief Spy General Mahmoud Ahmad, the alleged “money-man” behind the 9-11 hijackers, was at a breakfast meeting on Capitol Hill hosted by Senator Bob Graham and Rep. Porter Goss, the chairmen of the Senate and House Intelligence committees. 9/11 Contradictions: Bush in the Classroom - by Dr. David Ray Griffin – 2008-04-04 9/11 Contradictions: When Did Cheney Enter the Underground Bunker? - by David Ray Griffin – 2008-04-24 VIDEO: Pilots For 9/11 Truth: Intercepted Don’t miss this important documentary, now on GRTV - 2012-05-16
  • PART II What Happened on the Planes “United 93″: What Happened on the Planes? - by Michel Chossudovsky – 2006-05-01   Phone Calls from the 9/11 Airliners Response to Questions Evoked by My Fifth Estate Interview - by Prof David Ray Griffin – 2010-01-12 Given the cell phone technology available in 2001, cell phone calls from airliners at altitudes of more than a few thousand feet, were virtually impossible Ted Olson’s Report of Phone Calls from Barbara Olson on 9/11: Three Official Denials - by David Ray Griffin – 2008-04-01 Ted Olson’s report was very important. It provided apparent “evidence” that American 77 had struck the Pentagon.
  • PART III What Caused the Collapse of The WTC Buildings and the Pentagon? The Destruction of the World Trade Center: Why the Official Account Cannot Be True - by Dr. David Ray Griffin – 2006-01-29 The official theory about the Twin Towers says that they collapsed because of the combined effect of the impact of the airplanes and the resulting fires Evidence Refutes the Official 9/11 Investigation: The Scientific Forensic Facts - by Richard Gage, Gregg Roberts – 2010-10-13 VIDEO: Controlled Demolitions Caused the Collapse of the World Trade Center (WTC) buildings on September 11, 2001 - by Richard Gage – 2009-09-20 VIDEO: 9/11: The Myth and The Reality Now on GRTV - by Prof. David Ray Griffin – 2011-08-30 Undisputed Facts Point to the Controlled Demolition of WTC 7 - by Richard Gage – 2008-03-28 VIDEO: 9/11 Explosive Evidence: Experts Speak Out See the trailer for this ground-breaking film on GRTV - 2011-08-03 9/11: “Honest Mistake” or BBC Foreknowledge of Collapse of WTC 7? Jane Standley Breaks Her Silence - by James Higham – 2011-08-18 The Collapse of WTC Building Seven. Interview. Comment by Elizabeth Woodworth - by David Ray Griffin – 2009-10-17   Building What? How SCADs Can Be Hidden in Plain Sight: The 9/11 “Official Story” and the Collapse of WTC Building Seven - by Prof David Ray Griffin – 2010-05-30 Besides omitting and otherwise falsifying evidence, NIST also committed the type of scientific fraud called fabrication, which means simply “making up results.” VIDEO; Firefighters’ Analysis of the 9/11 Attacks Refutes the Official Report - by Erik Lawyer – 2012-08-27 VIDEO: Pentagon Admits More 9/11 Remains Dumped in Landfill - by James Corbett – 2012-03-01 The Pentagon revealed that some of the unidentifiable remains from victims at the Pentagon and Shanksville sites on September 11, 2001 were disposed of in a landfill. 9/11: The Attack on the Pentagon on September 11, 2001 The Official Version Amounts to an Enormous Lie - by Thierry Meyssan – 2012-08-16
  • PART IV Lies and Fabrications: The 9/11 Commission Report A National Disgrace: A Review of the 9/11 Commission Report - by David Ray Griffin – 2005-03-24 The 9/11 Commission Report: A 571 Page Lie - by Dr. David Ray Griffin – 2005-09-08 September 11, 2001: 21 Reasons to Question the Official Story about 9/11 - by David Ray Griffin – 2008-09-11 911 “Conspiracy Theorists” Vindicated: Pentagon deliberately misled Public Opinion Military officials made false statements to Congress and to the 911 Commission - by Michel Chossudovsky – 2006-08-02 The 9/11 Commission’s Incredible Tales Flights 11, 175, 77, and 93 - by Prof. David Ray Griffin – 2005-12-13 9/11 and the War on Terror: Polls Show What People Think 10 Years Later - by Washington’s Blog – 2011-09-10
  • PART  V Foreknowledge of 9/11   VIDEO: The SECRET SERVICE ON 9/11: What did the Government Know? Learn more on this week’s GRTV Feature Interview - by Kevin Ryan, James Corbett – 2012-04-10 9/11 Foreknowledge and “Intelligence Failures”: “Revealing the Lies” on 9/11 Perpetuates the “Big Lie” - by Prof. Michel Chossudovsky – 2011-09-14 “Foreknowledge” and “Failure to act” upholds the notion that the terrorist attacks (“act of war”) “waged by Muslims against America” are real, when all the facts and findings point towards coverup and complicity at the highest levels of the US government. Foreknowledge of 9/11 by Western Intelligence Agencies - by Michael C. Ruppert – 2012-08-21
  • PART VI Insider Trading and the 9/11 Financial Bonanza 9/11 Attacks: Criminal Foreknowledge and Insider Trading lead directly to the CIA’s Highest Ranks CIA Executive Director “Buzzy” Krongard managed Firm that handled “Put” Options on UAL - by Michael C. Ruppert – 2012-08-13 The 9/11 Attacks on the World Trade Center (WTC): Unspoken Financial Bonanza - by Prof Michel Chossudovsky – 2012-04-27 SEPTEMBER 11, 2001: Insider Trading 9/11 … the Facts Laid Bare - by Lars Schall – 2012-03-20 Osama Bin Laden and The 911 Illusion: The 9/11 Short-Selling Financial Scam - by Dean Henderson – 2011-05-09
  • PART VII 9/11 and the “Global War on Terrorism” (GWOT) Political Deception: The Missing Link behind 9-11 - by Michel Chossudovsky – 2002-06-20 On the morning of September 11, Pakistan’s Chief Spy General Mahmoud Ahmad, the alleged “money-man” behind the 9-11 hijackers, was at a breakfast meeting on Capitol Hill hosted by Senator Bob Graham and Rep. Porter Goss, the chairmen of the Senate and House Intelligence committees. 9/11 ANALYSIS: From Ronald Reagan and the Soviet-Afghan War to George W Bush and September 11, 2001 - by Michel Chossudovsky – 2010-09-09 Osama bin Laden was recruited by the CIA in 1979. The US spent millions of dollars to supply Afghan schoolchildren with textbooks filled with violent images and militant Islamic teachings.     The Central Role of Al Qaeda in Bush’s National Security Doctrine “Revealing the Lies” on 9/11 Perpetuates the “Big Lie” - by Michel Chossudovsky – 2007-07-12 September 11, 2001: America and NATO Declare War on Afghanistan NATO’s Doctrine of Collective Security - by Michel Chossudovsky – 2009-12-21   America’s Holy Crusade against the Muslim World. - by Michel Chossudovsky – 2010-08-30 What is now unfolding is a generalized process of demonization of an entire population group
  • Osamagate - by Michel Chossudovsky – 2001-10-09 The main justification for waging this war has been totally fabricated. The American people have been deliberately and consciously misled by their government into supporting a major military adventure which affects our collective future. The “Demonization” of Muslims and the Battle for Oil - by Michel Chossudovsky – 2007-01-04 Muslim countries possess three quarters of the World’s oil reserves. In contrast, the United States of America has barely 2 percent of total oil reserves.   Was America Attacked by Muslims on 9/11? - by David Ray Griffin – 2008-09-10 Much of US foreign policy since 9/11 has been based on the assumption that America was attacked by Muslims on 9/11.   New Documents Detail America’s Strategic Response to 9/11 Rumsfeld’s War Aim: “Significantly Change the World’s Political Map” - by National Security Archive – 2011-09-12
  • PART VIII The Alleged 9/11 Mastermind: The Life and Death of  Osama bin Laden Who Is Osama Bin Laden? - by Michel Chossudovsky – 2001-09-12   VIDEO: The Last Word on Osama Bin Laden - by James Corbett – 2011-05-24 Osama bin Laden: A Creation of the CIA - by Michel Chossudovsky – 2011-05-03 Interview with Osama bin Laden. Denies his Involvement in 9/11 Full text of Pakistani paper’s Sept 01 “exclusive” interview - 2011-05-09 Where was Osama on September 11, 2001? - by Michel Chossudovsky – 2008-09-11 On September 10. 2001, Osama was in a Pakistan military hospital in Rawalpindi, courtesy of America’s indefectible ally Pakistan Osama bin Laden, among the FBI’s “Ten Most Wanted Fugitives”: Why was he never indicted for his alleged role in 9/11? - by Michel Chossudovsky – 2006-09-17 Osama bin Laden: Already Dead… Evidence that Bin Laden has been Dead for Several Years - by Prof. David Ray Griffin – 2011-05-02 The Mysterious Death of Osama bin Laden: Creating Evidence Where There Is None - by Dr. Paul Craig Roberts – 2011-08-04 The Assassination of Osama bin Laden: Glaring Anomalies in the Official Narrative Osama was Left Handed… - by Felicity Arbuthnot – 2011-05-11 The Assassination of Osama Bin Laden - by Fidel Castro Ruz – 2011-05-07 Dancing on the Grave of 9/11. Osama and “The Big Lie” - by Larry Chin – 2011-05-05
  • PART  IX  ”False Flags”: The Pentagon’s Second 9/11 The Pentagon’s “Second 911″ “Another [9/11] attack could create both a justification and an opportunity to retaliate against some known targets” - by Michel Chossudovsky – 2006-08-10 The presumption of this military document, is that a Second 911 attack “which is lacking today” would usefully create both a “justification and an opportunity” to wage war on “some known targets Crying Wolf: Terror Alerts based on Fabricated Intelligence - by Michel Chossudovsky – 2006-08-20 This is not the first time that brash and unsubstantiated statements have been made regarding an impending terror attack, which have proven to be based on “faulty intelligence”.
  • PART X “Deep Events” and State Violence The Doomsday Project and Deep Events: JFK, Watergate, Iran-Contra, and 9/11 - by Prof. Peter Dale Scott – 2011-11-22 The Doomsday Project is the Pentagon’s name for the emergency planning “to keep the White House and Pentagon running during and after a nuclear war or some other major crisis.” JFK and 9/11 Insights Gained from Studying Both - by Dr. Peter Dale Scott – 2006-12-20 In both 9/11 and the JFK assassination, the US government and the media immediately established a guilty party. Eventually, in both cases a commission was set up to validate the official narrative. Able Danger adds twist to 9/11 9/11 Ringleader connected to secret Pentagon operation - by Dr. Daniele Ganser – 2005-08-27 Atta was connected to a secret operation of the Pentagon’s Special Operations Command (SOCOM) in the US. A top secret Pentagon project code-named Able Danger identified Atta and 3 other 9/11 hijackers as members of an al-Qaida cell more than a year before the attacks. 9/11, Deep State Violence and the Hope of Internet Politics - by Prof. Peter Dale Scott – 2008-06-11 The unthinkable – that elements inside the state would conspire with criminals to kill innocent civilians – has become thinkable… Al Qaeda: The Database. - by Pierre-Henri Bunel – 2011-05-12
  • PART XI Propaganda: Creating and Perpetuating the 9/11 Legend September 11, 2001: The Propaganda Preparation for 9/11: Creating the Osama bin Laden “Legend” - by Chaim Kupferberg – 2011-09-11 THE 9/11 MYTH: State Propaganda, Historical Revisionism, and the Perpetuation of the 9/11 Myth - by Prof. James F. Tracy – 2012-05-06   Al Qaeda and Human Consciousness: Al Qaeda, Al Qaeda…. An Incessant and Repetitive Public Discourse - by Prof. Michel Chossudovsky – 2012-03-24 9/11 Truth, Inner Consciousness and the “Public Mind” - by James F. Tracy – 2012-03-18
  • PART XII Post 9/11 “Justice” IRAN ACCUSED OF BEING BEHIND 9/11 ATTACKS. U.S. Court Judgment, December 2011 (Havlish v. Iran) - by Julie Lévesque – 2012-05-11 U.S. Court Judgment, December 2011 (Havlish v. Iran) “American Justice”: The Targeted Assassination of Osama Bin Laden Extrajudicial executions are unlawful - by Prof. Marjorie Cohn – 2011-05-10 ALLEGED “MASTERMIND” OF 9/11 ON TRIAL IN GUANTANAMO: Military Tribunals proceed Despite Evidence of Torture - by Tom Carter – 2012-05-30 U.S. Military Drugged Detainees to Obtain FALSE Confessions Self-confessed 9/11 “mastermind” falsely confessed to crimes he didn’t commit - by Washington’s Blog – 2012-07-15 911 MILITARY TRIAL: Pentagon Clears Way for Military Trial of Five charged in 9/11 Attacks - by Bill Van Auken – 2012-04-06 Khalid Sheikh Mohammed’s trial will convict us all - by Paul Craig Roberts – 2009-11-25
  • PART XIII 9/11 Truth Revealing the Lies,  Commemorating the 9/11 Tragedy VIDEO: Commemorating the 10th Anniversary of 9/11 - by Prof. Michel Chossudovsky – 2011-09-01 VIDEO: AFTER 9/11: TEN YEARS OF WAR Special GRTV Feature Production - by James Corbett – 2011-09-08
  •  
    Wow!
Paul Merrell

M of A - Media Neglect Turkish False Flag Attack Leak And Its Implications - 0 views

  • Some more thoughts on the leaked tape from a meeting in the Turkish foreign ministry which is only very selectively reported in "western" media. A video with recorded voices and English text is available as is the seemingly complete text in two parts. The setting of the recording is this: The voices of the illegal recording believed to belong to Davutoğlu, National Intelligence Organization (MİT) Hakan Fidan, Foreign Ministry Undersecretary Feridun Sinirlioğlu, and Deputy Chief of General Staff Gen. Yaşar Gürel. According to the information obtained from sources, the recording consists of a chat between four officials in Davutoğlu’s office before the commencement of the official meeting with the participation of more civil and military bureaucrats in another room at the Foreign Ministry. It is not clear when exactly the meeting happened. It would fit the situation late last year or early 2014.
  • The major points from my view: Turkey has delivered 2,000 trucks of weapons and ammunition to the insurgents in Syria. There are plans for false flag attacks on Turkey or Turkish property to justify an attack from Turkey on Syria. The Turkish military has great concerns going into and fighting Syria. The general atmosphere between these deciders is one of indecisiveness. Everyone seems to be unclear what Erdogan wants and is waiting for clear orders from above. U.S. military has shortly before the meeting presented fresh plans for a no-fly one over Syria. Then there is the fact in itself that this tape and others leaked. Internal government communication in Turkey and personal communication of Turkish official has been thoroughly compromised. This will hinder future decision making and will erode any trust Turkish government allies may have in it.
  • It is somewhat astonishing how "western" media avoid the content of the leaked tape. An AP report on it makes a lot of the youtube blocking the Turkish government ordered in reaction to the tape. Of the recording itself the AP only mentions this: The four are allegedly heard discussing a military intervention in neighboring Syria, a sensitive political issue in Turkey, although the context of the conversation is not clear. The Washington Post filed that AP report under Technology. This is an incredible disservice to its readers. The Guardian report based on Reuters is not any better: The move by the TIB came hours after an anonymous YouTube account posted a leaked audio recording allegedly of a confidential conversation between Turkish intelligence chief Hakan Fidan, foreign minister Ahmet Davutoglu, undersecretary of the foreign ministry Feridun Sinirlioglu and deputy chief of the general staff, Yasar Gürel, discussing possible military action in Syria. There is no mentioning at all of the false flag attack. The Wall Street Journal comes somewhat nearer to the truth: ... a leaked recording published anonymously on the platform purported to reveal a conversation in which Turkey's foreign minister, spy chief and a top general appear to discuss how to create a pretext for a possible Turkish attack within Syria. For once kudos to the NYT which at least touches one point but leaves out the other important ones: ... the officials were heard discussing a plot to establish a justification for military strikes in Syria. One option that is said to have been discussed was orchestrating an attack on the Tomb of Suleyman Shah ... German media did not do any better.
  • ...2 more annotations...
  • A NATO ally is planning a false flag attack on its own territory which would implicate NATO Article 5 and other NATO countries' forces and the media do not even touch the issue? This is ludicrous. Related to the Syria issue is another thinly sourced trial balloon, the tenth or so, by the unofficial CIA spokesperson David Ignatius in the Washington Post: The Obama administration, stung by reversals in Ukraine and Syria, appears to have decided to expand its covert program of training and assistance for the Syrian opposition, deepening U.S. involvement in that brutal and stalemated civil war. ... Details of the plan were still being debated Thursday, but its likely outlines were described by knowledgeable officials: ... It follows the list of issues that have been discussed on and on over the last three years, more CIA training for insurgents in Jordan, more weapons, maybe some MANPADs. Ignatius source is here seems to be the CIA friends in the Syrian opposition: The expanded program would “send a clear message to the Assad regime that there is no military solution to the struggle,” according to a March memo to the White House from the opposition. Assad “has no incentive to talk” now, the memo argued, because he thinks he is winning. The rationale, bluntly stated, is that to reach an eventual diplomatic settlement in Syria, it is necessary now to escalate the conflict militarily. This has been a hard pill for Obama to swallow, but prodded by the Saudis, he seems to have reached that point.
  • There are so many caveats in here - "appears to have decided", 2still being debated", "seems to have reached that point" - that I do not believe a word of it. The loudly announced, by Ignatius and others, attack on south Syria has yet to appear and the halfhearted attack by the Turkish supported Jihadists in the north seems to be stuck. I do not anticipate any bigger action by Turkey or the U.S. especially as the such action right now would likely lead to harsher reaction by Russia.
  •  
    "A NATO ally is planning a false flag attack on its own territory which would implicate NATO Article 5 and other NATO countries' forces and the media do not even touch the issue? This is ludicrous." Beyond ludicrous. If a NATO member is attacked, all NATO nations are required by treaty to come to that nation's military aid. That Turkey is planning a false flag attack on Syria that could force us into a war deserves far more widespread news coverage.
Paul Merrell

Lavon Affair - Wikipedia, the free encyclopedia - 0 views

  • The Lavon Affair refers to a failed Israeli covert operation, code named Operation Susannah, conducted in Egypt in the Summer of 1954. As part of the false flag operation,[1] a group of Egyptian Jews were recruited by Israeli military intelligence for plans to plant bombs inside Egyptian, American and British-owned civilian targets, cinema, library and American educational center. The attacks were to be blamed on the Muslim Brotherhood, Egyptian Communists, "unspecified malcontents" or "local nationalists" with the aim of creating a climate of sufficient violence and instability to induce the British government to retain its occupying troops in Egypt's Suez Canal zone.[2] The operation caused no casualties, except for those members of the cell who committed suicide after being captured.
  • After Israel publicly denied any involvement in the incident for 51 years, the surviving agents were officially honored in 2005 by being awarded certificates of appreciation by Israeli President Moshe Katzav.[3]
  • In the early 1950s, the United States initiated a more activist policy of support for Egyptian nationalism; this was often in contrast with British policies of maintaining its regional hegemony. Israel feared that this policy, which encouraged Britain to withdraw its military forces from the Suez Canal, would embolden Egyptian President Nasser's military ambitions towards Israel. Israel first sought to influence this policy through diplomatic means but was frustrated.[4] In the summer of 1954 Colonel Binyamin Gibli, the chief of Israel's military intelligence, Aman, initiated Operation Susannah in order to reverse that decision. The goal of the Operation was to carry out bombings and other acts of terrorism in Egypt with the aim of creating an atmosphere in which the British and American opponents of British withdrawal from Egypt would be able to gain the upper hand and block the British withdrawal from Egypt.
  • ...8 more annotations...
  • According to historian Shabtai Teveth, who wrote one of the more detailed accounts, the assignment was "To undermine Western confidence in the existing [Egyptian] regime by generating public insecurity and actions to bring about arrests, demonstrations, and acts of revenge, while totally concealing the Israeli factor. The team was accordingly urged to avoid detection, so that suspicion would fall on the Muslim Brotherhood, the Communists, 'unspecified malcontents' or 'local nationalists'."[2]
  • The top-secret cell, Unit 131,[5] which was to carry out the operation, had existed since 1948 and under Aman since 1950. At the time of Operation Susannah, Unit 131 was the subject of a bitter dispute between Aman (military intelligence) and Mossad (national intelligence agency) over who should control it. Unit 131 operatives had been recruited several years before, when the Israeli intelligence officer Avram Dar arrived in Cairo undercover as a British citizen of Gibraltar called John Darling. He had recruited several Egyptian Jews who had previously been active in illegal emigration activities and trained them for covert operations.
  • Aman decided to activate the network in the Spring of 1954. On July 2, the cell firebombed a post office in Alexandria,[6] and on July 14, it bombed the libraries of the U.S. Information Agency in Alexandria and Cairo and a British-owned theater.
  • Before the group began the operation, Israeli agent Avri Elad (Avraham Zeidenberg) was sent to oversee the operations. Elad assumed the identity of Paul Frank, a former SS officer with Nazi underground connections. Avri Elad allegedly informed the Egyptians, resulting in the Egyptian Intelligence Service following a suspect to his target, the Rio Theatre, where a fire engine was standing by. Egyptian authorities arrested this suspect, Philip Natanson, when his bomb accidentally ignited prematurely in his pocket. Having searched his apartment, they found incriminating evidence and names of accomplices to the operation.
  • Several suspects were arrested, including Egyptian Jews and undercover Israelis. Colonel Dar and Elad had managed to escape. Two suspects, Yosef Carmon and Hungarian-born Israeli Meir Max Bineth committed suicide in prison.
  • The Egyptian trial began on December 11 and lasted until January 27, 1955; two of the accused (Moshe Marzouk and Shmuel Azar) were condemned to execution by hanging, two were acquitted, and the rest received lengthy prison terms. The trial was criticised in Israel as a show trial, although strict Israeli military censorship of the press, at the time, meant that the Israeli public was kept in the dark about the facts of the case and, in fact, were led to believe that the defendants were innocent.[7] There were allegations that evidence had been extracted by torture.[8] After serving seven-year jail sentences, two of the imprisoned operatives (Meir Meyuhas and Meir Za'afran) were released in 1962. The rest were eventually freed in February 1968, in a secret addendum to a prisoner of war exchange.
  • Soon after the affair, Mossad chief Isser Harel expressed suspicion to Aman concerning the integrity of Avri Elad. Despite his concerns, Aman continued using Elad for intelligence operations until 1956, when he was caught trying to sell Israeli documents to the Egyptians. Elad was tried in Israel and sentenced to 10 years imprisonment. During Elad's imprisonment in Ayalon Prison, the media were only able to refer to him as the "The Third Man" or "X" due to government censorship.[9] In 1976, whilst living in Los Angeles, Elad publicly identified himself as the "Third Man" from the Lavon Affair.[9] In 1980, Harel publicly revealed evidence that Elad had been turned by the Egyptians even before Operation Susannah.
  • Operation Susannah and the Lavon Affair turned out to be disastrous for Israel in several ways: Israel lost significant standing and credibility in its relations with the United Kingdom and the United States that took years to repair.[11] The political aftermath caused considerable political turmoil in Israel that affected the influence of its government.[12] In March 2005, Israel publicly honored the surviving operatives, and President Moshe Katsav presented each with a certificate of appreciation for their efforts on behalf of the state, ending decades of official denial by Israel.[13]
Paul Merrell

Israel Spied on Iran Nuclear Talks With U.S. - WSJ - 0 views

  • Soon after the U.S. and other major powers entered negotiations last year to curtail Iran’s nuclear program, senior White House officials learned Israel was spying on the closed-door talks. The spying operation was part of a broader campaign by Israeli Prime Minister Benjamin Netanyahu’s government to penetrate the negotiations and then help build a case against the emerging terms of the deal, current and former U.S. officials said. In addition to eavesdropping, Israel acquired information from confidential U.S. briefings, informants and diplomatic contacts in Europe, the officials said.
  • The espionage didn’t upset the White House as much as Israel’s sharing of inside information with U.S. lawmakers and others to drain support from a high-stakes deal intended to limit Iran’s nuclear program, current and former officials said. “It is one thing for the U.S. and Israel to spy on each other. It is another thing for Israel to steal U.S. secrets and play them back to U.S. legislators to undermine U.S. diplomacy,” said a senior U.S. official briefed on the matter.
  • The U.S. and Israel, longtime allies who routinely swap information on security threats, sometimes operate behind the scenes like spy-versus-spy rivals. The White House has largely tolerated Israeli snooping on U.S. policy makers—a posture Israel takes when the tables are turned. The White House discovered the operation, in fact, when U.S. intelligence agencies spying on Israel intercepted communications among Israeli officials that carried details the U.S. believed could have come only from access to the confidential talks, officials briefed on the matter said. Israeli officials denied spying directly on U.S. negotiators and said they received their information through other means, including close surveillance of Iranian leaders receiving the latest U.S. and European offers. European officials, particularly the French, also have been more transparent with Israel about the closed-door discussions than the Americans, Israeli and U.S. officials said.
  • ...11 more annotations...
  • Mr. Netanyahu and Israeli Ambassador Ron Dermer early this year saw a rapidly closing window to increase pressure on Mr. Obama before a key deadline at the end of March, Israeli officials said. Using levers of political influence unique to Israel, Messrs. Netanyahu and Dermer calculated that a lobbying campaign in Congress before an announcement was made would improve the chances of killing or reshaping any deal. They knew the intervention would damage relations with the White House, Israeli officials said, but decided that was an acceptable cost. The campaign may not have worked as well as hoped, Israeli officials now say, because it ended up alienating many congressional Democrats whose support Israel was counting on to block a deal. Obama administration officials, departing from their usual description of the unbreakable bond between the U.S. and Israel, have voiced sharp criticism of Messrs. Netanyahu and Dermer to describe how the relationship has changed.
  • “People feel personally sold out,” a senior administration official said. “That’s where the Israelis really better be careful because a lot of these people will not only be around for this administration but possibly the next one as well.” This account of the Israeli campaign is based on interviews with more than a dozen current and former U.S. and Israeli diplomats, intelligence officials, policy makers and lawmakers. Weakened ties Distrust between Mr. Netanyahu and Mr. Obama had been growing for years but worsened when Mr. Obama launched secret talks with Iran in 2012. The president didn’t tell Mr. Netanyahu because of concerns about leaks, helping set the stage for the current standoff, according to current and former U.S. and Israeli officials. U.S. officials said Israel has long topped the list of countries that aggressively spy on the U.S., along with China, Russia and France. The U.S. expends more counterintelligence resources fending off Israeli spy operations than any other close ally, U.S. officials said.
  • A senior official in the prime minister’s office said Monday: “These allegations are utterly false. The state of Israel does not conduct espionage against the United States or Israel’s other allies. The false allegations are clearly intended to undermine the strong ties between the United States and Israel and the security and intelligence relationship we share.” Current and former Israeli officials said their intelligence agencies scaled back their targeting of U.S. officials after the jailing nearly 30 years ago of American Jonathan Pollard for passing secrets to Israel. While U.S. officials may not be direct targets, current and former officials said, Israeli intelligence agencies sweep up communications between U.S. officials and parties targeted by the Israelis, including Iran. Americans shouldn’t be surprised, said a person familiar with the Israeli practice, since U.S. intelligence agencies helped the Israelis build a system to listen in on high-level Iranian communications.
  • As secret talks with Iran progressed into 2013, U.S. intelligence agencies monitored Israel’s communications to see if the country knew of the negotiations. Mr. Obama didn’t tell Mr. Netanyahu until September 2013. Israeli officials, who said they had already learned about the talks through their own channels, told their U.S. counterparts they were upset about being excluded. “ ‘Did the administration really believe we wouldn’t find out?’ ” Israeli officials said, according to a former U.S. official.
  • The episode cemented Mr. Netanyahu’s concern that Mr. Obama was bent on clinching a deal with Iran whether or not it served Israel’s best interests, Israeli officials said. Obama administration officials said the president was committed to preventing Iran from developing nuclear weapons. Mr. Dermer started lobbying U.S. lawmakers just before the U.S. and other powers signed an interim agreement with Iran in November 2013. Mr. Netanyahu and Mr. Dermer went to Congress after seeing they had little influence on the White House. Before the interim deal was made public, Mr. Dermer gave lawmakers Israel’s analysis: The U.S. offer would dramatically undermine economic sanctions on Iran, according to congressional officials who took part. After learning about the briefings, the White House dispatched senior officials to counter Mr. Dermer. The officials told lawmakers that Israel’s analysis exaggerated the sanctions relief by as much as 10 times, meeting participants said.
  • When the next round of negotiations with Iran started in Switzerland last year, U.S. counterintelligence agents told members of the U.S. negotiating team that Israel would likely try to penetrate their communications, a senior Obama administration official said. The U.S. routinely shares information with its European counterparts and others to coordinate negotiating positions. While U.S. intelligence officials believe secured U.S. communications are relatively safe from the Israelis, they say European communications are vulnerable. Mr. Netanyahu and his top advisers received confidential updates on the Geneva talks from Undersecretary of State for Political Affairs Wendy Sherman and other U.S. officials, who knew at the time that Israeli intelligence was working to fill in any gaps. The White House eventually curtailed the briefings, U.S. officials said, withholding sensitive information for fear of leaks. Current and former Israeli officials said their intelligence agencies can get much of the information they seek by targeting Iranians and others in the region who are communicating with countries in the talks. In November, the Israelis learned the contents of a proposed deal offered by the U.S. but ultimately rejected by Iran, U.S. and Israeli officials said. Israeli officials told their U.S. counterparts the terms offered insufficient protections.
  • U.S. officials urged the Israelis to give the negotiations a chance. But Mr. Netanyahu’s top advisers concluded the emerging deal was unacceptable. The White House was making too many concessions, Israeli officials said, while the Iranians were holding firm. Obama administration officials reject that view, saying Israel was making impossible demands that Iran would never accept. “The president has made clear time and again that no deal is better than a bad deal,” a senior administration official said. In January, Mr. Netanyahu told the White House his government intended to oppose the Iran deal but didn’t explain how, U.S. and Israeli officials said. On Jan. 21, House Speaker John Boehner (R., Ohio) announced Mr. Netanyahu would address a joint meeting of Congress. That same day, Mr. Dermer and other Israeli officials visited Capitol Hill to brief lawmakers and aides, seeking a bipartisan coalition large enough to block or amend any deal. Most Republicans were already prepared to challenge the White House on the negotiations, so Mr. Dermer focused on Democrats. “This deal is bad,” he said in one briefing, according to participants.
  • A spokesman for the Israeli embassy in Washington, Aaron Sagui, said Mr. Dermer didn’t launch a special campaign on Jan 21. Mr. Dermer, the spokesperson said, has “consistently briefed both Republican and Democrats, senators and congressmen, on Israel’s concerns regarding the Iran negotiations for over a year.” Mr. Dermer and other Israeli officials over the following weeks gave lawmakers and their aides information the White House was trying to keep secret, including how the emerging deal could allow Iran to operate around 6,500 centrifuges, devices used to process nuclear material, said congressional officials who attended the briefings. The Israeli officials told lawmakers that Iran would also be permitted to deploy advanced IR-4 centrifuges that could process fuel on a larger scale, meeting participants and administration officials said. Israeli officials said such fuel, which under the emerging deal would be intended for energy plants, could be used to one day build nuclear bombs. The information in the briefings, Israeli officials said, was widely known among the countries participating in the negotiations. When asked in February during one briefing where Israel got its inside information, the Israeli officials said their sources included the French and British governments, as well as their own intelligence, according to people there.
  • “Ambassador Dermer never shared confidential intelligence information with members of Congress,” Mr. Sagui said. “His briefings did not include specific details from the negotiations, including the length of the agreement or the number of centrifuges Iran would be able to keep.” Current and former U.S. officials confirmed that the number and type of centrifuges cited in the briefings were part of the discussions. But they said the briefings were misleading because Israeli officials didn’t disclose concessions asked of Iran. Those included giving up stockpiles of nuclear material, as well as modifying the advanced centrifuges to slow output, these officials said. The administration didn’t brief lawmakers on the centrifuge numbers and other details at the time because the information was classified and the details were still in flux, current and former U.S. officials said. Unexpected reaction The congressional briefings and Mr. Netanyahu’s decision to address a joint meeting of Congress on the emerging deal sparked a backlash among many Democratic lawmakers, congressional aides said.
  • On Feb. 3, Mr. Dermer huddled with Sen. Joe Manchin, a West Virginia Democrat, who said he told Mr. Dermer it was a breach of protocol for Mr. Netanyahu to accept an invitation from Mr. Boehner without going through the White House. Mr. Manchin said he told Mr. Dermer he would attend the prime minister’s speech to Congress, but he was noncommittal about supporting any move by Congress to block a deal. Mr. Dermer spent the following day doing damage control with Sen. Kirsten Gillibrand, a New York Democrat, congressional aides said. Two days later, Mr. Dermer met with Sen. Dianne Feinstein of California, the top Democrat on the SenateIntelligence Committee, at her Washington, D.C., home. He pressed for her support because he knew that she, too, was angry about Mr. Netanyahu’s planned appearance. Ms. Feinstein said afterward she would oppose legislation allowing Congress to vote down an agreement.
  • Congressional aides and Israeli officials now say Israel’s coalition in Congress is short the votes needed to pass legislation that could overcome a presidential veto, although that could change. In response, Israeli officials said, Mr. Netanyahu was pursuing other ways to pressure the White House. This week, Mr. Netanyahu sent a delegation to France, which has been more closely aligned with Israel on the nuclear talks and which could throw obstacles in Mr. Obama’s way before a deal is signed. The Obama administration, meanwhile, is stepping up its outreach to Paris to blunt the Israeli push. “If you’re wondering whether something serious has shifted here, the answer is yes,” a senior U.S. official said. “These things leave scars.”
  •  
    Obama is moving preemptively to blunt Israel's influence in Congress on the Iran negotiation.
Paul Merrell

Obama Pins Fate of Nuclear Pact on Documents From an Iranian "Curveball" - 0 views

  • Obama administration officials insist "possible military dimensions" of Iran’s nuclear program must be resolved to the satisfaction of the IAEA to complete a nuclear agreement. But the term refers to discredited intelligence from suspect sources. One of the issues Obama administration officials are insisting must be resolved to the satisfaction of the International Atomic Energy Agency (IAEA) before any nuclear agreement may be concluded involves "possible military dimensions." That term refers to documents long discredited by German intelligence but which the United States and the IAEA have maintained came from a covert Iranian nuclear weapons program. A former senior German official has now revealed that the biggest collection of documents cited as evidence of such a covert Iran program actually came from a member of the Iranian terrorist organization Mujihedin-E-Khalq (MEK) and that German intelligence sought to warn the George W. Bush administration that the source of the documents was not trustworthy.
  • The use of those documents to make a case for action against Iran closely parallels the Bush administration's use of the testimony of the now-discredited Iraqi exile called "Curveball" to convince the US public to support war against Iraq. The parallel between the two episodes was recognized explicitly by the German intelligence service, the Bundesnachrichtendienst (BND), according to Karsten Voigt, who was the German Foreign Office's coordinator of North American-German relations. Voigt provided details of the story behind the appearance of the mysterious Iran nuclear documents in an interview with this writer last March for a book on the false narrative surrounding Iran's nuclear program that is newly published, Manufactured Crisis. 
  • In 2004, Powell and his State Department team still regarded the MEK as a disreputable terrorist organization, but the neoconservatives in the administration viewed it as useful as an anti-regime tool. The MEK was known to have served the interests of Israel's Mossad by providing a way to "launder" intelligence claims that Israel wanted to get out to the public but didn't want identified as having come from Israel. In the best-known case, the group's political front organization, the National Council of Resistance in Iran, had revealed the location of the Iranian uranium enrichment facility at Natanz in an August 2002 press conference, but it had been given the coordinates of the construction site by Israeli intelligence, according to both a senior IAEA official and an Iranian opposition group source, cited by Seymour Hersh and New Yorker writer Connie Bruck, respectively. The purported Iranian documents conveyed by the MEK to Western intelligence also displayed multiple indications of having been fabricated by an outside actor. The clearest and most significant anomaly was that the drawings of efforts to redesign the Shahab-3 missile to accommodate a nuclear weapons showed a missile that had already been abandoned by Iran's Defense Ministry by the time the drawings were said to have been made, as was confirmed by former IAEA deputy director general for safeguards, Olli Heinonen, in an interview with this writer. The Iranian abandonment of the earlier missile design became known to foreign analysts, however, only after Iran flight-tested a completely new missile design in August 2004 - after the "laptop documents" had already been conveyed to the BND by its MEK source. Whoever ordered those drawings was unaware of the switch to the new missile design, which would rule out a genuine Iranian Defense Ministry or military program.
  • ...3 more annotations...
  • A former IAEA official familiar with those documents recalled in interview with Truthout that senior officials at the IAEA were immediately suspicious of the entire collection of documents given to the agency in 2005. "The documents were never really convincing," said the former official. The creators of the documents had taken publicly available information about people, organizations and location and had "woven their own narrative" around them, he said. Furthermore, he recalled finding anomalies in the stamps and signature blocs of documents. The fabricated documents, depicting Iran as redesigning their missile reentry vehicle to accommodate a nuclear weapon, among other things, fit into a Bush administration strategy - coordinated with Israel - that was aimed at justifying a military confrontation with Iran. The working assumption, as was revealed by David Wurmser, special assistant to Bolton and then to Cheney, in October 2007, was that the United States would probably need to use force to bring about that change once Iraq was brought under control. Bolton recalls in his memoirs that his aim was to move the Iran nuclear issue out of the IAEA to the United Nations Security Council, where the Bush administration would call for international action against Iran, and failing that, take unilateral action.
  • The IAEA got more documents and intelligence directly from Israel in 2008 and 2009 claiming Iranian work on nuclear weapons, according to then-IAEA Director-General Mohamed ElBaradei. The intelligence passed on by Israel included the claim that Iran had installed a large metal cylinder for high explosives tests at its Parchin military facility in 2000, which it intended to use for hydrodynamic tests of nuclear weapons designs. But the IAEA never revealed the information had come from Israel, covering up the primary fact relevant to its reliability and authenticity. The Safeguards Department had been prepared as early as 2009 to publish a dossier on what it called the "possible military dimensions" of the Iranian nuclear program that would accept all the intelligence reports and documents provided by Israel as genuine and accurate. But ElBaradei's successor, Yukiya Amano, waited to do so until November 2011, when the Obama administration was ready to organize an international coalition for harsh sanctions against Iran's oil export sector. The Obama administration returned to the "possible military dimensions" last November, insisting on a provision in the interim Iran nuclear agreement that required Iran to "resolve" all the "concerns" about that issue. A "senior administration official" briefing the press on the agreement November 24 said there would be no final agreement unless Iran showed that it had "come into compliance with its obligations under the NPT and its obligations to the IAEA."
  • In response to a request from Truthout for a confirmation or denial of the revelation by Karsten Voigt of the MEK role in transmitting the purported Iranian documents to the BND in 2004, NSC officials declined to comment on the matter, according to NSC spokesperson Bernadette Meehan. Some observers believe US negotiators hope to get Iran to admit to having had a nuclear weapons program. However, Iran is certainly not going to admit that the documents and intelligence reports it knows to be fabrications are true. But the Obama administration may well believe so strongly in the Iran nuclear narrative it inherited from the Bush administration and in the idea that the sanctions against Iran confer ultimate negotiating leverage on the United States that it sees an Iranian confession as a realistic goal. In any case, the decision to introduce the falsified evidence of the past into the final negotiations is bound to bring them to an impasse unless the United States is prepared to back down.
  •  
    Neocons in the Obama administration are at it again, fueling the Iranian nukes myth with fabricated intelligence on behalf of Israel. 
Paul Merrell

Guess who credits the Mossad with producing the 'laptop documents?' | Middle East Eye - 0 views

  • In the United States and Europe, it is unchallenged in political and media circles that intelligence documents purporting to be from a covert Iranian nuclear weapons program for which the IAEA long demanded an Iranian explanation are genuine.   But evidence has continued to accumulate that the documents - sometimes called the “laptop documents” because they were said to have been on a laptop computer belonging to one of the participants in the program - were fabricated by Israel’s foreign intelligence agency (Mossad).  We now know that the documents did not come from an Iranian participant in the alleged project, as the media were led to believe for years; they were turned over to German intelligence by the anti-regime Iranian terrorist organisation, Mujahedeen E Khalq, (MEK). I first reported this in 2008 and have now confirmed from an authoritative German source in my book on the Iran nuclear issue. The MEK was well known to have been a client of the Mossad, serving to launder Israeli intelligence claims that the Israelis did not want attributed to themselves.
  • Although it has never been mentioned in news media, former International Atomic Energy Agency (IAEA) Director General, Mohamed El Baradei recalled in his memoirs that he was doubtful of the authenticity of the documents. “No one knew if any of this was real,” he wrote in reference to the laptop documents. Another former senior IAEA official told me, “It just really didn’t add up.  It made more sense that this information originated in another country.”  And as I have detailed in articles and in my book, key documents in the collection bear clear indications of fabrication. Support for that virtually unknown part of the Iran nuclear story has come from a surprising source: a popular Israeli account, celebrating the successes of the Mossad’s covert operations. “Mossad: The Greatest Missions of the Israeli Secret Service,” first published in Hebrew in 2010, and then published in English in 2012, was Israel’s best-selling book for months in 2010. But not only does it acknowledge that it was indeed the MEK that delivered the documents, it also suggests that at least some of the documents came from the Mossad.  
  • The co-authors of the book are far from critics of Israel’s policy toward Iran; One of the co-authors, Michael Bar-Zohar, is a well-connected former member of the Israeli Knesset and former paratrooper, who had previously written an authorised biography of Shimon Peres, as well as the biography of Isser Harel, the Mossad chief who presided over the kidnapping of Adolph Eichmann in Argentina. Much of what Bar-Zohar chronicled in the book had already been reported earlier by Israeli journalists - especially Ronen Bergman of the daily Yedioth Ahronoth.  In fact, Bergman accused Bar-Zohar of plagiarising his articles for much of the book, while changing only a few words.  But one thing that Bar-Zohar and co-author Nisham Mishal did not get from other Israeli journalists, was the role of the Mossad in regard to the laptop documents. 
  • ...5 more annotations...
  • Although they do not flatly state that the Mossad was the source of the documents, they certainly lead the reader to that conclusion. They begin by establishing the fact that the MEK was fronting for the Mossad in its revelation in August 2002 of Iran’s first enrichment facility at Natanz. The CIA, they write, “appeared to believe that the Mossad and the British MI6 were feeding MEK intelligence they had obtained, using the Iranian opposition as a hopefully credible source”.  And they explicitly confirm CIA’s suspicions. “According to Israeli sources,” they write, “It was, in fact, a watchful Mossad officer who had discovered the mammoth centrifuge installation at Natanz.”  Other sources, including Seymour Hersh and Connie Bruck have reported that the MEK got the intelligence on Natanz from the Israelis, but theirs is the first explicit acknowledgement attributed to an Israeli source that the MEK had revealed Natanz on the basis of Mossad intelligence.  What the Israeli co-authors do not say is that the Mossad was simply guessing at the purpose of Natanz, which the MEK mistakenly called a “fuel fabrication” facility, rather than a centrifuge enrichment facility.
  • Bar-Zohar and Mishal are little concerned with whether the Mossad’s laptop caper involved fraud or not. They obviously view the Israeli intelligence agency’s use of an Iranian exile group to get out documents that had been central to the international sanctions regime against Iran as a great triumph. But whatever their reasons, their book adds another layer to the growing body of evidence showing that the Bush administration and its allies hoodwinked the rest of the world with those documents.
  • The authors further suggest that the Mossad was behind information later released by the MEK on Mohsen Fakhrizadeh, the Iranian physics professor said to be shown in the laptop documents as the man in charge of that purported Iranian nuclear weapons research program. The MEK disclosed such personal details as Fakhrizadeh’s passport number and his home telephone number. But the Mossad chroniclers write: “This abundance of detail and means of transmission leads one to believe that, again, “a certain secret service” ever suspected by the West of pursuing its own agenda, painstakingly collected these facts and figures about the Iranian scientists and passed them to the Iranian resistance.” I asked Bar-Zohar’s research assistant, Nilly Ovnat, whether he had Israeli sources for those statements relating to the MEK and the laptop documents. She responded by          e-mail: “Professor Bar Zohar had other sources for most of the material concerning MEK and Natanz [and the] laptop, yet they could not be mentioned and cannot be discussed.”
  • Turning to the laptop documents, they make it clear that western intelligence had indeed obtained the documents from the MEK and suggest that the MEK got them from somewhere else. “The dissidents wouldn’t say how they had gotten hold of the laptop,” they write. They again frame the question of the origins of those documents in terms of CIA suspicions. “[T]he skeptical Americans suspected that the documents had been only recently scanned into the computer,” they write. “They accused the Mossad of having slipped in some information obtained from our own sources - and passing it to the MEK leaders for delivery to the West." Bar-Zohar and Mishal steer clear of any suggestion that the Mossad fabricated any documents, but their account leaves little doubt that they are convinced that the Mossad should be credited for the appearance of the documents. Their approach of referring to US suspicions, rather than stating it directly, appears to be a way of avoiding problems with Israeli military censors, who often clamp down on local reporting on sensitive issues while allowing references to foreign reports.
  • In the United States and Europe, it is unchallenged in political and media circles that intelligence documents purporting to be from a covert Iranian nuclear weapons program for which the IAEA long demanded an Iranian explanation are genuine.   But evidence has continued to accumulate that the documents - sometimes called the “laptop documents” because they were said to have been on a laptop computer belonging to one of the participants in the program - were fabricated by Israel’s foreign intelligence agency (Mossad).  We now know that the documents did not come from an Iranian participant in the alleged project, as the media were led to believe for years; they were turned over to German intelligence by the anti-regime Iranian terrorist organisation, Mujahedeen E Khalq, (MEK). I first reported this in 2008 and have now confirmed from an authoritative German source in my book on the Iran nuclear issue. The MEK was well known to have been a client of the Mossad, serving to launder Israeli intelligence claims that the Israelis did not want attributed to themselves.
Paul Merrell

The "Cuban Twitter" Scam Is a Drop in the Internet Propaganda Bucket - The Intercept - 0 views

  • This week, the Associated Press exposed a secret program run by the U.S. Agency for International Development to create “a Twitter-like Cuban communications network” run through “secret shell companies” in order to create the false appearance of being a privately owned operation. Unbeknownst to the service’s Cuban users was the fact that “American contractors were gathering their private data in the hope that it might be used for political purposes”–specifically, to manipulate those users in order to foment dissent in Cuba and subvert its government. According to top-secret documents published today by The Intercept, this sort of operation is frequently discussed at western intelligence agencies, which have plotted ways to covertly use social media for ”propaganda,” “deception,” “mass messaging,” and “pushing stories.” These ideas–discussions of how to exploit the internet, specifically social media, to surreptitiously disseminate viewpoints friendly to western interests and spread false or damaging information about targets–appear repeatedly throughout the archive of materials provided by NSA whistleblower Edward Snowden. Documents prepared by NSA and its British counterpart GCHQ–and previously published by The Intercept as well as some by NBC News–detailed several of those programs, including a unit devoted in part to “discrediting” the agency’s enemies with false information spread online.
  • he documents in the archive show that the British are particularly aggressive and eager in this regard, and formally shared their methods with their U.S. counterparts. One previously undisclosed top-secret document–prepared by GCHQ for the 2010 annual “SIGDEV” gathering of the “Five Eyes” surveillance alliance comprising the UK, Canada, New Zealand, Australia, and the U.S.–explicitly discusses ways to exploit Twitter, Facebook, YouTube, and other social media as secret platforms for propaganda.
  • The document was presented by GCHQ’s Joint Threat Research Intelligence Group (JTRIG). The unit’s self-described purpose is “using online techniques to make something happen in the real or cyber world,” including “information ops (influence or disruption).” The British agency describes its JTRIG and Computer Network Exploitation operations as a “major part of business” at GCHQ, conducting “5% of Operations.” The annual SIGDEV conference, according to one NSA document published today by The Intercept, “enables unprecedented visibility of SIGINT Development activities from across the Extended Enterprise, Second Party and US Intelligence communities.” The 2009 Conference, held at Fort Meade, included “eighty-six representatives from the wider US Intelligence Community, covering agencies as diverse as CIA (a record 50 participants), the Air Force Research Laboratory and the National Air and Space Intelligence Center.” Defenders of surveillance agencies have often insinuated that such proposals are nothing more than pipe dreams and wishful thinking on the part of intelligence agents. But these documents are not merely proposals or hypothetical scenarios. As described by the NSA document published today, the purpose of SIGDEV presentations is “to synchronize discovery efforts, share breakthroughs, and swap knowledge on the art of analysis.”
  • ...5 more annotations...
  • (The GCHQ document also describes a practice called “credential harvesting,” which NBC described as an effort to “select journalists who could be used to spread information” that the government wants distributed. According to the NBC report, GCHQ agents would employ “electronic snooping to identify non-British journalists who would then be manipulated to feed information to the target of a covert campaign.” Then, “the journalist’s job would provide access to the targeted individual, perhaps for an interview.” Anonymous sources that NBC didn’t characterize claimed at the time that GCHQ had not employed the technique.) Whether governments should be in the business of publicly disseminating political propaganda at all is itself a controversial question. Such activities are restricted by law in many countries, including the U.S. In 2008, The New York Times’ David Barstow won a Pulitzer Prize for exposing a domestic effort coordinated by the Pentagon whereby retired U.S. generals posed as “independent analysts” employed by American television networks and cable news outlets as they secretly coordinated their messaging with the Pentagon.
  • The GCHQ document we are publishing today expressly contemplates exploiting social media venues such as Twitter, as well as other communications venues including email, to seed state propaganda–GHCQ’s word, not mine–across the internet:
  • For instance: One of the programs described by the newly released GCHQ document is dubbed “Royal Concierge,” under which the British agency intercepts email confirmations of hotel reservations to enable it to subject hotel guests to electronic monitoring. It also contemplates how to “influence the hotel choice” of travelers and to determine whether they stay at “SIGINT friendly” hotels. The document asks: “Can we influence the hotel choice? Can we cancel their visit?” Previously, der Spiegel and NBC News both independently confirmed that the “Royal Concierge” program has been implemented and extensively used. The German magazine reported that “for more than three years, GCHQ has had a system to automatically monitor hotel bookings of at least 350 upscale hotels around the world in order to target, search, and analyze reservations to detect diplomats and government officials.” NBC reported that “the intelligence agency uses the information to spy on human targets through ‘close access technical operations,’ which can include listening in on telephone calls and tapping hotel computers as well as sending intelligence officers to observe the targets in person at the hotels.”
  • Because American law bars the government from employing political propaganda domestically, that program was likely illegal, though no legal accountability was ever brought to bear (despite all sorts of calls for formal investigations). Barack Obama, a presidential candidate at the time, pronounced himself in a campaign press release “deeply disturbed” by the Pentagon program, which he said “sought to manipulate the public’s trust.” Propagandizing foreign populations has generally been more legally acceptable. But it is difficult to see how government propaganda can be segregated from domestic consumption in the digital age. If American intelligence agencies are adopting the GCHQ’s tactics of “crafting messaging campaigns to go ‘viral’,” the legal issue is clear: A “viral” online propaganda campaign, by definition, is almost certain to influence its own citizens as well as those of other countries.
  • But these documents, along with the AP’s exposure of the sham “Cuban Twitter” program, underscore how aggressively western governments are seeking to exploit the internet as a means to manipulate political activity and shape political discourse. Those programs, carried out in secrecy and with little accountability (it seems nobody in Congress knew of the “Cuban Twitter” program in any detail) threaten the integrity of the internet itself, as state-disseminated propaganda masquerades as free online speech and organizing. There is thus little or no ability for an internet user to know when they are being covertly propagandized by their government, which is precisely what makes it so appealing to intelligence agencies, so powerful, and so dangerous.
  •  
    Glenn Greenwald drops a choice few new documents. Well worth viewing. 
Paul Merrell

The Woman at the Center of the C.I.A.'s Torture Report - 0 views

  • or the past eight months, there has been a furious battle raging behind closed doors at the White House, the C.I.A., and in Congress. The question has been whether the Senate Select Committee on Intelligence would be allowed to use pseudonyms as a means of identifying characters in the devastating report it released last week on the C.I.A.’s abusive interrogation and detention program. Ultimately, the committee was not allowed to, and now we know one reason why. The NBC News investigative reporter Matthew Cole has pieced together a remarkable story revealing that a single senior officer, who is still in a position of high authority over counterterrorism at the C.I.A.—a woman who he does not name—appears to have been a source of years’ worth of terrible judgment, with tragic consequences for the United States. Her story runs through the entire report. She dropped the ball when the C.I.A. was given information that might very well have prevented the 9/11 attacks; she gleefully participated in torture sessions afterward; she misinterpreted intelligence in such a way that it sent the C.I.A. on an absurd chase for Al Qaeda sleeper cells in Montana. And then she falsely told congressional overseers that the torture worked.
  • Had the Senate Intelligence Committee been permitted to use pseudonyms for the central characters in its report, as all previous congressional studies of intelligence failures, including the widely heralded Church Committee report in 1975, have done, it might not have taken a painstaking, and still somewhat cryptic, investigation after the fact in order for the American public to hold this senior official accountable. Many people who have worked with her over the years expressed shock to NBC that she has been entrusted with so much power. A former intelligence officer who worked directly with her is quoted by NBC, on background, as saying that she bears so much responsibility for so many intelligence failures that “she should be put on trial and put in jail for what she has done.” Instead, however, she has been promoted to the rank of a general in the military, most recently working as the head of the C.I.A.’s global-jihad unit. In that perch, she oversees the targeting of terror suspects around the world. (She was also, in part, the model for the lead character in “Zero Dark Thirty.”)
  • Amazingly, perhaps, more than thirteen years after the 9/11 attacks, no one at the C.I.A. has ever been publicly held responsible for this failure. Evidently, the C.I.A. was adamant in its negotiations with the White House and the Senate Intelligence Committee that the American public never learn the names of anyone directly involved in this failure.
  • ...3 more annotations...
  • According to sources in the law-enforcement community who I have interviewed over the years, and who I spoke to again this week, this woman—whose name the C.I.A. has asked the news media to withhold—had supervision over an underling at the agency who failed to share with the F.B.I. the news that two of the future 9/11 hijackers had entered the United States prior to the terrorist attacks.
  • As NBC recounts, this egregious chapter was apparently only the first in a long tale, in which the same C.I.A. official became a driving force in the use of waterboarding and other sadistic interrogation techniques that were later described by President Obama as “torture.” She personally partook in the waterboarding of Khalid Sheikh Mohammed, the architect of the 9/11 attacks, at a black site in Poland. According to the Senate report, she sent a bubbly cable back to C.I.A. headquarters in 2003, anticipating the pain they planned to inflict on K.S.M. in an attempt to get him to confirm a report from another detainee, about a plot to use African-American Muslims training in Afghanistan for future terrorist attacks. “i love the Black American Muslim at AQ camps in Afghanuistan (sic). … Mukie (K.S.M.) is going to be hatin’ life on this one,” she wrote, according to the report. But, as NBC notes, she misconstrued the intelligence gathered from the other detainee. Somehow, the C.I.A. mistakenly believed that African-American Muslim terrorists were already in the United States. The intelligence officials evidently pressed K.S.M. so hard to confirm this, under such physical duress, that he eventually did, even though it was false—leading U.S. officials on a wild-goose chase for black Muslim Al Qaeda operatives in Montana. According to the report, the same woman oversaw the extraction of this false lead, as well as the months-long rendition and gruesome interrogation of another detainee whose detention was a case of mistaken identity. Later, in 2007, she accompanied then C.I.A. director Michael Hayden to brief Congress, where she insisted forcefully that the torture program had been a tremendous and indispensable success.
  • Readers can speculate on how the pieces fit together, and who the personalities behind this program are. But without even pseudonyms, it is exceedingly hard to connect the dots. It seems entirely possible—though, again, one can only speculate—that the C.I.A. overcompensated for its pre-9/11 intelligence failures by employing overly harsh measures later. Once they’d made a choice that America had never officially made before—of sanctioning torture—it seems possible that they felt they had to defend its efficacy, despite mounting evidence to the contrary. If so, this would be worth learning. But without names, or even pseudonyms, it is almost impossible to piece together the puzzle, or hold anyone in the American government accountable. Evidently, that is exactly what the C.I.A. was fighting for during its eight-month-long redaction process, behind all those closed doors.
Paul Merrell

Turkey Cooks the Books in Syria | The American Conservative - 0 views

  • If you had been a reader of The American Conservative magazine back in December 2011, you might have learned from an article written by me that “Unmarked NATO warplanes are arriving at Turkish military bases close to Iskenderum on the Syrian border, delivering weapons [to the Free Syrian Army] derived from Colonel Muammar Gaddafi’s arsenals…” Well, it seems that the rest of the media is beginning to catch up with the old news, supplemented with significant details by Sy Hersh in the latest issue of the London Review of Books in an article entitled “The Red Line and the Rat Line.” The reality is that numerous former intelligence officials, like myself, have long known most of the story surrounding the on-again off-again intervention by the United States and others in Syria, but what was needed was a Sy Hersh, with his unmatched range of contacts deep in both the Pentagon as well as at CIA and State Department, to stitch it all together with corroboration from multiple sources. In a sense it was a secret that wasn’t really very well hidden but which the mainstream media wouldn’t touch with a barge pole because it revealed that the Obama Administration, just like the Bushies who preceded it, has been actively though clandestinely conspiring to overthrow yet another government in the Middle East. One might well conclude that the White House is like the Bourbon Kings of France in that it never forgets anything but never learns anything either.
  • The few media outlets that are willing to pick up the Syria story even now are gingerly treating it as something new, jumping in based on their own editorial biases, sometimes emphasizing the CIA and MI6 role in cooperating with the Turks to undermine Bashar al-Assad. But Hersh’s tale is only surprising if one had not been reading between the lines over the past three years, where the clandestine role of the British and American governments was evident and frequently reported on over the internet and, most particularly, in the local media in the Middle East. Far from being either rogue or deliberately deceptive, operations by the U.S. and UK intelligence services, the so-called “ratlines” feeding weapons into Syria, were fully vetted and approved by both the White House and Number 10 Downing Street. The more recent exposure of the Benghazi CIA base’s possible involvement in obtaining Libyan arms as part of the process of equipping the Syrian insurgents almost blew the lid off of the arrangement but somehow the media attention was diverted by a partisan attack on the Obama Administration over who said what and when to explain the security breakdown and the real story sank out of sight.
  • So this is what happened, roughly speaking: the United States had been seeking the ouster of President Bashar al-Assad of Syria since at least 2003, joining with Saudi Arabia, which had been funding efforts to destabilize his regime even earlier. Why? Because from the Saudi viewpoint Syria was an ally of Iran and was also a heretical state led by a secular government dominated by Alawite Muslims, viewed as being uncomfortably close to Shi’ites in their apostasy. From the U.S. viewpoint, the ties to Iran and reports of Syrian interference in Lebanon were a sufficient casus belli coupled with a geostrategic assessment shared with the Saudis that Syria served as the essential land bridge connecting Hezbollah in Lebanon to Iran. The subsequent Congressional Syria Accountability Acts of 2004 and 2010, like similar legislation directed against Iran, have resulted in little accountability and have instead stifled diplomacy. They punished Syria with sanctions for supporting Hezbollah in Lebanon and for its links to Tehran, making any possible improvement in relations problematical. The 2010 Act even calls for steps to bring about regime change in Damascus. The United States also engaged in a program eerily reminiscent of its recent moves to destabilize the government in Ukraine, i.e., sending in ambassadors and charges who deliberately provoked the Syrian government by meeting with opposition leaders and openly making demands for greater democracy. The last U.S. Ambassador to Syria Robert Ford spoke openly in support of the protesters while serving in Damascus in 2010. On one occasion he was pelted with tomatoes and was eventually removed over safety concerns.
  • ...4 more annotations...
  • Lost in translation is the fact that Washington’s growing support for radical insurgency in Syria would also inevitably destabilize all its neighbors, most notably including Iraq, which has indeed been the case, making a shambles of U.S. claims that it was seeking to introduce stable democracies into the region. Some also saw irony in the fact that a few years before Washington decided al-Assad was an enemy it had been sending victims of the CIA’s rendition program to Syria, suggesting that at least some short-term and long-term strategies were on a collision course from the start, if indeed the advocates of the two policies were actually communicating with each other at all. Prime Minister Recep Tayyip Erdogan of Turkey, whose country shared a long border with Syria and who had legitimate security concerns relating to Kurdish separatists operating out of the border region, became the proxy in the secret war for Washington and its principal European allies, the British and French. When the U.S.-Saudi supported insurgency began to heat up and turn violent, Turkey became the key front line state in pushing for aggressive action against Damascus. Erdogan miscalculated, thinking that al-Assad was on his last legs, needing only a push to force him out, and Ankara saw itself as ultimately benefiting from a weak Syria with a Turkish-controlled buffer zone along the border to keep the Kurds in check.
  • Hersh reports how President Barack Obama had to back down from attacking Syria when the Anglo-American intelligence community informed him flatly and unambiguously that Damascus was not responsible for the poison gas attack that took place in Damascus on August 21, 2013 that was being exploited as a casus belli. The information supporting that assertion was known to many like myself who move around the fringes of the intelligence community, but the real revelation from Hersh is the depth of Turkish involvement in the incident in order to have the atrocity be exploitable as a pretext for American armed intervention, which, at that point, Erdogan strongly desired. As the use of weapons of mass destruction against civilians was one of the red lines that Obama had foolishly promoted regarding Syria Erdogan was eager to deliver just that to force the U.S.’s hand. Relying on unidentified senior U.S. intelligence sources, Hersh demonstrates how Turkey’s own preferred militant group Jabhat al-Nusra, which is generally regarded as an al-Qaeda affiliate, apparently used Turkish-provided chemicals and instructions to stage the attack.
  • Is it all true? Unless one has access to the same raw information as Sy Hersh it is difficult to say with any certainty, but I believe I know who some of the sources are and they both have good access to intelligence and are reliable. Plus, the whole narrative has an undeniable plausibility, particularly if one also considers other evidence of Erdogan’s willingness to take large risks coupled with a more general Turkish underhandedness relating to Syria. On March 23rd, one week before local elections in Turkey that Erdogan feared would go badly for him, a Turkish air force F-16 shot down a Syrian Mig-23, claiming that it had strayed half a mile into Turkish airspace. The pilot who bailed out, claimed that he was attacking insurgent targets at least four miles inside the border when he was shot down, an assertion borne out by physical evidence as the plane’s remains landed inside Syria. Was Erdogan demonstrating how tough he could be just before elections? Possibly.
  • Critics of Hersh claim that the Turks would be incapable of carrying out such a grand subterfuge, but I would argue that putting together some technicians, chemicals, and a couple of trucks to carry the load are well within the capability of MIT, an organization that I have worked with and whose abilities I respect. And one must regard with dismay the “tangled webs we weave,” with due credit to Bobby Burns, for what has subsequently evolved in Syria. Allies like Turkey that are willing to cook the books to bring about military action are exploiting the uncertainty of a White House that continues to search for foreign policy successes while simultaneously being unable to define any genuine American interests. Syria is far from an innocent in the ensuing mayhem, but it has become the fall guy for a whole series of failed policies. Turkey meanwhile has exploited the confusion to clamp down on dissent and to institutionalize Erdogan’s authoritarian inclinations. Ten years of American-licensed meddling combined with obliviousness to possible consequences has led to in excess of 100,000 dead Syrians and the introduction of large terrorist infrastructures into the Arab heartland, yet another foreign policy disaster in the making with no clear way out.
  •  
    Former CIA officer Philip Giraldi adds valuable context to revelations of Turkey's involvement in the false flag Sarin gas attack in Syria and in Turkey's follow-up plan to stage a false flag attack on a Turkish tomb in Syria as a pretext for Turkish invasion of Syria. 
Paul Merrell

French and Spanish intelligence aided NSA spying - report - RT News - 0 views

  • Electronic surveillance which the European media and politicians blamed on the NSA was also carried out by their own intelligence services, as part of a wide-ranging allied security effort, according to US officials. European spy agencies collected phone records in war zones and areas outside their borders and shared information with the NSA, US officials said on Tuesday, as part of wider efforts to protect allied soldiers and civilians, according to a report in the Wall Street Journal. This is a markedly different version of events to what has been reported in Europe and throws up questions about the level of European involvement in global surveillance.
  • However, these efforts are separate to the US program which targeted foreign leaders, including Angela Merkel. There has so far been no comment from either the French or Spanish authorities or from the NSA.
  • But James Clapper, the director of National Intelligence said that the notion that the NSA had eavesdropped on the phone calls of 70 million French citizens was false and that the allegations were based on “inaccurate and misleading information regarding US foreign intelligence activities.” But he didn’t provide any other explanation. US intelligence officials have, according to the Wall Street Journal, privately said that the disclosures by the European press put them in a difficult position. They are keen to put the record straight but to do so would expose the activities of their allies’ intelligence activities. US officials also say that the leaked documents that the Le Monde story was based on were not supplied by the NSA, but rather were NSA data received from French intelligence. The US reached the conclusion that the phone records the French had collected were from outside France and were then shared with the NSA. There was a similar story for the documents citied in El Mundo, the officials said. There are considerable diplomatic sensitivities of outing partner services, which the NSA relies on for a considerable amount of intelligence. A public exposure of European complicity may spark domestic outrage in Europe and threaten co-operation with the US in future.
  •  
    Finger-pointing by the U.S. Intelligence Community is good news, a strong sign that the Western nation's surveillance conspiracy is fragmenting. When one defendant blames another, their front is no longer united. 
Paul Merrell

Spy Chief James Clapper Wins Rosemary Award - 0 views

  • Director of National Intelligence James Clapper has won the infamous Rosemary Award for worst open government performance in 2013, according to the citation published today by the National Security Archive at www.nsarchive.org. Despite heavy competition, Clapper's "No, sir" lie to Senator Ron Wyden's question: "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?" sealed his receipt of the dubious achievement award, which cites the vastly excessive secrecy of the entire U.S. surveillance establishment. The Rosemary Award citation leads with what Clapper later called the "least untruthful" answer possible to congressional questions about the secret bulk collection of Americans' phone call data. It further cites other Clapper claims later proved false, such as his 2012 statement that "we don't hold data on U.S. citizens." But the Award also recognizes Clapper's fellow secrecy fetishists and enablers, including:
  • Gen. Keith Alexander, director of the NSA, for multiple Rose Mary Woods-type stretches, such as (1) claiming that the secret bulk collection prevented 54 terrorist plots against the U.S. when the actual number, according to the congressionally-established Privacy and Civil Liberties Oversight Board (PCLOB) investigation (pp. 145-153), is zero; (2) his 2009 declaration to the wiretap court that multiple NSA violations of the court's orders arose from differences over "terminology," an explanation which the chief judge said "strains credulity;" and (3) public statements by the NSA about its programs that had to be taken down from its website for inaccuracies (see Documents 78, 85, 87 in The Snowden Affair), along with public statements by other top NSA officials now known to be untrue (see "Remarks of Rajesh De," NSA General Counsel, Document 53 in The Snowden Affair).
  • Robert Mueller, former FBI director, for suggesting (as have Gen. Alexander and many others) that the secret bulk collection program might have been able to prevent the 9/11 attacks, when the 9/11 Commission found explicitly the problem was not lack of data points, but failing to connect the many dots the intelligence community already had about the would-be hijackers living in San Diego. The National Security Division lawyers at the Justice Department, for misleading their own Solicitor General (Donald Verrilli) who then misled (inadvertently) the U.S. Supreme Court over whether Justice let defendants know that bulk collection had contributed to their prosecutions. The same National Security Division lawyers who swore under oath in the Electronic Frontier Foundation's Freedom of Information Act lawsuit for a key wiretap court opinion that the entire text of the opinion was appropriately classified Top Secret/Sensitive Compartmented Information (release of which would cause "exceptionally grave damage" to U.S. national security). Only after the Edward Snowden leaks and the embarrassed governmental declassification of the opinion did we find that one key part of the opinion's text simply reproduced the actual language of the 4th Amendment to the U.S. Constitution, and the only "grave damage" was to the government's false claims.
  • ...9 more annotations...
  • President Obama for his repeated misrepresentations about the bulk collection program (calling the wiretap court "transparent" and saying "all of Congress" knew "exactly how this program works") while in effect acknowledging the public value of the Edward Snowden leaks by ordering the long-overdue declassification of key documents about the NSA's activities, and investigations both by a special panel and by the Privacy and Civil Liberties Oversight Board. The PCLOB directly contradicted the President, pointing out that "when the only means through which legislators can try to understand a prior interpretation of the law is to read a short description of an operational program, prepared by executive branch officials, made available only at certain times and locations, which cannot be discussed with others except in classified briefings conducted by those same executive branch officials, legislators are denied a meaningful opportunity to gauge the legitimacy and implications of the legal interpretation in question. Under such circumstances, it is not a legitimate method of statutory construction to presume that these legislators, when reenacting the statute, intended to adopt a prior interpretation that they had no fair means of evaluating." (p. 101)
  • Even an author of the Patriot Act, Rep. Jim Sensenbrenner (R-WI), was broadsided by the revelation of the telephone metadata dragnet. After learning of the extent of spying on Americans that his Act unleashed, he wrote that the National Security Agency "ignored restrictions painstakingly crafted by lawmakers and assumed plenary authority never imagined by Congress" by cloaking its actions behind the "thick cloud of secrecy" that even our elected representatives could not breech. Clapper recently conceded to the Daily Beast, "I probably shouldn't say this, but I will. Had we been transparent about this [phone metadata collection] from the outset … we wouldn't have had the problem we had." The NSA's former deputy director, John "Chris" Inglis, said the same when NPR asked him if he thought the metadata dragnet should have been disclosed before Snowden. "In hindsight, yes. In hindsight, yes." Speaking about potential (relatively minimal) changes to the National Security Agency even the president acknowledged, "And all too often new authorities were instituted without adequate public debate," and "Given the unique power of the state, it is not enough for leaders to say: Trust us. We won't abuse the data we collect. For history has too many examples when that trust has been breached." (Exhibit A, of course, is the NSA "watchlist" in the 1960's and 1970's that targeted not only antiwar and civil rights activists, but also journalists and even members of Congress.)
  • The Archive established the not-so-coveted Rosemary Award in 2005, named after President Nixon's secretary, Rose Mary Woods, who testified she had erased 18-and-a-half minutes of a crucial Watergate tape — stretching, as she showed photographers, to answer the phone with her foot still on the transcription pedal. Bestowed annually to highlight the lowlights of government secrecy, the Rosemary Award has recognized a rogue's gallery of open government scofflaws, including the CIA, the Treasury Department, the Air Force, the FBI, the Federal Chief Information Officers' Council, and the career Rosemary leader — the Justice Department — for the last two years. Rosemary-winner James Clapper has offered several explanations for his untruthful disavowal of the National Security Agency's phone metadata dragnet. After his lie was exposed by the Edward Snowden revelations, Clapper first complained to NBC's Andrea Mitchell that the question about the NSA's surveillance of Americans was unfair, a — in his words — "When are you going to stop beating your wife kind of question." So, he responded "in what I thought was the most truthful, or least untruthful, manner by saying 'no.'"
  • The Emmy and George Polk Award-winning National Security Archive, based at the George Washington University, has carried out thirteen government-wide audits of FOIA performance, filed more than 50,000 Freedom of Information Act requests over the past 28 years, opened historic government secrets ranging from the CIA's "Family Jewels" to documents about the testing of stealth aircraft at Area 51, and won a series of historic lawsuits that saved hundreds of millions of White House e-mails from the Reagan through Obama presidencies, among many other achievements.
  • After continuing criticism for his lie, Clapper wrote a letter to Chairman of the Senate Select Committee on Intelligence Dianne Feinstein, now explaining that he misunderstood Wyden's question and thought it was about the PRISM program (under Section 702 of the Foreign Intelligence Surveillance Act) rather than the telephone metadata collection program (under Section 215 of the Patriot Act). Clapper wrote that his staff "acknowledged the error" to Senator Wyden soon after — yet he chose to reject Wyden's offer to amend his answer. Former NSA senior counsel Joel Brenner blamed Congress for even asking the question, claiming that Wyden "sandbagged" Clapper by the "vicious tactic" of asking "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?" Meanwhile, Steve Aftergood of the Federation of American Scientists countered that "it is of course wrong for officials to make false statements, as DNI Clapper did," and that in fact the Senate Intelligence Committee "became complicit in public deception" for failing to rebut or correct Clapper's statement, which they knew to be untruthful. Clapper described his unclassified testimony as a game of "stump the chump." But when it came to oversight of the National Security Agency, it appears that senators and representatives were the chumps being stumped. According to Representative Justin Amash (R-Mich), the House Intelligence Committee "decided it wasn't worthwhile to share this information" about telephone metadata surveillance with other members of Congress. Classified briefings open to the whole House were a "farce," Amash contended, often consisting of information found in newspapers and public statutes.
  • Director Clapper joins an undistinguished list of previous Rosemary Award winners: 2012 - the Justice Department (in a repeat performance, for failure to update FOIA regulations for compliance with the law, undermining congressional intent, and hyping its open government statistics) 2011- the Justice Department (for doing more than any other agency to eviscerate President Obama's Day One transparency pledge, through pit-bull whistleblower prosecutions, recycled secrecy arguments in court cases, retrograde FOIA regulations, and mixed FOIA responsiveness) 2010 - the Federal Chief Information Officers' Council (for "lifetime failure" to address the crisis in government e-mail preservation) 2009 - the FBI (for having a record-setting rate of "no records" responses to FOIA requests) 2008 - the Treasury Department (for shredding FOIA requests and delaying responses for decades) 2007 - the Air Force (for disappearing its FOIA requests and having "failed miserably" to meet its FOIA obligations, according to a federal court ruling) 2006 - the Central Intelligence Agency (for the biggest one-year drop-off in responsiveness to FOIA requests yet recorded).   ALSO-RANS The Rosemary Award competition in 2013 was fierce, with a host of government contenders threatening to surpass the Clapper "least untruthful" standard. These secrecy over-achievers included the following FOI delinquents:
  • Admiral William McRaven, head of the Special Operations Command for the raid that killed Osama Bin Laden, who purged his command's computers and file cabinets of all records on the raid, sent any remaining copies over to CIA where they would be effectively immune from the FOIA, and then masterminded a "no records" response to the Associated Press when the AP reporters filed FOIA requests for raid-related materials and photos. If not for a one-sentence mention in a leaked draft inspector general report — which the IG deleted for the final version — no one would have been the wiser about McRaven's shell game. Subsequently, a FOIA lawsuit by Judicial Watch uncovered the sole remaining e-mail from McRaven ordering the evidence destruction, in apparent violation of federal records laws, a felony for which the Admiral seems to have paid no price. Department of Defense classification reviewers who censored from a 1962 document on the Cuban Missile Crisis direct quotes from public statements by Soviet Premier Nikita Khrushchev. The quotes referred to the U.S. Jupiter missiles in Turkey that would ultimately (and secretly) be pulled out in exchange for Soviet withdrawal of its missiles in Cuba. The denials even occurred after an appeal by the National Security Archive, which provided as supporting material the text of the Khrushchev statements and multiple other officially declassified documents (and photographs!) describing the Jupiters in Turkey. Such absurd classification decisions call into question all of the standards used by the Pentagon and the National Declassification Center to review historical documents.
  • Admiral William McRaven memo from May 13, 2011, ordering the destruction of evidence relating to the Osama bin Laden raid. (From Judicial Watch)
  • The Department of Justice Office of Information Policy, which continues to misrepresent to Congress the government's FOIA performance, while enabling dramatic increases in the number of times government agencies invoke the purely discretionary "deliberative process" exemption. Five years after President Obama declared a "presumption of openness" for FOIA requests, Justice lawyers still cannot show a single case of FOIA litigation in which the purported new standards (including orders from their own boss, Attorney General Eric Holder) have caused the Department to change its position in favor of disclosure.
Paul Merrell

Data Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the Bahama... - 0 views

  • The National Security Agency is secretly intercepting, recording, and archiving the audio of virtually every cell phone conversation on the island nation of the Bahamas. According to documents provided by NSA whistleblower Edward Snowden, the surveillance is part of a top-secret system – code-named SOMALGET – that was implemented without the knowledge or consent of the Bahamian government. Instead, the agency appears to have used access legally obtained in cooperation with the U.S. Drug Enforcement Administration to open a backdoor to the country’s cellular telephone network, enabling it to covertly record and store the “full-take audio” of every mobile call made to, from and within the Bahamas – and to replay those calls for up to a month. SOMALGET is part of a broader NSA program called MYSTIC, which The Intercept has learned is being used to secretly monitor the telecommunications systems of the Bahamas and several other countries, including Mexico, the Philippines, and Kenya. But while MYSTIC scrapes mobile networks for so-called “metadata” – information that reveals the time, source, and destination of calls – SOMALGET is a cutting-edge tool that enables the NSA to vacuum up and store the actual content of every conversation in an entire country.
  • All told, the NSA is using MYSTIC to gather personal data on mobile calls placed in countries with a combined population of more than 250 million people. And according to classified documents, the agency is seeking funding to export the sweeping surveillance capability elsewhere. The program raises profound questions about the nature and extent of American surveillance abroad. The U.S. intelligence community routinely justifies its massive spying efforts by citing the threats to national security posed by global terrorism and unpredictable rival nations like Russia and Iran. But the NSA documents indicate that SOMALGET has been deployed in the Bahamas to locate “international narcotics traffickers and special-interest alien smugglers” – traditional law-enforcement concerns, but a far cry from derailing terror plots or intercepting weapons of mass destruction.
  • By targeting the Bahamas’ entire mobile network, the NSA is intentionally collecting and retaining intelligence on millions of people who have not been accused of any crime or terrorist activity. Nearly five million Americans visit the country each year, and many prominent U.S. citizens keep homes there, including Sen. Tom Harkin (D-Iowa), Bill Gates, and Oprah Winfrey.
  • ...12 more annotations...
  • The Intercept has confirmed that as of 2013, the NSA was actively using MYSTIC to gather cell-phone metadata in five countries, and was intercepting voice data in two of them. Documents show that the NSA has been generating intelligence reports from MYSTIC surveillance in the Bahamas, Mexico, Kenya, the Philippines, and one other country, which The Intercept is not naming in response to specific, credible concerns that doing so could lead to increased violence. The more expansive full-take recording capability has been deployed in both the Bahamas and the unnamed country. MYSTIC was established in 2009 by the NSA’s Special Source Operations division, which works with corporate partners to conduct surveillance. Documents in the Snowden archive describe it as a “program for embedded collection systems overtly installed on target networks, predominantly for the collection and processing of wireless/mobile communications networks.”
  • If an entire nation’s cell-phone calls were a menu of TV shows, MYSTIC would be a cable programming guide showing which channels offer which shows, and when. SOMALGET would be the DVR that automatically records every show on every channel and stores them for a month. MYSTIC provides the access; SOMALGET provides the massive amounts of storage needed to archive all those calls so that analysts can listen to them at will after the fact. According to one NSA document, SOMALGET is “deployed against entire networks” in the Bahamas and the second country, and processes “over 100 million call events per day.”
  • When U.S. drug agents need to tap a phone of a suspected drug kingpin in another country, they call up their counterparts and ask them set up an intercept. To facilitate those taps, many nations – including the Bahamas – have hired contractors who install and maintain so-called lawful intercept equipment on their telecommunications. With SOMALGET, it appears that the NSA has used the access those contractors developed to secretly mine the country’s entire phone system for “signals intelligence” –recording every mobile call in the country. “Host countries,” the document notes, “are not aware of NSA’s SIGINT collection.” “Lawful intercept systems engineer communications vulnerabilities into networks, forcing the carriers to weaken,” says Christopher Soghoian, the principal technologist for the American Civil Liberties Union. “Host governments really should be thinking twice before they accept one of these Trojan horses.”
  • The DEA has long been in a unique position to help the NSA gain backdoor access to foreign phone networks. “DEA has close relationships with foreign government counterparts and vetted foreign partners,” the manager of the NSA’s drug-war efforts reported in a 2004 memo. Indeed, with more than 80 international offices, the DEA is one of the most widely deployed U.S. agencies around the globe. But what many foreign governments fail to realize is that U.S. drug agents don’t confine themselves to simply fighting narcotics traffickers. “DEA is actually one of the biggest spy operations there is,” says Finn Selander, a former DEA special agent who works with the drug-reform advocacy group Law Enforcement Against Prohibition. “Our mandate is not just drugs. We collect intelligence.” What’s more, Selander adds, the NSA has aided the DEA for years on surveillance operations. “On our reports, there’s drug information and then there’s non-drug information,” he says. “So countries let us in because they don’t view us, really, as a spy organization.”
  • “I seriously don’t think that would be your run-of-the-mill legal interception equipment,” says the former engineer, who worked with hardware and software that typically maxed out at 1,000 intercepts. The NSA, by contrast, is recording and storing tens of millions of calls – “mass surveillance,” he observes, that goes far beyond the standard practices for lawful interception recognized around the world. The Bahamas Telecommunications Company did not respond to repeated phone calls and emails.
  • The proliferation of private contractors has apparently provided the NSA with direct access to foreign phone networks. According to the documents, MYSTIC draws its data from “collection systems” that were overtly installed on the telecommunications systems of targeted countries, apparently by corporate “partners” cooperating with the NSA. One NSA document spells out that “the overt purpose” given for accessing foreign telecommunications systems is “for legitimate commercial service for the Telco’s themselves.” But the same document adds: “Our covert mission is the provision of SIGINT,” or signals intelligence.
  • According to the NSA documents, MYSTIC targets calls and other data transmitted on  Global System for Mobile Communications networks – the primary framework used for cell phone calls worldwide. In the Philippines, MYSTIC collects “GSM, Short Message Service (SMS) and Call Detail Records” via access provided by a “DSD asset in a Philippine provider site.” (The DSD refers to the Defence Signals Directorate, an arm of Australian intelligence. The Australian consulate in New York declined to comment.) The operation in Kenya is “sponsored” by the CIA, according to the documents, and collects “GSM metadata with the potential for content at a later date.” The Mexican operation is likewise sponsored by the CIA. The documents don’t say how or under what pretenses the agency is gathering call data in those countries. In the Bahamas, the documents say, the NSA intercepts GSM data that is transmitted over what is known as the “A link”–or “A interface”–a core component of many mobile networks. The A link transfers data between two crucial parts of GSM networks – the base station subsystem, where phones in the field communicate with cell towers, and the network subsystem, which routes calls and text messages to the appropriate destination. “It’s where all of the telephone traffic goes,” says the former engineer.
  • When U.S. drug agents wiretap a country’s phone networks, they must comply with the host country’s laws and work alongside their law enforcement counterparts. “The way DEA works with our allies – it could be Bahamas or Jamaica or anywhere – the host country has to invite us,” says Margolis. “We come in and provide the support, but they do the intercept themselves.” The Bahamas’ Listening Devices Act requires all wiretaps to be authorized in writing either by the minister of national security or the police commissioner in consultation with the attorney general. The individuals to be targeted must be named. Under the nation’s Data Protection Act, personal data may only be “collected by means which are both lawful and fair in the circumstances of the case.” The office of the Bahamian data protection commissioner, which administers the act, said in a statement that it “was not aware of the matter you raise.” Countries like the Bahamas don’t install lawful intercepts on their own. With the adoption of international standards, a thriving market has emerged for private firms that are contracted by foreign governments to install and maintain lawful intercept equipment. Currently valued at more than $128 million, the global market for private interception services is expected to skyrocket to more than $970 million within the next four years, according to a 2013 report from the research firm Markets and Markets.
  • If the U.S. government wanted to make a case for surveillance in the Bahamas, it could point to the country’s status as a leading haven for tax cheats, corporate shell games, and a wide array of black-market traffickers. The State Department considers the Bahamas both a “major drug-transit country” and a “major money laundering country” (a designation it shares with more than 60 other nations, including the U.S.). According to the International Monetary Fund, as of 2011 the Bahamas was home to 271 banks and trust companies with active licenses. At the time, the Bahamian banks held $595 billion in U.S. assets. But the NSA documents don’t reflect a concerted focus on the money launderers and powerful financial institutions – including numerous Western banks – that underpin the black market for narcotics in the Bahamas. Instead, an internal NSA presentation from 2013 recounts with pride how analysts used SOMALGET to locate an individual who “arranged Mexico-to-United States marijuana shipments” through the U.S. Postal Service.
  • The presentation doesn’t say whether the NSA shared the information with the DEA. But the drug agency’s Special Operations Divison has come under fire for improperly using classified information obtained by the NSA to launch criminal investigations – and then creating false narratives to mislead courts about how the investigations began. The tactic – known as parallel construction – was first reported by Reuters last year, and is now under investigation by the Justice Department’s inspector general. So: Beyond a desire to bust island pot dealers, why would the NSA choose to apply a powerful collection tool such as SOMALGET against the Bahamas, which poses virtually no threat to the United States? The answer may lie in a document that characterizes the Bahamas operation as a “test bed for system deployments, capabilities, and improvements” to SOMALGET. The country’s small population – fewer than 400,000 residents – provides a manageable sample to try out the surveillance system’s features. Since SOMALGET is also operational in one other country, the Bahamas may be used as a sort of guinea pig to beta-test improvements and alterations without impacting the system’s operations elsewhere. “From an engineering point of view it makes perfect sense,” says the former engineer. “Absolutely.”
  • SOMALGET operates under Executive Order 12333, a Reagan-era rule establishing wide latitude for the NSA and other intelligence agencies to spy on other countries, as long as the attorney general is convinced the efforts are aimed at gathering foreign intelligence. In 2000, the NSA assured Congress that all electronic surveillance performed under 12333 “must be conducted in a manner that minimizes the acquisition, retention, and dissemination of information about unconsenting U.S. persons.” In reality, many legal experts point out, the lack of judicial oversight or criminal penalties for violating the order render the guidelines meaningless. “I think it would be open, whether it was legal or not,” says German, the former FBI agent. “Because we don’t have all the facts about how they’re doing it. For a long time, the NSA has been interpreting their authority in the broadest possible way, even beyond what an objective observer would say was reasonable.” “An American citizen has Fourth Amendment rights wherever they are,” adds Kurt Opsahl, an attorney with the Electronic Frontier Foundation. “Nevertheless, there have certainly been a number of things published over the last year which suggest that there are broad, sweeping programs that the NSA and other government agencies are doing abroad that sweep up the communications of Americans.”
  • Legal or not, the NSA’s covert surveillance of an entire nation suggests that it will take more than the president’s tepid “limits” to rein in the ambitions of the intelligence community. “It’s almost like they have this mentality – if we can, we will,” says German. “There’s no analysis of the long-term risks of doing it, no analysis of whether it’s actually worth the effort, no analysis of whether we couldn’t take those resources and actually put them on real threats and do more good.” It’s not surprising, German adds, that the government’s covert program in the Bahamas didn’t remain covert. “The undermining of international law and international cooperation is such a long-term negative result of these programs that they had to know would eventually be exposed, whether through a leak, whether through a spy, whether through an accident,” he says. “Nothing stays secret forever. It really shows the arrogance of these agencies – they were just going to do what they were going to do, and they weren’t really going to consider any other important aspects of how our long-term security needs to be addressed.”
  •  
    Words fail me.
Paul Merrell

WASHINGTON: Not just torture: Senator says CIA stalling over bogus intelligence that le... - 0 views

  • CIA Director John Brennan, under fire over the Senate report on the CIA’s use of torture, is facing new heat over his role in what a senior lawmaker calls an apparent coverup involving bogus intelligence used by the George W. Bush administration to help justify the 2003 invasion of Iraq.Carl Levin, D-Mich., who’s ending 36 years in the Senate, plans to press Brennan one last time to fulfill a pledge to support the full declassification of a CIA cable debunking the claim that the leader of the 9/11 hijackers met with an Iraqi intelligence officer in the Czech capital of Prague just months before the attacks.“Director Brennan’s apparent refusal to do what he has committed to do – to ask the Czech government if it objects to release of the cable – now takes on the character of a continuing coverup,” Levin plans to tell the Senate on Thursday, according to a draft of his speech obtained by McClatchy.
  • At a Christian Science Monitor breakfast with reporters on Wednesday, Levin said he’s been told by Czech officials that “they have no objection” to the release of the cable.Levin also pointed out that the former chief of the Czech counterintelligence service, who was in the post at the time of the alleged meeting, published a memoir this year in which he asserted that the CIA pressured him to confirm the encounter and that U.S. officials pressured the Czech government when he couldn’t do so.“Without any regard to us, they used our intelligence information for propaganda press leaks. They wanted to mine certainty from unconfirmed suspicion and use it as an excuse for military action,” wrote Jiri Ruzek. “We were to play the role of useful idiot.”The CIA declined to comment. But a U.S. intelligence official said that Levin had been told that releasing the full cable couldn’t be done without damaging intelligence sources.
  • The March 13, 2003, cable was sent by CIA field officers in response to a request for more information on a single-source intelligence report of a meeting in a Prague park between Atta and al Ani. The cable warned that U.S. government officials shouldn’t cite the unverified report.Even so, Cheney continued to give the report credibility in media interviews, telling CNN in June 2004 that the truth of the report hadn’t been resolved.“Those statements were simply not true,” Levin said in the draft. “The vice president was recklessly disregarding the truth, and he did so in a way calculated to maintain support for the administration’s decision to go to war in Iraq.”During his February 2013 hearing to be confirmed as CIA director, Brennan was urged by Levin to ask the Czech government if it would object to the release of the cable. “Absolutely, Senator, I will,” Brennan replied.
  • ...3 more annotations...
  • The alleged meeting between Mohammad Atta and Ahmad Samir al Ani was repeatedly cited by former Vice President Dick Cheney before and after the invasion to bolster the Bush administration’s assertion that Saddam was in cahoots with al Qaida and could pass Iraqi weapons of mass destruction – which didn’t exist – to the terrorist group.“The notion of such a meeting was a centerpiece of the administration’s campaign to create an impression in the public mind that Saddam was in league with the al Qaida terrorists who attacked us on 9/11,” Levin planned to tell the Senate, according to the speech draft.“Now why am I bringing up a CIA cable from more than a decade ago?” the draft said. “This is about giving the American people a full account of the march to war as new information becomes available. It is about trying to hold leaders who misled the public accountable.”
  • After receiving no response from Brennan, Levin earlier this year blocked the nomination of Caroline Krass to be the CIA general counsel. He agreed to lift his hold on Krass after receiving a March 13 letter from Brennan that summarized the cable, saying that it cast “serious doubt” that the alleged meeting occurred.Brennan added, “Investigative records subsequently placed Atta in the United States just before and after the date on which the single-source report said the meeting was to have occurred,” according to a copy of the letter obtained by McClatchy.Brennan declassified a single line from the cable that said, “There is not one USG (U.S. government counterterrorism) or FBI expert that . . . has said they have evidence or ‘know’ that (Atta) was indeed (in Prague). In fact, the analysis has been quite the opposite.”
  • In the draft of his remarks, Levin asserted that there was other “critically relevant information” in the cable that had been “denied to the public in order to protect those in the Bush White House who are responsible” for “playing games with intelligence.”“I believe decision-makers should have to face the full, unadulterated, unredacted truth about their decisions,” said Levin. “The American people should know the full story . . . as a warning to future leaders against the misuse of intelligence and the abuse of power.”
Paul Merrell

Land Destroyer: NATO's War on Syria Just Got Dirtier - 0 views

  • But even with the West's capitulation in Syria, and months passing without a shred of credible evidence produced, hacks among Western media continue to perpetuate the original narrative. Among these are of course corporate-financier funded think-tanks and propaganda fronts like the Brookings Institution, Foreign Policy Magazine, the Foundation for the Defense of Democracies (FDD), and establishment papers like the Guardian. In the middle of it all is couch-potato self-proclaimed weapons expert, Eliot Higgins, a representation of the West's propaganda 2.0 campaign.  UK-based Higgins lost his job and now spends his days combing social media sites for "evidence" he then analyzes and reports on. The Western media, with its propagandists expelled from Syria and many of its "sources" in Syria exposed in humiliating attempts to fabricate and manipulate evidence, quickly picked Higgins up and elevated his armchair blogging to "expert analysis." Since then, Higgins has joined the already discredited "Syrian Observatory for Human Rights" another UK-based individual, as the basis upon which the West's Syrian narrative spins. 
  • Whitaker is desperately attempting to keep the wheels on the establishment's new propaganda 2.0 vehicle - manipulating social media, much the way Hersh describes intelligence being manipulated, to create any outcome necessary to bolster a predetermined narrative.  What he doesn't address is the fact that Higgins' work almost entirely depends on videos posted online by people he does not know, who may be misrepresenting who they are, what they are posting, and their motivations for doing so - such is the nature of anonymity on the web and why this evidence alone is useless outside of a larger geopolitical context.  Both Whitaker and Higgins, who maintain that the Syrian government was behind the attacks, fail to address another glaring reality. A false flag attack is designed to look like the work of one's enemy. In other words, terrorists in Syria would use equipment, uniforms, weapons, and tactics that would pin the crime on the Syrian government. All Higgins has proved, thus far, is that the superficial details of the operation made for a convincing false flag attack. 
  • Toward the end of Higgin's piece, he, like his friends at the Guardian, attempt to claim Al Nusra, contrary to Hersh's report, are most likely not capable of producing sarin.
  • ...5 more annotations...
  • The e-mails illustrate prior knowledge of chemical weapons falling into the hands of terrorists who fully planned on using them in a false flag operation. Higgins and others had this information, and now, have Seymour Hersh's report as well, yet they still pose the argument that the militants had neither the ability nor the means to carry out the attacks. In fact, it appears that the Western media and underlings like Higgins went out of their way specifically to discredit the notion from even being considered.  In other words, a concerted cover-up.  The e-mails above, and others in the large cache also reveal the possible motivation for these lies. So-called journalists and researchers peddling the West's narrative appear to have a wide range of lucrative offers presented to them, as well as funding for them to continue doing the work they are already involved in. This of course is only the case so long as their narratives mesh with the institutions, corporations, and individuals cutting the checks. 
  • While perhaps Higgins and company missed that CNN report, it is now revealed that at least Higgins, and several other journalists were told by an American contractor on the ground inside of Syria, that militants had gained access to chemical weapons and more importantly, were planning to use them in a false flag attack - this months before the August 21 attack in Damascus.   The Syrian Electronic Army (SEA) has released e-mails this week between American contractor Matthew Van Dyke and members of the Western media, including Higgins. The e-mails indicated that militants had chemical weapons and were planning to use them in an attack to frame the Syrian government - serving as impetus for wider foreign intervention. SEA's emails have been confirmed by Higgins himself in a series of self-incriminating tweets where he goes, point-by-point, attempting to provide explanations for the damning revelations. 
  • The e-mails reveal multiple correspondences regarding chemical weapons falling into the hands of terrorists aimed at using them in a false flag operation, Higgins' and Van Dyke's mutual "benefactor" located in Virginia, "near DC" (Langley, Virginia?), and job offers for Higgins from NGOs and a defense contractor involving "open source intelligence," the new buzzword used by Higgins and Whitaker in regards to the new form of propaganda they both participate in. 
  • Why would Higgins even mention the possibility of a false flag attack, when all that would do is alienate him from the establishment he is so eagerly trying to be a part of? His recent piece in Foreign Policy and the Guardian's ceaseless promotion of his work are favors that demand reciprocation - in the form of toeing the line and selling a narrative Higgins and others know is deceitful.  That Higgins, the Guardian, and Foreign Policy are prepared to throw veteran journalist Seymour Hersh under the bus to protect their interests, gives us a look into the depths of depravity within which this "new" media Whitaker celebrates, operate.  Worst of all for the West, is that the transparency and accountability they claim to uphold, had to be kept in check by the SEA - an organization wanted by the FBI as "terrorists." We would be led to believe by the likes of Whitaker, Higgins, and Van Dyke that the Syrian government and their supporters are the villains, but in their own words and actions we see the truth. 
  • Note: The full extent of SEA's leaked e-mails exposes Van Dyke and the journalists he associates with as utterly depraved, deceitful, unprincipled individuals each driven by untethered greed and narcissism. The e-mails also reveal that "aid ships" are used to bring in weapons and foreign fighters, that the Syrians are almost entirely behind the government and that the so-called revolution was "fake." Van Dyke is exposed as having conspired to kill a man and his entire family over a trivial personal dispute and much, much more. Readers are encouraged to comb through the archives, and to follow SEA on Twitter  @Official_SEA16.
  •  
    "Brown Moses" (Eliot Higgins) has been the principle source of "evidence" that the Assad government used chemical weapons, arguing strenuously that the "rebels" had no such capability. But the Syrian Electronic Army obtained a large number of emails between Higgins and an American mercenary working in Syria showing beyond doubt that Higgins had been put on notice in May 2013 -- months before the sarin gas attack near Damascus in late August -- that the "rebels" had sarin.   Oopsies!
Paul Merrell

US Intel Agencies Try to Strong-Arm Trump into War With Russia - 0 views

  • Powerful elites are using the credibility of the US Intelligence agencies to demonize Russia and prepare the country for war. This is the real meaning of the “Russia hacking” story which, as yet, has not produced any hard evidence of Russian complicity. Last week’s 25-page report, that was released by the Director of National Intelligence James Clapper, illustrates to what extent intelligence is being “fixed around the policy”.  Just as the CIA generated false information related to Weapons of Mass Destruction to soften public resistance to war with Iraq, so too, the spurious allegations in the DNI’s politically-motivated report are designed to depict Russia as a growing threat to US national security. The timing of the report has less to do with the election of Donald Trump as President than it does with critical developments in Syria where the Russian military has defeated US-proxies in Syria’s industrial hub, Aleppo, rolling back Washington’s 15-year War of Terror and derailing the imperialist plan to control vital resources and pipeline corridors across the Middle East and Central Asia. Russia has become the main obstacle to Washington achieving its strategic vision of pivoting to Asia and maintaining its dominant role into the next century. The Intelligence Community has been coerced into compromising its credibility to incite fear of Russia and to advance the geopolitical ambitions of deep state powerbrokers.
  • The “Russia hacking” flap shows how far the Intel agencies have veered from their original mandate, which is to impartially gather and analyze information that may be vital to US national security. As we have seen in the last two weeks, the leaders of these organizations feel free to offer opinions on  issues that clearly conflict with those of the new President-elect. Trump has stated repeatedly that he wants to reduce tensions and reset relations with Russia, but that policy is being sabotaged by members of the intelligence community, particularly CIA Director John Brennan who appeared just last week on PBS Newshour with Judy Woodruff. Here’s an excerpt from the interview: “We see that there are still a lot of actions that Russia is undertaking that undermine the principles of democracy in so many countries. What has happened in our recent election is not new. The Russians have engaged in trying to manipulate elections in Europe for a number of years… the Russians tried to interfere in our electoral process recently, and were actively involved in that. And that is something that we can’t countenance.” (“Interview with CIA Director John Brennan”,  PBS Newshour)
  • Brennan, of course, provided no evidence for his claims nor did he mention the hundreds of CIA interventions around the world. But Brennan’s accusations are less important than the fact that his appearance on a nationwide broadcast identifies him as a political advocate for policies that conflict with those of the new president. Do we really want unelected intelligence officials — whose job it is to provide the president with sensitive information related to national security– to assume a partisan role in shaping policy? And why would Brennan –whose is supposed to “serve at the pleasure of the president”– accept an invitation to offer his views on Russia when he knew they would be damaging to the new administration? Powerful people behind the scenes are obviously pushing the heads of these intelligence agencies to stick to their ‘anti-Moscow’ narrative to force Trump to abandon his plan for peaceful relations with Moscow.  Brennan isn’t calling the shots and neither are Clapper or Comey. They’re all merely agents serving the interests of establishment plutocrats whose geopolitical agenda doesn’t jibe with that of the incoming administration. If that wasn’t the case, then why would the Intelligence Community stake its reputation on such thin gruel as this Russian hacking gibberish? It doesn’t make any sense. The people who launched this campaign are either supremely arrogant or extremely desperate. Which is it?
  • ...2 more annotations...
  • What’s really going on here?  Why have the Intelligence agencies savaged their credibility just to convince people that Russia is up to no good? The Russia hacking story has more to do with recent developments in Syria than it does with delegitimizing Donald Trump. Aleppo was a real wake up call for the US foreign policy establishment which is beginning to realize that their plans for the next century have been gravely undermined by Russia’s military involvement in Syria. Aleppo represents the first time that an armed coalition of allied states (Russia, Iran, Syria, Hezbollah) have actively engaged US jihadist-proxies and soundly beat them to a pulp. The stunning triumph in Aleppo has spurred hope among the vassal states that Washington’s bloody military juggernaut can be repelled, rolled back and defeated. And if Washington’s CIA-armed, trained and funded jihadists can be repelled, then the elitist plan to project US power into Central Asia to dominate the world’s most populous and prosperous region, will probably fail. In other words, the outcome in Aleppo has cast doubts on Uncle Sam’s ability to successfully execute its pivot to Asia. That’s why the Intel agencies have been employed to shape public perceptions on Russia.  Their job is to prepare the American people for an escalation of hostilities between the two nuclear-armed superpowers. US powerbrokers are determined to intensify the conflict and reverse facts on the ground. (Recent articles by elites at the Council on Foreign Relations and the Brookings Institute reveal that they are as committed to partitioning Syria as ever.)  Washington wants to  reassert its exceptional role as the uncontested steward of global security and the lone ‘unipolar’ world power.
  • That’s what this whole “hacking” fiasco is about. The big shots who run the country are trying to strong-arm ‘the Donald’ into carrying their water so the depredations can continue and Central Asia can be transformed into a gigantic Washington-dominated corporate free trade zone where the Big Money calls the shots and Capital reigns supreme. That’s their dreamstate, Capitalist Valhalla. They just need Trump to get-with-the-program so the bloodletting can continue apace.
Paul Merrell

Why Turkey wanted to provoke war with a 'false flag' terrorist attack on Syria - Stop t... - 0 views

  • A leaked talk by high-ranking Turkish officials reveals them talking about how easy it would be to create a false flag incident, and how they could use that to justify a wide military intervention inside Syria.
  • It was stunning to hear the highest-ranking Turks causally discussing how to provoke a false flag incident that would justify a large military intervention in Syria. This is a big deal because Turkish troops in Syria opens the door to NATO troops in Syria, which drastically expands the conflict. As someone who has spent a number of years living and working in the Middle East, and having been to Syria multiple times, I was encouraged by my colleagues at Casey Research to share my perspective on this.
  • Turkey owns a very small piece of territory inside of Syria that dates back to the Ottoman Empire. This small piece of land is the tomb of Suleyman Shah, a relative of one of the founding Ottomans. It’s guarded by 24 Turkish troops and is considered sovereign Turkish territory. Having Turkish troops in this area is not controversial, as the Syrian government has long agreed to it. The region where this tomb is located has totally fallen out of the Syrian government’s control for many months. And now, the hardcore ISIL group controls the surrounding area. It has threatened the Turkish soldiers and told them to leave. The Turks refused, and that’s why the Turkish government is getting skittish. This is where the leaked tape comes in.
  • ...3 more annotations...
  • The conversation started out with the Turks talking about how they can protect this tomb from ISIL. This is not controversial. I don’t believe the Syrian government would care about the Turks intervening to protect the tomb, since this is an area where it has lost control anyways. Plus, I’d bet the Syrian government would be happy to see the Turks bogged down fighting ISIL militants who’d otherwise be fighting them. However, that was not the end of the conversation. The really sinister part comes when the high-ranking Turks talk about how easy it would be to create a false flag incident involving the tomb, and how they could use that to justify a much wider military intervention inside Syria. Such an incident would be a sort of foot in the door to further military activities inside Syria and would allow the Turks to help their favored rebel groups, which have seen serious setbacks lately.
  • That step would clearly cause them to go to war with the Syrian government and drastically expand the conflict. And once Turkey is involved inside Syria, that opens the door for NATO to be involved. The Erdogan government has staked a huge amount of domestic political capital by supporting the Syrian rebels. They gambled that their favored rebel groups would quickly win and as a result, Turkey would have more geopolitical influence in a post-Assad Syria. It was a losing bet. Turkey’s favored rebels have seriously faltered, and a growing number of Turkish voters have become skeptical of their government’s intervention and the blowback it’s causing. A false flag incident with the tomb would be a way for Erdogan to double down in a desperate attempt to turn things around in Syria. Whoever leaked this conversation clearly timed it to take the wind out the sails of such a strategy.
  • There are only a few people with the capability and motivation to do this. As an ally of the Syrian government, Russian intelligence is at the top of that list. They have leaked similarly shocking private conversations in Ukraine recently. Members of the Turkish military opposed to Erdogan could have also done it. Instead of coming up with a classy way of saying “touché,” the Turkish government responded by throwing a childish fit, futilely trying to block YouTube and Twitter. In this digital age, restricting Internet access, seizing and spying on digital data, and otherwise tampering with an individual’s digital presence have become new tools in the traditional toolbox of desperate governments.
1 - 20 of 145 Next › Last »
Showing 20 items per page