Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged leak-assessment

Rss Feed Group items tagged

11More

Pentagon report: scope of intelligence compromised by Snowden 'staggering' | World news... - 0 views

  • • Classified assessment describes impact of leaks as 'grave' • Report does not include specific detail to support conclusions• 12 of 39 heavily redacted pages released after Foia request• Read the full Defense Intelligence Agency report
  • A top-secret Pentagon report to assess the damage to national security from the leak of classified National Security Agency documents by Edward Snowden concluded that “the scope of the compromised knowledge related to US intelligence capabilities is staggering”.The Guardian has obtained a copy of the Defense Intelligence Agency's classified damage assessment in response to a Freedom of Information Act (Foia) lawsuit filed against the Defense Department earlier this year. The heavily redacted 39-page report was prepared in December and is titled “DoD Information Review Task Force-2: Initial Assessment, Impacts Resulting from the Compromise of Classified Material by a Former NSA Contractor.”But while the DIA report describes the damage to US intelligence capabilities as “grave”, the government still refuses to release any specific details to support this conclusion. The entire impact assessment was redacted from the material released to the Guardian under a presidential order that protects classified information and several other Foia exemptions.Only 12 pages of the report were declassified by DIA and released. A Justice Department attorney said DIA would continue to process other internal documents that refer to the DIA report for possible release later this year.
  • The classified damage assessment was first cited in a news report published by Foreign Policy on January 9. The Foreign Policy report attributed details of the DIA assessment to House intelligence committee chairman Mike Rogers and its ranking Democrat Dutch Ruppersberger. The lawmakers said the White House had authorized them to discuss the document in order to undercut the narrative of Snowden being portrayed as a heroic whistleblower.The DIA report has been cited numerous times by Rogers and Rusppersberger and other lawmakers who claimed Snowden’s leaks have put US personnel at risk.
  • ...8 more annotations...
  • But details to back up Rogers' claims are not included in the declassified material released to the Guardian.Neither he nor any other lawmaker has disclosed specific details from the DIA report but they have continued to push the “damage” narrative in interviews with journalists and during appearances on Sunday talk shows.
  • The declassified material does not state the number of documents Snowden is alleged to have taken, which Rogers and Ruppersberger have claimed, again citing the DIA’s assessment, was 1.7m. Nor does the declassified portion of the report identify Snowden by name.“[Redacted] a former NSA contractor compromised [redacted] from NSA Net and the Joint Worldwide Intelligence Communications System (JWICS),” the report says. “On 6 June 2013, media groups published the first stories based on this material, and on 9 June 2013 they identified the source as an NSA contractor who had worked in Hawaii.”JWICS is identified as a “24 hour a day network designed to meet the requirements for secure [top-secret/sensitive compartmented information] multi-media intelligence communications worldwide. The Defense Intelligence Agency (DIA) has directed that all Special Security Offices (SSOs) will install the JWICS.”The Washington Post, quoting anonymous sources, reported last October that Snowden “lifted the documents from a top-secret network run by the Defense Intelligence Agency and used by intelligence arms of the Army, Air Force, Navy and Marines.” The Post further claimed that Snowden “took 30,000 documents that involve the intelligence work of one of the services” and that he gained access to the documents through JWICS.
  • A top-secret Pentagon report to assess the damage to national security from the leak of classified National Security Agency documents by Edward Snowden concluded that “the scope of the compromised knowledge related to US intelligence capabilities is staggering”. The Guardian has obtained a copy of the Defense Intelligence Agency's classified damage assessment in response to a Freedom of Information Act (Foia) lawsuit filed against the Defense Department earlier this year. The heavily redacted 39-page report was prepared in December and is titled “DoD Information Review Task Force-2: Initial Assessment, Impacts Resulting from the Compromise of Classified Material by a Former NSA Contractor.” But while the DIA report describes the damage to US intelligence capabilities as “grave”, the government still refuses to release any specific details to support this conclusion. The entire impact assessment was redacted from the material released to the Guardian under a presidential order that protects classified information and several other Foia exemptions.
  • Only 12 pages of the report were declassified by DIA and released. A Justice Department attorney said DIA would continue to process other internal documents that refer to the DIA report for possible release later this year. Steven Aftergood, director of the Project on Government Secrecy at the Federation of American Scientists, questioned the decision to withhold specific details. "The essence of the report is contained in the statement that 'the scope of the compromised knowledge related to US intelligence capabilities is staggering'. But all elaboration of what this striking statement means has been withheld," he said. The assessment excluded NSA-related information and dealt exclusively with non-NSA defense materials. The report was distributed to multiple US military commands around the world and all four military branches.
  • The classified damage assessment was first cited in a news report published by Foreign Policy on January 9. The Foreign Policy report attributed details of the DIA assessment to House intelligence committee chairman Mike Rogers and its ranking Democrat Dutch Ruppersberger. The lawmakers said the White House had authorized them to discuss the document in order to undercut the narrative of Snowden being portrayed as a heroic whistleblower. The DIA report has been cited numerous times by Rogers and Rusppersberger and other lawmakers who claimed Snowden’s leaks have put US personnel at risk. In January, Rogers asserted that the report concluded that most of the documents Snowden took "concern vital operations of the US Army, Navy, Marine Corps and Air Force". "This report confirms my greatest fears — Snowden’s real acts of betrayal place America’s military men and women at greater risk. Snowden’s actions are likely to have lethal consequences for our troops in the field," Rogers said in a statement at the time.
  • But details to back up Rogers' claims are not included in the declassified material released to the Guardian. Neither he nor any other lawmaker has disclosed specific details from the DIA report but they have continued to push the “damage” narrative in interviews with journalists and during appearances on Sunday talk shows. The declassified portion of the report obtained by the Guardian says only that DIA “assesses with high confidence that the information compromise by a former NSA contractor [redacted] and will have a GRAVE impact on US national defense”. The declassified material does not state the number of documents Snowden is alleged to have taken, which Rogers and Ruppersberger have claimed, again citing the DIA’s assessment, was 1.7m.
  • No evidence has surfaced to support persistent claims from pundits and lawmakers that Snowden has provided any of the NSA documents he obtained to a “foreign adversary”. Ben Wizner, Snowden’s attorney at the American Civil Liberties Union, said: "This report, which makes unsubstantiated claims about alleged harm to national security, is from December of 2013. Just this month, Keith Alexander admitted in an interview that he doesn’t 'think anybody really knows what he [Snowden] actually took with him, because the way he did it, we don’t have an accurate way of counting'. In other words, the government’s so-called damage assessment is based entirely on guesses, not on facts or evidence."
  • Steven Aftergood, of the Federation of American Scientists, pointed out that the report's finding that the Snowden leaks had a "grave" impact did not follow any of the levels defined in the annex. "That is a bit odd," he said, adding: "Within this hierarchy, it is not clear where 'grave impact' would fall."
4More

Spy chief trashes leaks, assures Trump of loyalty - POLITICO - 0 views

  • The outgoing U.S. director of national intelligence has extended an olive branch of sorts to Donald Trump — denouncing media leaks, casting skepticism on a report that Russia has damaging material on the president-elect, and assuring Trump that America's spies stand ready to serve him. In an unusual statement, James Clapper said he had spoken Wednesday evening with Trump, five days after the spy chief and some of his counterparts met with the incoming president to discuss U.S. intelligence assessments that Russia tried to interfere in the 2016 election, possibly to help him win.Story Continued Below The assessment has badly aggravated existing tensions between the intelligence community and Trump. On Tuesday, CNN, BuzzFeed and other media outlets reported that, during Friday’s briefing, the intelligence officials told Trump about an unsubstantiated private report that detailed how Russia's government allegedly had salacious information about him. In addition, BuzzFeed published the apparent dossier, which Trump has since denounced as “fake news.” "I expressed my profound dismay at the leaks that have been appearing in the press, and we both agreed that they are extremely corrosive and damaging to our national security," Clapper said of the information that has come out since last week's intelligence briefing.
  • Clapper’s statement represented a dramatic turn of events only 24 hours after initial leaks about the intelligence leaders having told Trump of the dossier. And while Clapper’s statement indirectly confirmed the media reports of the briefing, it also could be viewed as a concession of sorts from an intelligence community that has come under repeated, direct fire from the president-elect. Trump had compared the leak from his briefing to “Nazi Germany” on Twitter on Wednesday morning, writing, “Intelligence agencies should never have allowed this fake news to "leak" into the public. One last shot at me. Are we living in Nazi Germany?” In a news conference, also held Wednesday, Trump defended the comparison and elaborated further, saying, “A thing like that should have never been written, it should never have been had, and it certainly should never have been released.” Clapper, however, said he did not believe the leaks to the press came from the intelligence community. At the same time, he indicated that the intelligence community decided to share the material with Trump because its mere existence was important for the incoming president to know about.
  • As far as the "private security company document," Clapper said, "I emphasized that this document is not a U.S. Intelligence Community product and that I do not believe the leaks came from within the IC. The IC has not made any judgment that the information in this document is reliable, and we did not rely upon it in any way for our conclusions."
  • ...1 more annotation...
  • "Part of our obligation is to ensure that policymakers are provided with the fullest possible picture of any matters that might affect national security," Clapper added. Clapper's statement comes amid extraordinary strains between the spy world and Trump, who takes office next week. The president-elect has been resistant to U.S. intelligence assessments that Russia intervened in the election, although during a press conference Wednesday morning Trump admitted that Moscow likely did do some hacking. Steven Hall, a former head of Russian operations at the CIA, said Clapper’s statement didn’t appear to be an all-out apology, but that it was possible the spy chief wants to try to patch up the tensions between Trump and the intelligence world before he himself steps down in just a few days. “He just might very well be like, wow, this really has kind of gotten out of control,” said Hall, who described Clapper as an “old-school, principled” kind of guy. “This might be his parting attempt to say, look at the very least after more than a 50-year career in intelligence, I don’t want this to be what I’m remembered by.”
10More

Take A Break From The Snowden Drama For A Reminder Of What He's Revealed So Far - Forbes - 0 views

  • Here’s a recap of Snowden’s leaked documents published so far, in my own highly subjective order of importance.
  • The publication of Snowden’s leaks began with a top secret order from the Foreign Intelligence Surveillance Court (FISC) sent to Verizon on behalf of the NSA, demanding the cell phone records of all of Verizon Business Network Services’ American customers for the three month period ending in July. The order, obtained by the Guardian, sought only the metadata of those millions of users’ calls–who called whom when and from what locations–but specifically requested Americans’ records, disregarding foreigners despite the NSA’s legal restrictions that it may only surveil non-U.S. persons. Senators Saxby Chambliss and Diane Feinstein defended the program and said it was in fact a three-month renewal of surveillance practices that had gone for seven years.
  • A leaked executive order from President Obama shows the administration asked intelligence agencies to draw up a list of potential offensive cyberattack targets around the world. The order, which suggests targeting “systems, processes and infrastructure” states that such offensive hacking operations “can offer unique and unconventional capabilities to advance U.S. national objectives around the world with little or no warning to the adversary or target and with potential effects ranging from subtle to severely damaging.” The order followed repeated accusations by the U.S. government that China has engaged in state-sponsored hacking operations, and was timed just a day before President Obama’s summit with Chinese President Xi Jinping.
  • ...6 more annotations...
  • Another leaked slide deck revealed a software tool called Boundless Informant, which the NSA appears to use for tracking the origin of data it collects. The leaked materials included a map produced by the program showing the frequency of data collection in countries around the world. While Iran, Pakistan and Jordan appeared to be the most surveilled countries according to the map, it also pointed to significant data collection from the United States.
  • In a congressional hearing, NSA director Keith Alexander argued that the kind of surveillance of Americans’ data revealed in that Verizon order was necessary to for archiving purposes, but was rarely accessed and only with strict oversight from Foreign Intelligence Surveillance Court judges. But another secret document published by the Guardian revealed the NSA’s own rules for when it makes broad exceptions to its foreign vs. U.S. persons distinction, accessing Americans’ data and holding onto it indefinitely. Those exceptions include anytime Americans’ data is judged to be “significant foreign intelligence” information or information about a crime that has been or is about to be committed, any data “involved in the unauthorized disclosure of national security information,” or necessary to “assess a communications security vulnerability.” Any encrypted data that the NSA wants to crack can also be held indefinitely, regardless of whether its American or foreign origin.
  • Documents leaked to the Guardian revealed a five-year-old British intelligence scheme to tap transatlantic fiberoptic cables to gather data. A program known as Tempora, created by the U.K.’s NSA equivalent Government Communications Headquarters (GCHQ) has for the last 18 months been able to store huge amounts of that raw data for up to 30 days. Much of the data is shared with the NSA, which had assigned 250 analysts to sift through it as of May of last year.
  • Another GCHQ project revealed to the Guardian through leaked documents intercepted the communications of delegates to the G20 summit of world leaders in London in 2009. The scheme included monitoring the attendees’ phone calls and emails by accessing their Blackberrys, and even setting up fake Internet cafes that used keylogging software to surveil them.
  • Snowden showed the Hong Kong newspaper the South China Morning Post documents that it said outlined extensive hacking of Chinese and Hong Kong targets by the NSA since 2009, with 61,000 targets globally and “hundreds” in China. Other SCMP stories based on Snowden’s revelations stated that the NSA had gained access to the Chinese fiberoptic network operator Pacnet as well as Chinese mobile phone carriers, and had gathered large quantities of Chinese SMS messages.
  • The Guardian’s Glenn Greenwald has said that Snowden provided him “thousands” of documents, of which “dozens” are newsworthy. And Snowden himself has said he’d like to expose his trove of leaks to the global media so that each country’s reporters can decide whether “U.S. network operations against their people should be published.” So regardless of where Snowden ends up, expect more of his revelations to follow.
  •  
    Nice tight summary
1More

DNI Issues New Policy on Leak Damage Assessments | Federation Of American Scientists - 0 views

  • The Director of National Intelligence has issued new guidance on assessing damage resulting from the unauthorized disclosure of classified intelligence information to ensure that the damage assessments “are produced in an efficient, timely, consistent and collaborative manner.” Leak damage assessments should be used iteratively and the lessons learned from them should be applied “to strengthen the protection of classified national intelligence and prevent future unauthorized disclosures or compromises.” In addition to the facts and circumstances of the unauthorized disclosure, damage assessments should identify “any foreign involvement” in the case and “actionable recommendations to prevent future occurrences.” Where foreign partners are affected by the leak, agency heads shall coordinate with DNI “prior to notifying a foreign government.” Also, “foreign governments normally will not be advised of any security system vulnerabilities that contributed to the compromise.” See “Damage Assessments,” Intelligence Community Directive 732, June 27, 2014.
6More

Drone strikes counterproductive, says secret CIA report - 0 views

  • Drone strikes and other "targeted killings" of terrorist and insurgent leaders favoured by the US and supported by Australia can strengthen extremist groups and be counterproductive, according to a secret CIA report published by WikiLeaks.According to a leaked document by the CIA's Directorate of Intelligence, "high value targeting" (HVT) involving air strikes and special forces operations against insurgent leaders can be effective, but can also havenegative effects including increasing violence and greater popular support for extremist groups.The leaked document is classified secret and "NoForn" (meaning not to be distributed to non-US nationals) and reviews attacks by the United States and other countries engaged in counter-insurgency operations over the past 50 years.The CIA assessment is the first leaked secret intelligence document published by WikiLeaks since 2011. Led by Australian publisher Julian Assange, the anti-secrecy group says the CIA assessment is the first in what will be a new series of leaked documents relating to the US agency.
  • The 2009 CIA study lends support to critics of US drone strikes in Afghanistan, Iraq, Pakistan, Somalia and Yemen by warning that such operations "may increase support for the insurgents, particularly if these strikes enhance insurgent leaders' lore, if non-combatants are killed in the attacks, if legitimate or semi-legitimate politicians aligned with the insurgents are targeted, or if the government is already seen as overly repressive or violent".
  • The CIA study observes that the US-led coalition in Afghanistan made "a sustained effort since 2001 to target Taliban leaders", but "Afghan government corruption and lack of unity, insufficient strength of Afghan and NATO security forces, and the country's endemic lawlessness have constrained the effectiveness of these counter-insurgency elements"."Senior Taliban leaders' use of sanctuary in Pakistan has also complicated the HVT effort," the CIA says. "Moreover, the Taliban has a high overall ability to replace lost leaders, a centralised but flexible command and control overlaid with egalitarian Pashtun structures, and good succession planning and bench strength, especially at the middle levels."The CIA study also reports mixed results for such tactics in Iraq, noting that al-Qaeda in Iraq "initially lost several iterations of its senior leadership and numerous local emirs, but these losses initially did little to slow AQI's momentum".
  • ...2 more annotations...
  • Similarly, the CIA observes that Israel's "targeted-killings campaign" against Hamas and Hezbollah was of limited effectiveness owing to "decentralised command structures, compartmented leadership, strong succession planning, and deep ties to their communities, making the[se] groups highly resilient to leadership losses".The CIA review does suggest that targeted killings can be useful when they are part of a broader counter-insurgency strategy that employs other military and non-military counter-insurgency instruments. 
  • Drone strikes and other "targeted killings" of terrorist and insurgent leaders favoured by the US and supported by Australia can strengthen extremist groups and be counterproductive, according to a secret CIA report published by WikiLeaks.According to a leaked document by the CIA's Directorate of Intelligence, "high value targeting" (HVT) involving air strikes and special forces operations against insurgent leaders can be effective, but can also havenegative effects including increasing violence and greater popular support for extremist groups.
  •  
    The report is at http://www.wikileaks.org/cia-hvt-counterinsurgency/ Apparently we have a new leaker with access to top secret/no foreign documents.  
6More

Obama's crackdown views leaks as aiding enemies of U.S. | McClatchy - 0 views

  • Even before a former U.S. intelligence contractor exposed the secret collection of Americans’ phone records, the Obama administration was pressing a government-wide crackdown on security threats that requires federal employees to keep closer tabs on their co-workers and exhorts managers to punish those who fail to report their suspicions. President Barack Obama’s unprecedented initiative, known as the Insider Threat Program, is sweeping in its reach. It has received scant public attention even though it extends beyond the U.S. national security bureaucracies to most federal departments and agencies nationwide, including the Peace Corps, the Social Security Administration and the Education and Agriculture departments. It emphasizes leaks of classified material, but catchall definitions of “insider threat” give agencies latitude to pursue and penalize a range of other conduct.
  • Government documents reviewed by McClatchy illustrate how some agencies are using that latitude to pursue unauthorized disclosures of any information, not just classified material. They also show how millions of federal employees and contractors must watch for “high-risk persons or behaviors” among co-workers and could face penalties, including criminal charges, for failing to report them. Leaks to the media are equated with espionage.
  • Employees must turn themselves and others in for failing to report breaches. “Penalize clearly identifiable failures to report security infractions and violations, including any lack of self-reporting,” the strategic plan says.The Obama administration already was pursuing an unprecedented number of leak prosecutions, and some in Congress – long one of the most prolific spillers of secrets – favor tightening restrictions on reporters’ access to federal agencies, making many U.S. officials reluctant to even disclose unclassified matters to the public. The policy, which partly relies on behavior profiles, also could discourage creative thinking and fuel conformist “group think” of the kind that was blamed for the CIA’s erroneous assessment that Iraq was hiding weapons of mass destruction, a judgment that underpinned the 2003 U.S. invasion. “The real danger is that you get a bland common denominator working in the government,” warned Ilana Greenstein, a former CIA case officer who says she quit the agency after being falsely accused of being a security risk. “You don’t get people speaking up when there’s wrongdoing. You don’t get people who look at things in a different way and who are willing to stand up for things. What you get are people who toe the party line, and that’s really dangerous for national security.”
  • ...3 more annotations...
  • The program could make it easier for the government to stifle the flow of unclassified and potentially vital information to the public, while creating toxic work environments poisoned by unfounded suspicions and spurious investigations of loyal Americans, according to these current and former officials and experts. Some non-intelligence agencies already are urging employees to watch their co-workers for “indicators” that include stress, divorce and financial problems.
  • The program, however, gives agencies such wide latitude in crafting their responses to insider threats that someone deemed a risk in one agency could be characterized as harmless in another. Even inside an agency, one manager’s disgruntled employee might become another’s threat to national security. Obama in November approved “minimum standards” giving departments and agencies considerable leeway in developing their insider threat programs, leading to a potential hodgepodge of interpretations. He instructed them to not only root out leakers but people who might be prone to “violent acts against the government or the nation” and “potential espionage.”
  • The Department of Education, meanwhile, informs employees that co-workers going through “certain life experiences . . . might turn a trusted user into an insider threat.” Those experiences, the department says in a computer training manual, include “stress, divorce, financial problems” or “frustrations with co-workers or the organization.”An online tutorial titled “Treason 101” teaches Department of Agriculture and National Oceanic and Atmospheric Administration employees to recognize the psychological profile of spies.
3More

NSA chief says Snowden leaked up to 200,000 secret documents | Reuters - 0 views

  • (Reuters) - Former U.S. National Security Agency contractor Edward Snowden leaked as many as 200,000 classified U.S. documents to the media, according to little-noticed public remarks by the eavesdropping agency's chief late last month. In a question-and-answer session following a speech to a foreign affairs group in Baltimore on October 31, NSA Director General Keith Alexander was asked by a member of the audience what steps U.S. authorities were taking to stop Snowden from leaking additional information to journalists."I wish there was a way to prevent it. Snowden has shared somewhere between 50 (thousand) and 200,000 documents with reporters. These will continue to come out," Alexander said.
  • Alexander added that the documents were "being put out in a way that does the maximum damage to NSA and our nation," according to a transcript of his talk made available by NSA.U.S. officials briefed on investigations into Snowden's activities have said privately for months that internal government assessments indicate that the number of classified documents to which Snowden got access as a systems operator at NSA installations ran into the hundreds of thousands.Officials said that while investigators now believe they know the range of documents that Snowden accessed, they remain unsure which documents he downloaded for leaking to the media.
  •  
    50K to 200K documents, NSA thinks they know the range of documents Snowden accessed but not which ones. But that's information from Gen. Alexander, who is a congenital liar, caught in lie after lie. 
1More

Leaks Damaged U.S. Intelligence, Official Says - 0 views

  • Unauthorized disclosures of classified information by Edward Snowden have damaged U.S. intelligence capabilities, National Counterterrorism Center director Nicholas J. Rasmussen told Congress last week. “Due to the Snowden leaks and other disclosures, terrorists also have a great understanding of how we seek to conduct surveillance including our methods, our tactics and the scope and scale of our efforts. They’ve altered the ways in which they communicate and this has led to a decrease in collection,” Mr. Rasmussen said at a February 12 hearing of the Senate Select Committee on Intelligence. “We have specific examples which I believe we have shared with the committee and the committee staff in classified session — specific examples of terrorists who have adopted greater security measures such as using various new types of encryption, terrorists who have dropped or changed email addresses, and terrorists who have simply stopped communicating in ways they had before, in part because they understand how we collected,” he said. This is not terribly persuasive, particularly since Mr. Rasmussen did not specify which leaks resulted in which changes by which terrorists at what cost to U.S. security. Nor is a public statement by an intelligence official before the Senate Intelligence Committee entitled any longer to a presumption of accuracy since the Committee permits errors to stand uncorrected.
8More

U.S. Military and Intelligence Officials to Obama: "Assad NOT Responsible for Chemical ... - 1 views

  • MEMORANDUM FOR: The President FROM: Veteran Intelligence Professionals for Sanity (VIPS) SUBJECT: Is Syria a Trap? Precedence: IMMEDIATE We regret to inform you that some of our former co-workers are telling us, categorically, that contrary to the claims of your administration, the most reliable intelligence shows that Bashar al-Assad was NOT responsible for the chemical incident that killed and injured Syrian civilians on August 21, and that British intelligence officials also know this. In writing this brief report, we choose to assume that you have not been fully informed because your advisers decided to afford you the opportunity for what is commonly known as “plausible denial.” We have been down this road before – with President George W. Bush, to whom we addressed our first VIPS memorandumimmediately after Colin Powell’s Feb. 5, 2003 U.N. speech, in which he peddled fraudulent “intelligence” to support attacking Iraq. Then, also, we chose to give President Bush the benefit of the doubt, thinking he was being misled – or, at the least, very poorly advised.
  • The fraudulent nature of Powell’s speech was a no-brainer. And so, that very afternoon we strongly urged your predecessor to “widen the discussion beyond …  the circle of those advisers clearly bent on a war for which we see no compelling reason and from which we believe the unintended consequences are likely to be catastrophic.” We offer you the same advice today. Our sources confirm that a chemical incident of some sort did cause fatalities and injuries on August 21 in a suburb of Damascus. They insist, however, that the incident was not the result of an attack by the Syrian Army using military-grade chemical weapons from its arsenal. That is the most salient fact, according to CIA officers working on the Syria issue. They tell us that CIA Director John Brennan is perpetrating a pre-Iraq-War-type fraud on members of Congress, the media, the public – and perhaps even you. We have observed John Brennan closely over recent years and, sadly, we find what our former colleagues are now telling us easy to believe. Sadder still, this goes in spades for those of us who have worked with him personally; we give him zero credence. And that goes, as well, for his titular boss, Director of National Intelligence James Clapper, who has admitted he gave “clearly erroneous” sworn testimony to Congress denying NSA eavesdropping on Americans.
  • That Secretary of State John Kerry would invoke Clapper’s name this week in Congressional testimony, in an apparent attempt to enhance the credibility of the four-page “Government Assessment” strikes us as odd. The more so, since it was, for some unexplained reason, not Clapper but the White House that released the “assessment.” This is not a fine point. We know how these things are done. Although the “Government Assessment” is being sold to the media as an “intelligence summary,” it is a political, not an intelligence document. The drafters, massagers, and fixers avoided presenting essential detail. Moreover, they conceded upfront that, though they pinned “high confidence” on the assessment, it still fell “short of confirmation.”
  • ...3 more annotations...
  • There is a growing body of evidence from numerous sources in the Middle East — mostly affiliated with the Syrian opposition and its supporters — providing a strong circumstantial case that the August 21 chemical incident was a pre-planned provocation by the Syrian opposition and its Saudi and Turkish supporters. The aim is reported to have been to create the kind of incident that would bring the United States into the war. According to some reports, canisters containing chemical agent were brought into a suburb of Damascus, where they were then opened. Some people in the immediate vicinity died; others were injured. We are unaware of any reliable evidence that a Syrian military rocket capable of carrying a chemical agent was fired into the area. In fact, we are aware of no reliable physical evidence to support the claim that this was a result of a strike by a Syrian military unit with expertise in chemical weapons. In addition, we have learned that on August 13-14, 2013, Western-sponsored opposition forces in Turkey started advance preparations for a major, irregular military surge. Initial meetings between senior opposition military commanders and Qatari, Turkish and U.S. intelligence officials took place at the converted Turkish military garrison in Antakya, Hatay Province, now used as the command center and headquarters of the Free Syrian Army (FSA) and their foreign sponsors.
  • Senior opposition commanders who came from Istanbul pre-briefed the regional commanders on an imminent escalation in the fighting due to “a war-changing development,” which, in turn, would lead to a U.S.-led bombing of Syria. At operations coordinating meetings at Antakya, attended by senior Turkish, Qatari and U.S. intelligence officials as well as senior commanders of the Syrian opposition, the Syrians were told that the bombing would start in a few days. Opposition leaders were ordered to prepare their forces quickly to exploit the U.S. bombing, march into Damascus, and remove the Bashar al-Assad government The Qatari and Turkish intelligence officials assured the Syrian regional commanders that they would be provided with plenty of weapons for the coming offensive. And they were. A weapons distribution operation unprecedented in scope began in all opposition camps on August 21-23. The weapons were distributed from storehouses controlled by Qatari and Turkish intelligence under the tight supervision of U.S. intelligence officers.
  • We hope your advisers have warned you that retaliation for attacks on Syrian are not a matter of IF, but rather WHERE and WHEN. Retaliation is inevitable. For example, terrorist strikes on U.S. embassies and other installations are likely to make what happened to the U.S. “Mission” in Benghazi on Sept. 11, 2012, look like a minor dust-up by comparison. One of us addressed this key consideration directly a week ago in an article titled “Possible Consequences of a U.S. Military Attack on Syria – Remembering the U.S. Marine Barracks Destruction in Beirut, 1983.”
  •  
    This report by Veteran Intelligence Professionals for Sanity is almost certainly the most credible report contradicting the White House's "intelligence summary" that included zero evidence supporting the claim that Syrian government forces had unleashed the August 21, 2013 chemical attack in Ghoutu, near Damascus and less than five miles away from the just-arrived UN investigative team.  Spread it far and wide. 
  •  
    Wow!! The cover-up of this false flag operation designed to get us into another civil war is incredible. Yet the truth continues to leak out. The ruling elites must be so pissed right now. The Internet is changing the world balance of power - in real time no less. And we are witness. Awesome stuff Paul.
5More

Attention fliers: Canada's electronic spy agency is following you - new Snowden leaks -... - 0 views

  • Documents released by US whistleblower Edward Snowden show the Communications Security Establishment Canada (CSEC) used airport Wi-Fi to track passengers from around the world. Travelers passing through a major Canadian airport were potentially caught up in a vast electronic surveillance net, which allowed the nation’s electronic spy agency to track the wireless devices of thousands of airline passengers - even for days after they had departed the terminal, a document obtained by CBC News revealed. The document shows the spy agency was then able to track travelers for a week or more as the unwitting passengers, together with their wireless devices, visited other Wi-Fi "hot spots" in locations across Canada, and across the border at American airports.
  • After reviewing details of the leaked information, one of Canada's leading authorities on internet security says the secret operation was almost certainly illegal. "I can't see any circumstance in which this would not be unlawful, under current Canadian law, under our Charter, under CSEC's mandates," Professor Ronald Deibert, an internet security expert at the University of Toronto, told CBC News. It remains unclear from the leaked data how CSEC was able to infiltrate so many wireless devices to see who was using them, both on Canadian territory and beyond.
  • The CSEC is specifically tasked with gathering foreign intelligence by intercepting overseas phone and internet traffic, and is forbidden by law from collecting information on Canadians - or foreigners in Canada - without a court warrant. As CSEC Chief John Forster recently stated: "I can tell you that we do not target Canadians at home or abroad in our foreign intelligence activities, nor do we target anyone in Canada. "In fact, it's prohibited by law. Protecting the privacy of Canadians is our most important principle." However analysts who were privy to the document say that airline passengers in a Canadian airport were clearly on the territory of Canada. CSEC spokesperson Lauri Sullivan told the Star, an online Canadian news outlet, that the “classified document in question is a technical presentation between specialists exploring mathematical models built on everyday scenarios to identify and locate foreign terrorist threats.”
  • ...2 more annotations...
  • Early assessment of the leaked information indicates the passenger tracking operation was a trial run of a powerful new software program CSEC was developing with help from its American partner, the National Security Agency. The technology was to be shared with the so-called 'Five Eyes' surveillance bloc composed of Canada, the United States, Britain, New Zealand and Australia. In the document, CSEC described the new spy technology as "game-changing," saying it could be used for powerful surveillance on "any target that makes occasional forays into other cities/regions." Sources told CBC News the “technologies tested on Canadians in 2012 have since become fully operational.”
  • Ontario's privacy commissioner Ann Cavoukian admitted she is "blown away" by news of the secret operation. "It is really unbelievable that CSEC would engage in that kind of surveillance of Canadians," Cavoukian told the Canadian news agency. "This resembles the activities of a totalitarian state, not a free and open society."
5More

Leaked cables show Netanyahu's Iran bomb claim contradicted by Mossad | World news | Th... - 0 views

  • Read the leaked document here
  • Binyamin Netanyahu’s dramatic declaration to world leaders in 2012 that Iran was about a year away from making a nuclear bomb was contradicted by his own secret service, according to a top-secret Mossad document. It is part of a cache of hundreds of dossiers, files and cables from the world’s major intelligence services – one of the biggest spy leaks in recent times
  • But in a secret report shared with South Africa a few weeks later, Israel’s intelligence agency concluded that Iran was “not performing the activity necessary to produce weapons”. The report highlights the gulf between the public claims and rhetoric of top Israeli politicians and the assessments of Israel’s military and intelligence establishment.
  • ...2 more annotations...
  • The disclosure comes as tensions between Israel and its staunchest ally, the US, have dramatically increased ahead of Netanyahu’s planned address to the US Congress on 3 March. The White House fears the Israeli leader’s anticipated inflammatory rhetoric could damage sensitive negotiations between Tehran and the world’s six big powers over Iran’s nuclear programme. The deadline to agree on a framework is in late March, with the final settlement to come on 30 June. Netanyahu has vowed to block an agreement he claims would give Iran access to a nuclear weapons capability.
  • The Mossad briefing about Iran’s nuclear programme in 2012 was in stark contrast to the alarmist tone set by Netanyahu, who has long presented the Iranian nuclear programme as an existential threat to Israel and a huge risk to world security. The Israeli prime minister told the UN: “By next spring, at most by next summer, at current enrichment rates, they will have finished the medium enrichment and move[d] on to the final stage. From there, it’s only a few months, possibly a few weeks before they get enough enriched uranium for the first bomb.”
2More

EXCLUSIVE: Snowden sought Booz Allen job to gather evidence on NSA surveillance | South... - 0 views

  • The documents he divulged to the Post were obtained during his tenure at Booz Allen Hamilton in April, he said. He also signalled his intention to leak more of those documents at a later date. “If I have time to go through this information, I would like to make it available to journalists in each country to make their own assessment, independent of my bias, as to whether or not the knowledge of US network operations against their people should be published.”
  •  
    A bit more detail on Snowden's plans to leak more documents.
5More

Greenwald: Snowden's Files Are Out There if "Anything Happens" To Him - The Daily Beast - 0 views

  • Glenn Greenwald, the Guardian journalist who Snowden first contacted in February, told The Daily Beast on Tuesday that Snowden “has taken extreme precautions to make sure many different people around the world have these archives to insure the stories will inevitably be published.” Greenwald added that the people in possession of these files “cannot access them yet because they are highly encrypted and they do not have the passwords.” But, Greenwald said, “if anything happens at all to Edward Snowden, he told me he has arranged for them to get access to the full archives.” The fact that Snowden has made digital copies of the documents he accessed while working at the NSA poses a new challenge to the U.S. intelligence community that has scrambled in recent days to recover them and assess the full damage of the breach. Even if U.S. authorities catch up with Snowden and the four classified laptops the Guardian reported he brought with him to Hong Kong the secrets Snowden hopes to expose will still likely be published.
  • A former U.S. counterintelligence officer following the Snowden saga closely said his contacts inside the U.S. intelligence community “think Snowden has been planning this for years and has stashed files all over the Internet.” This source added, “At this point there is very little anyone can do about this.” The arrangement to entrust encrypted archives of his files with others also sheds light on a cryptic statement Snowden made on June 17 during a live chat with The Guardian. In the online session he said, “All I can say right now is the U.S. government is not going to be able to cover this up by jailing or murdering me. Truth is coming, and it cannot be stopped.”
  • However, Greenwald said that in his dealings with Snowden the 30-year-old systems administrator was adamant that he and his newspaper go through the document and only publish what served the public’s right to know. “Snowden himself was vehement from the start that we do engage in that journalistic process and we not gratuitously publish things,” Greenwald said. “I do know he was vehement about that. He was not trying to harm the U.S. government; he was trying to shine light on it.” Greenwald said Snowden for example did not wish to publicize information that gave the technical specifications or blueprints for how the NSA constructed its eavesdropping network. “He is worried that would enable other states to enhance their security systems and monitor their own citizens.” Greenwald also said Snowden did not wish to repeat the kinds of disclosures made famous a generation ago by former CIA spy, Philip Agee—who published information after defecting to Cuba that outed undercover CIA officers. “He was very insistent he does not want to publish documents to harm individuals or blow anyone’s undercover status,” Greenwald said. He added that Snowden told him, “Leaking CIA documents can actually harm people, whereas leaking NSA documents can harm systems.”
  • ...2 more annotations...
  • Greenwald said that he himself has thousands of documents from Snowden that he is continuing to examine. That figure is considerably higher than the 200 documents that Sen. Dianne Feinstein, the chairwoman of the Senate Select Committee, said over the weekend that she was told Snowden possessed. “I don’t know for sure whether [Snowden] has more documents than the ones he has given me,” Greenwald said. “I believe he does. He was clear he did not want to give to journalists things he did not think should be published.”
  • For now, Greenwald said he is taking extra precautions against the prospect that he is a target of U.S. surveillance. He said he began using encrypted email when he began communicating with Snowden in February after Snowden sent him a YouTube video walking him through the procedure to encrypt his email. “When I was in Hong Kong, I spoke to my partner in Rio via Skype and told him I would send an electronic encrypted copy of the documents,” Greenwald said. “I did not end up doing it. Two days later his laptop was stolen from our house and nothing else was taken. Nothing like that has happened before. I am not saying it’s connected to this, but obviously the possibility exists.” When asked if Greenwald believed his computer was being monitored by the U.S. government. “I would be shocked if the U.S. government were not trying to access the information on my computer. I carry my computers and data with me everywhere I go.”
4More

Clapper Reads From the Bush/Cheney/Nixon Playbook to Fear-Monger Over Transparency - Th... - 0 views

  • James Clapper, President Obama’s top national security official, is probably best known for having been caught lying outright to Congress about NSA activities, behavior which (as some baseball players found out) happens to be a felony under federal law. But – like torturers and Wall Street tycoons before him – Clapper has been not only shielded from prosecution, and not only allowed to keep his job; he has has now been anointed the arbiter of others’ criminality, as he parades around the country calling American journalists “accomplices”. Yesterday, as Wired’s Dave Kravets reports, the “clearly frustrated” Clapper went before a Senate committee (different than the one he got caught lying to) to announce that the Snowden disclosures are helping the terrorists: We’re beginning to see changes in the communications behavior of adversaries: particularly terrorists. A disturbing trend, which I anticipate will continue . . . Terrorists and other adversaries of this country are going to school on U.S. intelligence sources, methods, and tradecraft. And the insights they’re gaining are making our job in the intelligence community much, much harder. And this includes putting the lives of members or assets of the intelligence community at risk, as well as those of our armed forces, diplomats, and our citizens. As Kravets notes, “Clapper is not the most credible source on Snowden and the NSA leaks.” Moreover, it’s hardly surprising that Clapper is furious at these disclosures given that “Snowden’s very first leak last June” – revelation of the domestic surveillance program – “had the side-effect of revealing that Clapper had misled the public and Congress about NSA spying.” And, needless to say, Clapper offered no evidence at all to support his assertions yesterday; he knows that, unlike Kravets, most establishment media outlets will uncritically trumpet his claims without demanding evidence or even noting that he has none.
  • But in general, it’s hardly surprising that national security officials claim that unwanted disclosures help terrorists. Fear-mongering comes naturally to those who wield political power. Particularly in post-9/11 America, shouting “terrorists!” has been the favorite tactic of the leadership of both parties to spread fear and thus induce submission. In a recent New York Times op-ed detailing how exploitation of terrorism fears is the key to sustaining the modern surveillance state, Northwestern University Philosophy Professor Peter Ludlow wrote that “since 9/11 leaders of both political parties in the United States have sought to consolidate power by leaning … on the danger of a terrorist attack”. He recounted that ”Machiavelli notoriously argued that a good leader should induce fear in the populace in order to control the rabble” and that “Hobbes in ‘The Leviathan’ argued that fear effectively motivates the creation of a social contract in which citizens cede their freedoms to the sovereign.” It would be surprising if people like Clapper didn’t do this. But what has struck me is how seriously many media figures take this claim. In the vast majority of interviews I’ve done about NSA reporting, interviewers adopt a grave tone in their voice and trumpet the claims from U.S. officials that our reporting is helping the terrorists. They treat these claims as though they’re the by-product of some sort of careful, deliberative, unique assessment rather than what it is: the evidence-free tactics national security state officials reflexively invoke to discredit all national security journalism they dislike. Let’s review a bit of history to see how true that is.
  • Political officials hate transparency.They would rather be able to hide what they’re doing. They therefore try to demonize those who impose transparency with the most extreme and discrediting accusations they can concoct (you’re helping terrorists kill Americans!). The more transparency one imposes on them, the more extreme and desperate this accusatory rhetoric becomes. This is not complicated. It’s all very basic. James Clapper is saying exactly what Dick Cheney and George Bush before him said, and those three said what John Ehrlichman and Henry Kissinger said before them about Ellsberg. It’s all spouted with no evidence. It’s rote and reflexive. It’s designed to smear and fear-monger. As Professor Ludlow notes, “Fear is even used to prevent us from questioning the decisions supposedly being made for our safety.” Maybe it’s time for journalists to cease being the leading advocates for state secrecy and instead take seriously their claimed role as watchdogs. At the very least, demand evidence before these sorts of highly predictable, cliched attacks are heralded as something to be taken seriously. As it is, they’re just cartoons: ones that are played over and over and over.
  •  
    Glenn Greenwald pokes his stick in the presstitutes' eyes, again.
11More

Top-Secret Document Reveals NSA Spied On Porn Habits As Part Of Plan To Discredit 'Radi... - 0 views

  • WASHINGTON -- The National Security Agency has been gathering records of online sexual activity and evidence of visits to pornographic websites as part of a proposed plan to harm the reputations of those whom the agency believes are radicalizing others through incendiary speeches, according to a top-secret NSA document. The document, provided by NSA whistleblower Edward Snowden, identifies six targets, all Muslims, as “exemplars” of how “personal vulnerabilities” can be learned through electronic surveillance, and then exploited to undermine a target's credibility, reputation and authority. The NSA document, dated Oct. 3, 2012, repeatedly refers to the power of charges of hypocrisy to undermine such a messenger. “A previous SIGINT" -- or signals intelligence, the interception of communications -- "assessment report on radicalization indicated that radicalizers appear to be particularly vulnerable in the area of authority when their private and public behaviors are not consistent,” the document argues. Among the vulnerabilities listed by the NSA that can be effectively exploited are “viewing sexually explicit material online” and “using sexually explicit persuasive language when communicating with inexperienced young girls.”
  • The Director of the National Security Agency -- described as "DIRNSA" -- is listed as the "originator" of the document. Beyond the NSA itself, the listed recipients include officials with the Departments of Justice and Commerce and the Drug Enforcement Administration. "Without discussing specific individuals, it should not be surprising that the US Government uses all of the lawful tools at our disposal to impede the efforts of valid terrorist targets who seek to harm the nation and radicalize others to violence," Shawn Turner, director of public affairs for National Intelligence, told The Huffington Post in an email Tuesday. Yet Jameel Jaffer, deputy legal director of the American Civil Liberties Union, said these revelations give rise to serious concerns about abuse. "It's important to remember that the NSA’s surveillance activities are anything but narrowly focused -- the agency is collecting massive amounts of sensitive information about virtually everyone," he said. "Wherever you are, the NSA's databases store information about your political views, your medical history, your intimate relationships and your activities online," he added. "The NSA says this personal information won't be abused, but these documents show that the NSA probably defines 'abuse' very narrowly."
  • None of the six individuals targeted by the NSA is accused in the document of being involved in terror plots. The agency believes they all currently reside outside the United States. It identifies one of them, however, as a "U.S. person," which means he is either a U.S. citizen or a permanent resident. A U.S. person is entitled to greater legal protections against NSA surveillance than foreigners are. Stewart Baker, a one-time general counsel for the NSA and a top Homeland Security official in the Bush administration, said that the idea of using potentially embarrassing information to undermine targets is a sound one. "If people are engaged in trying to recruit folks to kill Americans and we can discredit them, we ought to," said Baker. "On the whole, it's fairer and maybe more humane" than bombing a target, he said, describing the tactic as "dropping the truth on them." Any system can be abused, Baker allowed, but he said fears of the policy drifting to domestic political opponents don't justify rejecting it. "On that ground you could question almost any tactic we use in a war, and at some point you have to say we're counting on our officials to know the difference," he said.
  • ...6 more annotations...
  • In addition to analyzing the content of their internet activities, the NSA also examined the targets' contact lists. The NSA accuses two of the targets of promoting al Qaeda propaganda, but states that surveillance of the three English-speakers’ communications revealed that they have "minimal terrorist contacts." In particular, “only seven (1 percent) of the contacts in the study of the three English-speaking radicalizers were characterized in SIGINT as affiliated with an extremist group or a Pakistani militant group. An earlier communications profile of [one of the targets] reveals that 3 of the 213 distinct individuals he was in contact with between 4 August and 2 November 2010 were known or suspected of being associated with terrorism," the document reads. The document contends that the three Arabic-speaking targets have more contacts with affiliates of extremist groups, but does not suggest they themselves are involved in any terror plots. Instead, the NSA believes the targeted individuals radicalize people through the expression of controversial ideas via YouTube, Facebook and other social media websites. Their audience, both English and Arabic speakers, "includes individuals who do not yet hold extremist views but who are susceptible to the extremist message,” the document states. The NSA says the speeches and writings of the six individuals resonate most in countries including the United Kingdom, Germany, Sweden, Kenya, Pakistan, India and Saudi Arabia.
  • The NSA possesses embarrassing sexually explicit information about at least two of the targets by virtue of electronic surveillance of their online activity. The report states that some of the data was gleaned through FBI surveillance programs carried out under the Foreign Intelligence and Surveillance Act. The document adds, "Information herein is based largely on Sunni extremist communications." It further states that "the SIGINT information is from primary sources with direct access and is generally considered reliable." According to the document, the NSA believes that exploiting electronic surveillance to publicly reveal online sexual activities can make it harder for these “radicalizers” to maintain their credibility. "Focusing on access reveals potential vulnerabilities that could be even more effectively exploited when used in combination with vulnerabilities of character or credibility, or both, of the message in order to shape the perception of the messenger as well as that of his followers," the document argues. An attached appendix lists the "argument" each surveillance target has made that the NSA says constitutes radicalism, as well the personal "vulnerabilities" the agency believes would leave the targets "open to credibility challenges" if exposed.
  • One target's offending argument is that "Non-Muslims are a threat to Islam," and a vulnerability listed against him is "online promiscuity." Another target, a foreign citizen the NSA describes as a "respected academic," holds the offending view that "offensive jihad is justified," and his vulnerabilities are listed as "online promiscuity" and "publishes articles without checking facts." A third targeted radical is described as a "well-known media celebrity" based in the Middle East who argues that "the U.S perpetrated the 9/11 attack." Under vulnerabilities, he is said to lead "a glamorous lifestyle." A fourth target, who argues that "the U.S. brought the 9/11 attacks on itself" is said to be vulnerable to accusations of “deceitful use of funds." The document expresses the hope that revealing damaging information about the individuals could undermine their perceived "devotion to the jihadist cause." The Huffington Post is withholding the names and locations of the six targeted individuals; the allegations made by the NSA about their online activities in this document cannot be verified. The document does not indicate whether the NSA carried out its plan to discredit these six individuals, either by communicating with them privately about the acquired information or leaking it publicly. There is also no discussion in the document of any legal or ethical constraints on exploiting electronic surveillance in this manner.
  • While Baker and others support using surveillance to tarnish the reputation of people the NSA considers "radicalizers," U.S. officials have in the past used similar tactics against civil rights leaders, labor movement activists and others. Under J. Edgar Hoover, the FBI harassed activists and compiled secret files on political leaders, most notably Martin Luther King, Jr. The extent of the FBI's surveillance of political figures is still being revealed to this day, as the bureau releases the long dossiers it compiled on certain people in response to Freedom of Information Act requests following their deaths. The information collected by the FBI often centered on sex -- homosexuality was an ongoing obsession on Hoover's watch -- and information about extramarital affairs was reportedly used to blackmail politicians into fulfilling the bureau's needs. Current FBI Director James Comey recently ordered new FBI agents to visit the Martin Luther King, Jr. Memorial in Washington to understand "the dangers in becoming untethered to oversight and accountability."
  • James Bamford, a journalist who has been covering the NSA since the early 1980s, said the use of surveillance to exploit embarrassing private behavior is precisely what led to past U.S. surveillance scandals. "The NSA's operation is eerily similar to the FBI's operations under J. Edgar Hoover in the 1960s where the bureau used wiretapping to discover vulnerabilities, such as sexual activity, to 'neutralize' their targets," he said. "Back then, the idea was developed by the longest serving FBI chief in U.S. history, today it was suggested by the longest serving NSA chief in U.S. history." That controversy, Bamford said, also involved the NSA. "And back then, the NSA was also used to do the eavesdropping on King and others through its Operation Minaret. A later review declared the NSA’s program 'disreputable if not outright illegal,'" he said. Baker said that until there is evidence the tactic is being abused, the NSA should be trusted to use its discretion. "The abuses that involved Martin Luther King occurred before Edward Snowden was born," he said. "I think we can describe them as historical rather than current scandals. Before I say, 'Yeah, we've gotta worry about that,' I'd like to see evidence of that happening, or is even contemplated today, and I don't see it."
  • Jaffer, however, warned that the lessons of history ought to compel serious concern that a "president will ask the NSA to use the fruits of surveillance to discredit a political opponent, journalist or human rights activist." "The NSA has used its power that way in the past and it would be naïve to think it couldn't use its power that way in the future," he said.
  •  
    By Glenn Greenwald, Ryan Gallagher, and Ryan Grim, 26 November 2013. I will annotate later. But this is by far the most important NSA disclosure from Edward Snowden's leaked documents thus far. A report originated by Gen. Alexander himself revealing COINTELPRO like activities aimed at destroying the reputations of non-terrorist "radicalizers," including one "U.S. person." This is exactly the kind of repressive activity that the civil libertarians among us warn about. 
  •  
    By Glenn Greenwald, Ryan Gallagher, and Ryan Grim, 26 November 2013. I will annotate later. But this is by far the most important NSA disclosure from Edward Snowden's leaked documents thus far. A report originated by Gen. Alexander himself revealing COINTELPRO like activities aimed at destroying the reputations of non-terrorist "radicalizers," including one "U.S. person." This is exactly the kind of repressive activity that the civil libertarians among us warn about. 
6More

Leaked Emails ot Save the Children confirms Pakistan full of CIA agents!! - 0 views

  • Here are the emails. An article written by Umar Cheema is also on the Web, will post link once I am on my laptop. http://cirp.pk/e-mail.htm (edit: although some names have been blacked out, you can still view them by taking mouse over the links! e.g. First email is by Hassan Noor.. to Mike Novell, tkrift (??), Amanullah Khan.. CC is Afnan Aleem) These basically proves that everyone in the Abbotabad commission (except Mr Ashraf Qazi), including a very senior judge and general, were working under the influence of Save The Children NGO Retired General Nadeem was directly working under them! Afridi was NOT tortured by ISI. He did give ISI some false statements which the ISI didn't dig deeper because it suited them! (Example he was working for CIA since 2008, not 2009 as ISI was led to believe) Edit: Here is the article: http://www.thenews.com.pk/Todays-Ne...s-Abbottabad-Commission-was-penetrated-by-CIA -- All these NGOs should be banned and thrashed! ISI should publically hang foreign agents! (Even if they are Generals)
  • The NGO has neither denied the email record and the contents it carried (when shown by The News for seeking version) nor offered specific comments but that: “Our assistance to the Abbottabad Commission and its members including Gen Nadeem was within the legal parameters and Abbottabad Commission mandate to find facts.” Nadeem was not available for comments, however, his close aide termed the allegations as utterly “rubbish and non-sense” when comments were sought after showing the email record A transcript of internal wrangling: Muhammad Hassan Noor Saadi, deputy country director of Save the Children, met Gen (R) Nadeem on November 20, 2012 that followed his email to four senior colleagues. The report was primarily compiled by ‘our friend’, his email reads, and was endorsed by the Chairman but one of the members, Ashraf Qazi, was not in agreement with them. He wrote a dissenting note criticising Chairman Justice (R) Javed Iqbal and Gen (R) Nadeem ‘for being soft on certain institutions (including Save the Children).’
  • Another member, Abbas Khan, was neither willing to sign the report in its current shape, discloses email record, nor wanted to put a dissenting note hence decided to prolong his stay in the US where he went on the ‘pretext of medical ground’. More alarmingly, the NGO was granted access to the Commission’s report well before it was sent to the prime minister. Save the Children had uninterrupted access to the four drafts prepared in June 2012 by the members including the chairman, email record available with The News indicates. All favours granted to Save the Children on behalf of the Commission were in clear breach of public trust raising question marks about the integrity of the members. The chairman of the NGO, Save the Children, was contacted by The News. He initially agreed to meet but later stopped taking calls and did not respond to messages sent to him.Nadeem also felt confident, the email record shows, that he would be able to convince the panel with the answers given by the NGO and urge his colleagues to go by the facts presented by Save the Children instead of believing on the contents of Afridi’s statement. Gen (R) Nadeem also advised the NGO, an email of the country director reads, to fight the expulsion of our expatriate as otherwise the ISI would move quickly to close down the country programme before the Commission report comes out.
  • ...3 more annotations...
  • Record shows Abbottabad Commission was penetrated by CIA​ Umar Cheema Friday, August 02, 2013 From Print Edition ISLAMABAD: A mind-blowing detail has emerged from the internal correspondence of NGO Save the Children disclosing its infiltration into the Abbottabad Commission to save its skin following allegations of the CIA’s penetration into the NGO in a hunt for Osama bin Laden through Dr Shakil Afridi, now under arrest in Peshawar. “Some of us suspected that the khakis had access to the record and receive daily updates but never realised an NGO had infiltrated too,” said an official privy to the Commission’s working. The leaked communication indicates that Lt Gen (retd) Nadeem Ahmed, an unofficial representative of the Army and ISI in the Commission, was allegedly cultivated by Save the Children who would offer him ‘how-to-do’ bailout advice, even sharing details about the internal politics of the Commission and classified record, something in radical contradiction to his reputation as a thorough professional and a man of integrity. He briefed the deputy country director of Save the Children, according to the email, about the views of different members, staunch opposition from a panel colleague, Ashraf Jehangir Qazi, resulting in his dissenting note on the NGO and other institutions, and Gen (retd) Nadeem’s plan to effectively counter this note in collaboration with Justice (R) Javed Iqbal, the Chairman.
  • The Commission could not issue the report with that note and therefore now they are working on developing counter arguments on the note, read the email. The Commission needs to have a lot of comments removed from the note before it is in a shape that allows the report to be shared, the email continues, otherwise it can jeopardize the integrity of the members of the Commission. Justice (R) Javed Iqbal and Gen (R) Nadeem ‘have to work extra hard to factually prove a lot of things wrong that this third member is referring to,’ read the email of deputy country director. The email then explained the position of the fourth member, Abbas Ali Khan, absent from discussion. He is not willing to sign the report in the current shape, reads Hassan’s email, but also does not want to put in a note of dissent and therefore continues to prolong his stay in the US where he went on the pretext of treatment. As a way forward, the email continues, the two members will work with the third member (Ashraf Qazi) and try to come to a point where the note is significantly reduced and numbers of comments are taken out of the report. Gen (R) Nadeem’s advisory role of the NGO: The email also brings to light his role as adviser to the NGO. To a question that what Save the Children should do, Nadeem advised the deputy country director to build relationship and confidence with the Ministry of Interior and Economic Affairs Division. “It would take few months for you to be back to complete normalcy,” Gen (R) Nadeem advised.
  • In another email generated on August 29, 2012, David Wright, the country director, wrote that ‘on my instructions Hassan asked Gen (R) Nadeem to give an honest assessment as to what he thinks our chances are of surviving this.’ Gen (R) Nadeem replied that he felt confident regarding the answers we (NGO) will give to the questions proposed, ‘he could convince the other commission members to go with the fact rather than the content of Afridi’s statement.’ Gen (R) Nadeem also advised to fight the expulsion of our expatriates, Wrights email continued. “He felt if we did not do this and the expats left, the ISI would then move quickly to close down the country programme before the Commission report comes out.” Report draft shared with the NGO: Wright’s another email indicates that the draft was shared more than once with the NGO. Referring to a meeting of two senior officers of Save the Children with Gen (R) Nadeem, the country director said they were shown the report written by the Chairman of the Commission. The email said there were four versions of the report in June 2012 and these were reduced to two in August that year. However, they have reservations about the latest version shared in August as ‘the report which was originally thought to be our saviour, will be the tool for this expulsion.’ We will do our best, the email reads, to work ‘with our friends and try and get our responses in before the report is finalised.’ SOURCE: THE NEWS Record shows Abbottabad Commission was penetrated by CIA - thenews.com.pk
1More

'Clinton death list': 33 spine-tingling cases - 0 views

  •  
    "(Editor's note: This list was originally published in August 2016 and has gone viral on the web. WND is running it again as American voters cast their ballots for the nation's next president on Election Day.) How many people do you personally know who have died mysteriously? How about in plane crashes or car wrecks? Bizarre suicides? People beaten to death or murdered in a hail of bullets? And what about violent freak accidents - like separate mountain biking and skiing collisions in Aspen, Colorado? Or barbells crushing a person's throat? Bill and Hillary Clinton attend a funeral Apparently, if you're Bill or Hillary Clinton, the answer to that question is at least 33 - and possibly many more. Talk-radio star Rush Limbaugh addressed the issue of the "Clinton body count" during an August show. "I swear, I could swear I saw these stories back in 1992, back in 1993, 1994," Limbaugh said. He cited a report from Rachel Alexander at Townhall.com titled, "Clinton body count or left-wing conspiracy? Three with ties to DNC mysteriously die." Limbaugh said he recalled Ted Koppel, then-anchor of ABC News' "Nightline," routinely having discussions on the issue following the July 20, 1993, death of White House Deputy Counsel Vince Foster. In fact, Limbaugh said, he appeared on Koppel's show. "One of the things I said was, 'Who knows what happened here? But let me ask you a question.' I said, 'Ted, how many people do you know in your life who've been murdered? Ted, how many people do you know in your life that have died under suspicious circumstances?' "Of course, the answer is zilch, zero, nada, none, very few," Limbaugh chuckled. "Ask the Clintons that question. And it's a significant number. It's a lot of people that they know who have died, who've been murdered. "And the same question here from Rachel Alexander. It's amazing the cycle that exists with the Clintons. [Citing Townhall]: 'What it
4More

White House to release independent report on NSA spying - CNN.com - 0 views

  • An independent assessment of National Security Agency surveillance ordered by President Barack Obama following classified leaks by Edward Snowden will be released Wednesday, White House spokesman Jay Carney said. The review was submitted last week by an outside panel, but Carney said news reports about its recommendations were "inaccurate" so the White House has decided to release the conclusions now rather than in January as previously planned.
  • Release of the findings would come two days after a federal judge in Washington ruled preliminarily that NSA data collection of telephone metadata was probably unconstitutional on privacy grounds.
  • Company executives met with Obama on Tuesday, and sources told CNN's Jake Tapper that those present got the impression from the President that NSA metadata collection would not stop anytime soon but that more efforts at transparency would be made.
  •  
    "Independent assessment." By a group of people hand-picked by Director of Intelligence James Clapper himself. "Independent" would be making everything public and allowing the affected public to weigh in on what they find. But stand by, the report is due out today. 
4More

McCain Proposes New Select Committee on NSA Leaks - Secrecy News - 0 views

  • A resolution introduced yesterday by Sen. John McCain would establish a new Senate Select Committee to investigate the unauthorized disclosures of classified information on National Security Agency collection programs and their implications for national policy. The McCain resolution is framed broadly and touches on many issues besides leaks, including intelligence policy, congressional oversight, the role of contractors, the constitutionality of current intelligence programs, and more. The resolution asserts that “senior officials in the intelligence community may have misled Congress or otherwise obfuscated the nature, extent, or use of certain intelligence-collection programs, operations, and activities of the National Security Agency, including intelligence-collection programs affecting Americans.” “[T]he provision of incomplete or inaccurate information by officials of the intelligence community has inhibited effective congressional oversight of certain intelligence-collection programs, operations, and activities of the National Security Agency, including intelligence-collection programs affecting Americans, and undermined congressional and public support of these programs,” the resolution stated.
  • Moreover, “some such programs, operations, and activities that are the subject matter of the unauthorized disclosures may not have been authorized, or may have exceeded that which was authorized, by law, or may not have been permitted under the Constitution of the United States.” The proposed new select committee would investigate the unauthorized disclosures and assess how they occurred, the damage to U.S. national security that resulted, and how such damage could be mitigated. The committee would review the role of intelligence contractors and the adequacy of current management controls.
  • The committee would evaluate the legality, constitutionality, and efficacy of the NSA collection programs that have been disclosed. It would also consider “the need for greater transparency and more effective congressional oversight of intelligence community activities,” and whether existing laws are sufficient “to safeguard the rights and privacies of citizens of the United States.” In proposing a new select committee, Senator McCain is implicitly declaring that existing oversight procedures are inadequate, and that a new, more fundamental approach is required. The prospects for the McCain proposal to become a reality are uncertain.
  •  
    Reading the McCain resolution left me with mixed feelings. As worded, the proposed Select Committee is largely aimed at the right subjects but suffers somewhat from focus on a rather diffuse set of individual trees rather than on the forest. I.e., the topic should be definition of digital privacy rights and their vindication but focuses instead on NSA reform. The most worrisome aspect is the absence of a mechanism to ensure that the few Senators who have taken the lead in protection of civil liberties would become members of the Select Committee; rather, appointments to the Select Committee are parceled out to be made various existing Committee chairs and ranking minority members, plus top ranking Senators of both parties.   But this could also be the 2014 counterpart to the 1975 Church Committee that resulted in significant reform of U.S. spy agencies, albeit the spy agencies seem to have managed to work their way around those reforms.  
4More

ExposeFacts - For Whistleblowers, Journalism and Democracy - 0 views

  • Launched by the Institute for Public Accuracy in June 2014, ExposeFacts.org represents a new approach for encouraging whistleblowers to disclose information that citizens need to make truly informed decisions in a democracy. From the outset, our message is clear: “Whistleblowers Welcome at ExposeFacts.org.” ExposeFacts aims to shed light on concealed activities that are relevant to human rights, corporate malfeasance, the environment, civil liberties and war. At a time when key provisions of the First, Fourth and Fifth Amendments are under assault, we are standing up for a free press, privacy, transparency and due process as we seek to reveal official information—whether governmental or corporate—that the public has a right to know. While no software can provide an ironclad guarantee of confidentiality, ExposeFacts—assisted by the Freedom of the Press Foundation and its “SecureDrop” whistleblower submission system—is utilizing the latest technology on behalf of anonymity for anyone submitting materials via the ExposeFacts.org website. As journalists we are committed to the goal of protecting the identity of every source who wishes to remain anonymous.
  • The seasoned editorial board of ExposeFacts will be assessing all the submitted material and, when deemed appropriate, will arrange for journalistic release of information. In exercising its judgment, the editorial board is able to call on the expertise of the ExposeFacts advisory board, which includes more than 40 journalists, whistleblowers, former U.S. government officials and others with wide-ranging expertise. We are proud that Pentagon Papers whistleblower Daniel Ellsberg was the first person to become a member of the ExposeFacts advisory board. The icon below links to a SecureDrop implementation for ExposeFacts overseen by the Freedom of the Press Foundation and is only accessible using the Tor browser. As the Freedom of the Press Foundation notes, no one can guarantee 100 percent security, but this provides a “significantly more secure environment for sources to get information than exists through normal digital channels, but there are always risks.” ExposeFacts follows all guidelines as recommended by Freedom of the Press Foundation, and whistleblowers should too; the SecureDrop onion URL should only be accessed with the Tor browser — and, for added security, be running the Tails operating system. Whistleblowers should not log-in to SecureDrop from a home or office Internet connection, but rather from public wifi, preferably one you do not frequent. Whistleblowers should keep to a minimum interacting with whistleblowing-related websites unless they are using such secure software.
    • Gary Edwards
       
      Thanks Paul! Great article and I agree with you about switching. Rather than a USB, I would rather look into a SSD and try to isolate performance to an ISP bandwidth issue. FYI, I read your Diigo posts daily at this Web site: https://groups.diigo.com/group/socialism-and-the-end-of-the-american-dream/content/user/marbux Seems to be the best visual presentation of your research. I do however think Diigo could improve their hosting of this research by enabling more extensive comments. Notice that your comments are often clipped :( Still, I really do appreciate your sharing both your research and your commentary. Priceless stuff! Many thanks! ~ge~
  •  
    A new resource site for whistle-blowers. somewhat in the tradition of Wikileaks, but designed for encrypted communications between whistleblowers and journalists.  This one has an impressive board of advisors that includes several names I know and tend to trust, among them former whistle-blowers Daniel Ellsberg, Ray McGovern, Thomas Drake, William Binney, and Ann Wright. Leaked records can only be dropped from a web browser running the Tor anonymizer software and uses the SecureDrop system originally developed by Aaron Schwartz. They strongly recommend using the Tails secure operating system that can be installed to a thumb drive and leaves no tracks on the host machine. https://tails.boum.org/index.en.html Curious, I downloaded Tails and installed it to a virtual machine. It's a heavily customized version of Debian. It has a very nice Gnome desktop and blocks any attempt to connect to an external network by means other than installed software that demands encrypted communications. For example, web sites can only be viewed via the Tor anonymizing proxy network. It does take longer for web pages to load because they are moving over a chain of proxies, but even so it's faster than pages loaded in the dial-up modem days, even for web pages that are loaded with graphics, javascript, and other cruft. E.g., about 2 seconds for New York Times pages. All cookies are treated by default as session cookies so disappear when you close the page or the browser. I love my Linux Mint desktop, but I am thinking hard about switching that box to Tails. I've been looking for methods to send a lot more encrypted stuff down the pipe for NSA to store. Tails looks to make that not only easy, but unavoidable. From what I've gathered so far, if you want to install more software on Tails, it takes about an hour to create a customized version and then update your Tails installation from a new ISO file. Tails has a wonderful odor of having been designed for secure computing. Current
1 - 20 of 35 Next ›
Showing 20 items per page