Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged intel

Rss Feed Group items tagged

Paul Merrell

Your Computer May Already be Hacked - NSA Inside? | Steve Blank - 1 views

  • But while the interviewer focused on the Skype revelation, I thought the most interesting part was the other claim, “that the National Security Agency already had pre-encryption stage access to email on Outlook.”  Say what??  They can see the plaintext on my computer before I encrypt it? That defeats any/all encryption methods. How could they do that? Bypass Encryption While most outside observers think the NSA’s job is cracking encrypted messages, as the Prism disclosures have shown, the actual mission is simply to read all communications. Cracking codes is a last resort.
  • The NSA has a history of figuring out how to get to messages before or after they are encrypted. Whether it was by putting keyloggers on keyboards and recording the keystrokes or detecting the images of the characters as they were being drawn on a CRT. Today every desktop and laptop computer has another way for the NSA to get inside. Intel Inside It’s inevitable that complex microprocessors have bugs in them when they ship. When the first microprocessors shipped the only thing you could hope is that the bug didn’t crash your computer. The only way the chip vendor could fix the problem was to physically revise the chip and put out a new version. But computer manufacturers and users were stuck if you had an old chip. After a particularly embarrassing math bug in 1994 that cost Intel $475 million, the company decided to fix the problem by allowing it’s microprocessors to load fixes automatically when your computer starts.
  • Starting in 1996 with the Intel P6 (Pentium Pro) to today’s P7 chips (Core i7) these processors contain instructions that are reprogrammable in what is called microcode. Intel can fix bugs on the chips by reprogramming a microprocessors microcode with a patch. This patch, called a microcode update, can be loaded into a processor by using special CPU instructions reserved for this purpose. These updates are not permanent, which means each time you turn the computer on, its microprocessor is reset to its built-in microcode, and the update needs to be applied again (through a computer’s BIOS.). Since 2000, Intel has put out 29 microcode updates to their processors. The microcode is distributed by 1) Intel or by 2) Microsoft integrated into a BIOS or 3) as part of a Windows update. Unfortunately, the microcode update format is undocumented and the code is encrypted. This allows Intel to make sure that 3rd parties can’t make unauthorized add-ons to their chips. But it also means that no one can look inside to understand the microcode, which makes it is impossible to know whether anyone is loading a backdoor into your computer.
  • ...3 more annotations...
  • Or perhaps the NSA, working with Intel and/or Microsoft, have wittingly have put backdoors in the microcode updates. A backdoor is is a way of gaining illegal remote access to a computer by getting around the normal security built-in to the computer. Typically someone trying to sneak malicious software on to a computer would try to install a rootkit (software that tries to conceal the malicious code.) A rootkit tries to hide itself and its code, but security conscious sites can discover rootkits by tools that check kernel code and data for changes. But what if you could use the configuration and state of microprocessor hardware in order to hide? You’d be invisible to all rootkit detection techniques that checks the operating system. Or what if you can make the microprocessor random number generator (the basis of encryption) not so random for a particular machine? (The NSA’s biggest coup was inserting backdoors in crypto equipment the Swiss sold to other countries.) Rather than risk getting caught messing with everyone’s updates, my bet is that the NSA has compromised the microcode update signing keys  giving the NSA the ability to selectively target specific computers. (Your operating system ensures security of updates by checking downloaded update packages against the signing key.) The NSA then can send out backdoors disguised as a Windows update for “security.” (Ironic but possible.) That means you don’t need backdoors baked in the hardware, don’t need Intel’s buy-in, don’t have discoverable rootkits, and you can target specific systems without impacting the public at large.
  • A few months ago these kind of discussions would have been theory at best, if not paranoia.
  • The Prism disclosures prove otherwise – the National Security Agency has decided it needs the ability to capture all communications in all forms. Getting inside of a target computer and weakening its encryption or having access to the plaintext of encrypted communication seems likely. Given the technical sophistication of the other parts of their surveillance net, the surprise would be if they haven’t implemented a microcode backdoor. The downside is that 1) backdoors can be hijacked by others with even worse intent. So if NSA has a microcode backdoor – who else is using it? and 2) What other pieces of our infrastructure, (routers, smartphones, military computers, satellites, etc) use processors with uploadable microcode? —— And that may be why the Russian president is now using a typewriter rather than a personal computer.
Paul Merrell

"We cannot trust" Intel and Via's chip-based crypto, FreeBSD developers say | Ars Technica - 0 views

  • Developers of the FreeBSD operating system will no longer allow users to trust processors manufactured by Intel and Via Technologies as the sole source of random numbers needed to generate cryptographic keys that can't easily be cracked by government spies and other adversaries. The change, which will be effective in the upcoming FreeBSD version 10.0, comes three months after secret documents leaked by former National Security Agency (NSA) subcontractor Edward Snowden said the US spy agency was able to decode vast swaths of the Internet's encrypted traffic. Among other ways, The New York Times, Pro Publica, and The Guardian reported in September, the NSA and its British counterpart defeat encryption technologies by working with chipmakers to insert backdoors, or cryptographic weaknesses, in their products. The revelations are having a direct effect on the way FreeBSD will use hardware-based random number generators to seed the data used to ensure cryptographic systems can't be easily broken by adversaries. Specifically, "RDRAND" and "Padlock"—RNGs provided by Intel and Via respectively—will no longer be the sources FreeBSD uses to directly feed random numbers into the /dev/random engine used to generate random data in Unix-based operating systems. Instead, it will be possible to use the pseudo random output of RDRAND and Padlock to seed /dev/random only after it has passed through a separate RNG algorithm known as "Yarrow." Yarrow, in turn, will add further entropy to the data to ensure intentional backdoors, or unpatched weaknesses, in the hardware generators can't be used by adversaries to predict their output.
  • "For 10, we are going to backtrack and remove RDRAND and Padlock backends and feed them into Yarrow instead of delivering their output directly to /dev/random," FreeBSD developers said. "It will still be possible to access hardware random number generators, that is, RDRAND, Padlock etc., directly by inline assembly or by using OpenSSL from userland, if required, but we cannot trust them any more." In separate meeting minutes, developers specifically invoked Snowden's name when discussing the change. "Edward Snowdon [sic] -- v. high probability of backdoors in some (HW) RNGs," the notes read, referring to hardware RNGs. Then, alluding to the Dual EC_DRBG RNG forged by the National Institute of Standards and Technology and said to contain an NSA-engineered backdoor, the notes read: "Including elliptic curve generator included in NIST. rdrand in ivbridge not implemented by Intel... Cannot trust HW RNGs to provide good entropy directly. (rdrand implemented in microcode. Intel will add opcode to go directly to HW.) This means partial revert of some work on rdrand and padlock."
  •  
    Hopefully, all Linux distros jump on this bandwagon.
Paul Merrell

The Sultan of (Emergency) Swing - 0 views

  • Amidst an astonishing, relentless, wide-ranging purge that shows no signs of abating, with 60,000 – and counting – civil servants, academics, judges, prosecutors, policemen, soldiers jailed, fired, suspended or stripped of professional accreditation, it’s relatively established by now the Turkish government was very much informed a military coup was imminent on July 15. The information may have come from Russian intelligence, although neither Moscow nor Ankara will reveal any details. So, once and for all, this was no false flag.
  • As Erdogan solidifies his internal iron grip, a formerly iron clad connection – NATO/Turkey – slowly dissolves into thin air. It’s as if the fate of Incirlik air base was hangin’ – literally – by a few, selected radar threads. There’s extreme suspicion across the spectrum in Turkey that the Pentagon knew what the «rebels» were up to. It’s a fact that not a pin drops in Incirlik without the Americans knowing it. AKP members stress the use of NATO’s communication network to coordinate the putschists and thus escape Turkish intel. At a minimum, the putschists may have believed NATO would have their backs. No «NATO ally» deigned itself to warn Erdogan about the coup. Then there’s the saga of the refueling tanker for the «rebel» F-16s. The tankers in Incirlik are all the same model – KC-135R Stratotanker – for Americans and Turks alike. They work side by side and are all under the same command; the 10th Main Tanker Base, led by Gen. Bekir Ercan Van, who was duly arrested this past Sunday – as seven judges also confiscated all the control tower communications. Not by accident Gen. Bekir Ercan Van happened to be very close to Pentagon head Ash Carter. What happened in Turkish airspace after Erdogan’s Gulfstream IV left the Mediterranean coast and landed in Istanbul’s Ataturk airport has been largely mapped – but there are still some crucial gaps in the narrative open to speculation. As Erdogan has been tight-lipped in all his interviews, one is left with a Mission Impossible-style scenario featuring «rebel» F-16s «Lion One» and «Lion Two» on a «special mission» with their transponder off; their face off with loyalist «Falcon One» and «Falcon Two»; one of the «Lions» piloted by the none other than the man who shot down the Russian Su-24 last November; the by now famous tanker that took off from Incirlik to refuel the «rebels»; and three extra pairs of F-16s that took off from Dalaman, Erzurum and Balikesir to intercept the «rebels», including the pair that protected Erdogan’s Gulfsteam (which was using callsign THY 8456 to disguise it as a Turkish Airlines flight).
  • Notorious Saudi whistleblower «Mujtahid» caused a sensation as he revealed that the UAE not only «played a role» in the coup but also kept the House of Saud in the loop. As if this was not damning enough, the self-deposed emir of Qatar, Sheikh Hamad al-Thani, very close to Erdogan, has alleged that the US and another Western nation (France is a strong possibility) had staged the whole thing, with Saudi Arabian involvement. Ankara, predictably, denied all of it.
  • ...1 more annotation...
  • Once again, the basic facts; every intel operative in Southwest Asia knows that without a Pentagon green light, Turkish military factions would have had an extremely hard, if not impossible, time to organize a coup. Moreover, during that fateful night, until it was clear the coup was a failure, the plotters – from Washington to Brussels – were not exactly being described as «evil». A top American intel source, which does not subscribe to the usual Beltway consensus, is adamant that, «the Turkish military would not have moved without the green light from Washington. The same thing was planned for Saudi Arabia in April 2014, but was blocked at the highest levels in Washington by a friend of Saudi Arabia». The source, thinking outside the box, subscribes to what should be regarded as the key, current working hypothesis; the coup took place, or was fast-forwarded, essentially «because of Erdogan's sudden rapprochement with Russia». Turks across the spectrum would add fuel to the fire, insisting that more than likely the Istanbul airport bombing was an Operation Gladio. Rumor mills from East to West are already advancing that Erdogan should leave NATO sooner or later and join the Shanghai Cooperation Organization (SCO).
  •  
    It's ugly in Turkey. Thousands of schools closed, thousands of academics fired, tens of thousands of people being held in sports stadium makeshift prisons, 49 generals imprisoned, Amnesty International reports that torture and rape of prisoners is widespread, Erdogan has taken over the Turkish military. U.S. involvement in the failed coup attempt seems ironclad. Turkey's bid to join the E.U. is dead and it's expected to drop out of NATO as it swings toward Russian relations.
Paul Merrell

US Intel Agencies Try to Strong-Arm Trump into War With Russia - 0 views

  • Powerful elites are using the credibility of the US Intelligence agencies to demonize Russia and prepare the country for war. This is the real meaning of the “Russia hacking” story which, as yet, has not produced any hard evidence of Russian complicity. Last week’s 25-page report, that was released by the Director of National Intelligence James Clapper, illustrates to what extent intelligence is being “fixed around the policy”.  Just as the CIA generated false information related to Weapons of Mass Destruction to soften public resistance to war with Iraq, so too, the spurious allegations in the DNI’s politically-motivated report are designed to depict Russia as a growing threat to US national security. The timing of the report has less to do with the election of Donald Trump as President than it does with critical developments in Syria where the Russian military has defeated US-proxies in Syria’s industrial hub, Aleppo, rolling back Washington’s 15-year War of Terror and derailing the imperialist plan to control vital resources and pipeline corridors across the Middle East and Central Asia. Russia has become the main obstacle to Washington achieving its strategic vision of pivoting to Asia and maintaining its dominant role into the next century. The Intelligence Community has been coerced into compromising its credibility to incite fear of Russia and to advance the geopolitical ambitions of deep state powerbrokers.
  • The “Russia hacking” flap shows how far the Intel agencies have veered from their original mandate, which is to impartially gather and analyze information that may be vital to US national security. As we have seen in the last two weeks, the leaders of these organizations feel free to offer opinions on  issues that clearly conflict with those of the new President-elect. Trump has stated repeatedly that he wants to reduce tensions and reset relations with Russia, but that policy is being sabotaged by members of the intelligence community, particularly CIA Director John Brennan who appeared just last week on PBS Newshour with Judy Woodruff. Here’s an excerpt from the interview: “We see that there are still a lot of actions that Russia is undertaking that undermine the principles of democracy in so many countries. What has happened in our recent election is not new. The Russians have engaged in trying to manipulate elections in Europe for a number of years… the Russians tried to interfere in our electoral process recently, and were actively involved in that. And that is something that we can’t countenance.” (“Interview with CIA Director John Brennan”,  PBS Newshour)
  • Brennan, of course, provided no evidence for his claims nor did he mention the hundreds of CIA interventions around the world. But Brennan’s accusations are less important than the fact that his appearance on a nationwide broadcast identifies him as a political advocate for policies that conflict with those of the new president. Do we really want unelected intelligence officials — whose job it is to provide the president with sensitive information related to national security– to assume a partisan role in shaping policy? And why would Brennan –whose is supposed to “serve at the pleasure of the president”– accept an invitation to offer his views on Russia when he knew they would be damaging to the new administration? Powerful people behind the scenes are obviously pushing the heads of these intelligence agencies to stick to their ‘anti-Moscow’ narrative to force Trump to abandon his plan for peaceful relations with Moscow.  Brennan isn’t calling the shots and neither are Clapper or Comey. They’re all merely agents serving the interests of establishment plutocrats whose geopolitical agenda doesn’t jibe with that of the incoming administration. If that wasn’t the case, then why would the Intelligence Community stake its reputation on such thin gruel as this Russian hacking gibberish? It doesn’t make any sense. The people who launched this campaign are either supremely arrogant or extremely desperate. Which is it?
  • ...2 more annotations...
  • What’s really going on here?  Why have the Intelligence agencies savaged their credibility just to convince people that Russia is up to no good? The Russia hacking story has more to do with recent developments in Syria than it does with delegitimizing Donald Trump. Aleppo was a real wake up call for the US foreign policy establishment which is beginning to realize that their plans for the next century have been gravely undermined by Russia’s military involvement in Syria. Aleppo represents the first time that an armed coalition of allied states (Russia, Iran, Syria, Hezbollah) have actively engaged US jihadist-proxies and soundly beat them to a pulp. The stunning triumph in Aleppo has spurred hope among the vassal states that Washington’s bloody military juggernaut can be repelled, rolled back and defeated. And if Washington’s CIA-armed, trained and funded jihadists can be repelled, then the elitist plan to project US power into Central Asia to dominate the world’s most populous and prosperous region, will probably fail. In other words, the outcome in Aleppo has cast doubts on Uncle Sam’s ability to successfully execute its pivot to Asia. That’s why the Intel agencies have been employed to shape public perceptions on Russia.  Their job is to prepare the American people for an escalation of hostilities between the two nuclear-armed superpowers. US powerbrokers are determined to intensify the conflict and reverse facts on the ground. (Recent articles by elites at the Council on Foreign Relations and the Brookings Institute reveal that they are as committed to partitioning Syria as ever.)  Washington wants to  reassert its exceptional role as the uncontested steward of global security and the lone ‘unipolar’ world power.
  • That’s what this whole “hacking” fiasco is about. The big shots who run the country are trying to strong-arm ‘the Donald’ into carrying their water so the depredations can continue and Central Asia can be transformed into a gigantic Washington-dominated corporate free trade zone where the Big Money calls the shots and Capital reigns supreme. That’s their dreamstate, Capitalist Valhalla. They just need Trump to get-with-the-program so the bloodletting can continue apace.
Paul Merrell

Disclosing Classified Info to the Press - With Permission | - 0 views

  • Intelligence officials disclosed classified information to members of the press on at least three occasions in 2013, according to a National Security Agency report to Congress that was released last week under the Freedom of Information Act. See Congressional Notification — Authorized Disclosures of Classified Information to Media Personnel, NSA memorandum to the staff director, House Permanent Select Committee on Intelligence, December 13, 2013. The specific information that NSA gave to the unnamed reporters was not declassified. But the disclosures were not “leaks,” or unauthorized disclosures. They were, instead, authorized disclosures. For their part, the reporters agreed not to disseminate the information further. “Noteworthy among the classified topics disclosed were NSA’s use of metadata to locate terrorists, the techniques we use and the processes we follow to assist in locating hostages, [several words deleted] overseas support to the warfighter and U.S. allies in war zones, and NSA support to overall USG efforts to mitigate cyber threats. The [deleted] personnel executed non-disclosure agreements that covered all classified discussions.” In one case, “classified information was disclosed in order to correct inaccurate understandings held by the reporter about the nature and circumstances of [deleted].” On another occasion, “classified information was disclosed in an effort to limit or avoid reporting that could lead to the loss of the capability [deleted].”
  • In all three cases, “the decision to disclose classified information was made in consultation with the Director of National Intelligence pursuant to Executive Order 13526, and in each case the information disclosed remains properly classified.” This seems like a generous interpretation of the Executive Order, which does not mention disclosures to the press at all. It does say, in section 4.2(b) that “In an emergency, when necessary to respond to an imminent threat to life or in defense of the homeland, the agency head or any designee may authorize the disclosure of classified information […] to an individual or individuals who are otherwise not eligible for access.” In an emergency, then, but not just “to correct inaccurate understandings.” Still, the report accurately reflects the true instrumental nature of the classification system. That is, the protection of classified information under all circumstances is not a paramount goal. National security secrecy is a tool to be used if it advances the national interest (and is consistent with law and policy) and to be set aside when it does not. So hypocrisy in the handling of classified information is not an issue here. The concern, rather, is that the power of selective disclosure of classified material can be easily abused to manage and to manipulate public perceptions. The congressional requirement to report on authorized disclosures of classified information to the press may help to mitigate that danger.
  •  
    This would set up an interesting Freedom of Information Act case aimed at resolving the issue whether the "authorized" disclosures established a waiver of the FOIA exemption for national security information. A waiver, viewed most simplistically, is any conduct that is inconsistent with later assertion of a right. Deliberate disclosure to anyone who lacks a national security clearance would seem to be inconsistent with later assertion of the exemption. That the purpose of the disclosures was to adjust the attitudes of press members seems a very poor justification in that it establishes particular reporters as a class of persons entitled to more disclosure than other members of the public. Yet the Supreme Court has held time and again that journalists have no more right to access government information than any other member of the public. So there is a strong argument that everyone should be entitled to the same disclosures.
Paul Merrell

Washington's Civil War Over Russia Intel - The Daily Beast - 0 views

  • As Russia continues airstrikes in Syria, a fight is brewing between members of Congress and U.S. intelligence agencies over what lawmakers were told about the Russian military operations, and when.The House Intelligence Committee, which oversees the CIA and other spy agencies responsible for tracking the Russian military buildup in Syria, is “looking at possible problems in the timely provision of information to Congress,” a congressional staff member told The Daily Beast. Three other officials confirmed that the inquiry—which is not a formal investigation—is underway and that lawmakers have been talking to intelligence officials about whether their reports to Congress accurately predicted when the Russian air strikes would begin and that they would target rebel groups fighting the regime of Bashar al-Assad.
  • U.S. intelligence officials fired back that they had provided lawmakers with warnings about Russia’s intentions to begin military operations in Syria, including in the weeks before airstrikes began in late September. “Any suggestion that the intelligence community was surprised by Russia’s military support to the Assad regime is misleading,” a senior intelligence official told The Daily Beast. Members of Congress had access to intelligence reports on the movements of Russian aircraft into Syria as well as the buildup of ground troops and could read them anytime they chose, another official said.
  • “For several years, the Intelligence Community has provided regular assessments of Russia’s military, political, and financial support to the [Assad] regime,” Brian Hale, a spokesperson for the Director of National Intelligence, said in a statement. “In recent months, the Intelligence Community tracked and reported Moscow’s determination to play a more direct role in propping up Assad’s grip on power, including its deployment of offensive military assets to Syria. While these events unfolded quickly, the IC carried out its responsibilities with equal agility.”The pushback from officials underscored how sensitive the agencies are to allegations of “intelligence failures” and in particular being behind the curve about Russia’s international ambitions and the rise of extremists groups in the Middle East. The Defense Department is also investigating allegations that senior intelligence officials at the military’s Central Command manipulated intelligence reports to paint a rosy picture about the U.S.-led air campaign against the so-called Islamic State, widely known as ISIS, in Iraq and Syria.
Paul Merrell

Is There a US-Russia Grand Bargain in Syria? - 0 views

  • It’s spy thriller stuff; no one is talking. But there are indications Russia would not announce a partial withdrawal from Syria right before the Geneva negotiations ramp up unless a grand bargain with Washington had been struck.Some sort of bargain is in play, of which we still don’t know the details; that's what the CIA itself is basically saying through their multiple US Think Tankland mouthpieces. And that's the real meaning hidden under a carefully timed Barack Obama interview that, although inviting suspension of disbelief, reads like a major policy change document. Obama invests in proverbial whitewashing, now admitting US intel did not specifically identify the Bashar al-Assad government as responsible for the Ghouta chemical attack. And then there are nuggets, such as Ukraine seen as not a vital interest of the US – something that clashes head on with the Brzezinski doctrine. Or Saudi Arabia as freeloaders of US foreign policy – something that provoked a fierce response from former Osama bin Laden pal and Saudi intel supremo Prince Turki.
  • Tradeoffs seem to be imminent. And that would imply a power shift has taken place above Obama — who is essentially a messenger, a paperboy. Still that does not mean that the bellicose agendas of both the Pentagon and the CIA are now contained.
  • Russian intel cannot possibly trust a US administration infested with warmongering neocon cells. Moreover, the Brzezinski doctrine has failed – but it’s not dead. Part of the Brzezinski plan was to flood oil markets with shut-in capacity in OPEC to destroy Russia. That caused damage, but the second part, which was to lure Russia into an war in Ukraine for which Ukrainians were to be the cannon fodder in the name of “democracy”, failed miserably. Then there was the wishful thinking that Syria would suck Russia into a quagmire of Dubya in Iraq proportions – but that also failed miserably with the current Russian time out. 
  • ...5 more annotations...
  • As much as Russia may be downsizing, Iran (and Hezbollah) are not. Tehran has trained and weaponized key paramilitary forces – thousands of soldiers from Iraq and Afghanistan fighting side by side with Hezbollah and the Syrian Arab Army (SAA). The SAA will keep advancing and establishing facts on the ground. As the Geneva negotiations pick up, those facts are now relatively frozen. Which brings us to the key sticking point in Geneva – which has got to be included in the possible grand bargain. The grand bargain is based on the current ceasefire (or "cessation of hostilities") holding, which is far from a given. Assuming all these positions hold, a federal Syria could emerge, what could be dubbed Break Up Light.
  • And yet, in the shadows, lurks the possibility that Russian intel may be ready to strike a deal with the Turkish military – with the corollary that a possible removal of Sultan Erdogan would pave the way for the reestablishment of the Russia-Turkey friendship, essential for Eurasia integration.
  • Only the proverbially clueless Western corporate media was caught off-guard by Russia’s latest diplomatic coup in Syria. Consistency has been the norm. Russia has been consistently upgrading the Russia-China strategic partnership. This has run in parallel to the hybrid warfare in Ukraine (asymmetric operations mixed with economic, political, military and technological support to the Donetsk and Lugansk republics); even NATO officials with a decent IQ had to admit that without Russian diplomacy there’s no solution to the war in Donbass. In Syria, Moscow accomplished the outstanding feat of making Team Obama see the light beyond the fog of neo-con-instilled war, leading to a solution involving Syria’s chemical arsenal after Obama ensnared himself in his own red line. Obama owes it to Putin and Lavrov, who literally saved him not only from tremendous embarrassment but from yet another massive Middle East quagmire.
  • Russia will be closely monitoring the current “cessation of hostilities”; and if the War Party decides to ramp up “support” for ISIS/ISIL/Daesh or the “moderate rebel” front via any shadow war move, Russia will be back in a flash. As for Sultan Erdogan, he can brag what he wants about his “no-fly zone” pipe dream; but the fact is the northwestern Syria-Turkish border is now fully protected by the S-400 air defense system. Moreover, the close collaboration of the “4+1” coalition – Russia, Syria, Iran, Iraq, plus Hezbollah – has broken more ground than a mere Russia-Shi’te alignment. It prefigures a major geopolitical shift, where NATO is not the only game in town anymore, dictating humanitarian imperialism; this “other” coalition could be seen as a prefiguration of a future, key, global role for the Shanghai Cooperation Organization.
  • As we stand, it may seem futile to talk about winners and losers in the five-year-long Syrian tragedy – especially with Syria destroyed by a vicious, imposed proxy war. But facts on the ground point, geopolitically, to a major victory for Russia, Iran and Syrian Kurds, and a major loss for Turkey and the GCC petrodollar gang, especially considering the huge geo-energy interests in play. It’s always crucial to stress that Syria is an energy war – with the “prize” being who will be better positioned to supply Europe with natural gas; the proposed Iran-Iraq-Syria pipeline, or the rival Qatar pipeline to Turkey that would imply a pliable Damascus. Other serious geopolitical losers include the self-proclaimed humanitarianism of the UN and the EU. And most of all the Pentagon and the CIA and their gaggle of weaponized “moderate rebels”. It ain’t over till the last jihadi sings his Paradise song. Meanwhile, “time out” Russia is watching.
  •  
    Pepe Escobar.
Paul Merrell

Obama Should Release MH-17 Intel | Consortiumnews - 0 views

  • A year ago, the U.S. government issued a sketchy report on the Malaysia Airlines Flight 17 shoot-down citing “social media” and other flimsy data implicating eastern Ukrainian rebels and Russia, but then – as hard intelligence became available – went silent. Now, U.S. intelligence veterans are demanding release of that intel.MEMORANDUM FOR: The PresidentFROM: Veteran Intelligence Professionals for Sanity (VIPS)SUBJECT: Releasing an Intelligence Report on Shoot-Down of Malaysia Airlines Flight 17
  • In what follows, we former intelligence professionals with a cumulative total of some 360 years in various parts of U.S. intelligence provide our perspective on the issue and request for a second time that the intelligence over the downing be made public to counter the fuzzy and flimsy evidence that has over the past year been served up – some of it based on “social media.”
Paul Merrell

Exclusive: This Is the ISIS Intel the U.S. Military Dumbed Down - The Daily Beast - 0 views

  • The intelligence pros said killing certain ISIS leaders might not diminish the group and that airstrikes might not be working. The bosses didn’t like those answers—not at all.Senior intelligence officials at the U.S. military’s Central Command demanded significant alterations to analysts’ reports that questioned whether airstrikes against the so-called Islamic State widely known as ISIS were damaging the group’s finances and its ability to launch attacks. But reports that showed the group being weakened by the U.S.-led air campaign received comparatively little scrutiny, The Daily Beast has learned. Senior CENTCOM intelligence officials who reviewed the critical reports sent them back to the analysts and ordered them to write new versions that included more footnotes and details to support their assessments, according to two officials familiar with a complaint levied by more than 50 analysts about intelligence manipulation by CENTCOM higher-ups.
  • In some cases, analysts were also urged to state that killing particular ISIS leaders and key officials would diminish the group and lead to its collapse. Many analysts, however, didn’t believe that simply taking out top ISIS leaders would have an enduring effect on overall operations. “There was the reality on the ground but it was not as rosy as [the leadership] wanted it to be,” a defense official familiar with the complaint told The Daily Beast. “The challenge was assessing whether the glass was half empty, not half full.”Some analysts have also complained that they felt “bullied” into reaching conclusions favored by their bosses, two separate sources familiar with analysts’ complaints said. The written and verbal pressure created a climate at CENTCOM in which analysts felt they had to self-censor some of their reports.
  • Some of the analysts have also accused their bosses of changing the reports in order to appeal to what they perceived as the Obama administration’s official line that the anti-ISIS campaign was making progress and would eventually end with the group’s destruction.Lawmakers and even presidential candidates seized on the allegations of politicizing intelligence as the White House tried to distance itself from the very strategy it has been pursuing.
  • ...3 more annotations...
  • Army General Lloyd Austin came under withering bipartisan criticism on Wednesday when he testified before the Senate Armed Services Committee that after spending at least $43 million over a 10-month period, the U.S. had trained only nine fighters to confront ISIS in Syria. Senators were dumbfounded that the nearly year-long effort had produced such paltry results, calling it “a joke” and “an abject failure.”
  • Meanwhile, Pentagon investigators are examining the back-and-forth between the intelligence bosses at CENTCOM and the analysts, which created a paper trail. Favorable reports had fewer comments written on them, and requests that were more critical showed heavy questioning, the two officials said. The altering of intelligence led to reports that overstated the damage that U.S. strikes had on specific ISIS targets. For instance, strikes on oil refineries and equipment were said to have done more damage to the group’s financing of operations through illicit oil sales than the analysts believed. Also, strikes on military equipment were said to have set back the group’s ability to wage combat operations, when the analysts believed that wasn’t always the case.The altered reports made ISIS seem financially weakened and less capable of launching attacks, the analysts allege.
  • The CENTCOM supervisors “did not like the reports on the impact [of the airstrikes] because they didn’t believe it,” one military adviser familiar with CENTCOM operations told The Daily Beast. The Defense Department inspector general has been conducting interviews at CENTCOM headquarters in Tampa, Florida, in order to determine who in the command’s intelligence directorate may have distorted or manipulated the intelligence reports, some of which eventually made their way into materials briefed to President Obama. Investigators have pulled CENTCOM personnel one by one into private interviews to get to the bottom of the allegations and determine who was ultimately responsible for changing intelligence reports, according to individuals with knowledge of the investigation. The inspector general has confirmed that the investigation is focused on the CENTCOM intelligence directorate, or J2. Multiple sources told The Daily Beast that the head of intelligence, Army Major General Steven Grove, is named in the complaint, as are several other senior officials at CENTCOM. The tone of the complaint is said to be harsh and highly critical of senior officials’ leadership and actions.
Paul Merrell

Warning Merkel on Russian 'Invasion' Intel | Consortiumnews - 0 views

  • Alarmed at the anti-Russian hysteria sweeping Official Washington – and the specter of a new Cold War – U.S. intelligence veterans took the unusual step of sending this Aug. 30 memo to German Chancellor Merkel challenging the reliability of Ukrainian and U.S. media claims about a Russian “invasion.” MEMORANDUM FOR: Angela Merkel, Chancellor of Germany FROM: Veteran Intelligence Professionals for Sanity (VIPS) SUBJECT: Ukraine and NATO We the undersigned are long-time veterans of U.S. intelligence. We take the unusual step of writing this open letter to you to ensure that you have an opportunity to be briefed on our views prior to the NATO summit on Sept. 4-5.
  •  
    Our buddies the Veteran Intelligence Professionals for Sanity (VIPS) are back, this time with a warning for German Chancellor Angela Merkel that John Kerry is lying about Russia invading Ukraine. The NATO Summit kicked off on the 4th; this was published on the 1st. 
Paul Merrell

Cybersecurity Information Sharing: A Legal Morass, Says CRS - 0 views

  • Several pending bills would promote increased sharing of cybersecurity-related information — such as threat intelligence and system vulnerabilities — in order to combat the perceived rise in the frequency and intensity of cyber attacks against private and government entities. But such information sharing is easier said than done, according to a new report from the Congressional Research Service, because it involves a thicket of conflicting and perhaps incompatible laws and policy objectives. “The legal issues surrounding cybersecurity information sharing… are complex and have few certain resolutions.” A copy of the CRS report was obtained by Secrecy News. See Cybersecurity and Information Sharing: Legal Challenges and Solutions, March 16, 2015. Cyber information sharing takes at least three different forms: the release of cyber intelligence from government to the private sector, information sharing among private entities, and the transfer of threat information from private entities to government agencies.
  • “While collectively these three variants on the concept of cyber-information sharing have some commonalities, each also raises separate legal challenges that may impede cyber-intelligence dissemination more generally,” said the CRS report, which examines the legal ramifications of each category in turn. Among the concerns at issue are: the potential for liability associate with disclosure of cybersecurity information, inappropriate release of private information through open government laws, loss of intellectual property, and potential compromise of personal privacy rights. All of these create a legal morass that may be unreconcilable. “A fundamental question lawmakers may need to contemplate is how restrictions that require close government scrutiny and control over shared cyber-information can be squared with other goals of cyber-information sharing legislation, like requirements that received information be disseminated in an almost instantaneous fashion,” the CRS report said.
  • “Ultimately, because the goals of cyber-information legislation are often diametrically opposed, it may simply be impossible for information sharing legislation to simultaneously promote the rapid and robust collection and dissemination of cyber-intelligence by the federal government, while also ensuring that the government respects the property and privacy interests implicated by such information sharing,” the report said. Other new or newly updated CRS reports that Congress has withheld from public distribution include the following. Cybersecurity: Authoritative Reports and Resources, by Topic, March 13, 2015
  • ...1 more annotation...
  • U.S. Strategic Nuclear Forces: Background, Developments, and Issues, March 18, 2015
Paul Merrell

What was the Israeli involvement in collecting U.S. communications intel for NSA? - Dip... - 0 views

  • Were Israeli companies Verint and Narus the ones that collected information from the U.S. communications network for the National Security Agency? The question arises amid controversy over revelations that the NSA has been collecting the phone records of hundreds of millions of Americans every day, creating a database through which it can learn whether terror suspects have been in contact with people in the United States. It also was disclosed this week that the NSA has been gathering all Internet usage - audio, video, photographs, emails and searches - from nine major U.S. Internet providers, including Microsoft and Google, in hopes of detecting suspicious behavior that begins overseas.
  • According to an article in the American technology magazine "Wired" from April 2012, two Israeli companies – which the magazine describes as having close connections to the Israeli security community – conduct bugging and wiretapping for the NSA. Verint, which took over its parent company Comverse Technology earlier this year, is responsible for tapping the communication lines of the American telephone giant Verizon, according to a past Verizon employee sited by James Bamford in Wired. Neither Verint nor Verizon commented on the matter.
  • Natus, which was acquired in 2010 by the American company Boeing, supplied the software and hardware used at AT&T wiretapping rooms, according to whistleblower Mark Klein, who revealed the information in 2004. Klein, a past technician at AT&T who filed a suit against the company for spying on its customers, revealed a "secret room" in the company's San Fransisco office, where the NSA collected data on American citizens' telephone calls and Internet surfing. Klein's claims were reinforced by former NSA employee Thomas Drake who testified that the agency uses a program produced by Narus to save the personal electrical communications of AT&T customers.  Both Verint and Narus have ties to the Israeli intelligence agency and the Israel Defense Forces intelligence-gathering unit 8200. Hanan Gefen, a former commander of the 8200 unit, told Forbes magazine in 2007 that Comverse's technology, which was formerly the parent company of Verint and merged with it this year, was directly influenced by the technology of 8200. Ori Cohen, one of the founders of Narus, told Fortune magazine in 2001 that his partners had done technology work for the Israeli intelligence.
  • ...2 more annotations...
  • "Nobody is listening to your telephone calls," Obama assured the nation after two days of reports that many found unsettling. What the government is doing, he said, is digesting phone numbers and the durations of calls, seeking links that might "identify potential leads with respect to folks who might engage in terrorism." If there's a hit, he said, "if the intelligence community then actually wants to listen to a phone call, they've got to go back to a federal judge, just like they would in a criminal investigation."
  • Obama said U.S. intelligence officials are looking at phone numbers and lengths of calls - not at people's names - and not listening in.
  •  
    It figures that the Israeli creators of the Stuxnet worm would be involved. And here we also get our reminder why Obama is lying. We hearken back to the days when several ISPs and Telcos were being sued in class actions for providing NSA with access to their subscriber's phone calls and internet traffic.  Those suits ended only after Congress passed legislation immunizing the companies from suit for collaboration with NSA. The net effect was to allow the NSA to continue eavesdropping. So it matters not that Prism allegedly only gets the communications metadata. NSA need only correlate the metadata with the actual communications obtained from the Telcos and ISPs.   
Paul Merrell

US Intel Vets Dispute Russia Hacking Claims - Consortiumnews - 0 views

  • As the hysteria about Russia’s alleged interference in the U.S. election grows, a key mystery is why U.S. intelligence would rely on “circumstantial evidence” when it has the capability for hard evidence, say U.S. intelligence veterans. Veteran Intelligence Professionals for Sanity MEMORANDUM Allegations of Hacking Election Are Baseless A New York Times report on Monday alluding to “overwhelming circumstantial evidence” leading the CIA to believe that Russian President Vladimir Putin “deployed computer hackers with the goal of tipping the election to Donald J. Trump” is, sadly, evidence-free. This is no surprise, because harder evidence of a technical nature points to an inside leak, not hacking – by Russians or anyone else.
  • We have gone through the various claims about hacking. For us, it is child’s play to dismiss them. The email disclosures in question are the result of a leak, not a hack. Here’s the difference between leaking and hacking: Leak: When someone physically takes data out of an organization and gives it to some other person or organization, as Edward Snowden and Chelsea Manning did. Hack: When someone in a remote location electronically penetrates operating systems, firewalls or any other cyber-protection system and then extracts data. All signs point to leaking, not hacking. If hacking were involved, the National Security Agency would know it – and know both sender and recipient. In short, since leaking requires physically removing data – on a thumb drive, for example – the only way such data can be copied and removed, with no electronic trace of what has left the server, is via a physical storage device.
  • These collection resources are extensive [see attached NSA slides 1, 2, 3, 4, 5]; they include hundreds of trace route programs that trace the path of packets going across the network and tens of thousands of hardware and software implants in switches and servers that manage the network. Any emails being extracted from one server going to another would be, at least in part, recognizable and traceable by all these resources. The bottom line is that the NSA would know where and how any “hacked” emails from the DNC, HRC or any other servers were routed through the network. This process can sometimes require a closer look into the routing to sort out intermediate clients, but in the end sender and recipient can be traced across the network. The various ways in which usually anonymous spokespeople for U.S. intelligence agencies are equivocating – saying things like “our best guess” or “our opinion” or “our estimate” etc. – shows that the emails alleged to have been “hacked” cannot be traced across the network. Given NSA’s extensive trace capability, we conclude that DNC and HRC servers alleged to have been hacked were, in fact, not hacked. The evidence that should be there is absent; otherwise, it would surely be brought forward, since this could be done without any danger to sources and methods. Thus, we conclude that the emails were leaked by an insider – as was the case with Edward Snowden and Chelsea Manning. Such an insider could be anyone in a government department or agency with access to NSA databases, or perhaps someone within the DNC.
  • ...1 more annotation...
  • As for the comments to the media as to what the CIA believes, the reality is that CIA is almost totally dependent on NSA for ground truth in the communications arena. Thus, it remains something of a mystery why the media is being fed strange stories about hacking that have no basis in fact. In sum, given what we know of NSA’s existing capabilities, it beggars belief that NSA would be unable to identify anyone – Russian or not – attempting to interfere in a U.S. election by hacking. For the Steering Group, Veteran Intelligence Professionals for Sanity (VIPS)
Paul Merrell

Syrian moderate rebel "spymaster" slams CIA for 'ignoring' detailed intel on Isil since... - 0 views

  • The "spymaster" of a key moderate Syrian rebel group has accused the CIA of failing to act on reams of detailed intelligence his network has been supplying the US on Isil since 2013 - including GPS coordinates of its leaders and headquarters. The Free Syrian Army’s spy chief insisted proper use of the intelligence his agents provided from within Isil’s ranks, and often at grave risk to their life, could have critically damaged the jihadist group on several occasions. Speaking to Le Monde in Turkey, “M”, as the French newspaper dubbed the man for security reasons, said: “From the moment Daesh (the Arab acronym for Isil) had 20 members to when it had 20,000, we have shown everything to the Americans. When we asked them what they did with this information, they always gave evasive answers, saying it was up to their decision-makers”. The Free Syrian Army, or FSA, was founded by a group of defected Syrian Armed Forces officers and soldiers in July 2011, and received backing from Britain and the US for its moderate line.
  • In the summer of 2014, while Isil besieged Mossul in Iraq, “M” helped devise a secret plan presented to the Americans to rout Isil from northern Syria on the Azaz-Alep line. The plan was detailed street by street, hour by hour, and included the precise itinerary of fighters and their refuelling points. “In every village held by Daesh, knew the number of armed men, where their offices and hideouts were. We had located snipers and mines, we knew where the local emir slept, the colour of his car and even the brand. From a tactical and strategic point of view, we were ready,” he said. However, the Americans failed to give the green light, he said. “They were reluctant to provide us satellite images. They said their planes couldn’t help once the fighting with Isil started. All they offered us was to get rid of a few obstacles before the start of the offensive,” he said. He then provided the US with details of the Isil command structure in Raqqa, from the emir to those in charge of checkpoints and pages of GPS coordinates. “That was a year and a half ago and Raqqa is still the capital of Daesh,” he said.
  •  
    Why, it's almost as though the U.S. government doesn't want to really hurt ISIL. 
Paul Merrell

That 'Valuable Intel' From The Yemen Raid? It Was 10 Years Old : The Two-Way : NPR - 0 views

  • A terrorist video released on Friday by the Pentagon to show what it called intelligence gleaned by the recent raid in Yemen actually was made about 10 years ago, it acknowledged. Defense officials canceled a briefing they had called to discuss the value of the information recovered from Yemen and took the video off the website of the U.S. Central Command. They circulated clips from a video that showed how to prepare explosives without knowing it had already been public. However, Navy Capt. Jeff Davis, a Defense Department spokesman, stuck by the Pentagon's main argument: Al-Qaida in the Arabian Peninsula remains dangerous and wants to recruit and train people to attack the West.
  • "Even though the video is old, it shows their intent," he told reporters. But defense officials declined to release any other, newer intelligence they said was in computers recovered by the American and allied special operations troops who attacked the Yemeni town. The messaging kerfuffle turned an ongoing counterattack into a damp squib. Critics in Congress and within the national security establishment — speaking without identification in press reports — have called the Yemen raid botched. They accused the White House of hurrying troops into an operation with bad intelligence, or pressing commanders to go ahead with a raid after it lost its element of surprise. Spokesman Sean Spicer began to return fire on Thursday: The initial planning began in November, he said, and then the military and intelligence community worked to refine it in the succeeding months through the transition. With a strong case for action, Spicer said, the only thing needed was a moonless night in Yemen, which fell after President Trump's inauguration. Trump ultimately authorized it on Jan. 26. Article continues after sponsorship SEAL Team Six and its partners attacked the AQAP target early on Sunday, as NPR's Alice Fordham and Tom Bowman have detailed. The U.S. says some 14 terrorists were killed in the operation, which also claimed the life of an unknown number of civilians — including women and children — and Navy Chief Special Warfare Operator William Owens. An American MV-22 Osprey aircraft also crash-landed, injuring its crew, and U.S. troops went on to deliberately destroy it to keep it from being compromised.
Paul Merrell

Pentagon Officials: No Actionable Intelligence From Yemen Raid - 0 views

  • The Trump Administration’s decision to continue hyping a failed Yemeni raid, despite all evidence to the contrary, as having netted a trove of intelligence continues to blow up in their face tonight, as Pentagon officials once again affirmed that the information gathered was minimal, and things they already knew about. Some equipment was recovered giving them some insight into tactics, but so far none of the laptops and cellphones seized has any useful information on it. This is in keeping with what other US officials said just two days prior, that no “actionable” intelligence was gathered in the raid, but is in direct contradiction to claims by President Trump last night at the Congressional address, and Vice President Mike Pence today, that “significant” intelligence was obtained. The first major foreign military operation on his term, President Trump has invested a lot of effort into portraying the operation as an unquestioned success. Repeated concessions from the military that there were myriad problems, and things didn’t go nearly as well as intended, have all been dismissed, with Trump continuing on with the success claims.
  • That we never really get good information on what the source of intelligence is for future raids means it’s likely impossible to ever conclusively prove no actionable intelligence came from Yemen, though the fact that the Pentagon keeps saying this is the case certainly lends credence to the idea that the operation, on top of all of its other failures, didn’t accomplish anything intelligence-wise.
  •  
    The Deep State keeps lobbing more shells at Trump.
Paul Merrell

Hezbollah: Israel Attacking Syria To Prevent ISIS Defeat - 0 views

  • Addressing the flurry of Israeli attacks against Syria in recent days, Hezbollah leader Hassan Nasrallah says he believes Israel is deliberately trying to help ISIS in an effort to prevent ISIS from suffering outright defeat in Syria amid growing pressure. Israeli Prime Minister Benjamin Netanyahu claimed the Friday attacks, which started the latest flurry, targeted a weapons convoy intended for Hezbollah forces, who are in Syria fighting alongside the government against ISIS and other rebel forces. Nasrallah, however, said that Israel has been using “all kinds of excuses” throughout the war to intervene, and that what they are really afraid of is an ISIS defeat, because that would mean a Hezbollah victory. This is largely in keeping with Israel’s own narrative on the Syrian Civil War, despite the pretense of neutrality.
  • sraeli officials have repeatedly expressed concern that the survival of the Assad government would mean that a Shi’ite ally of Iran would remain along their border. Moreover, last summer Israel’s Maj. Gen. Herzi Halevy, their military intelligence chief, publicly declared that Israel does not want to see ISIS defeated in the war, and prefers ISIS over the Assad government.
Paul Merrell

National Security Letters: Legal Background, & More from CRS - Secrecy News - 0 views

  • New and newly updated reports from the Congressional Research Service that Congress has withheld from online public distribution include the following. National Security Letters in Foreign Intelligence Investigations: Legal Background, January 3, 2014 National Security Letters in Foreign Intelligence Investigations: A Glimpse at the Legal Background, January 3, 2014
Paul Merrell

IPS - Obama's Case for Syria Didn't Reflect Intel Consensus | Inter Press Service - 0 views

  • Contrary to the general impression in Congress and the news media, the Syria chemical warfare intelligence summary released by the Barack Obama administration Aug. 30 did not represent an intelligence community assessment, an IPS analysis and interviews with former intelligence officials reveals. The evidence indicates that Director of National Intelligence James Clapper culled intelligence analyses from various agencies and by the White House itself, but that the White House itself had the final say in the contents of the document. Leading members of Congress to believe that the document was an intelligence community assessment and thus represents a credible picture of the intelligence on the alleged chemical attack of Aug. 21 has been a central element in the Obama administration’s case for war in Syria. That part of the strategy, at least, has been successful. Despite strong opposition in Congress to the proposed military strike in Syria, no one in either chamber has yet challenged the administration’s characterisation of the intelligence. But the administration is vulnerable to the charge that it has put out an intelligence document that does not fully and accurately reflect the views of intelligence analysts. Former intelligence officials told IPS that that the paper does not represent a genuine intelligence community assessment but rather one reflecting a predominantly Obama administration influence.
  • In essence, the White House selected those elements of the intelligence community assessments that supported the administration’s policy of planning a strike against the Syrian government force and omitted those that didn’t. In a radical departure from normal practice involving summaries or excerpts of intelligence documents that are made public, the Syria chemical weapons intelligence summary document was not released by the Office of the Director of National Intelligence but by the White House Office of the Press Secretary. It was titled “Government Assessment of the Syrian Government’s Use of Chemical Weapons on August 21, 2013.” The first sentence begins, “The United States government assesses,” and the second sentence begins, “We assess”. The introductory paragraph refers to the main body of the text as a summary of “the intelligence community’s analysis” of the issue, rather than as an “intelligence community assessment”, which would have been used had the entire intelligence community endorsed the document.
  • A former senior intelligence official who asked not to be identified told IPS in an e-mail Friday that the language used by the White House “means that this is not an intelligence community document”. The former senior official, who held dozens of security classifications over a decades-long intelligence career, said he had “never seen a document about an international crisis at any classification described/slugged as a U.S. government assessment.” The document further indicates that the administration “decided on a position and cherry-picked the intelligence to fit it,” he said. “The result is not a balanced assessment of the intelligence.” Greg Thielmann, whose last position before retiring from the State Department was director of the Strategic, Proliferation and Military Affairs Office in the Bureau of Intelligence and Research, told IPS he has never seen a government document labeled “Government Assessment” either. “If it’s an intelligence assessment,” Thielmann said, “why didn’t they label it as such?”
  • ...5 more annotations...
  • Former National Intelligence Officer Paul Pillar, who has participated in drafting national intelligence estimates, said the intelligence assessment summary released by the White House “is evidently an administration document, and the working master copy may have been in someone’s computer at the White House or National Security Council.” Pillar suggested that senior intelligence officials might have signed off on the administration paper, but that the White House may have drafted its own paper to “avoid attention to analytic differences within the intelligence community.” Comparable intelligence community assessments in the past, he observed – including the 2002 Iraq WMD estimate – include indications of differences in assessment among elements of the community. An unnamed “senior administration official” briefing the news media on the intelligence paper on Aug. 30 said that the paper was “fully vetted within the intelligence community,” and that, ”All members of the intelligence community participated in its development.”
  • But that statement fell far short of asserting that all the elements of the intelligence community had approved the paper in question, or even that it had gone through anything resembling consultations between the primary drafters and other analysts, and opportunities for agencies to register dissent that typically accompany intelligence community assessments. The same “senior administration official” indicated that DNI Clapper had “approved” submissions from various agencies for what the official called “the process”. The anonymous speaker did not explain further to journalists what that process preceding the issuance of the White House paper had involved. However, an Associated Press story on Aug. 29 referred to “a report by the Office of the Director of National Intelligence outlining the evidence against Syria”, citing two intelligence officials and two other administration officials as sources. That article suggests that the administration had originally planned for the report on intelligence to be issued by Clapper rather than the White House, apparently after reaching agreement with the White House on the contents of the paper. But Clapper’s name was not on the final document issued by the White House, and the document is nowhere to be found on the ODNI website. All previous intelligence community assessments were posted on that site.
  • The issuance of the document by the White House rather than by Clapper, as had been apparently planned, points to a refusal by Clapper to put his name on the document as revised by the White House. Clapper’s refusal to endorse it – presumably because it was too obviously an exercise in “cherry picking” intelligence to support a decision for war – would explain why the document had to be issued by the White House. Efforts by IPS to get a comment from the Office of the Director of National Intelligence suggest strongly that Clapper is embarrassed by the way the Obama White House misrepresented the Aug. 30 document.
  • An e-mail query by IPS to the media relations staff of ODNI requesting clarification of the status of the Aug. 30 document in relation to the intelligence community was never answered. In follow-up phone calls, ODNI personnel said someone would respond to the query. After failing to respond for two days, despite promising that someone would call back, however, ODNI’s media relations office apparently decided to refuse any further contact with IPS on the subject. A clear indication that the White House, rather than Clapper, had the final say on the content of the document is that it includes a statement that a “preliminary U.S. government assessment determined that 1,429 people were killed in the chemical weapons attack, including at least 426 children.” That figure, for which no source was indicated, was several times larger than the estimates given by British and French intelligence. The document issued by the White House cites intelligence that is either obviously ambiguous at best or is of doubtful authenticity, or both, as firm evidence that the Syrian government carried out a chemical weapons attack. It claims that Syrian chemical weapons specialists were preparing for such an attack merely on the basis of signals intelligence indicating the presence of one or more individuals in a particular location. The same intelligence had been regarded prior to Aug. 21 as indicating nothing out of the ordinary, as was reported by CBS news Aug. 23.
  • he paper also cites a purported intercept by U.S intelligence of conversations between Syrian officials in which a “senior official” supposedly “confirmed” that the government had carried out the chemical weapons attack. But the evidence appears to indicate that the alleged intercept was actually passed on to the United States by Israeli intelligence. U.S. intelligence officials have long been doubtful about intelligence from Israeli sources that is clearly in line with Israeli interests. Opponents of the proposed U.S. strike against Syria could argue that the Obama administration’s presentation of the intelligence supporting war is far more politicised than the flawed 2002 Iraq WMD estimate that the George W. Bush administration cited as part of the justification for the invasion of Iraq.
  •  
    If you vote for either a Democrat or Republican for President, you are in reality voting for the War Party and it will use the same dirty tricks to start the dirty wars. Bush Administration lied to make war against Iraq. Obama lies to get us into Syria. Maybe it's time to launch a "Peace Party" that calls Dems and Repubs out for what they really are, loyal servants of the War Party.  A single issue party aimed at peeling off the the Republican and Democrat disguises from the War Partiers.    Just daydreaming. Homo sapiens have been a vicious lot as far back as archaeology can take us.  We just enhance our destructiveness as the time line moves forward. 
1 - 20 of 103 Next › Last »
Showing 20 items per page